Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183990
Bingyu Zou, Huanguo Zhang
Nowadays cloud computing is becoming more and more popular. As it saves cloud user the budget to purchase relatively expensive and easily outdated hardware and the energy to maintain system, some compromises comes along as well, such as computing environment and stored data out of control, which put cloud user on the horns of a dilemma. In order for cloud users to have more faith with the security of computing environment and data on the remote uncontrolled cloud, trust should be build between them. It's easier to trust when you can verify. We took advantage of sealed storage of trust computing to improve traditional trust chain technology in order to provide a dual verifiable trusted bootstrap to make sure each compartment during system bootstrap not to be maliciously changed. We extend trusted chain to memory by developing monitoring tools in privileged domain using features provided by virtual machine monitor to monitor and record runtime states of security critical application in targeted virtual machine instance. Measurements of system configurations stored in platform configuration registers of TPM along with runtime states of application in cloud user's vm are reported to corresponding cloud user through remote attestation which is a key feature of trusted computing as well in order to provide genuine evidences to cloud user.
{"title":"Toward enhancing trust in cloud computing enviroment","authors":"Bingyu Zou, Huanguo Zhang","doi":"10.1109/ICCIAUTOM.2011.6183990","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183990","url":null,"abstract":"Nowadays cloud computing is becoming more and more popular. As it saves cloud user the budget to purchase relatively expensive and easily outdated hardware and the energy to maintain system, some compromises comes along as well, such as computing environment and stored data out of control, which put cloud user on the horns of a dilemma. In order for cloud users to have more faith with the security of computing environment and data on the remote uncontrolled cloud, trust should be build between them. It's easier to trust when you can verify. We took advantage of sealed storage of trust computing to improve traditional trust chain technology in order to provide a dual verifiable trusted bootstrap to make sure each compartment during system bootstrap not to be maliciously changed. We extend trusted chain to memory by developing monitoring tools in privileged domain using features provided by virtual machine monitor to monitor and record runtime states of security critical application in targeted virtual machine instance. Measurements of system configurations stored in platform configuration registers of TPM along with runtime states of application in cloud user's vm are reported to corresponding cloud user through remote attestation which is a key feature of trusted computing as well in order to provide genuine evidences to cloud user.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132277993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183894
Hao Cheng, Li Jin-wei, Li Jia-biao
Study of the laser level meter based on semiconductor laser diode. Using the emission laser diode - avalanche diode accept - MCU control level meter is designed, The principle is analyzed using phase measuring the distance from the level meter to surface material, It has a simple structure, low cost, stable, high accuracy to good effect.
{"title":"Research on laser level meter based on MSP430 MCU","authors":"Hao Cheng, Li Jin-wei, Li Jia-biao","doi":"10.1109/ICCIAUTOM.2011.6183894","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183894","url":null,"abstract":"Study of the laser level meter based on semiconductor laser diode. Using the emission laser diode - avalanche diode accept - MCU control level meter is designed, The principle is analyzed using phase measuring the distance from the level meter to surface material, It has a simple structure, low cost, stable, high accuracy to good effect.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"173 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132950008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183926
Yi Zhang, Zeeshan Fareed
This paper presents the insects' image preprocessing, feature extraction and target recognition. The objective of this research was to design a new type of insect multimedia databases. Implementation of three types of basic feature extraction methods: color features of image, texture features and shape features, mainly the color vector, Gabor-wavelet transform, Fourier, GLCM, etc was done and then experimental results were analyzed. Authors suggested a new assisted GPS feature which can improve the retrieval efficiency of large insect's dataset. Designed and implemented a multi-feature asynchronous insect retrieval system, multi-feature fusion research retrieval features normalization and similarity measure algorithm. Implemented insect identification sample tested in Matlab and Visual C++ environment and the test results were analyzed. The proposed database will include audio, video and special image (such as the infrared image). This research will add an assistant feature of GPS applications, and this feature will effectively enhance the efficiency of retrieval in large dataset.
{"title":"Prototype system of insects identification based on computer vision","authors":"Yi Zhang, Zeeshan Fareed","doi":"10.1109/ICCIAUTOM.2011.6183926","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183926","url":null,"abstract":"This paper presents the insects' image preprocessing, feature extraction and target recognition. The objective of this research was to design a new type of insect multimedia databases. Implementation of three types of basic feature extraction methods: color features of image, texture features and shape features, mainly the color vector, Gabor-wavelet transform, Fourier, GLCM, etc was done and then experimental results were analyzed. Authors suggested a new assisted GPS feature which can improve the retrieval efficiency of large insect's dataset. Designed and implemented a multi-feature asynchronous insect retrieval system, multi-feature fusion research retrieval features normalization and similarity measure algorithm. Implemented insect identification sample tested in Matlab and Visual C++ environment and the test results were analyzed. The proposed database will include audio, video and special image (such as the infrared image). This research will add an assistant feature of GPS applications, and this feature will effectively enhance the efficiency of retrieval in large dataset.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116722532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183907
You Fei
Universal fuzzy approximators can be used in a practical fuzzy system. We introduce the rule-intersection operator, and list 23 rule-intersection operators. A kind of rule-intersection-operator-based fuzzy systems is set up. It is turned out that the rule-intersection-operator-based fuzzy systems are universal fuzzy approximators. The necessary condition and the sufficient condition are respectively investigated on which the general rule-intersection-operator-based fuzzy systems are universal fuzzy approximators.
{"title":"Necessary and sufficient conditions on RIO-based fuzzy systems are universal fuzzy approximators","authors":"You Fei","doi":"10.1109/ICCIAUTOM.2011.6183907","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183907","url":null,"abstract":"Universal fuzzy approximators can be used in a practical fuzzy system. We introduce the rule-intersection operator, and list 23 rule-intersection operators. A kind of rule-intersection-operator-based fuzzy systems is set up. It is turned out that the rule-intersection-operator-based fuzzy systems are universal fuzzy approximators. The necessary condition and the sufficient condition are respectively investigated on which the general rule-intersection-operator-based fuzzy systems are universal fuzzy approximators.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114735018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183998
Jianbo Li, Shan Jiang, Hequn Xian
Many Delay Tolerant Networks (DTNs) applications need multicast service, thus making efficient multicast communication support essential. In this paper, we propose a Probability-based Adaptive Multicast Routing scheme (PAMR) to address the challenges of intermittent link connectivity and frequent partitions in DTNs. PAMR relies on node encounter histories rather than the global knowledge or the summary of link states of the network topology, which makes PAMR be more flexible and practical than the existing multicast routing schemes. Furthermore, PAMR can handle different DTNs application scenarios by adjusting network parameters. Extensive simulations have been conducted to verify the performance of PAMR and the results indicate that the PAMR scheme can achieve a higher bundle delivery ratio and incur much smaller end-to-end delay at the cost of comparatively lower delivery efficiency.
{"title":"A probability based adaptive multicast routing scheme for delay tolerant networks","authors":"Jianbo Li, Shan Jiang, Hequn Xian","doi":"10.1109/ICCIAUTOM.2011.6183998","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183998","url":null,"abstract":"Many Delay Tolerant Networks (DTNs) applications need multicast service, thus making efficient multicast communication support essential. In this paper, we propose a Probability-based Adaptive Multicast Routing scheme (PAMR) to address the challenges of intermittent link connectivity and frequent partitions in DTNs. PAMR relies on node encounter histories rather than the global knowledge or the summary of link states of the network topology, which makes PAMR be more flexible and practical than the existing multicast routing schemes. Furthermore, PAMR can handle different DTNs application scenarios by adjusting network parameters. Extensive simulations have been conducted to verify the performance of PAMR and the results indicate that the PAMR scheme can achieve a higher bundle delivery ratio and incur much smaller end-to-end delay at the cost of comparatively lower delivery efficiency.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183967
Desheng Liu, Guo Jing, Xiong Wei
The requirement of the Integration of the C4ISR simulation system is analyzed. Then the definition, architecture, and main realizations are described. The Integration framework based on SOA for C4ISR simulation systems is designed. On the base of the framework, the simulation application systems are integrated effectively and linked seamlessly.
{"title":"Design of C4ISR simulation system based on SOA","authors":"Desheng Liu, Guo Jing, Xiong Wei","doi":"10.1109/ICCIAUTOM.2011.6183967","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183967","url":null,"abstract":"The requirement of the Integration of the C4ISR simulation system is analyzed. Then the definition, architecture, and main realizations are described. The Integration framework based on SOA for C4ISR simulation systems is designed. On the base of the framework, the simulation application systems are integrated effectively and linked seamlessly.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128426589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6184023
Xitao Zheng, Yongwei Zhang, Jun Shi, Yehua Yu
A fuzzy clustering recognition method is proposed to identify cells from sliced marrow cell image. In our image processing, leukocytes can be distinguished against other cells like red cell, megakaryocyte, and cytoplasm. The leukocytes can be further distinguished into promyelocyte, myelocyte or metamyelocyte. Probably the ratio of the counts of these three kinds of leukocytes can be used as the indication of leukemia relapse. Previous work on this project involves the recognition using pixel distribution and probability lays the background of data processing and preprocessing. Constraints based on size, pixel distribution, and grayscale pattern are used for the successful counting and positioning of individual cells. This shape, pattern and color based method can reach satisfied counting and we hope it can be used to get the relative positions for the research of pro-ALIP structure.
{"title":"A method to distinguish leukocytes from marrow cell images based on fuzzy clustering","authors":"Xitao Zheng, Yongwei Zhang, Jun Shi, Yehua Yu","doi":"10.1109/ICCIAUTOM.2011.6184023","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184023","url":null,"abstract":"A fuzzy clustering recognition method is proposed to identify cells from sliced marrow cell image. In our image processing, leukocytes can be distinguished against other cells like red cell, megakaryocyte, and cytoplasm. The leukocytes can be further distinguished into promyelocyte, myelocyte or metamyelocyte. Probably the ratio of the counts of these three kinds of leukocytes can be used as the indication of leukemia relapse. Previous work on this project involves the recognition using pixel distribution and probability lays the background of data processing and preprocessing. Constraints based on size, pixel distribution, and grayscale pattern are used for the successful counting and positioning of individual cells. This shape, pattern and color based method can reach satisfied counting and we hope it can be used to get the relative positions for the research of pro-ALIP structure.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133312655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6184032
Liu Hongyi, Luo Yunfeng, Xie Shuguo, Zhao Di
In this paper, an artificial neural network based method is proposed in order to better evaluate and predict the electromagnetic compatibility. There are many inherent shortcomings in traditional BP neural networks. Thereafter, two improved BP neural network based method are introduced: BP neural networks with an additional momentum term and self-adaptive learning rate BP neural networks. The feasibility of applying these two methods to the evaluation and prediction of EMC. A simulation experiment is also given, together with the comparison of the two improved BP neural networks.
{"title":"A BP neural network based prediction method for electromagnetic compatibility","authors":"Liu Hongyi, Luo Yunfeng, Xie Shuguo, Zhao Di","doi":"10.1109/ICCIAUTOM.2011.6184032","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184032","url":null,"abstract":"In this paper, an artificial neural network based method is proposed in order to better evaluate and predict the electromagnetic compatibility. There are many inherent shortcomings in traditional BP neural networks. Thereafter, two improved BP neural network based method are introduced: BP neural networks with an additional momentum term and self-adaptive learning rate BP neural networks. The feasibility of applying these two methods to the evaluation and prediction of EMC. A simulation experiment is also given, together with the comparison of the two improved BP neural networks.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133638644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183986
Feng Biming, Song Jianjun
Using the virtual displacement of missile in short time, established a 3-dimensional variable structure guidance (VSG) logic with terminal angle constraints for un-powered homing missile. Then contrasted the trajectories, control angles and loads of the missile with VSG and PNG (proportional navigation guidance) command order, and the simulation results showed that the designed guidance logic not only could make sure the missile impact the target in specified direction precisely, but also make sure the final control angles close to zero. So the designed guidance law adapted to the homing missile to attack ground target precisely with terminal angle constraints.
{"title":"Three-dimensional variable structure guidance law for homing missile with terminal angle constraints","authors":"Feng Biming, Song Jianjun","doi":"10.1109/ICCIAUTOM.2011.6183986","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183986","url":null,"abstract":"Using the virtual displacement of missile in short time, established a 3-dimensional variable structure guidance (VSG) logic with terminal angle constraints for un-powered homing missile. Then contrasted the trajectories, control angles and loads of the missile with VSG and PNG (proportional navigation guidance) command order, and the simulation results showed that the designed guidance logic not only could make sure the missile impact the target in specified direction precisely, but also make sure the final control angles close to zero. So the designed guidance law adapted to the homing missile to attack ground target precisely with terminal angle constraints.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124790069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183950
Jiang Shuming, X. Shijie, Z. Jianfeng, W. Zhiqiang, Li Jian, Wang Shuai
Through the analysis of flowers pattern, firstly this paper abstracts the needed patterns and uses the genetic algorithm to generate new pattern so as to found a colorful pattern. And then through the analysis of the flowers pattern, it selects and assembles the various patterns automatically to create lots of different styles of the art patterns which can also be manually changed according to the actual needs. The above method has been proved in the experiment that it can enhance the creativity of the flowers pattern designer.
{"title":"Application of genetic algorithm in computer aided design","authors":"Jiang Shuming, X. Shijie, Z. Jianfeng, W. Zhiqiang, Li Jian, Wang Shuai","doi":"10.1109/ICCIAUTOM.2011.6183950","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183950","url":null,"abstract":"Through the analysis of flowers pattern, firstly this paper abstracts the needed patterns and uses the genetic algorithm to generate new pattern so as to found a colorful pattern. And then through the analysis of the flowers pattern, it selects and assembles the various patterns automatically to create lots of different styles of the art patterns which can also be manually changed according to the actual needs. The above method has been proved in the experiment that it can enhance the creativity of the flowers pattern designer.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}