Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461240
Hongliang Zhou
A cost effective scheme was proposed to realize real-time power quality monitoring for remote distribution system. The key point is to realize the communication between monitoring substations and monitoring centre. The communication can be carried out based on general packet radio service (GPRS). And it has the merit of always on-line, flexible structure and low cost. The design scheme was applied to power quality monitoring systems and satisfactory results were achieved. The scheme can work where the monitoring substations were located in remote wild farms or on mountains. The communication method can also be used in applications where the data flow is not so heavy and there is difficult in wire communication.
{"title":"GPRS based power quality monitoring system","authors":"Hongliang Zhou","doi":"10.1109/ICNSC.2005.1461240","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461240","url":null,"abstract":"A cost effective scheme was proposed to realize real-time power quality monitoring for remote distribution system. The key point is to realize the communication between monitoring substations and monitoring centre. The communication can be carried out based on general packet radio service (GPRS). And it has the merit of always on-line, flexible structure and low cost. The design scheme was applied to power quality monitoring systems and satisfactory results were achieved. The scheme can work where the monitoring substations were located in remote wild farms or on mountains. The communication method can also be used in applications where the data flow is not so heavy and there is difficult in wire communication.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131164167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461191
Yongchun He, Cong Wang, J. Qiu
At present, as an extension of distributed computing, the technology of mobile agent is becoming more and more popular. In this paper, a model of Web information gathering based on mobile agent technology is constructed, and the design of the model and the working process is introduced. A model of cooperating working for information gathering and a kind of arithmetic to implement this model are given. In addition, the upgrade of information gathered is implemented by making use of mobile agent technology.
{"title":"An information gathering model based on mobile agents","authors":"Yongchun He, Cong Wang, J. Qiu","doi":"10.1109/ICNSC.2005.1461191","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461191","url":null,"abstract":"At present, as an extension of distributed computing, the technology of mobile agent is becoming more and more popular. In this paper, a model of Web information gathering based on mobile agent technology is constructed, and the design of the model and the working process is introduced. A model of cooperating working for information gathering and a kind of arithmetic to implement this model are given. In addition, the upgrade of information gathered is implemented by making use of mobile agent technology.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124470455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461182
Gu Yang, Wu Zhaohui, Yue Long
AlphaOS is a newly born RTOS for automotive use. It is compliant with OSEK/VDX standard and has a high performance compared to the average. This creation is conceived at July 2002, implemented on Motorola MPC555 board at November 2003 and fully tested till May 2004. This paper focuses on the design architecture and the test "method flow" of AlphaOS, aiming at revealing the methodology of how to develop and test an OSEK compliant RTOS.
{"title":"AlphaOS, an automotive RTOS based on OSEK/VDX: design and test","authors":"Gu Yang, Wu Zhaohui, Yue Long","doi":"10.1109/ICNSC.2005.1461182","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461182","url":null,"abstract":"AlphaOS is a newly born RTOS for automotive use. It is compliant with OSEK/VDX standard and has a high performance compared to the average. This creation is conceived at July 2002, implemented on Motorola MPC555 board at November 2003 and fully tested till May 2004. This paper focuses on the design architecture and the test \"method flow\" of AlphaOS, aiming at revealing the methodology of how to develop and test an OSEK compliant RTOS.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128856565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461300
Bin Ye, Zhonggui Ma, Cong Wang, Xuyan Tu
This paper presented a structure model of distributed intelligent ERP system based on SoftMan technology, multiple base cooperation technology. The authors analyzed the disadvantage of traditional ERP system. Many defects of system, such as the bad intelligence and flexibility, are indicated. These work supplies the foundation in order to design and apply the distributed intelligent ERP system.
{"title":"Research on the architecture of distributed intelligent ERP system","authors":"Bin Ye, Zhonggui Ma, Cong Wang, Xuyan Tu","doi":"10.1109/ICNSC.2005.1461300","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461300","url":null,"abstract":"This paper presented a structure model of distributed intelligent ERP system based on SoftMan technology, multiple base cooperation technology. The authors analyzed the disadvantage of traditional ERP system. Many defects of system, such as the bad intelligence and flexibility, are indicated. These work supplies the foundation in order to design and apply the distributed intelligent ERP system.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125794406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461179
Lin Jie, Wang Cong, Guo Yanhui
This paper presents a framework of access control security in grid computing environment. Considering the dynamic characteristic and multi-management domains in grid computing, I design a model of combining inner-domain and cross-domain access control mechanism based on the intelligent agent and basic network access control technology. It's a try on setting a unified grid security strategy.
{"title":"Agent-based access control security in grid computing environment","authors":"Lin Jie, Wang Cong, Guo Yanhui","doi":"10.1109/ICNSC.2005.1461179","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461179","url":null,"abstract":"This paper presents a framework of access control security in grid computing environment. Considering the dynamic characteristic and multi-management domains in grid computing, I design a model of combining inner-domain and cross-domain access control mechanism based on the intelligent agent and basic network access control technology. It's a try on setting a unified grid security strategy.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126687178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461278
R. Fierro, C. Branca, J. Spletzer
The objective of this work is to investigate on-line optimization-based coordination strategies for robot teams to efficiently accomplish a mission (e.g., reach a set of assigned targets) while avoiding collisions. The multi-robot coordination problem is addressed by solving an on-line receding-horizon mixed-integer program to find some suitable inputs for the vehicles. Simulations results verify the feasibility of our approach.
{"title":"On-line optimization-based coordination of multiple unmanned vehicles","authors":"R. Fierro, C. Branca, J. Spletzer","doi":"10.1109/ICNSC.2005.1461278","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461278","url":null,"abstract":"The objective of this work is to investigate on-line optimization-based coordination strategies for robot teams to efficiently accomplish a mission (e.g., reach a set of assigned targets) while avoiding collisions. The multi-robot coordination problem is addressed by solving an on-line receding-horizon mixed-integer program to find some suitable inputs for the vehicles. Simulations results verify the feasibility of our approach.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461332
Meng Yu, Wanyu Zang, Peng Liu, Jiacun Wang
Distributed computing systems are important in daily business processing. Since vulnerability cannot be totally removed from a distributed computing system, successful attacks always happen and may inject malicious tasks or incorrect data into the distributed system. Referring to the incorrect data will further corrupt more data objects in the system, which comprises the integrity level of the system. In this paper, based on our recovery theories and algorithms proposed in [Yu, M., et al. (2004)], we build an architecture of a distributed attack recovery system. Our work can help the user to build a real recovery system and serve as a test bed to evaluate both our attack recovery techniques and new developed attack recovery techniques in the future.
分布式计算系统在日常业务处理中非常重要。由于分布式计算系统不可能完全消除漏洞,因此总会发生成功的攻击,并可能向分布式系统注入恶意任务或错误数据。引用不正确的数据将进一步破坏系统中的更多数据对象,这构成了系统的完整性级别。本文在[Yu, M., et al.(2004)]中提出的恢复理论和算法的基础上,构建了分布式攻击恢复系统的体系结构。我们的工作可以帮助用户建立一个真实的恢复系统,并作为一个测试平台来评估我们的攻击恢复技术和未来新开发的攻击恢复技术。
{"title":"The architecture of an automatic distributed recovery system","authors":"Meng Yu, Wanyu Zang, Peng Liu, Jiacun Wang","doi":"10.1109/ICNSC.2005.1461332","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461332","url":null,"abstract":"Distributed computing systems are important in daily business processing. Since vulnerability cannot be totally removed from a distributed computing system, successful attacks always happen and may inject malicious tasks or incorrect data into the distributed system. Referring to the incorrect data will further corrupt more data objects in the system, which comprises the integrity level of the system. In this paper, based on our recovery theories and algorithms proposed in [Yu, M., et al. (2004)], we build an architecture of a distributed attack recovery system. Our work can help the user to build a real recovery system and serve as a test bed to evaluate both our attack recovery techniques and new developed attack recovery techniques in the future.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126269674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461312
D. Israel
The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A space network IP services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet protocol (IP) communications. This architecture will support all IP protocols, including mobile IP, over TDRSS single access, multiple access, and demand access radio frequency (RF) links. This paper will describe this architecture and how it can enable low Earth orbiting IP satellite missions.
美国国家航空航天局(NASA)空间网络(SN)利用跟踪和数据中继卫星系统(TDRSS)为各种任务提供支持,该系统包括位于新墨西哥州白沙和关岛的地面站。目前正在开发一种空间网络 IP 服务(SNIS)架构,以支持未来用户对端到端互联网协议(IP)通信的需求。该架构将通过 TDRSS 单接入、多接入和按需接入射频(RF)链路支持包括移动 IP 在内的所有 IP 协议。本文将介绍这一架构,以及它如何支持低地球轨道 IP 卫星任务。
{"title":"Space network IP services (SNIS): an architecture for supporting low Earth orbiting IP satellite missions","authors":"D. Israel","doi":"10.1109/ICNSC.2005.1461312","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461312","url":null,"abstract":"The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A space network IP services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet protocol (IP) communications. This architecture will support all IP protocols, including mobile IP, over TDRSS single access, multiple access, and demand access radio frequency (RF) links. This paper will describe this architecture and how it can enable low Earth orbiting IP satellite missions.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130074917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461201
Yanhui Guo, Cong Wang
Based on the existing problems in current network security, the concept and structure of autonomous decentralized system (ADS) are introduced. The defects of network security system and the application feasibility of ADS to it are analyzed. A simple configuration of autonomous decentralized network security system is given. It improves the traditional network security and solves the technical problems existing in the traditional network security.
{"title":"Autonomous decentralized network security system","authors":"Yanhui Guo, Cong Wang","doi":"10.1109/ICNSC.2005.1461201","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461201","url":null,"abstract":"Based on the existing problems in current network security, the concept and structure of autonomous decentralized system (ADS) are introduced. The defects of network security system and the application feasibility of ADS to it are analyzed. A simple configuration of autonomous decentralized network security system is given. It improves the traditional network security and solves the technical problems existing in the traditional network security.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126463379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461175
Wen-June Wang, Chung-Hsun Sun
A weighting dependent Lyapunov function based stability criterion for T-S fuzzy discrete systems has been studied in lots of literature. That is to find out r (number of rules) symmetric positive matrices P/sub iS/ to satisfy r/sup 2/ Lyapunov inequalities. The aim of this paper is to reduce the Lyapunov inequalities which should be satisfied with positive matrices P/sub iS/ then the conservatism of the stability conditions would be relaxed. From the viewpoint of the group of firing rules and the maximum distance between two successive states of the system, a new relaxed stability criterion based on the weighting dependent Lyapunov function is proposed. Finally, an example is illustrated to show the relaxation effectiveness of the proposed stability criterion.
{"title":"A weighting dependent Lyapunov function based relaxed stability criterion for T-S fuzzy discrete systems","authors":"Wen-June Wang, Chung-Hsun Sun","doi":"10.1109/ICNSC.2005.1461175","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461175","url":null,"abstract":"A weighting dependent Lyapunov function based stability criterion for T-S fuzzy discrete systems has been studied in lots of literature. That is to find out r (number of rules) symmetric positive matrices P/sub iS/ to satisfy r/sup 2/ Lyapunov inequalities. The aim of this paper is to reduce the Lyapunov inequalities which should be satisfied with positive matrices P/sub iS/ then the conservatism of the stability conditions would be relaxed. From the viewpoint of the group of firing rules and the maximum distance between two successive states of the system, a new relaxed stability criterion based on the weighting dependent Lyapunov function is proposed. Finally, an example is illustrated to show the relaxation effectiveness of the proposed stability criterion.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133015992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}