Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579206
Xiao-ming Sun, Zhaosheng Yang, Pengcheng Sun
Vehicle-grade traffic information selecting type based on floating cars plays a significant role when it was under the influence of emergency accidents, and map matching (MM) is the key technology of this type. In this paper, against the problems of current MM method, we proposed a novel MM method based on road incremental updating data. This method was carried out through network topology which updated according to roads' dynamic changes, and it could solve real-time MM process by an effective candidate links identification method, at the same time, the MM method put forward applied parallel roads reverse recognition method on the link matching. And on the junction, this method took delay matching method and optimal path selection method to overcome the MM complexity caused by intersections and main side roads in large-scale urban traffic network. Experiment results showed that the MM method proposed in this paper can perform high MM precision in large-scale and complicated road network under emergency accidents.
{"title":"Map matching method of large-scale floating cars based on road incremental updating under emergency accidents","authors":"Xiao-ming Sun, Zhaosheng Yang, Pengcheng Sun","doi":"10.1109/ICACTE.2010.5579206","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579206","url":null,"abstract":"Vehicle-grade traffic information selecting type based on floating cars plays a significant role when it was under the influence of emergency accidents, and map matching (MM) is the key technology of this type. In this paper, against the problems of current MM method, we proposed a novel MM method based on road incremental updating data. This method was carried out through network topology which updated according to roads' dynamic changes, and it could solve real-time MM process by an effective candidate links identification method, at the same time, the MM method put forward applied parallel roads reverse recognition method on the link matching. And on the junction, this method took delay matching method and optimal path selection method to overcome the MM complexity caused by intersections and main side roads in large-scale urban traffic network. Experiment results showed that the MM method proposed in this paper can perform high MM precision in large-scale and complicated road network under emergency accidents.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126282786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579035
Peidong Wu, Xiao Feng
To improve the reliability of traditional supervision system for intelligent equipments, a supervision system based on redundant work stations is proposed and then the gateway applied in this system is designed. According characteristic of intelligent equipment communication protocol, the multicast gateway has relatively high performance, which is confirmed by the efficiency comparison of UDP with TCP and the differences among unicasting, multicasting and broadcasting. Experiments results clearly indicate that the multicast gateway can increase packet transport speed and decrease computation of network bandwidth as well as the load on hosts with no interest in the application. The supervision system using this gateway can have improved reliability but has effect on whole performance with might and main.
{"title":"Research on the gateway in supervision system for intelligent equipments based on redundant work stations","authors":"Peidong Wu, Xiao Feng","doi":"10.1109/ICACTE.2010.5579035","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579035","url":null,"abstract":"To improve the reliability of traditional supervision system for intelligent equipments, a supervision system based on redundant work stations is proposed and then the gateway applied in this system is designed. According characteristic of intelligent equipment communication protocol, the multicast gateway has relatively high performance, which is confirmed by the efficiency comparison of UDP with TCP and the differences among unicasting, multicasting and broadcasting. Experiments results clearly indicate that the multicast gateway can increase packet transport speed and decrease computation of network bandwidth as well as the load on hosts with no interest in the application. The supervision system using this gateway can have improved reliability but has effect on whole performance with might and main.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126302206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579712
Jianwei Wang, Wei Zhao
The color forest dynamic inspection images corrupted by some noise are a large amount of original information obtained in the processing of defending the forest diseases and insect pests. Based on analyzing three color image attributes such as resolution, pixel depth and true color or pseudocolor, it is separately presented what are the external evaluation rules about the means and effect of the forest plant diseases and insect pests color image denoising processing in real time in RGB, HSI and YCbCr color space. The experiment results show that color space must be reasonly selected during the course of color image denoising. The advantage of applying HSI or YCbCr color space is that the denoising arithmetic executes faster and it fits the circumstance of less noise than applying RGB color space. The advantage of applying RGB color space is that the denoising arithmetic executes slower space and it fits the circumstance of more noise than applying HSI or YCbCr color.
{"title":"A method of color space selection for color forest inspection image denoising applications","authors":"Jianwei Wang, Wei Zhao","doi":"10.1109/ICACTE.2010.5579712","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579712","url":null,"abstract":"The color forest dynamic inspection images corrupted by some noise are a large amount of original information obtained in the processing of defending the forest diseases and insect pests. Based on analyzing three color image attributes such as resolution, pixel depth and true color or pseudocolor, it is separately presented what are the external evaluation rules about the means and effect of the forest plant diseases and insect pests color image denoising processing in real time in RGB, HSI and YCbCr color space. The experiment results show that color space must be reasonly selected during the course of color image denoising. The advantage of applying HSI or YCbCr color space is that the denoising arithmetic executes faster and it fits the circumstance of less noise than applying RGB color space. The advantage of applying RGB color space is that the denoising arithmetic executes slower space and it fits the circumstance of more noise than applying HSI or YCbCr color.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126449542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579569
Bochuan Zheng, Zhang Yi
It is well known that contours in image are salient when a series of edge elements are aligned in a collinear or co-circular fashion. In this paper, a contour extractor is constructed to extract contours by using the competitive layer mode implemented by Lotka-Volterra recurrent neural networks. This extractor can bind all edge elements which belong to a contour onto a layer. In order to extract long contours, by moving the established contour extractor along a long contour, then the long contour can be extracted segment by segment. Experiments show that the proposed method can extract long contour properly from images.
{"title":"Extracting long contour by using the competitive layer model of the Lotka-Volterra recurrent neural networks","authors":"Bochuan Zheng, Zhang Yi","doi":"10.1109/ICACTE.2010.5579569","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579569","url":null,"abstract":"It is well known that contours in image are salient when a series of edge elements are aligned in a collinear or co-circular fashion. In this paper, a contour extractor is constructed to extract contours by using the competitive layer mode implemented by Lotka-Volterra recurrent neural networks. This extractor can bind all edge elements which belong to a contour onto a layer. In order to extract long contours, by moving the established contour extractor along a long contour, then the long contour can be extracted segment by segment. Experiments show that the proposed method can extract long contour properly from images.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126572044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579081
Wen-bao Guo, Zhonghui Wei, Xin He, C. Qi
In order to meet the needs of measurement of high-speed target, the timing sequence of LUPA300, an array CMOS image sensor of CYPRESS, is analyzed. The driving timing and control software is designed for the array CMOS sensor. High speed CMOS imaging system, whose hardware platform is FPGA, is emphasized. Real-time non-uniformity correction for CMOS sensor is implemented in the output stage. The experimental result shows that the system could control the CMOS sensor flexibly. The image is clear and stable. The maximum resolution of the image is 640H×480V pixels and the system can operate up to 250 frames per second in full resolution.
{"title":"Design and implementation of a high speed CMOS imaging system","authors":"Wen-bao Guo, Zhonghui Wei, Xin He, C. Qi","doi":"10.1109/ICACTE.2010.5579081","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579081","url":null,"abstract":"In order to meet the needs of measurement of high-speed target, the timing sequence of LUPA300, an array CMOS image sensor of CYPRESS, is analyzed. The driving timing and control software is designed for the array CMOS sensor. High speed CMOS imaging system, whose hardware platform is FPGA, is emphasized. Real-time non-uniformity correction for CMOS sensor is implemented in the output stage. The experimental result shows that the system could control the CMOS sensor flexibly. The image is clear and stable. The maximum resolution of the image is 640H×480V pixels and the system can operate up to 250 frames per second in full resolution.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128074559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579860
D. Yin, Haili Qin, Yazhou Zhou
This paper gives the theoretical method to determine water-coming volume by using pseudo-tracer. According to the flow mechanism of tracer in reservoirs, the theoretical model of numerical simulation of tracer has been established. The method that is implicit to pressure and explicit to saturation for difference solution of model is used and a numerical simulation software has been designed. The calculation method to ascertain the direction and water-coming volume of pseudo-tracer has been given. The water-coming volumes of four injection wells in Xing 4 to 6 blocks of Daqing Oilfield has been calculated and the direction of water-coming has been estimated. The reasons for remaining oil and the potential exploitation measures have been put forward. The results show that the water-coming volume of injection well sj312 is 19.28 m3, which accounts for 43% of the total water volume. This well is the main inflow direction of this block. Therefore, this research can provide theoretical basis for the remaining oil potential of other blocks.
{"title":"The computer numerical simulation of applications of pseudo-tracer method to determine the direction of water-coming in oil wells","authors":"D. Yin, Haili Qin, Yazhou Zhou","doi":"10.1109/ICACTE.2010.5579860","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579860","url":null,"abstract":"This paper gives the theoretical method to determine water-coming volume by using pseudo-tracer. According to the flow mechanism of tracer in reservoirs, the theoretical model of numerical simulation of tracer has been established. The method that is implicit to pressure and explicit to saturation for difference solution of model is used and a numerical simulation software has been designed. The calculation method to ascertain the direction and water-coming volume of pseudo-tracer has been given. The water-coming volumes of four injection wells in Xing 4 to 6 blocks of Daqing Oilfield has been calculated and the direction of water-coming has been estimated. The reasons for remaining oil and the potential exploitation measures have been put forward. The results show that the water-coming volume of injection well sj312 is 19.28 m3, which accounts for 43% of the total water volume. This well is the main inflow direction of this block. Therefore, this research can provide theoretical basis for the remaining oil potential of other blocks.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"71-72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125697876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579028
Li Zhong-xue, Cheng Peng, Liu Ji-ping
Agent organization is provided with well integrity and collaboration mechanism, process is a reflection to the organizational dynamic behavior, and portrays the organizational collaboration course. In this paper, we used the role of agent organization as an intermediary for the process modeling, got the entity agent by instantiating the goals, tasks, activities of the role, multi-agent coordination mechanism was set up by adding auxiliary agent to achieve the coordination and management of the entity agent. On the basis of the extending contract network protocol, tasks assignment standards were given, the service harmony course was described based on contract network protocol, accordingly coordination efficiency and flexibility of the process model was improved.
{"title":"Research on flexible process modeling based on agent organization","authors":"Li Zhong-xue, Cheng Peng, Liu Ji-ping","doi":"10.1109/ICACTE.2010.5579028","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579028","url":null,"abstract":"Agent organization is provided with well integrity and collaboration mechanism, process is a reflection to the organizational dynamic behavior, and portrays the organizational collaboration course. In this paper, we used the role of agent organization as an intermediary for the process modeling, got the entity agent by instantiating the goals, tasks, activities of the role, multi-agent coordination mechanism was set up by adding auxiliary agent to achieve the coordination and management of the entity agent. On the basis of the extending contract network protocol, tasks assignment standards were given, the service harmony course was described based on contract network protocol, accordingly coordination efficiency and flexibility of the process model was improved.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121930120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579310
Dexiang Zhou, Xianrong Wang
Based on primary HMM algorithm, this paper discusses an improving algorithm of HMM and uses wavelet algorithm to reduce signal noise and then signal reconstruction. The improved algorithm uses MATLAB to carry out simulation test. Through setting appropriate wavelet soft threshold value, the test result shows that the improved algorithm will improve obviously speech recognition efficiency compared with primary HMM algorithm.
{"title":"The improvement of HMM algorithm using wavelet de-noising in speech recognition","authors":"Dexiang Zhou, Xianrong Wang","doi":"10.1109/ICACTE.2010.5579310","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579310","url":null,"abstract":"Based on primary HMM algorithm, this paper discusses an improving algorithm of HMM and uses wavelet algorithm to reduce signal noise and then signal reconstruction. The improved algorithm uses MATLAB to carry out simulation test. Through setting appropriate wavelet soft threshold value, the test result shows that the improved algorithm will improve obviously speech recognition efficiency compared with primary HMM algorithm.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121965009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579809
Heng Wang, Shi-zhong Yang, Jinzhao Lin, Guoquan Li
Through automatic repeat request (ARQ) mechanism, additional diversity benefit can be obtained for delay-tolerant wireless networks. In this paper, we combine the distributed selection cooperation protocols with ARQ mechanism to develop more powerful cooperative schemes and analyze their performance from the perspective of diversity-multiplexing-delay (D-M-D) tradeoff. We prove that directly extending the selection cooperation protocol with single round of feedback to multiple rounds does not lead to optimal D-M-D tradeoff. Then we develop an improved scheme achieving the upper bound of D-M-D tradeoff and also propose an efficient scheme that greatly reduces the number of feedbacks and almost achieves the optimal performance. The D-M-D tradeoff analysis and simulation results demonstrate the significant performance improvement of all the proposed schemes.
{"title":"Selection cooperation with ARQ in delay-tolerant wireless networks","authors":"Heng Wang, Shi-zhong Yang, Jinzhao Lin, Guoquan Li","doi":"10.1109/ICACTE.2010.5579809","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579809","url":null,"abstract":"Through automatic repeat request (ARQ) mechanism, additional diversity benefit can be obtained for delay-tolerant wireless networks. In this paper, we combine the distributed selection cooperation protocols with ARQ mechanism to develop more powerful cooperative schemes and analyze their performance from the perspective of diversity-multiplexing-delay (D-M-D) tradeoff. We prove that directly extending the selection cooperation protocol with single round of feedback to multiple rounds does not lead to optimal D-M-D tradeoff. Then we develop an improved scheme achieving the upper bound of D-M-D tradeoff and also propose an efficient scheme that greatly reduces the number of feedbacks and almost achieves the optimal performance. The D-M-D tradeoff analysis and simulation results demonstrate the significant performance improvement of all the proposed schemes.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121970069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-09-20DOI: 10.1109/ICACTE.2010.5579381
Hongzhou Yu, Aidong Xu
This paper introduces a voting scheme for safety-related analog input module to arbitrate between the results of redundant channels in fault-tolerant system. The design approach is a distributed system using a sophisticated form of duplication. For each running process, there is a backup process running on a different CPU. The voter is responsible for checkpointing its state to duplex CPUs. In order to increase the dependability for safety-related controllers, the I/O modules use redundancy to reduce the risk associated with relying upon any single component operating flawlessly. The 1oo2D voting principle is commonly used in fault tolerant I/O modules to provide passive redundancy for masking runtime faults at hardware and software levels, respectively. A dual architecture (1oo2D) which provides high safety integrity to a rating of SIL 3 is presented. The outputs from two identical channels operating in parallel with the same inputs are supplied to a voting unit that arbitrates between them to produce an overall output. Based on the hardware logic model and FPGA technique, the study adopts the hardware voter which has much more advantage in the velocity and reliability. Finally, using modelsim simulations, we verify the effectiveness of the proposed voter design in preserving the hazard-free property of the response of an analog inputs module.
{"title":"Design of a fault-tolerant voter for safety related analog inputs","authors":"Hongzhou Yu, Aidong Xu","doi":"10.1109/ICACTE.2010.5579381","DOIUrl":"https://doi.org/10.1109/ICACTE.2010.5579381","url":null,"abstract":"This paper introduces a voting scheme for safety-related analog input module to arbitrate between the results of redundant channels in fault-tolerant system. The design approach is a distributed system using a sophisticated form of duplication. For each running process, there is a backup process running on a different CPU. The voter is responsible for checkpointing its state to duplex CPUs. In order to increase the dependability for safety-related controllers, the I/O modules use redundancy to reduce the risk associated with relying upon any single component operating flawlessly. The 1oo2D voting principle is commonly used in fault tolerant I/O modules to provide passive redundancy for masking runtime faults at hardware and software levels, respectively. A dual architecture (1oo2D) which provides high safety integrity to a rating of SIL 3 is presented. The outputs from two identical channels operating in parallel with the same inputs are supplied to a voting unit that arbitrates between them to produce an overall output. Based on the hardware logic model and FPGA technique, the study adopts the hardware voter which has much more advantage in the velocity and reliability. Finally, using modelsim simulations, we verify the effectiveness of the proposed voter design in preserving the hazard-free property of the response of an analog inputs module.","PeriodicalId":255806,"journal":{"name":"2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121610862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}