It has been reported that wrong medicine box has been delivered to patient accidentally at hospital's Inpatient Department, so the patient may take the wrong medicine and the medical incident occurs consequently. In order to resolving this problem, it is necessary to design intelligent medicine box monitoring and management system. This system integrates technologies involving network, RFID, and touch screen. At the network, the system monitors and controls the releasing process of medicine box through RFID label ring, and displays the medicine's name, dosing time, notes and other relevant information for patients on the touch screen. Therefore the patient would be reminded to take the medicine clearly and regularly. The system could effectively resolve the problem of negligence and misoperation when medicine distribution, and as well avoid the accidental medicine taking for patient.
{"title":"Intelligent Medicine Box Monitoring and Management System","authors":"Tao Zhang, Zhaohua Liu, Xuejiao Cao, Weixi Xia","doi":"10.1109/CSMA.2015.37","DOIUrl":"https://doi.org/10.1109/CSMA.2015.37","url":null,"abstract":"It has been reported that wrong medicine box has been delivered to patient accidentally at hospital's Inpatient Department, so the patient may take the wrong medicine and the medical incident occurs consequently. In order to resolving this problem, it is necessary to design intelligent medicine box monitoring and management system. This system integrates technologies involving network, RFID, and touch screen. At the network, the system monitors and controls the releasing process of medicine box through RFID label ring, and displays the medicine's name, dosing time, notes and other relevant information for patients on the touch screen. Therefore the patient would be reminded to take the medicine clearly and regularly. The system could effectively resolve the problem of negligence and misoperation when medicine distribution, and as well avoid the accidental medicine taking for patient.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114571980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Due to significant advantage, clinching is applied extensively in the automobile. In the clinch experiment, the sheets out of clinch joint has obvious warp. According to the theory of plastic deformation, as the pressure of the binder, the area of the binder and the friction factor have higher degrees, the warp of the sheets has lower degree. Abaqus was used to numerically simulate the clinch process and verify the result.
{"title":"Effects of Process Parameters on Sheets Warp of Clinching Based on Abaqus","authors":"Juguang Lin, T. Guo, Anpeng Su, Z. Niu","doi":"10.1109/CSMA.2015.68","DOIUrl":"https://doi.org/10.1109/CSMA.2015.68","url":null,"abstract":"Due to significant advantage, clinching is applied extensively in the automobile. In the clinch experiment, the sheets out of clinch joint has obvious warp. According to the theory of plastic deformation, as the pressure of the binder, the area of the binder and the friction factor have higher degrees, the warp of the sheets has lower degree. Abaqus was used to numerically simulate the clinch process and verify the result.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116284201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recent malware processes are armed with stealthy techniques to detect, subvert malware detection facilities of the victim. Traditional host-based detection tools execute inside the very hosts they are protecting, which makes them vulnerable to deceive and subvert. To address this limitation, improve the effectiveness and accuracy of detection, and boost the ability of tamper resistance, a VMM-based hidden process detection system is designed and implemented. The system is placed outside the protected virtual machine, using virtual machine introspection mechanism to inspect the low-level state of the protected virtual machine, then reconstructs the guest OS data structures by guest view casting technique. Based on view comparison detection, the system identifies the lack of the critical processes and the target hidden process. Additionally, this system provides process management operations, such as terminate and restart. Users can configure the corresponding response mechanism with configuration files.
{"title":"Detecting Malware and Rootkit via Memory Forensics","authors":"Qiang Hua, Yang Zhang","doi":"10.1109/CSMA.2015.25","DOIUrl":"https://doi.org/10.1109/CSMA.2015.25","url":null,"abstract":"Recent malware processes are armed with stealthy techniques to detect, subvert malware detection facilities of the victim. Traditional host-based detection tools execute inside the very hosts they are protecting, which makes them vulnerable to deceive and subvert. To address this limitation, improve the effectiveness and accuracy of detection, and boost the ability of tamper resistance, a VMM-based hidden process detection system is designed and implemented. The system is placed outside the protected virtual machine, using virtual machine introspection mechanism to inspect the low-level state of the protected virtual machine, then reconstructs the guest OS data structures by guest view casting technique. Based on view comparison detection, the system identifies the lack of the critical processes and the target hidden process. Additionally, this system provides process management operations, such as terminate and restart. Users can configure the corresponding response mechanism with configuration files.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124773122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As a creative intelligent optimization algorithm, ant colony algorithm (ACO) has advantages such as good robustness, positive feedback and distributed computation. It is powerful to solve complicated combinational optimization problems. However, there are many defections existing in a single ACO such as slow solving speed at the primary stage, poor convergence accuracy and easy falling into a local optimal solution. By effectively integrating ACO and genetic algorithm (GA), the presented paper utilized the rapid searching ability of GA to make up the shortage of initial pheromone and increase the convergence speed of the ACO. The experimental result of the simulation tool MATLAB presents that, compared with the traditional GA, ACO is more efficient to solve resource allocating problems.
{"title":"Cloud-Computing-Based Resource Allocation Research on the Perspective of Improved Ant Colony Algorithm","authors":"Weihua Hu, Ke Li, Junjun Xu, Qian Bao","doi":"10.1109/CSMA.2015.22","DOIUrl":"https://doi.org/10.1109/CSMA.2015.22","url":null,"abstract":"As a creative intelligent optimization algorithm, ant colony algorithm (ACO) has advantages such as good robustness, positive feedback and distributed computation. It is powerful to solve complicated combinational optimization problems. However, there are many defections existing in a single ACO such as slow solving speed at the primary stage, poor convergence accuracy and easy falling into a local optimal solution. By effectively integrating ACO and genetic algorithm (GA), the presented paper utilized the rapid searching ability of GA to make up the shortage of initial pheromone and increase the convergence speed of the ACO. The experimental result of the simulation tool MATLAB presents that, compared with the traditional GA, ACO is more efficient to solve resource allocating problems.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123582767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The heterogeneity of information systems constructed in different historical periods by electric power enterprise produces the problem of Information Island, which affects the effective use of information resources. This paper starts with analyzing the adoption status of information systems within power utilities, summarizes the data source types and their relationships. Meanwhile, the data integration necessity in power utility is discussed, and the main problems that include the heterogeneous and distribution of data sources, no unified identifier for power system data entities, lacking of entity associations are analyzed minutely. In order to solve these problems, the data integration platform architecture is designed, which uses CIM as the common data model in electric power enterprise. Through data integration platform, the heterogeneous data sources are mapped to general CIM model, and then the data services are provided by the platform through the well-defined data service interfaces. The data users can request data service via data service interface, and retrieve the object set that accord with specific CIM profile. Moreover, the meta-database schema of data integration platform is introduced in detail. Through the meta-database, the problems that include establishing associations for entities of various data sources, and the unified identifiers for same entities are solved.
{"title":"Design of Electric Power Enterprise Data Integration Platform Architecture Based on CIM","authors":"Yun-cheng Zhou, Tongyu Xu","doi":"10.1109/CSMA.2015.35","DOIUrl":"https://doi.org/10.1109/CSMA.2015.35","url":null,"abstract":"The heterogeneity of information systems constructed in different historical periods by electric power enterprise produces the problem of Information Island, which affects the effective use of information resources. This paper starts with analyzing the adoption status of information systems within power utilities, summarizes the data source types and their relationships. Meanwhile, the data integration necessity in power utility is discussed, and the main problems that include the heterogeneous and distribution of data sources, no unified identifier for power system data entities, lacking of entity associations are analyzed minutely. In order to solve these problems, the data integration platform architecture is designed, which uses CIM as the common data model in electric power enterprise. Through data integration platform, the heterogeneous data sources are mapped to general CIM model, and then the data services are provided by the platform through the well-defined data service interfaces. The data users can request data service via data service interface, and retrieve the object set that accord with specific CIM profile. Moreover, the meta-database schema of data integration platform is introduced in detail. Through the meta-database, the problems that include establishing associations for entities of various data sources, and the unified identifiers for same entities are solved.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125195531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper is concerned with the robust filter design problem in network environment subject to communication constrained, such as quantization distortion, randomly transmission delay and packets loss. By formulating the three communication constraints phenomena into a stochastic parameter uncertainty system, a linear filter is designed to satisfy that the error state of the filtering process is mean square bounded, and the steady-state variance of the estimation error for each state is not more than the individual prescribed upper bound. Based on existing positive definite solutions for a couple of algebraic Riccati-like inequalities or linear matrix inequalities, the theory of robust filter design is given and the process for solving filter parameters is proposed. Finally, an illustrative numerical example is presented to demonstrate the effectiveness and flexibility of the proposed design approach.
{"title":"Robust Filter Design for Discrete-Time Systems over Communication Constrained","authors":"Baocheng Wang, Jiawei Sun, B. Wang, Jiamin Qi","doi":"10.1109/CSMA.2015.32","DOIUrl":"https://doi.org/10.1109/CSMA.2015.32","url":null,"abstract":"The paper is concerned with the robust filter design problem in network environment subject to communication constrained, such as quantization distortion, randomly transmission delay and packets loss. By formulating the three communication constraints phenomena into a stochastic parameter uncertainty system, a linear filter is designed to satisfy that the error state of the filtering process is mean square bounded, and the steady-state variance of the estimation error for each state is not more than the individual prescribed upper bound. Based on existing positive definite solutions for a couple of algebraic Riccati-like inequalities or linear matrix inequalities, the theory of robust filter design is given and the process for solving filter parameters is proposed. Finally, an illustrative numerical example is presented to demonstrate the effectiveness and flexibility of the proposed design approach.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126333803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The advances of cloud computing and robot enable the cloud robotics become a newly emerging research hotspot of intelligent automobile robot. Lots of technical challenges of cloud robotics remain to be worked out. For example, the computation challenges, the communication challenges, and the security challenges. In this paper we intend to design an optimal execution framework for the cloud robotics under MIMO (multiple-input multiple-output) wireless channel model, which aims to minimize the energy consumption of the robot and extend the battery lifetime. The model of the energy consumption for cloud execution is derived, and the problem of optimization is analyzed during the process. Additionally, a model and optimization of the standalone execution by robot are proposed. Based on the models, we provide a theoretical framework, which decide whether to offloading task. Finally, the numerical results illustrate that the framework is significant for minimizing the energy consumption of robot.
{"title":"A Framework for Energy-Optimal Cloud Robotic System under MIMO Wireless Channel","authors":"Wei Sun, Jiabao Xu, Q. Liang, Yunfeng Lv","doi":"10.1109/CSMA.2015.29","DOIUrl":"https://doi.org/10.1109/CSMA.2015.29","url":null,"abstract":"The advances of cloud computing and robot enable the cloud robotics become a newly emerging research hotspot of intelligent automobile robot. Lots of technical challenges of cloud robotics remain to be worked out. For example, the computation challenges, the communication challenges, and the security challenges. In this paper we intend to design an optimal execution framework for the cloud robotics under MIMO (multiple-input multiple-output) wireless channel model, which aims to minimize the energy consumption of the robot and extend the battery lifetime. The model of the energy consumption for cloud execution is derived, and the problem of optimization is analyzed during the process. Additionally, a model and optimization of the standalone execution by robot are proposed. Based on the models, we provide a theoretical framework, which decide whether to offloading task. Finally, the numerical results illustrate that the framework is significant for minimizing the energy consumption of robot.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128256128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the backdrop of 'Industry 4.0', aiming at improving low informatization level and realizing real-time monitoring during the production in a rubber tyre factory in Hang Zhou, this paper intensively studies process features, requirments of system controlling, Cyber-Physical Systems, OPC XML-DA and so on. Based on Cyber-Physical Systems, a monitoring system of tire producting procedure (MES) is designed to realize the fuctional combination of data collection and processing, historical data query, users' interface display, information checking, real-time monitoring. Taking the curing production line of tire as an example, system's design and realization is detailedly introduced. The result indicates that this system effectively monitors tire producting procedure in real-time, which provides reliable productingly related data for enterprise's managers.
{"title":"Design and Realize of Tire Production Process Monitoring System Based on Cyber-Physical Systems","authors":"Jiafeng Ruan, Wujia Yu, Ying Yang, Jingjing Hu","doi":"10.1109/CSMA.2015.42","DOIUrl":"https://doi.org/10.1109/CSMA.2015.42","url":null,"abstract":"In the backdrop of 'Industry 4.0', aiming at improving low informatization level and realizing real-time monitoring during the production in a rubber tyre factory in Hang Zhou, this paper intensively studies process features, requirments of system controlling, Cyber-Physical Systems, OPC XML-DA and so on. Based on Cyber-Physical Systems, a monitoring system of tire producting procedure (MES) is designed to realize the fuctional combination of data collection and processing, historical data query, users' interface display, information checking, real-time monitoring. Taking the curing production line of tire as an example, system's design and realization is detailedly introduced. The result indicates that this system effectively monitors tire producting procedure in real-time, which provides reliable productingly related data for enterprise's managers.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130083607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A traffic matrix is an important input for some network management function such as traffic engineering and network planning. However, traffic matrix usually cannot be obtained directly. That is because the existing network traffic motoring techniques do not extremely well in practice. The common approaches for obtaining a traffic matrix are estimating it via other available information, such as link loads and routing information. The approach using link loads and routing information to infer the traffic matrix is named network tomography approach. Due to the ill-posed nature of the network tomography model, the network tomography techniques still face many challenges for the traffic matrix estimation problem. Motivated by this issue, we propose an optimization model to conquer the ill-posed nature of the network tomography model. In details, we first perturb the network tomography model by a stochastic matrix, which draws on idea from compressive sensing techniques. Then the perturbed model can be solve by a convex optimization model. However, this convex optimization cannot precisely estimate the traffic matrix since the coherence of the perturbed model. Then we proposed an improved optimization model by means of the network tomography model.
{"title":"A Novel Network Tomography Approach for Traffic Matrix Estimation Problem in Large-Scale IP Backbone Networks","authors":"Laisen Nie","doi":"10.1109/CSMA.2015.26","DOIUrl":"https://doi.org/10.1109/CSMA.2015.26","url":null,"abstract":"A traffic matrix is an important input for some network management function such as traffic engineering and network planning. However, traffic matrix usually cannot be obtained directly. That is because the existing network traffic motoring techniques do not extremely well in practice. The common approaches for obtaining a traffic matrix are estimating it via other available information, such as link loads and routing information. The approach using link loads and routing information to infer the traffic matrix is named network tomography approach. Due to the ill-posed nature of the network tomography model, the network tomography techniques still face many challenges for the traffic matrix estimation problem. Motivated by this issue, we propose an optimization model to conquer the ill-posed nature of the network tomography model. In details, we first perturb the network tomography model by a stochastic matrix, which draws on idea from compressive sensing techniques. Then the perturbed model can be solve by a convex optimization model. However, this convex optimization cannot precisely estimate the traffic matrix since the coherence of the perturbed model. Then we proposed an improved optimization model by means of the network tomography model.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121821844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The progress of computer aided testing technology brings new development opportunity of aero-engine synthetic test. In order to improve aero-engine synthetic test level, a taken aero-engine synthetic test system is designed using advanced testing technology. User requirements of current situation are introduced, and then system function of test system is given, also related key technology is analyzed. Design proposal and system implementation of a taken aero-engine synthetic test system is proposed. Practices prove that the designed system has good performance and can improve efficiency of aero-engine synthetic test greatly.
{"title":"Design of a Taken Aero-Engine Synthetic Test System","authors":"Z. Liu, Youcai Tang, Gang Zou, Zhanyong Wang","doi":"10.1109/CSMA.2015.72","DOIUrl":"https://doi.org/10.1109/CSMA.2015.72","url":null,"abstract":"The progress of computer aided testing technology brings new development opportunity of aero-engine synthetic test. In order to improve aero-engine synthetic test level, a taken aero-engine synthetic test system is designed using advanced testing technology. User requirements of current situation are introduced, and then system function of test system is given, also related key technology is analyzed. Design proposal and system implementation of a taken aero-engine synthetic test system is proposed. Practices prove that the designed system has good performance and can improve efficiency of aero-engine synthetic test greatly.","PeriodicalId":205396,"journal":{"name":"2015 International Conference on Computer Science and Mechanical Automation (CSMA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126518724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}