Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810578
Hu Qiong, Fang Shidong
This paper developed a pipeline leak detection system based on virtual instrument LabVIEW and described the system principle, composition structure and development progress in detail. The pipeline leak detection system acquired pressure and flow at two ends of the pipeline real time, analyzed data by wavelet analysis functions offered by LabVIEW, detected leak through flow changes and located leak by negative pressure wave method. This system has the characteristics of perfect functions, friendly interface, convenient operation and great practicality.
{"title":"Development of Pipeline Leak Detection System based on LabVIEW","authors":"Hu Qiong, Fang Shidong","doi":"10.1109/KAMW.2008.4810578","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810578","url":null,"abstract":"This paper developed a pipeline leak detection system based on virtual instrument LabVIEW and described the system principle, composition structure and development progress in detail. The pipeline leak detection system acquired pressure and flow at two ends of the pipeline real time, analyzed data by wavelet analysis functions offered by LabVIEW, detected leak through flow changes and located leak by negative pressure wave method. This system has the characteristics of perfect functions, friendly interface, convenient operation and great practicality.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127306417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810445
Lingfei Xiao, H. Su
Based on a creative sliding mode prediction model, a novel sliding mode observer (SMO) design method for discrete-time nonlinear uncertain systems is presented in this paper. By combining feedback correction approach, the observer states can close to system states as exactly as possible, and chattering is eliminate simultaneously. Because of the employing of receding horizon optimization technique, the observer compensatory term can be optimized continuously and on-line. The proposed method guarantees the SMO is robustly stable. The satisfying properties of the SMO are verified by a numerical example.
{"title":"Sliding Mode Observer Design for Discrete-time Nonlinear Uncertain Systems via Sliding Mode Prediction","authors":"Lingfei Xiao, H. Su","doi":"10.1109/KAMW.2008.4810445","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810445","url":null,"abstract":"Based on a creative sliding mode prediction model, a novel sliding mode observer (SMO) design method for discrete-time nonlinear uncertain systems is presented in this paper. By combining feedback correction approach, the observer states can close to system states as exactly as possible, and chattering is eliminate simultaneously. Because of the employing of receding horizon optimization technique, the observer compensatory term can be optimized continuously and on-line. The proposed method guarantees the SMO is robustly stable. The satisfying properties of the SMO are verified by a numerical example.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114456291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810591
Hui Hu, Luchao Xu, Yuguang Zhan
The paper completed all the correction of constellation error and receiver channel error. It was brought forward a comprehensive scheme for position error correction. The experiment platform was based on Superstar II GPS receiver and Matlab. It mainly corrected the position error such as satellite clock error, ionospheric error, tropospheric error, the earth rotation effect etc. Moreover, ionospheric delay error was corrected for about 14 m by Klobuchar model; tropospheric error was corrected for the average value of 4.05 m by the altitude angle module and so on. Especially, the satellite clock error was corrected for 3.1 m related to IGS by empirical formula. The user clock error is the max error with magnitude of 104~105 s to affect position result. Finally, these methods improved the positioning precision to 17 m. The result of experiment has proved the validity of these correcting methods, accumulating much experience for the next investigation.
完成了星座误差和接收机信道误差的全部校正。提出了一种综合的位置误差校正方案。实验平台基于Superstar II GPS接收机和Matlab。主要对卫星时钟误差、电离层误差、对流层误差、地球自转效应等位置误差进行校正。利用Klobuchar模型对电离层延迟误差进行了约14 m的修正;对流层误差经高度角模等校正为平均值4.05 m。利用经验公式对与IGS相关的3.1 m卫星时钟误差进行了修正。用户时钟误差是影响定位结果的最大误差,其量级为104~105秒。最后,这些方法将定位精度提高到17 m。实验结果证明了这些校正方法的有效性,为下一步的研究积累了经验。
{"title":"The Study on Position Error Correction of C/A Code GPS Receiver","authors":"Hui Hu, Luchao Xu, Yuguang Zhan","doi":"10.1109/KAMW.2008.4810591","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810591","url":null,"abstract":"The paper completed all the correction of constellation error and receiver channel error. It was brought forward a comprehensive scheme for position error correction. The experiment platform was based on Superstar II GPS receiver and Matlab. It mainly corrected the position error such as satellite clock error, ionospheric error, tropospheric error, the earth rotation effect etc. Moreover, ionospheric delay error was corrected for about 14 m by Klobuchar model; tropospheric error was corrected for the average value of 4.05 m by the altitude angle module and so on. Especially, the satellite clock error was corrected for 3.1 m related to IGS by empirical formula. The user clock error is the max error with magnitude of 104~105 s to affect position result. Finally, these methods improved the positioning precision to 17 m. The result of experiment has proved the validity of these correcting methods, accumulating much experience for the next investigation.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122727151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810577
Tang Bo, Tan Xiaobin, Yin Bao-qun
The use of continuous-time hidden Markov models for network protocol and application performance evaluation has been validated to simulate network environments. In this paper, we develop a better algorithm to infer the continuous-time hidden Markov model from a series of end-to-end delay and loss observation of probing packets. We prove the algorithm's feasibility by theory deduction and realize numerable validation by comparing the probability of the observed sequence produced by the model inferred by different methods. The algorithm complexity is lower.
{"title":"Continuous-time Hidden Markov models in Network Simulation","authors":"Tang Bo, Tan Xiaobin, Yin Bao-qun","doi":"10.1109/KAMW.2008.4810577","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810577","url":null,"abstract":"The use of continuous-time hidden Markov models for network protocol and application performance evaluation has been validated to simulate network environments. In this paper, we develop a better algorithm to infer the continuous-time hidden Markov model from a series of end-to-end delay and loss observation of probing packets. We prove the algorithm's feasibility by theory deduction and realize numerable validation by comparing the probability of the observed sequence produced by the model inferred by different methods. The algorithm complexity is lower.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126991697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810652
He Shaohua, Zhu Hongtao
The purpose of this study is to analyze the motivations of library tacit knowledge transfer and to explore how to utilize them to improve efficiency of tacit knowledge transfer. Beginning with the scope of the library tacit knowledge, this paper constructs a motivation model based on analyzing the process of library knowledge transfer. Then the two aspects of the model, including intrinsic motivation and extrinsic motivation, are discussed. In the end a few measures are brought forward in order to accelerate and utilize motivation to improve efficiency of library tacit knowledge transfer.
{"title":"Research on a Motivation Model of Library Tacit Knowledge Transfer and Its Utilization","authors":"He Shaohua, Zhu Hongtao","doi":"10.1109/KAMW.2008.4810652","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810652","url":null,"abstract":"The purpose of this study is to analyze the motivations of library tacit knowledge transfer and to explore how to utilize them to improve efficiency of tacit knowledge transfer. Beginning with the scope of the library tacit knowledge, this paper constructs a motivation model based on analyzing the process of library knowledge transfer. Then the two aspects of the model, including intrinsic motivation and extrinsic motivation, are discussed. In the end a few measures are brought forward in order to accelerate and utilize motivation to improve efficiency of library tacit knowledge transfer.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131278152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810421
Zhaohua Long, Guofeng Wang
Analyzes the engineering environment in WLAN based on ECC, this paper describe a kind of dual signature scheme using multi-element authentication method by choosing appropriate ECC parameters. This scheme strengthen authentication for all the entities in WLAN, any party's identity should be checked by others when associating. The analytical results indicate that this scheme not only enhance the security of access control in wireless network environment, restrict the "Man-in-the-Middle" attacks, but also well support the bandwidth transport in wireless network.
{"title":"A Multi-element Authentication Method Based on ECDSA for Wireless Network","authors":"Zhaohua Long, Guofeng Wang","doi":"10.1109/KAMW.2008.4810421","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810421","url":null,"abstract":"Analyzes the engineering environment in WLAN based on ECC, this paper describe a kind of dual signature scheme using multi-element authentication method by choosing appropriate ECC parameters. This scheme strengthen authentication for all the entities in WLAN, any party's identity should be checked by others when associating. The analytical results indicate that this scheme not only enhance the security of access control in wireless network environment, restrict the \"Man-in-the-Middle\" attacks, but also well support the bandwidth transport in wireless network.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133421724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810515
C. Chang, Yan Ma
The forest fire environment is complex. It is difficult to depict and quantitative analyze the relatives among all elements. The condition of fire scene also becomes more complicated. Everything can't be predicted or recurred. Multi-agent technology provides realizable methods for simulation of forest fire extinguishing with pneumatic extinguisher. In this paper, based on the current situation of simulation of forest fire extinguishing, we analyze the complex adaptive system's features, and design the model for forest fire extinguishing with pneumatic extinguisher system. According to the features of Multi-Agent, this paper introduces how to realize the simulation of forest fire extinguishing with pneumatic extinguisher using the develop tool-Mason.
{"title":"Simulation of Forest Fire Extinguishing with Pneumatic Extinguisher Based on Multi-Agent","authors":"C. Chang, Yan Ma","doi":"10.1109/KAMW.2008.4810515","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810515","url":null,"abstract":"The forest fire environment is complex. It is difficult to depict and quantitative analyze the relatives among all elements. The condition of fire scene also becomes more complicated. Everything can't be predicted or recurred. Multi-agent technology provides realizable methods for simulation of forest fire extinguishing with pneumatic extinguisher. In this paper, based on the current situation of simulation of forest fire extinguishing, we analyze the complex adaptive system's features, and design the model for forest fire extinguishing with pneumatic extinguisher system. According to the features of Multi-Agent, this paper introduces how to realize the simulation of forest fire extinguishing with pneumatic extinguisher using the develop tool-Mason.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"59 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114005111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810500
Chenghui Yang, Chuanjun Ren
Monitoring system always plays the great important role in many kinds of the controlling system. Communications between software and hardware becomes the core problem of the control system. In the system, choose the configuration software to develop the monitoring software system, which has features of well graphical intuitive. The entire electric locomotive monitoring system include some function module, and the monitoring software locomotive operations recorded by the whole locomotive of the acquisition, the top operations video capture, ID card information management, historical data query, print, and other full-featured and easy to use. Through contorting the main Real-time monitoring system and PLC system to achieve good communication and monitoring process. The monitoring software development well on the main station PLC control, greatly improved the electric locomotive of the entire operation by security.
{"title":"Communication Application on the Servicing Work Safety Supervision System for Electric Locomotive","authors":"Chenghui Yang, Chuanjun Ren","doi":"10.1109/KAMW.2008.4810500","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810500","url":null,"abstract":"Monitoring system always plays the great important role in many kinds of the controlling system. Communications between software and hardware becomes the core problem of the control system. In the system, choose the configuration software to develop the monitoring software system, which has features of well graphical intuitive. The entire electric locomotive monitoring system include some function module, and the monitoring software locomotive operations recorded by the whole locomotive of the acquisition, the top operations video capture, ID card information management, historical data query, print, and other full-featured and easy to use. Through contorting the main Real-time monitoring system and PLC system to achieve good communication and monitoring process. The monitoring software development well on the main station PLC control, greatly improved the electric locomotive of the entire operation by security.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122885230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810651
Lu Gao, Xiaoming Du, Zhongpeng Liu
This paper analyses the characteristics of military equipment information resources and the special demand of military equipment digital library. Based on the general digital library architecture combined the characteristics of military equipment information resource, it builds the architecture of military equipment digital library and the operation mechanism for military equipment digital library is discussed.
{"title":"Knowledge Management-Oriented Architecture Design of Military Equipment Digital Library","authors":"Lu Gao, Xiaoming Du, Zhongpeng Liu","doi":"10.1109/KAMW.2008.4810651","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810651","url":null,"abstract":"This paper analyses the characteristics of military equipment information resources and the special demand of military equipment digital library. Based on the general digital library architecture combined the characteristics of military equipment information resource, it builds the architecture of military equipment digital library and the operation mechanism for military equipment digital library is discussed.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122886885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/KAMW.2008.4810642
Hongbing Liu, Shengwu Xiong, Qiong Chen
Fast fuzzy support vector machines (FFSVMs) based on the convex hulls are proposed in this paper. Firstly, the convex hull of each class data is generated by using the quick hull algorithm, and the data points lying inside the convex hull are not important to form FSVMs and then discarded. Secondly, the reduced training set consisting of the convex points is used to train the FFSVMs. Thirdly, the benchmark two-class problems and multi-class problems datasets are used to test the effectiveness and validness of FFSVMs. The experiment results indicate that FFSVMs not only reduce the training set but also achieve the same or better performance compared with the traditional FSVMs.
{"title":"Fuzzy Support Vector Machines Based on Convex Hulls","authors":"Hongbing Liu, Shengwu Xiong, Qiong Chen","doi":"10.1109/KAMW.2008.4810642","DOIUrl":"https://doi.org/10.1109/KAMW.2008.4810642","url":null,"abstract":"Fast fuzzy support vector machines (FFSVMs) based on the convex hulls are proposed in this paper. Firstly, the convex hull of each class data is generated by using the quick hull algorithm, and the data points lying inside the convex hull are not important to form FSVMs and then discarded. Secondly, the reduced training set consisting of the convex points is used to train the FFSVMs. Thirdly, the benchmark two-class problems and multi-class problems datasets are used to test the effectiveness and validness of FFSVMs. The experiment results indicate that FFSVMs not only reduce the training set but also achieve the same or better performance compared with the traditional FSVMs.","PeriodicalId":375613,"journal":{"name":"2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124494238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}