In direct sequence (DS) spread spectrum communication system, the first condition of receiving correct data is code synchronization. Synchronization is one of the key techniques in spread spectrum communication systems. This paper presents pseudo-noise (PN) code acquisition and tracking technology. Spread spectrum communication technology is combined with software radio technology to constitute spread spectrum communication system based on software radio technology. Analog circuit design time can be bypassed. And volume, weight and cost of communication equipment are also greatly reduced. Simulation results are given in this paper.
{"title":"The Research of Code Synchronization of Spread Spectrum Communication System Based on FPGA","authors":"Hui Du, Quan Ding, Ziheng Yang","doi":"10.1109/IBICA.2011.47","DOIUrl":"https://doi.org/10.1109/IBICA.2011.47","url":null,"abstract":"In direct sequence (DS) spread spectrum communication system, the first condition of receiving correct data is code synchronization. Synchronization is one of the key techniques in spread spectrum communication systems. This paper presents pseudo-noise (PN) code acquisition and tracking technology. Spread spectrum communication technology is combined with software radio technology to constitute spread spectrum communication system based on software radio technology. Analog circuit design time can be bypassed. And volume, weight and cost of communication equipment are also greatly reduced. Simulation results are given in this paper.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121762887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Teng, Cheng-Min Lin, K. Lang, Yi-Lun Chu, Shou-Jie Chen
An interface between Android cell phone and external world by taking the advantages of Android IOIO is demonstrated experimentally. The hardware and software is described in this report while the capability of human-machine interface is also presented.
{"title":"An Implementation for Connecting Android Powered Device to External World","authors":"H. Teng, Cheng-Min Lin, K. Lang, Yi-Lun Chu, Shou-Jie Chen","doi":"10.1109/IBICA.2011.80","DOIUrl":"https://doi.org/10.1109/IBICA.2011.80","url":null,"abstract":"An interface between Android cell phone and external world by taking the advantages of Android IOIO is demonstrated experimentally. The hardware and software is described in this report while the capability of human-machine interface is also presented.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123068453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the continuously development of nuclear power enterprise information, various application system of coupling degree become more and more high. On the analysis of traditional application integration technology, research and implement a integrated framework model between the nuclear power overhaul management system and other application system based on web service, to interact with the application system automated, timing or real-time of data synchronization, to complete the close integration of business platform.
{"title":"Research and Implementation of Nuclear Power Overhaul Schedule Automatic Control Platform Based on WebService","authors":"Zinian Shi, Ying Peng","doi":"10.1109/IBICA.2011.40","DOIUrl":"https://doi.org/10.1109/IBICA.2011.40","url":null,"abstract":"With the continuously development of nuclear power enterprise information, various application system of coupling degree become more and more high. On the analysis of traditional application integration technology, research and implement a integrated framework model between the nuclear power overhaul management system and other application system based on web service, to interact with the application system automated, timing or real-time of data synchronization, to complete the close integration of business platform.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130042804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Artificial plant optimization algorithm is proposed to solve constrained optimization problems in this paper. In APOA, a shrinkage coefficient is introduce to ensure that all dimensions of a branch are within lower and upper bounds, and a new function to determine whether the particle is within the feasible region. One dimensional search optimization methods are selected in algorithm to produce a new position which is guaranteed to be in the feasible region for the branch which escapes from the feasible region. The experimental results show that artificial plant optimization algorithm is effective and efficient for constrained optimization problems.
{"title":"Artificial Plant Optimization Algorithm for Constrained Optimization Problems","authors":"Ziqiang Zhao, Z. Cui, J. Zeng, Xiaoguang Yue","doi":"10.1109/IBICA.2011.34","DOIUrl":"https://doi.org/10.1109/IBICA.2011.34","url":null,"abstract":"Artificial plant optimization algorithm is proposed to solve constrained optimization problems in this paper. In APOA, a shrinkage coefficient is introduce to ensure that all dimensions of a branch are within lower and upper bounds, and a new function to determine whether the particle is within the feasible region. One dimensional search optimization methods are selected in algorithm to produce a new position which is guaranteed to be in the feasible region for the branch which escapes from the feasible region. The experimental results show that artificial plant optimization algorithm is effective and efficient for constrained optimization problems.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"os-42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127783751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Lu, Yu-Yi Chen, Jing-Min Wang, J. Jan, Chih-Cheng Chen, Y. Lai
The common solution is using the plastic-type sealsto protect the power meter. The purpose of sealing is toguarantee the identity and integrity of the power meter.However, the seals are easy to reach. Once the seals werebroken, it is simple to tamper the energy meter. In order toachieve the more security of power meter, a new class of electronic seals based on radio frequency identification (RFID)technology has been developed. The RFID seal is more costeffective than the smart power meter. It can be applied to today's environment for achieving the purpose of tamperproof.In this paper, we focused on this important aspect of electricity theft which has been a matter of serious concern for the powercompanies. We design and implement an innovative, secure, efficient, and flexible RFID eSeals application for power meter. It can be guaranteed for the integrity of power meter andenhance the efficiency.
{"title":"Study and Implementation of RFID Eseals for Power Meters","authors":"J. Lu, Yu-Yi Chen, Jing-Min Wang, J. Jan, Chih-Cheng Chen, Y. Lai","doi":"10.1109/IBICA.2011.93","DOIUrl":"https://doi.org/10.1109/IBICA.2011.93","url":null,"abstract":"The common solution is using the plastic-type sealsto protect the power meter. The purpose of sealing is toguarantee the identity and integrity of the power meter.However, the seals are easy to reach. Once the seals werebroken, it is simple to tamper the energy meter. In order toachieve the more security of power meter, a new class of electronic seals based on radio frequency identification (RFID)technology has been developed. The RFID seal is more costeffective than the smart power meter. It can be applied to today's environment for achieving the purpose of tamperproof.In this paper, we focused on this important aspect of electricity theft which has been a matter of serious concern for the powercompanies. We design and implement an innovative, secure, efficient, and flexible RFID eSeals application for power meter. It can be guaranteed for the integrity of power meter andenhance the efficiency.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116383472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A large number of training samples is requiredin developing visual object recognition systems. However, the size of samples is limited sometimes. This paper investigates bagging of one class support vector machines (OCSVM), which just use one class of objects for training. Experiments are performed on Caltech101 database. Our findings show that the performance with bagging method is better than single OCSVM. Furthermore, bagging of OCSVM can also keep better performance with limited number of training samples.
{"title":"Visual Object Recognition with Bagging of One Class Support Vector Machines","authors":"Zongxia Xie, Yong Xu, Qinghua Hu","doi":"10.1109/IBICA.2011.29","DOIUrl":"https://doi.org/10.1109/IBICA.2011.29","url":null,"abstract":"A large number of training samples is requiredin developing visual object recognition systems. However, the size of samples is limited sometimes. This paper investigates bagging of one class support vector machines (OCSVM), which just use one class of objects for training. Experiments are performed on Caltech101 database. Our findings show that the performance with bagging method is better than single OCSVM. Furthermore, bagging of OCSVM can also keep better performance with limited number of training samples.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122587871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research aims to propose a universalframework and to model slight location-based services (LBS) design components, which are generated by UML.Furthermore, these components can be combined with a LBS process of design and then to execute process more efficiency ineach design stages of LBS. We use UML as our tool to model LBS components. The components are created by the diagrams of UML, with the characteristic of object-oriented technology,this research can be demonstrated by four concepts of UML diagrams, and present each dimensions of its concepts. Beside,LBS application is a trend while whole infrastructure has turned more mature in recent years, including locating technology, broadband network connectivity and inexpensivemobile devices with many location-based functions. Currently, most developing methods of LBS do not follow standard system developing methods, but the design of LBS becomesmore complicate, it's more important to propose a universal framework for developers to plan, design and maintain LBS systems with more efficient and agile methods. Most softwaredevelopers should have further understanding in designing LBS, in our proposed architecture, developers can design LBS, which is more suitable than developed LBS with traditionalmethod. Finally, the contribution of our research is to propose a universal designing architecture that combines the specificcharacteristic of LBS, and developer can to recruit the vital dimension in LBS designing process.
{"title":"Universal Design of Location-Based Services","authors":"Tung-Hsiang Chou, Chi-Yuan Bai","doi":"10.1109/IBICA.2011.52","DOIUrl":"https://doi.org/10.1109/IBICA.2011.52","url":null,"abstract":"This research aims to propose a universalframework and to model slight location-based services (LBS) design components, which are generated by UML.Furthermore, these components can be combined with a LBS process of design and then to execute process more efficiency ineach design stages of LBS. We use UML as our tool to model LBS components. The components are created by the diagrams of UML, with the characteristic of object-oriented technology,this research can be demonstrated by four concepts of UML diagrams, and present each dimensions of its concepts. Beside,LBS application is a trend while whole infrastructure has turned more mature in recent years, including locating technology, broadband network connectivity and inexpensivemobile devices with many location-based functions. Currently, most developing methods of LBS do not follow standard system developing methods, but the design of LBS becomesmore complicate, it's more important to propose a universal framework for developers to plan, design and maintain LBS systems with more efficient and agile methods. Most softwaredevelopers should have further understanding in designing LBS, in our proposed architecture, developers can design LBS, which is more suitable than developed LBS with traditionalmethod. Finally, the contribution of our research is to propose a universal designing architecture that combines the specificcharacteristic of LBS, and developer can to recruit the vital dimension in LBS designing process.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116183360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the actual operation of ERP system, data management must adhere to the principle of data-centric, data standardization, improved data optimization, and data maintenance work should attach great importance to the accuracy, completeness and timeliness of data. In this paper, group enterprise data standardization and group management and control are analyzed and researched on data maintenance strategy and core master data characteristics, the Group's business features, data maintenance strategy, maintenance organization architecture design, organization architecture responsibility, data maintenance process design, data maintenance timeliness, data maintenance quality, particle data management are all analyzed in detail from a multi-dimensional perspective. The design, advantages and disadvantages of the three maintenance strategies, maintenance organization and maintenance process program are compared and analyzed, and the corresponding solutions are put forward.
{"title":"Data Maintenance and Control Strategy of Group Management","authors":"Yuchun Zhang, Zhiqiang Ye","doi":"10.1109/IBICA.2011.39","DOIUrl":"https://doi.org/10.1109/IBICA.2011.39","url":null,"abstract":"In the actual operation of ERP system, data management must adhere to the principle of data-centric, data standardization, improved data optimization, and data maintenance work should attach great importance to the accuracy, completeness and timeliness of data. In this paper, group enterprise data standardization and group management and control are analyzed and researched on data maintenance strategy and core master data characteristics, the Group's business features, data maintenance strategy, maintenance organization architecture design, organization architecture responsibility, data maintenance process design, data maintenance timeliness, data maintenance quality, particle data management are all analyzed in detail from a multi-dimensional perspective. The design, advantages and disadvantages of the three maintenance strategies, maintenance organization and maintenance process program are compared and analyzed, and the corresponding solutions are put forward.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126448838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, many researchers address on the problem of reducing power consumption for data aggregation in wireless sensor networks. However, many existing event-to-sink routing schemes for data aggregation require assistance from a global positioning system (GPS), which is not always available. In this paper, we propose a GPS-free event-to-sink routing scheme for data aggregation in wireless sensor networks (GFESR). In GFESR, an axis-based virtual coordinate assignment protocol (ABVCap) that requires no GPS assistance is used to assign each node at least a virtual coordinate in wireless sensor networks. The event-to-sink routing scheme based on ABVCap is proposed to aggregate data for reducing the power consumption. In GFESR, the sensors are grouped into a number of cells. The events in the same cell are aggregated by intra-cell routing scheme and the events in different cells are aggregated by inter-cell routing scheme.
{"title":"GPS-Free Event-to-Sink Routing Scheme for Data Aggregation in Wireless Sensor Networks","authors":"Bing-Hong Liu, Jyun-Yu Jhang, Kuo-Wen Su","doi":"10.1109/IBICA.2011.11","DOIUrl":"https://doi.org/10.1109/IBICA.2011.11","url":null,"abstract":"Recently, many researchers address on the problem of reducing power consumption for data aggregation in wireless sensor networks. However, many existing event-to-sink routing schemes for data aggregation require assistance from a global positioning system (GPS), which is not always available. In this paper, we propose a GPS-free event-to-sink routing scheme for data aggregation in wireless sensor networks (GFESR). In GFESR, an axis-based virtual coordinate assignment protocol (ABVCap) that requires no GPS assistance is used to assign each node at least a virtual coordinate in wireless sensor networks. The event-to-sink routing scheme based on ABVCap is proposed to aggregate data for reducing the power consumption. In GFESR, the sensors are grouped into a number of cells. The events in the same cell are aggregated by intra-cell routing scheme and the events in different cells are aggregated by inter-cell routing scheme.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127188047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Community marketing,whose core of precision marketing, is pushingthe advertisement to the users who really need it.In this article, through building the feature model and interest model of users , we use ontology analysis and semantic mining to analyse behavior characteristics,statement and comments,concerned content etc,and finally dynamically build the real feature attribut and interest set of community users. In addition, we use reasoning under uncertainty to deduce users' feature and interest. Our experiment demonstrate that this method peformance good accuracy on users' feature attribute and interest set.
{"title":"Personalities Mining of Community Users Based on the Ontology Semantic Analysis","authors":"Wei Yu, T. Xiong","doi":"10.1109/IBICA.2011.100","DOIUrl":"https://doi.org/10.1109/IBICA.2011.100","url":null,"abstract":"Community marketing,whose core of precision marketing, is pushingthe advertisement to the users who really need it.In this article, through building the feature model and interest model of users , we use ontology analysis and semantic mining to analyse behavior characteristics,statement and comments,concerned content etc,and finally dynamically build the real feature attribut and interest set of community users. In addition, we use reasoning under uncertainty to deduce users' feature and interest. Our experiment demonstrate that this method peformance good accuracy on users' feature attribute and interest set.","PeriodicalId":158080,"journal":{"name":"2011 Second International Conference on Innovations in Bio-inspired Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130883058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}