Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461312
D. Israel
The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A space network IP services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet protocol (IP) communications. This architecture will support all IP protocols, including mobile IP, over TDRSS single access, multiple access, and demand access radio frequency (RF) links. This paper will describe this architecture and how it can enable low Earth orbiting IP satellite missions.
美国国家航空航天局(NASA)空间网络(SN)利用跟踪和数据中继卫星系统(TDRSS)为各种任务提供支持,该系统包括位于新墨西哥州白沙和关岛的地面站。目前正在开发一种空间网络 IP 服务(SNIS)架构,以支持未来用户对端到端互联网协议(IP)通信的需求。该架构将通过 TDRSS 单接入、多接入和按需接入射频(RF)链路支持包括移动 IP 在内的所有 IP 协议。本文将介绍这一架构,以及它如何支持低地球轨道 IP 卫星任务。
{"title":"Space network IP services (SNIS): an architecture for supporting low Earth orbiting IP satellite missions","authors":"D. Israel","doi":"10.1109/ICNSC.2005.1461312","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461312","url":null,"abstract":"The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A space network IP services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet protocol (IP) communications. This architecture will support all IP protocols, including mobile IP, over TDRSS single access, multiple access, and demand access radio frequency (RF) links. This paper will describe this architecture and how it can enable low Earth orbiting IP satellite missions.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130074917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461182
Gu Yang, Wu Zhaohui, Yue Long
AlphaOS is a newly born RTOS for automotive use. It is compliant with OSEK/VDX standard and has a high performance compared to the average. This creation is conceived at July 2002, implemented on Motorola MPC555 board at November 2003 and fully tested till May 2004. This paper focuses on the design architecture and the test "method flow" of AlphaOS, aiming at revealing the methodology of how to develop and test an OSEK compliant RTOS.
{"title":"AlphaOS, an automotive RTOS based on OSEK/VDX: design and test","authors":"Gu Yang, Wu Zhaohui, Yue Long","doi":"10.1109/ICNSC.2005.1461182","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461182","url":null,"abstract":"AlphaOS is a newly born RTOS for automotive use. It is compliant with OSEK/VDX standard and has a high performance compared to the average. This creation is conceived at July 2002, implemented on Motorola MPC555 board at November 2003 and fully tested till May 2004. This paper focuses on the design architecture and the test \"method flow\" of AlphaOS, aiming at revealing the methodology of how to develop and test an OSEK compliant RTOS.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128856565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461197
Zhenhua Yu, Zhiwu Li
Multi-agent systems are studied from the software architecture point of view. As traditional architecture description languages (ADLs) are difficult to describe the semantics of multi-agent systems, a novel architecture description language for multi-agent systems (ADLMAS) rooted in BDI model is proposed, which adopts object-oriented Petri nets presented in this paper as a formal theory basis. ADLMAS can visually and intuitively depict a formal framework for multi-agent system from the agent level and society level, describe the static and dynamic semantics, and analyze the dynamic behaviors of multi-agent systems and interactions among agents with formal methods. Moreover, ADLMAS is very suitable for representing concurrent, distributed and synchronous multi-agent systems. Finally, to illustrate the favorable representation capability of ADLMAS, an example of multi-agent systems in electronic marketplace is provided.
{"title":"Architecture description language based on object-oriented Petri nets for multi-agent systems","authors":"Zhenhua Yu, Zhiwu Li","doi":"10.1109/ICNSC.2005.1461197","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461197","url":null,"abstract":"Multi-agent systems are studied from the software architecture point of view. As traditional architecture description languages (ADLs) are difficult to describe the semantics of multi-agent systems, a novel architecture description language for multi-agent systems (ADLMAS) rooted in BDI model is proposed, which adopts object-oriented Petri nets presented in this paper as a formal theory basis. ADLMAS can visually and intuitively depict a formal framework for multi-agent system from the agent level and society level, describe the static and dynamic semantics, and analyze the dynamic behaviors of multi-agent systems and interactions among agents with formal methods. Moreover, ADLMAS is very suitable for representing concurrent, distributed and synchronous multi-agent systems. Finally, to illustrate the favorable representation capability of ADLMAS, an example of multi-agent systems in electronic marketplace is provided.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115999905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461278
R. Fierro, C. Branca, J. Spletzer
The objective of this work is to investigate on-line optimization-based coordination strategies for robot teams to efficiently accomplish a mission (e.g., reach a set of assigned targets) while avoiding collisions. The multi-robot coordination problem is addressed by solving an on-line receding-horizon mixed-integer program to find some suitable inputs for the vehicles. Simulations results verify the feasibility of our approach.
{"title":"On-line optimization-based coordination of multiple unmanned vehicles","authors":"R. Fierro, C. Branca, J. Spletzer","doi":"10.1109/ICNSC.2005.1461278","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461278","url":null,"abstract":"The objective of this work is to investigate on-line optimization-based coordination strategies for robot teams to efficiently accomplish a mission (e.g., reach a set of assigned targets) while avoiding collisions. The multi-robot coordination problem is addressed by solving an on-line receding-horizon mixed-integer program to find some suitable inputs for the vehicles. Simulations results verify the feasibility of our approach.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461169
Wen-Bing Horng, Jian-Wen Peng, Chih-Yuan Chen
A new image-based real-time flame detection method is proposed in this paper. First, fire flame features based on the HSI color model are extracted by analyzing 70 flame images. Then, based on these flame features, regions with fire-like colors are roughly separated from an image. Besides segmenting fire flame regions, background objects with similar fire colors or caused by color shift resulted from the reflection of fire flames are also separated from the image. In order to get rid of these spurious fire-like regions, the image difference method and the invented color masking technique are applied. Finally, a simple method is devised to estimate the burning degree of fire flames so that users could be informed with a proper warning alarm. The proposed method is tested with seven diverse fire flame video clips on a Pentium II 350 processor with 128 MB RAM at the process speed of thirty frames per second. The experimental results are quite encouraging. The proposed method can achieve more than 96.97% detection rate on average. In addition, the system can correctly recognize fire flames within one second on the initial combustion from the test video clips, which seems very promising.
提出了一种新的基于图像的火焰实时检测方法。首先,通过对70幅火焰图像的分析,提取基于HSI颜色模型的火焰火焰特征;然后,基于这些火焰特征,从图像中大致分离出具有类似火焰颜色的区域。除了分割火焰区域外,还将与火焰颜色相似或因火焰反射而产生色移的背景物体从图像中分离出来。为了消除这些虚假的火状区域,应用了图像差分法和发明的颜色掩蔽技术。最后,设计了一种简单的方法来估计火焰的燃烧程度,以便向用户发出适当的警告警报。该方法在Pentium II 350处理器上以每秒30帧的处理速度对7个不同的火焰视频片段进行了测试。实验结果相当令人鼓舞。该方法的平均检出率达到96.97%以上。此外,从测试视频片段来看,该系统可以在一秒钟内正确识别出最初燃烧的火焰,这似乎很有前景。
{"title":"A new image-based real-time flame detection method using color analysis","authors":"Wen-Bing Horng, Jian-Wen Peng, Chih-Yuan Chen","doi":"10.1109/ICNSC.2005.1461169","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461169","url":null,"abstract":"A new image-based real-time flame detection method is proposed in this paper. First, fire flame features based on the HSI color model are extracted by analyzing 70 flame images. Then, based on these flame features, regions with fire-like colors are roughly separated from an image. Besides segmenting fire flame regions, background objects with similar fire colors or caused by color shift resulted from the reflection of fire flames are also separated from the image. In order to get rid of these spurious fire-like regions, the image difference method and the invented color masking technique are applied. Finally, a simple method is devised to estimate the burning degree of fire flames so that users could be informed with a proper warning alarm. The proposed method is tested with seven diverse fire flame video clips on a Pentium II 350 processor with 128 MB RAM at the process speed of thirty frames per second. The experimental results are quite encouraging. The proposed method can achieve more than 96.97% detection rate on average. In addition, the system can correctly recognize fire flames within one second on the initial combustion from the test video clips, which seems very promising.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121125818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461179
Lin Jie, Wang Cong, Guo Yanhui
This paper presents a framework of access control security in grid computing environment. Considering the dynamic characteristic and multi-management domains in grid computing, I design a model of combining inner-domain and cross-domain access control mechanism based on the intelligent agent and basic network access control technology. It's a try on setting a unified grid security strategy.
{"title":"Agent-based access control security in grid computing environment","authors":"Lin Jie, Wang Cong, Guo Yanhui","doi":"10.1109/ICNSC.2005.1461179","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461179","url":null,"abstract":"This paper presents a framework of access control security in grid computing environment. Considering the dynamic characteristic and multi-management domains in grid computing, I design a model of combining inner-domain and cross-domain access control mechanism based on the intelligent agent and basic network access control technology. It's a try on setting a unified grid security strategy.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126687178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461170
Ruifan Li, Cong Wang, Xuyan Tu
Natural immune system has many features for inspirations to computer security. From this paradigm, a new multi-agent model for network-based intrusion detection system is presented. We briefly summarize the main mechanisms of immunology from information processing perspective and concisely review the related works. Moreover, some mechanisms, including cloning with hyper-mutation, affinity maturation, and stigmergy are incorporated to this new model for network intrusion detection. Its conceptual view and working mechanism are described, and its characteristics, autonomous, robust, adaptable, and lightweight, are discussed.
{"title":"A new immunity-based model for network intrusion detection","authors":"Ruifan Li, Cong Wang, Xuyan Tu","doi":"10.1109/ICNSC.2005.1461170","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461170","url":null,"abstract":"Natural immune system has many features for inspirations to computer security. From this paradigm, a new multi-agent model for network-based intrusion detection system is presented. We briefly summarize the main mechanisms of immunology from information processing perspective and concisely review the related works. Moreover, some mechanisms, including cloning with hyper-mutation, affinity maturation, and stigmergy are incorporated to this new model for network intrusion detection. Its conceptual view and working mechanism are described, and its characteristics, autonomous, robust, adaptable, and lightweight, are discussed.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125291706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461201
Yanhui Guo, Cong Wang
Based on the existing problems in current network security, the concept and structure of autonomous decentralized system (ADS) are introduced. The defects of network security system and the application feasibility of ADS to it are analyzed. A simple configuration of autonomous decentralized network security system is given. It improves the traditional network security and solves the technical problems existing in the traditional network security.
{"title":"Autonomous decentralized network security system","authors":"Yanhui Guo, Cong Wang","doi":"10.1109/ICNSC.2005.1461201","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461201","url":null,"abstract":"Based on the existing problems in current network security, the concept and structure of autonomous decentralized system (ADS) are introduced. The defects of network security system and the application feasibility of ADS to it are analyzed. A simple configuration of autonomous decentralized network security system is given. It improves the traditional network security and solves the technical problems existing in the traditional network security.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126463379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461240
Hongliang Zhou
A cost effective scheme was proposed to realize real-time power quality monitoring for remote distribution system. The key point is to realize the communication between monitoring substations and monitoring centre. The communication can be carried out based on general packet radio service (GPRS). And it has the merit of always on-line, flexible structure and low cost. The design scheme was applied to power quality monitoring systems and satisfactory results were achieved. The scheme can work where the monitoring substations were located in remote wild farms or on mountains. The communication method can also be used in applications where the data flow is not so heavy and there is difficult in wire communication.
{"title":"GPRS based power quality monitoring system","authors":"Hongliang Zhou","doi":"10.1109/ICNSC.2005.1461240","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461240","url":null,"abstract":"A cost effective scheme was proposed to realize real-time power quality monitoring for remote distribution system. The key point is to realize the communication between monitoring substations and monitoring centre. The communication can be carried out based on general packet radio service (GPRS). And it has the merit of always on-line, flexible structure and low cost. The design scheme was applied to power quality monitoring systems and satisfactory results were achieved. The scheme can work where the monitoring substations were located in remote wild farms or on mountains. The communication method can also be used in applications where the data flow is not so heavy and there is difficult in wire communication.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131164167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-03-19DOI: 10.1109/ICNSC.2005.1461175
Wen-June Wang, Chung-Hsun Sun
A weighting dependent Lyapunov function based stability criterion for T-S fuzzy discrete systems has been studied in lots of literature. That is to find out r (number of rules) symmetric positive matrices P/sub iS/ to satisfy r/sup 2/ Lyapunov inequalities. The aim of this paper is to reduce the Lyapunov inequalities which should be satisfied with positive matrices P/sub iS/ then the conservatism of the stability conditions would be relaxed. From the viewpoint of the group of firing rules and the maximum distance between two successive states of the system, a new relaxed stability criterion based on the weighting dependent Lyapunov function is proposed. Finally, an example is illustrated to show the relaxation effectiveness of the proposed stability criterion.
{"title":"A weighting dependent Lyapunov function based relaxed stability criterion for T-S fuzzy discrete systems","authors":"Wen-June Wang, Chung-Hsun Sun","doi":"10.1109/ICNSC.2005.1461175","DOIUrl":"https://doi.org/10.1109/ICNSC.2005.1461175","url":null,"abstract":"A weighting dependent Lyapunov function based stability criterion for T-S fuzzy discrete systems has been studied in lots of literature. That is to find out r (number of rules) symmetric positive matrices P/sub iS/ to satisfy r/sup 2/ Lyapunov inequalities. The aim of this paper is to reduce the Lyapunov inequalities which should be satisfied with positive matrices P/sub iS/ then the conservatism of the stability conditions would be relaxed. From the viewpoint of the group of firing rules and the maximum distance between two successive states of the system, a new relaxed stability criterion based on the weighting dependent Lyapunov function is proposed. Finally, an example is illustrated to show the relaxation effectiveness of the proposed stability criterion.","PeriodicalId":313251,"journal":{"name":"Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133015992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}