Pub Date : 2010-11-01DOI: 10.1109/YCICT.2010.5713139
Zhizhou Li, Guohua Liu, Rui Zhang, Zhencai Zhu
Fault location is important for attitude determination (AD) of satellite which provides better services without any degradation. Firstly, the assumption of statistically independent between 3-axis Euler angles and statistically independent between Euler angles and faults are proposed in this paper. Also it is assumed the fault appears only in one group of sensors and the fault is additive. With two difference groups of sensor measuring the Euler angles of satellite, the link between fault location and blind source separation (BSS) is established. Secondly, independent component analysis(ICA) algorithm is used for BSS. Finally, using semi-blind source separation (SBSS) method with correlation coefficient and pattern recognition of the mixed matrix, ambiguities of BSS are overcome. The numerical simulation shows this method can fulfill fault location and extraction of the attitude AD system.
{"title":"Using semi-blind source separation in multi-sensor fault location of satellite attitude determination system","authors":"Zhizhou Li, Guohua Liu, Rui Zhang, Zhencai Zhu","doi":"10.1109/YCICT.2010.5713139","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713139","url":null,"abstract":"Fault location is important for attitude determination (AD) of satellite which provides better services without any degradation. Firstly, the assumption of statistically independent between 3-axis Euler angles and statistically independent between Euler angles and faults are proposed in this paper. Also it is assumed the fault appears only in one group of sensors and the fault is additive. With two difference groups of sensor measuring the Euler angles of satellite, the link between fault location and blind source separation (BSS) is established. Secondly, independent component analysis(ICA) algorithm is used for BSS. Finally, using semi-blind source separation (SBSS) method with correlation coefficient and pattern recognition of the mixed matrix, ambiguities of BSS are overcome. The numerical simulation shows this method can fulfill fault location and extraction of the attitude AD system.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133045808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/YCICT.2010.5713135
H. Cai, Lianfeng Huang, Zhibin Gao, Xiaonan Cui
Allocating appropriate channels to the users (UE) is an important challenge in mobile networks. Heuristics Algorithm may be used to solve this problem. In this paper, a new time slot allocation (TSA) algorithm based on genetic algorithm (GA) is proposed after comparing to the dynamic queue TSA algorithm. The new algorithm is simulated and analyzed on the TD-SCDMA Radio Resource Management Simulation Platform designed by ourselves. The result shows that the genetic TSA is better than the centralized TSA, also shows that code channels in different time slot should be allocated preferentially to mobile station (MS) over that of different code channels in the same slot for the symmetrical services in TD-SCDMA system.
{"title":"Dynamic channel allocation based on genetic algorith in TD-SCDMA system","authors":"H. Cai, Lianfeng Huang, Zhibin Gao, Xiaonan Cui","doi":"10.1109/YCICT.2010.5713135","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713135","url":null,"abstract":"Allocating appropriate channels to the users (UE) is an important challenge in mobile networks. Heuristics Algorithm may be used to solve this problem. In this paper, a new time slot allocation (TSA) algorithm based on genetic algorithm (GA) is proposed after comparing to the dynamic queue TSA algorithm. The new algorithm is simulated and analyzed on the TD-SCDMA Radio Resource Management Simulation Platform designed by ourselves. The result shows that the genetic TSA is better than the centralized TSA, also shows that code channels in different time slot should be allocated preferentially to mobile station (MS) over that of different code channels in the same slot for the symmetrical services in TD-SCDMA system.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114019331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/YCICT.2010.5713059
Liu Ya-hui, Jia Qing-xuan, Sun Han-xu, Gao Xin
A spatial position analysis algorithm for multi-target tracking is proposed in multiple views. A target centroid marked is obtained from the zero and the first moments. Data association between a centroid and a trajectory exploits fuzzy C-mean clustering algorithm. Positions of moving targets are calculated by triangle principles in stereo vision. Furthermore, back projections from a three-dimensional point to a camera plane in each view angle are compared to the centroid in order to obtain RMS error. Experimental results indicate the method can reduce computational complexity and also be robust to occlusion, which can meet actual needs.
{"title":"Position analysis based on multiple views in multi-target tracking","authors":"Liu Ya-hui, Jia Qing-xuan, Sun Han-xu, Gao Xin","doi":"10.1109/YCICT.2010.5713059","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713059","url":null,"abstract":"A spatial position analysis algorithm for multi-target tracking is proposed in multiple views. A target centroid marked is obtained from the zero and the first moments. Data association between a centroid and a trajectory exploits fuzzy C-mean clustering algorithm. Positions of moving targets are calculated by triangle principles in stereo vision. Furthermore, back projections from a three-dimensional point to a camera plane in each view angle are compared to the centroid in order to obtain RMS error. Experimental results indicate the method can reduce computational complexity and also be robust to occlusion, which can meet actual needs.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121318783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/YCICT.2010.5713056
Xiuqing Yu
The concepts of the lower approximation integral, the upper approximation integral and rough integrals are given on the basis of function rough sets. Based on these concepts, the relation of the lower approximation integrals, the relation of the upper approximation integrals, the relation of rough integrals, and the double median theorem of rough integrals are discussed. Rough integrals have finite contraction characteristic and finite extension characteristic. Application is presented in research of teaching quality dynamic evaluation.
{"title":"Rough integrals generated by function rough sets and teaching information management-evaluation","authors":"Xiuqing Yu","doi":"10.1109/YCICT.2010.5713056","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713056","url":null,"abstract":"The concepts of the lower approximation integral, the upper approximation integral and rough integrals are given on the basis of function rough sets. Based on these concepts, the relation of the lower approximation integrals, the relation of the upper approximation integrals, the relation of rough integrals, and the double median theorem of rough integrals are discussed. Rough integrals have finite contraction characteristic and finite extension characteristic. Application is presented in research of teaching quality dynamic evaluation.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114581130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/YCICT.2010.5713116
Peidong Wang, Yishu Cong
A new security and efficient key pre-distribution scheme for wireless sensor network was put forward based on node ID and one-way hash functions, which could achieves a higher level security with considerably low communication overhead compared with existing typical pre-distribution scheme. This scheme could distribute and update the share key by one-time local broadcasting based on the one-way and non-comparison character of hash function, and resolve the problems of lower resiliency to node capture and higher communications burden in the key distribution and updating. The theoretical analysis and simulation experiments show that the whole network can afford the best security against the node capture attacking and performs outstanding ability in connectivity of network and also requires less storage consumption.
{"title":"ID-based key pre-distribution scheme for wireless sensor networks","authors":"Peidong Wang, Yishu Cong","doi":"10.1109/YCICT.2010.5713116","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713116","url":null,"abstract":"A new security and efficient key pre-distribution scheme for wireless sensor network was put forward based on node ID and one-way hash functions, which could achieves a higher level security with considerably low communication overhead compared with existing typical pre-distribution scheme. This scheme could distribute and update the share key by one-time local broadcasting based on the one-way and non-comparison character of hash function, and resolve the problems of lower resiliency to node capture and higher communications burden in the key distribution and updating. The theoretical analysis and simulation experiments show that the whole network can afford the best security against the node capture attacking and performs outstanding ability in connectivity of network and also requires less storage consumption.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116293310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/YCICT.2010.5713121
Zhang Yu-peng, Wang Yong-tian, Weng Dong-dong
Depth estimation is an important part in computer vision, which can be used in augmented reality and pattern recognition etc. At present, there are many methods of depth extraction, such as depth from defocus (DFD), depth from focus (DFF), stereo vision etc. Usually, depth information is very hard to be extracted from only one single shot. In that case, the calculation is lack of constraint. Coded aperture is a method of computational photography which just modifies the lens to plus some priors to realize the depth computation. We did some research on it, but found some problems in the process of layer judgment in depth extraction with coded aperture from one shot. The depth layer judgment in the existing method calculates the sum of convolution errors and derivatives priors, and determines the depth layer in which the minimum value is. However, this calculation is not very reliable and needs manually adjusting different parameters for different original images. In order to overcome the abovementioned problem, a novel depth judgment method is proposed. We note that canny operator is very sensitive to ringing effect and good to blurred image edge as well. According to the restored image sequence of the coded aperture, we use canny edge detection and morphological algorithm to score for every image, then we can judge which the proper one is. Experiments have proved that the proposed method is simple and effective.
{"title":"An improved method of depth judgment in coded aperture","authors":"Zhang Yu-peng, Wang Yong-tian, Weng Dong-dong","doi":"10.1109/YCICT.2010.5713121","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713121","url":null,"abstract":"Depth estimation is an important part in computer vision, which can be used in augmented reality and pattern recognition etc. At present, there are many methods of depth extraction, such as depth from defocus (DFD), depth from focus (DFF), stereo vision etc. Usually, depth information is very hard to be extracted from only one single shot. In that case, the calculation is lack of constraint. Coded aperture is a method of computational photography which just modifies the lens to plus some priors to realize the depth computation. We did some research on it, but found some problems in the process of layer judgment in depth extraction with coded aperture from one shot. The depth layer judgment in the existing method calculates the sum of convolution errors and derivatives priors, and determines the depth layer in which the minimum value is. However, this calculation is not very reliable and needs manually adjusting different parameters for different original images. In order to overcome the abovementioned problem, a novel depth judgment method is proposed. We note that canny operator is very sensitive to ringing effect and good to blurred image edge as well. According to the restored image sequence of the coded aperture, we use canny edge detection and morphological algorithm to score for every image, then we can judge which the proper one is. Experiments have proved that the proposed method is simple and effective.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126538790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/YCICT.2010.5713119
Qingxiao Guan, Jing Dong, T. Tan
In past several years so many feature sets for steganalysis were proposed to detect stego images. These features based on different ideas and were considered to be effective for most steganography schemes. However a systematically comparison of these features have not been made in previous papers. In order to get a view of performance of current features in state of art, we designed several experiment to make a evaluation of them. Experiment result and conclusions draw from it were proposed in this paper.
{"title":"Evaluation of feature sets for steganalysis of JPEG image","authors":"Qingxiao Guan, Jing Dong, T. Tan","doi":"10.1109/YCICT.2010.5713119","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713119","url":null,"abstract":"In past several years so many feature sets for steganalysis were proposed to detect stego images. These features based on different ideas and were considered to be effective for most steganography schemes. However a systematically comparison of these features have not been made in previous papers. In order to get a view of performance of current features in state of art, we designed several experiment to make a evaluation of them. Experiment result and conclusions draw from it were proposed in this paper.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126546547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/YCICT.2010.5713110
Li Zheng, Huang Yong, Li Yu, H. Ning
In this paper, extended towed array measurement and broadband beamforming in frequency domain are combined together to form a new efficient broadband beamforming based on extended towed array measurement (ETAM-FCBF). The angular resolution of this method is higher than the conventional beamforming, and the detection ability of the weak target is more excellent. Moreover, this method is fast enough for real-time processing.
{"title":"Study of efficient broadband beamforming based on extended towed array measurement","authors":"Li Zheng, Huang Yong, Li Yu, H. Ning","doi":"10.1109/YCICT.2010.5713110","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713110","url":null,"abstract":"In this paper, extended towed array measurement and broadband beamforming in frequency domain are combined together to form a new efficient broadband beamforming based on extended towed array measurement (ETAM-FCBF). The angular resolution of this method is higher than the conventional beamforming, and the detection ability of the weak target is more excellent. Moreover, this method is fast enough for real-time processing.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125217654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/YCICT.2010.5713122
X. Guan, C. Fang, Cheng-Wei Dong, Shasha Lu
As industrialization and urbanization accelerates, it is significant to establish a superior urban land evaluation system. Fuzzy theory consist of fuzzy comprehensive evaluation and fuzzy clustering analysis has achieved sound effects in the urban land evaluation for its' considering the ambiguity of the land quality. However, there are several limitations in these two traditional methods. Firstly, fuzzy comprehensive evaluation neglects some related information among similar spatial entities. Secondly, although fuzzy clustering analysis takes the spatial-related information into account, yet its selecting the threshold according to subjective experience and different thresholds may further get different clustering results. In this paper, the authors proposed the fuzzy comprehensive clustering algorithm based on data field, which would overcome the defects of either fuzzy comprehensive evaluation or fuzzy clustering analysis. A case study is given on land gradation in Shishi city of Fujian Province and the results of land gradation are proved to be consistent with the actual situation. How to obtain the accurate fuzzy equivalent matrix is the key of successful application of this method.
{"title":"APplication of fuzzy comprehensive clustering in urban land gradation based on data field","authors":"X. Guan, C. Fang, Cheng-Wei Dong, Shasha Lu","doi":"10.1109/YCICT.2010.5713122","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713122","url":null,"abstract":"As industrialization and urbanization accelerates, it is significant to establish a superior urban land evaluation system. Fuzzy theory consist of fuzzy comprehensive evaluation and fuzzy clustering analysis has achieved sound effects in the urban land evaluation for its' considering the ambiguity of the land quality. However, there are several limitations in these two traditional methods. Firstly, fuzzy comprehensive evaluation neglects some related information among similar spatial entities. Secondly, although fuzzy clustering analysis takes the spatial-related information into account, yet its selecting the threshold according to subjective experience and different thresholds may further get different clustering results. In this paper, the authors proposed the fuzzy comprehensive clustering algorithm based on data field, which would overcome the defects of either fuzzy comprehensive evaluation or fuzzy clustering analysis. A case study is given on land gradation in Shishi city of Fujian Province and the results of land gradation are proved to be consistent with the actual situation. How to obtain the accurate fuzzy equivalent matrix is the key of successful application of this method.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123717491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/YCICT.2010.5713133
X. Gao, Wen Yang, R. Liu
With the rapid development of EDA technology, many universities have set up the digital design course in the computer science speciality. The digital design course needs SOPC system board to mount FPGA and the appropriate support circuitry. This paper presented the design of extensible SOPC system board. This board has compact structure and embodies the characteristics of SOPC system such as high integration and strong flexibility. The cheaper chip with a unique combination of high functionality, low power and low cost is selected and used in the design to reduce the cost. The high-speed mezzanine interface is used in the design to expand the functionality of the development board through the addition of daughter cards. The functional test and application verification is carried out for the system board and the results are in accordance with the design requirements.
{"title":"The design and implementation of extensible SOPC system board","authors":"X. Gao, Wen Yang, R. Liu","doi":"10.1109/YCICT.2010.5713133","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713133","url":null,"abstract":"With the rapid development of EDA technology, many universities have set up the digital design course in the computer science speciality. The digital design course needs SOPC system board to mount FPGA and the appropriate support circuitry. This paper presented the design of extensible SOPC system board. This board has compact structure and embodies the characteristics of SOPC system such as high integration and strong flexibility. The cheaper chip with a unique combination of high functionality, low power and low cost is selected and used in the design to reduce the cost. The high-speed mezzanine interface is used in the design to expand the functionality of the development board through the addition of daughter cards. The functional test and application verification is carried out for the system board and the results are in accordance with the design requirements.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131802092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}