This paper presents a method for using the UWB ranging & communication modules (RCM) and designing ARM9 controllers to set up Self-organized WSN indoor localization system. It is the mobile target that measure the distance at the same time, so it needn't to synchronize the clock of the base station and can obtain real-time position information. The most advantage is that the mobile tag can detect the base stations nearby automatically and along with these base stations to form a self-organized wireless sensor network. The localization system can apply in large indoor range and the positioning error is less than 0.2m.
{"title":"The Designing of Indoor Localization System Based on Self-Organized WSN Using Pulson UWB Sensors","authors":"Wang Yan, Zhao Jing, Zhang Nailong","doi":"10.1109/ICISCE.2015.218","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.218","url":null,"abstract":"This paper presents a method for using the UWB ranging & communication modules (RCM) and designing ARM9 controllers to set up Self-organized WSN indoor localization system. It is the mobile target that measure the distance at the same time, so it needn't to synchronize the clock of the base station and can obtain real-time position information. The most advantage is that the mobile tag can detect the base stations nearby automatically and along with these base stations to form a self-organized wireless sensor network. The localization system can apply in large indoor range and the positioning error is less than 0.2m.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124792010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gao Dapeng, H. Jianming, Yu-hu, Xu Guoqian, Zhang Nainiang
Combats are taking on typical complicated and nonlinear characteristics with the more and more profound application of information technology in military field. Starting with the stimulation-reaction mechanism the article brings out the System Dynamics model of the battle in information age based on OODA loop according to the theory and method of System Dynamics and simulates the process of the battle. The model reflects better the nature of battle in information age. Result of the simulation will provide the commander with the quantitative theoretical support and policy orientation needed to organize command and win the war in information condition.
{"title":"Research on Combat SD Model Based on OODA Loop","authors":"Gao Dapeng, H. Jianming, Yu-hu, Xu Guoqian, Zhang Nainiang","doi":"10.1109/ICISCE.2015.201","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.201","url":null,"abstract":"Combats are taking on typical complicated and nonlinear characteristics with the more and more profound application of information technology in military field. Starting with the stimulation-reaction mechanism the article brings out the System Dynamics model of the battle in information age based on OODA loop according to the theory and method of System Dynamics and simulates the process of the battle. The model reflects better the nature of battle in information age. Result of the simulation will provide the commander with the quantitative theoretical support and policy orientation needed to organize command and win the war in information condition.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124427536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is a big challenge to establish a dynamic access control model to secure applications in open and dynamic environment. The dynamic feature of an access control system is sometimes related with that of applications of open environment. This paper analyzes first the reason that causes the dynamic change of access control systems and then proposes a five-level access control architecture which describes the relation between access control systems and applications, and also distinguishes two kinds of actions that may cause changes of the access control components and resources, respectively. This paper uses Role-based Access Control (RBAC) as a reference access control model and Web services as the example of applications so as to propose a special dynamic access control model. To give a formal representation of the two kind actions, this paper also proposes a dynamic description logic-based formalism.
{"title":"A Multi-level Dynamic Access Control Model and Its Formalization","authors":"Yanjie Zhou, Li Ma, Min Wen","doi":"10.1109/ICISCE.2015.14","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.14","url":null,"abstract":"It is a big challenge to establish a dynamic access control model to secure applications in open and dynamic environment. The dynamic feature of an access control system is sometimes related with that of applications of open environment. This paper analyzes first the reason that causes the dynamic change of access control systems and then proposes a five-level access control architecture which describes the relation between access control systems and applications, and also distinguishes two kinds of actions that may cause changes of the access control components and resources, respectively. This paper uses Role-based Access Control (RBAC) as a reference access control model and Web services as the example of applications so as to propose a special dynamic access control model. To give a formal representation of the two kind actions, this paper also proposes a dynamic description logic-based formalism.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124160466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, LBS (Location-Based Service)have been widely used. According tithe historical location of user, location service providers may analyze the user's interests, health and other personal privacy. The traditional k-anonymous protection method for trajectory mainly depends on the European space but not consider the road networks. In this paper, we proposed a method for trajectory privacy protection based on the segmented fake trajectory under road network. This method generated the fake position for the sampling location of real trajectory in different time, and generated the segmented fake trajectory in different time intervals. For the segmented fake trajectory which satisfied in the demand of privacy, according to the order of time, we connected them to generate the integrated fake trajectory. This method can both ensure the road network L-diversity and trajectory L-diversity. Through the experiment results, we proved that this method have a better effect for the user's real trajectory protection.
{"title":"A Method for the Trajectory Privacy Protection Based on the Segmented Fake Trajectory under Road Networks","authors":"Jiazhu Dai, Liang Hua","doi":"10.1109/ICISCE.2015.12","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.12","url":null,"abstract":"In recent years, LBS (Location-Based Service)have been widely used. According tithe historical location of user, location service providers may analyze the user's interests, health and other personal privacy. The traditional k-anonymous protection method for trajectory mainly depends on the European space but not consider the road networks. In this paper, we proposed a method for trajectory privacy protection based on the segmented fake trajectory under road network. This method generated the fake position for the sampling location of real trajectory in different time, and generated the segmented fake trajectory in different time intervals. For the segmented fake trajectory which satisfied in the demand of privacy, according to the order of time, we connected them to generate the integrated fake trajectory. This method can both ensure the road network L-diversity and trajectory L-diversity. Through the experiment results, we proved that this method have a better effect for the user's real trajectory protection.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"2003 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128825185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For data exchange industry chain enterprises and cloud service platform group based on SaaS mode, analyzed the data exchange all the inherent relation and data exchange participants, based on the solution of data exchange based on Web Services. On the basis of improving the traditional XML data exchange model based on the proposed rule double XML configuration data exchange model, in order to build a flexible exchange data dynamically configurable system of rules. Then phased abstract data exchange model designed bi-directional data exchange mechanism to achieve the data exchange remote collaborative data exchange between the two sides. Through the application in the automobile industry chain cloud services platform, it proves the research can better support cloud service platform and core vehicle manufacturing enterprises of multi-source heterogeneous data exchange requirements.
{"title":"Multi-source Heterogeneous Data Exchange System for Cloud Services Platform Based on SaaS","authors":"Binyong Li, Linfu Sun, R. Tian","doi":"10.1109/ICISCE.2015.79","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.79","url":null,"abstract":"For data exchange industry chain enterprises and cloud service platform group based on SaaS mode, analyzed the data exchange all the inherent relation and data exchange participants, based on the solution of data exchange based on Web Services. On the basis of improving the traditional XML data exchange model based on the proposed rule double XML configuration data exchange model, in order to build a flexible exchange data dynamically configurable system of rules. Then phased abstract data exchange model designed bi-directional data exchange mechanism to achieve the data exchange remote collaborative data exchange between the two sides. Through the application in the automobile industry chain cloud services platform, it proves the research can better support cloud service platform and core vehicle manufacturing enterprises of multi-source heterogeneous data exchange requirements.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129386324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luo She-Juang, Lee De-Chih, Tsai Yuan-Cheng, Mao Ko-Min, Shen Lin
Due to the fact that most business considered only product delivery to customer in their supply chain, follow-on logistics support often run short. It often occurs that the supply chain needs to be reconstructed or repaired when products are no longer manufactured. Military components or systems, in particular, will encounter the problem of Diminishing Manufacturing Source and Material Shortage (DMSMS) so that it needs supply chain management repair actions during its deployment phase. Due to DMSMS problems, the availability of parts is affected and the operation and support cost of electronic systems are increased. This study uses the cross-related attribute of concurrent engineering to collect and analyze maintenance data system of the customer's operational data. The concurrent engineering (CE) technique is integrated with DMSMS problems and thus results in increased efficiency of the production and the improvement of product quality. This paper discusses investigation architecture of DMSMS problem and an impact analysis of a fighter electronics system for the span of its product life cycle. It is hoped that this technique can provide a reference for management and decision making of managers when new products enter the market that they not only meet customer requirement, but also enhance company competitiveness.
{"title":"An Empirical Study of Reducing DMSMS Problem on Supply Chain Management Repair","authors":"Luo She-Juang, Lee De-Chih, Tsai Yuan-Cheng, Mao Ko-Min, Shen Lin","doi":"10.1109/ICISCE.2015.140","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.140","url":null,"abstract":"Due to the fact that most business considered only product delivery to customer in their supply chain, follow-on logistics support often run short. It often occurs that the supply chain needs to be reconstructed or repaired when products are no longer manufactured. Military components or systems, in particular, will encounter the problem of Diminishing Manufacturing Source and Material Shortage (DMSMS) so that it needs supply chain management repair actions during its deployment phase. Due to DMSMS problems, the availability of parts is affected and the operation and support cost of electronic systems are increased. This study uses the cross-related attribute of concurrent engineering to collect and analyze maintenance data system of the customer's operational data. The concurrent engineering (CE) technique is integrated with DMSMS problems and thus results in increased efficiency of the production and the improvement of product quality. This paper discusses investigation architecture of DMSMS problem and an impact analysis of a fighter electronics system for the span of its product life cycle. It is hoped that this technique can provide a reference for management and decision making of managers when new products enter the market that they not only meet customer requirement, but also enhance company competitiveness.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130533580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The power efficiency target is becomes the first goal of current hardware system. The workload under cloud computing environment needs to be accelerated by hardware as more as possible, in order to improve the overall power/performance efficiency. The traditional CPU-FPGA architecture can not handle fine granularity routine of algorithm by FPGA hardware in a effective way, as well as challenge on programming model. This paper proposed a memory/cache coherency based CPU-Cache-FPGA architecture to perform an effective transparent communication between software threads on CPU and hardware threads on FPGA. In a sorting application example, the proposed architecture can gain 2.6 times acceleration ratio than traditional CPU-FPGA architecture, as well as a simplified programming model.
{"title":"Memory Coherency Based CPU-Cache-FPGA Acceleration Architecture for Cloud Computing","authors":"Hao Yang, Xiaolang Yan","doi":"10.1109/ICISCE.2015.74","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.74","url":null,"abstract":"The power efficiency target is becomes the first goal of current hardware system. The workload under cloud computing environment needs to be accelerated by hardware as more as possible, in order to improve the overall power/performance efficiency. The traditional CPU-FPGA architecture can not handle fine granularity routine of algorithm by FPGA hardware in a effective way, as well as challenge on programming model. This paper proposed a memory/cache coherency based CPU-Cache-FPGA architecture to perform an effective transparent communication between software threads on CPU and hardware threads on FPGA. In a sorting application example, the proposed architecture can gain 2.6 times acceleration ratio than traditional CPU-FPGA architecture, as well as a simplified programming model.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129604730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In consideration of the difficulty to install speed sensor result from special high temperature working environment of submersible motor, in this paper, a method of sliding mode model reference adaptive observer(SMMRAS) is used to estimate the speed of sensor less vector controlled submersible motor. This method combines variable structure control with model reference adaptive system (MRAS) to improve the accuracy of speed identification, and testability and speediness capability of the system are proved by Yaupon theory. The model of the speed-sensor less vector control system of induction motor is built by MatLab/Simulink. Theoretical analysis and the MATLAB simulation results show that the proposed method used in the system for speed identification has rapid response, and the static and dynamic performance is also perfect.
{"title":"Sliding Mode MRAS Speed Sensorless Vector Control for Submersible Motor","authors":"Shan Bai, He Wang","doi":"10.1109/ICISCE.2015.208","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.208","url":null,"abstract":"In consideration of the difficulty to install speed sensor result from special high temperature working environment of submersible motor, in this paper, a method of sliding mode model reference adaptive observer(SMMRAS) is used to estimate the speed of sensor less vector controlled submersible motor. This method combines variable structure control with model reference adaptive system (MRAS) to improve the accuracy of speed identification, and testability and speediness capability of the system are proved by Yaupon theory. The model of the speed-sensor less vector control system of induction motor is built by MatLab/Simulink. Theoretical analysis and the MATLAB simulation results show that the proposed method used in the system for speed identification has rapid response, and the static and dynamic performance is also perfect.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129852154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper discusses influence of sloping ground on electric field under overhead lines. Sloping ground is first transformed into flat ground by use of conformal mapping. Then the analytical expression of electric field is obtained by mirror method. The calculation method of electric field with sloping ground is verified by an example with analytical result. At last, electric field under overhead lines with varying slope angle and distance from sloping ground to overhead line is calculated to show their influences.
{"title":"Calculation of Power Frequency Electric Field under Overhead Lines with Sloping Ground by Conformal Mapping","authors":"Yuze Jiang, Gang Li, Zhenguang Liang, Fei Guo","doi":"10.1109/ICISCE.2015.149","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.149","url":null,"abstract":"This paper discusses influence of sloping ground on electric field under overhead lines. Sloping ground is first transformed into flat ground by use of conformal mapping. Then the analytical expression of electric field is obtained by mirror method. The calculation method of electric field with sloping ground is verified by an example with analytical result. At last, electric field under overhead lines with varying slope angle and distance from sloping ground to overhead line is calculated to show their influences.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130273564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simultaneous position and force tracking are two critical factors in teleportation systems to achieve transparency. In this paper, a new control scheme is proposed to guarantee asymptotic position and force tracking in teleportation systems with disturbances. To this end, two sliding mode controllers are designed for the master and the slave robots respectively and are incorporated into the 4-channel teleportation framework. In order to demonstrate the validity of the proposed control scheme, the performance of the overall teleportation control system is rigorously proved and analyzed in a mathematical way. The analysis results show that the designed teleportation control scheme can simultaneously achieve asymptotic position and force tracking performance of the master and the slave robots.
{"title":"Design and Analysis of Position/Force Control in Teleoperation Systems with Disturbances","authors":"Xia Liu, Yong Chen","doi":"10.1109/ICISCE.2015.159","DOIUrl":"https://doi.org/10.1109/ICISCE.2015.159","url":null,"abstract":"Simultaneous position and force tracking are two critical factors in teleportation systems to achieve transparency. In this paper, a new control scheme is proposed to guarantee asymptotic position and force tracking in teleportation systems with disturbances. To this end, two sliding mode controllers are designed for the master and the slave robots respectively and are incorporated into the 4-channel teleportation framework. In order to demonstrate the validity of the proposed control scheme, the performance of the overall teleportation control system is rigorously proved and analyzed in a mathematical way. The analysis results show that the designed teleportation control scheme can simultaneously achieve asymptotic position and force tracking performance of the master and the slave robots.","PeriodicalId":356250,"journal":{"name":"2015 2nd International Conference on Information Science and Control Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125930532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}