Pub Date : 2007-05-23DOI: 10.1109/ICIEA.2007.4318770
Chen Hao, Z. Ye, Zhang Lei
To achieve the reliable transmission of the JPEG2000 compressed images over an error-prone wireless channel, JPEG2000 part 11 namely JPEG2000 wireless (JPWL) defines a frame for error protection and correction. After introducing the JPWL standard, the application method of JPWL is proposed. According to the error sensitivity information of the codestream provided by Error Sensitivity Descriptor, the Error Protection Block is applied to perform header protection and then to perform unequal error protection for the codestream. In process of decoding, the error concealment technology is used based on the residual errors information provided by Residual Errors Descriptor. Experimental results show that, compared with the traditional method, the proposed method gives more protections of the important parts of codestream. It can not only effectively correct transmission errors, but also significantly improve the ability of decoding and the quality of the decoded images.
{"title":"Application Method of JPEG2000 Wireless Standard","authors":"Chen Hao, Z. Ye, Zhang Lei","doi":"10.1109/ICIEA.2007.4318770","DOIUrl":"https://doi.org/10.1109/ICIEA.2007.4318770","url":null,"abstract":"To achieve the reliable transmission of the JPEG2000 compressed images over an error-prone wireless channel, JPEG2000 part 11 namely JPEG2000 wireless (JPWL) defines a frame for error protection and correction. After introducing the JPWL standard, the application method of JPWL is proposed. According to the error sensitivity information of the codestream provided by Error Sensitivity Descriptor, the Error Protection Block is applied to perform header protection and then to perform unequal error protection for the codestream. In process of decoding, the error concealment technology is used based on the residual errors information provided by Residual Errors Descriptor. Experimental results show that, compared with the traditional method, the proposed method gives more protections of the important parts of codestream. It can not only effectively correct transmission errors, but also significantly improve the ability of decoding and the quality of the decoded images.","PeriodicalId":231682,"journal":{"name":"2007 2nd IEEE Conference on Industrial Electronics and Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134162990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-05-23DOI: 10.1109/ICIEA.2007.4318898
Fangmin Li, Ping Han, Xinhua Liu
The working condition in coal mine is atrocious, once miners are stranded in coal mine when accident happened, how to find the location of the miners rapidly is the crux of rescue. This paper puts forward a wireless localization method used in coal mine which aims at the actual condition of coal mine, uses beacons and object nodes, measures the distance with the method of RF propagating time, with the precondition of comparing and analyzing the existing classic algorithm of measuring distance and localization. It discusses various factors that influence the precision of measuring distance and localization, calculates and provides the value of precision of measuring distance and localization based on node hardware.
{"title":"A Wireless Localization Method Used in Coal Mine","authors":"Fangmin Li, Ping Han, Xinhua Liu","doi":"10.1109/ICIEA.2007.4318898","DOIUrl":"https://doi.org/10.1109/ICIEA.2007.4318898","url":null,"abstract":"The working condition in coal mine is atrocious, once miners are stranded in coal mine when accident happened, how to find the location of the miners rapidly is the crux of rescue. This paper puts forward a wireless localization method used in coal mine which aims at the actual condition of coal mine, uses beacons and object nodes, measures the distance with the method of RF propagating time, with the precondition of comparing and analyzing the existing classic algorithm of measuring distance and localization. It discusses various factors that influence the precision of measuring distance and localization, calculates and provides the value of precision of measuring distance and localization based on node hardware.","PeriodicalId":231682,"journal":{"name":"2007 2nd IEEE Conference on Industrial Electronics and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131467998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-05-23DOI: 10.1109/ICIEA.2007.4318536
Xiulong Wu, Junning Chen, Daoming Ke
According to the high voltage LDMOS macromodel established in previous work, the inverter consists of LDMOS with high resistance drift region was analyzed. A formulation was presented to solve the power consumption of LDMOS power integrated circuits. The results are shown in good agreement with the simulation values by the two-dimensional numerical simulator MEDICI. Finally, a method to reduce circuit power consumption was presented.
{"title":"Analysis of High Voltage LDMOS Power Consumption","authors":"Xiulong Wu, Junning Chen, Daoming Ke","doi":"10.1109/ICIEA.2007.4318536","DOIUrl":"https://doi.org/10.1109/ICIEA.2007.4318536","url":null,"abstract":"According to the high voltage LDMOS macromodel established in previous work, the inverter consists of LDMOS with high resistance drift region was analyzed. A formulation was presented to solve the power consumption of LDMOS power integrated circuits. The results are shown in good agreement with the simulation values by the two-dimensional numerical simulator MEDICI. Finally, a method to reduce circuit power consumption was presented.","PeriodicalId":231682,"journal":{"name":"2007 2nd IEEE Conference on Industrial Electronics and Applications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131644804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-05-23DOI: 10.1109/ICIEA.2007.4318519
Jingong Cheng, Fei Liu, Ming Yang
Command and control models, often represented as rules or fuzzy rules, are key components in most military simulations. Although there exist some verification techniques for rule bases, they are not enough to assure the correctness of command and control models. Based on an analysis of the characteristics of command and control models, this paper presents a fuzzy causality diagram-based verification method for command and control models. Firstly, a formal description method is developed to describe command and control models. Secondly, formally described command and control models are mapped to fuzzy causality diagram. Thirdly, formal verification criteria for command and control models are developed in order to validly and formally verify them, based on which verification is grouped into two classes: weak verification and strong verification. Finally, algorithms for weak and strong verification are developed, thus implementing formal verification of command and control models.
{"title":"Verification of Command and Control Models","authors":"Jingong Cheng, Fei Liu, Ming Yang","doi":"10.1109/ICIEA.2007.4318519","DOIUrl":"https://doi.org/10.1109/ICIEA.2007.4318519","url":null,"abstract":"Command and control models, often represented as rules or fuzzy rules, are key components in most military simulations. Although there exist some verification techniques for rule bases, they are not enough to assure the correctness of command and control models. Based on an analysis of the characteristics of command and control models, this paper presents a fuzzy causality diagram-based verification method for command and control models. Firstly, a formal description method is developed to describe command and control models. Secondly, formally described command and control models are mapped to fuzzy causality diagram. Thirdly, formal verification criteria for command and control models are developed in order to validly and formally verify them, based on which verification is grouped into two classes: weak verification and strong verification. Finally, algorithms for weak and strong verification are developed, thus implementing formal verification of command and control models.","PeriodicalId":231682,"journal":{"name":"2007 2nd IEEE Conference on Industrial Electronics and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131795957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-05-23DOI: 10.1109/ICIEA.2007.4318875
Jianhua Wu, Kun Wang, Liqun Gao, Zhengang Shi, Zhaoyu Pian
An edge detection method by combining image entropy and self -organizing map (SOM) is proposed in this paper. First, discrete information entropy is used to curve up the smooth region and the region of gray level abruptly changed. This can decrease the latter process. Then we transform the gray level image to ideal binary pattern of pixels. We define six classes' edge and six edge prototype vectors. These edge prototype vectors are fed into input layer of the self-organizing map (SOM). Classifying the type of edge through this network, the edge image is obtained. At last, the speckle edges are discarded from the edge image. Experimental results show that it gained better edge image compared with other edge detection methods.
{"title":"A Method of Edge Detection Combined by Discrete Information Entropy and Self -Organizing Map (SOM)","authors":"Jianhua Wu, Kun Wang, Liqun Gao, Zhengang Shi, Zhaoyu Pian","doi":"10.1109/ICIEA.2007.4318875","DOIUrl":"https://doi.org/10.1109/ICIEA.2007.4318875","url":null,"abstract":"An edge detection method by combining image entropy and self -organizing map (SOM) is proposed in this paper. First, discrete information entropy is used to curve up the smooth region and the region of gray level abruptly changed. This can decrease the latter process. Then we transform the gray level image to ideal binary pattern of pixels. We define six classes' edge and six edge prototype vectors. These edge prototype vectors are fed into input layer of the self-organizing map (SOM). Classifying the type of edge through this network, the edge image is obtained. At last, the speckle edges are discarded from the edge image. Experimental results show that it gained better edge image compared with other edge detection methods.","PeriodicalId":231682,"journal":{"name":"2007 2nd IEEE Conference on Industrial Electronics and Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127563916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-05-23DOI: 10.1109/ICIEA.2007.4318446
Lin Xin, Xue Jun, Xu Jianyuan, Wang Wei
In this paper, database management monitoring system has been introduced to realize the remote data processing. Firstly, the data acquisition part has been designed; secondly, data storage part has been designed by SQL Server 2000; thirdly, the MMI (Man Machine Interface) has been programmed by VC++6.0 to realize the video curves displays of the datum; lastly, the good results have been gained by running the system in the experimental transformer. The result has indicated that it is the reliable database remote monitoring system.
本文介绍了数据库管理监控系统,实现了数据的远程处理。首先对数据采集部分进行了设计;其次,采用SQL Server 2000设计了数据存储部分;第三,利用vc++ 6.0编写了人机界面,实现了基准的视频曲线显示;最后,该系统在实验变压器上运行,取得了良好的效果。结果表明,该系统是一个可靠的数据库远程监控系统。
{"title":"Design of Database Remote Monitoring System in Distribution Automation","authors":"Lin Xin, Xue Jun, Xu Jianyuan, Wang Wei","doi":"10.1109/ICIEA.2007.4318446","DOIUrl":"https://doi.org/10.1109/ICIEA.2007.4318446","url":null,"abstract":"In this paper, database management monitoring system has been introduced to realize the remote data processing. Firstly, the data acquisition part has been designed; secondly, data storage part has been designed by SQL Server 2000; thirdly, the MMI (Man Machine Interface) has been programmed by VC++6.0 to realize the video curves displays of the datum; lastly, the good results have been gained by running the system in the experimental transformer. The result has indicated that it is the reliable database remote monitoring system.","PeriodicalId":231682,"journal":{"name":"2007 2nd IEEE Conference on Industrial Electronics and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127569829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-05-23DOI: 10.1109/ICIEA.2007.4318710
Yao Chen, Yibin Tong, Xinmin Jin
According to the operational principle of SVPWM and considering the characteristics of digital implement, this paper presents a novel algorithm of SVPWM harmonic analysis. This algorithm gives the expression of phase voltage harmonics through Fourier analysis, which provides the guidance for the filter design and motor control. To verify the algorithm, a three-phase voltage source inverter controlled by TMS320F2812 has been built. Power analyzer PZ4000 has been adopted to acquire experimental results. The good agreements between experimental results and those obtain in calculation demonstrate the accuracy of this algorithm.
{"title":"A Novel Algorithm of SVPWM Harmonic Analysis","authors":"Yao Chen, Yibin Tong, Xinmin Jin","doi":"10.1109/ICIEA.2007.4318710","DOIUrl":"https://doi.org/10.1109/ICIEA.2007.4318710","url":null,"abstract":"According to the operational principle of SVPWM and considering the characteristics of digital implement, this paper presents a novel algorithm of SVPWM harmonic analysis. This algorithm gives the expression of phase voltage harmonics through Fourier analysis, which provides the guidance for the filter design and motor control. To verify the algorithm, a three-phase voltage source inverter controlled by TMS320F2812 has been built. Power analyzer PZ4000 has been adopted to acquire experimental results. The good agreements between experimental results and those obtain in calculation demonstrate the accuracy of this algorithm.","PeriodicalId":231682,"journal":{"name":"2007 2nd IEEE Conference on Industrial Electronics and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127597473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-05-23DOI: 10.1109/ICIEA.2007.4318528
Bing Zhao, Youli Wu, Linhu Zhu
In order to solve the problem of the distance estimation of the infrared passive system, a distance estimation algorithm is proposed based on the optimal estimation theory of structure stochastic jump system. Considered the rapidity and the limit of the internal storage capacity of the algorithm, a simplified algorithm is derived. And the ability of the algorithm correcting the initial distance deviation is discussed, simulation results show that the algorithm and its simplified algorithm can both accurately estimate the distance between the infrared passive tracker and the infrared target. And the algorithm can quickly correct the initial distance deviation in 1-2 seconds.
{"title":"A Distance Estimation Algorithm for Infrared System Based on Structure Stochastic Jump System Theory","authors":"Bing Zhao, Youli Wu, Linhu Zhu","doi":"10.1109/ICIEA.2007.4318528","DOIUrl":"https://doi.org/10.1109/ICIEA.2007.4318528","url":null,"abstract":"In order to solve the problem of the distance estimation of the infrared passive system, a distance estimation algorithm is proposed based on the optimal estimation theory of structure stochastic jump system. Considered the rapidity and the limit of the internal storage capacity of the algorithm, a simplified algorithm is derived. And the ability of the algorithm correcting the initial distance deviation is discussed, simulation results show that the algorithm and its simplified algorithm can both accurately estimate the distance between the infrared passive tracker and the infrared target. And the algorithm can quickly correct the initial distance deviation in 1-2 seconds.","PeriodicalId":231682,"journal":{"name":"2007 2nd IEEE Conference on Industrial Electronics and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117334568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-05-23DOI: 10.1109/ICIEA.2007.4318515
Ren Chun-yu, Wang Xiaobo
There are many traditional methods solving logistic distribution problem. However, these methods meet with various problems under electronic commerce in varying degree. Therefore, this paper modifies alternative expenses and time-restricting conditions of location model according to the specific feature of model under electronics commerce. Because location model is a NP question, the result can be gotten through heuristic algorithm. Namely, the model can be divided into the feasible sub-question using the filtering condition in first phase. In second phase, because the feasible sub-question can be considered the flexible expenses are imbedded in the objective function of transportation model, improved genetic algorithm can get the satisfied result. Therefore, the study proposes the improved genetic algorithm, which using individual amount control selection game in order to guarantee group diversity, using order cross operator and partial route overturn mutation operator to improve convergent speed of algorithm so as to better solve the inconsistency between diversity and convergent speed. Thus it's difficult to consider all the factors during the course of establishing location model. And it is also difficult to quantify the restricting condition in model. Therefore, it is very necessary to consult the experts' opinions and advices and do some qualitative decisions. Consequently, this study proposes the method combining improved quantitative genetic algorithm and qualitative comprehensive evaluation method and confirms the distribution center location under electronic commerce. Confirm the project aims at realizing scientific decision. According to the result of quantitative calculation and qualitative analysis, this study adopts harmonious analysis method in order to logically make decision of the optimized location project according with electronic commerce and proves the algorithm validity in terms of concrete application examples.
{"title":"Research on Distribution Center Location Based on IGA and Decisions under Electronic Commerce","authors":"Ren Chun-yu, Wang Xiaobo","doi":"10.1109/ICIEA.2007.4318515","DOIUrl":"https://doi.org/10.1109/ICIEA.2007.4318515","url":null,"abstract":"There are many traditional methods solving logistic distribution problem. However, these methods meet with various problems under electronic commerce in varying degree. Therefore, this paper modifies alternative expenses and time-restricting conditions of location model according to the specific feature of model under electronics commerce. Because location model is a NP question, the result can be gotten through heuristic algorithm. Namely, the model can be divided into the feasible sub-question using the filtering condition in first phase. In second phase, because the feasible sub-question can be considered the flexible expenses are imbedded in the objective function of transportation model, improved genetic algorithm can get the satisfied result. Therefore, the study proposes the improved genetic algorithm, which using individual amount control selection game in order to guarantee group diversity, using order cross operator and partial route overturn mutation operator to improve convergent speed of algorithm so as to better solve the inconsistency between diversity and convergent speed. Thus it's difficult to consider all the factors during the course of establishing location model. And it is also difficult to quantify the restricting condition in model. Therefore, it is very necessary to consult the experts' opinions and advices and do some qualitative decisions. Consequently, this study proposes the method combining improved quantitative genetic algorithm and qualitative comprehensive evaluation method and confirms the distribution center location under electronic commerce. Confirm the project aims at realizing scientific decision. According to the result of quantitative calculation and qualitative analysis, this study adopts harmonious analysis method in order to logically make decision of the optimized location project according with electronic commerce and proves the algorithm validity in terms of concrete application examples.","PeriodicalId":231682,"journal":{"name":"2007 2nd IEEE Conference on Industrial Electronics and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130768117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-05-23DOI: 10.1109/ICIEA.2007.4318645
H. Xia, Guangcheng Ma, Changlong Wang, Qiyong Wen
The problem of robust fault detection filter design for networked control systems with time-delay and parameter uncertainty residing in a polytope is investigated. The filtering strategies are based on a new robust performance criteria derived from a new result of parameter-dependent Lyapunov stability condition, which exhibit less conservativeness than previous results in the quadratic framework. The designed filter guaranteeing a prescribed Hinfin noise attenuation level can be obtained from the solution of convex optimization problems since it is presented in terms of linear matrix inequalities (LMI). An iterative algorithm is developed to further refine the sub-optimal controller. Numerical examples are provided to illustrate that the proposed method is effective and robust.
{"title":"Robust Fault Detection of Networked Control Systems: An Improved LMJ Approach","authors":"H. Xia, Guangcheng Ma, Changlong Wang, Qiyong Wen","doi":"10.1109/ICIEA.2007.4318645","DOIUrl":"https://doi.org/10.1109/ICIEA.2007.4318645","url":null,"abstract":"The problem of robust fault detection filter design for networked control systems with time-delay and parameter uncertainty residing in a polytope is investigated. The filtering strategies are based on a new robust performance criteria derived from a new result of parameter-dependent Lyapunov stability condition, which exhibit less conservativeness than previous results in the quadratic framework. The designed filter guaranteeing a prescribed Hinfin noise attenuation level can be obtained from the solution of convex optimization problems since it is presented in terms of linear matrix inequalities (LMI). An iterative algorithm is developed to further refine the sub-optimal controller. Numerical examples are provided to illustrate that the proposed method is effective and robust.","PeriodicalId":231682,"journal":{"name":"2007 2nd IEEE Conference on Industrial Electronics and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130933963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}