Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747551
Zhenyu Li, Jun Zhou, Yonghui Sun
Uncertainties and time delays exist in practical control systems, which often lead to instability or performance degradation. The existing stability conditions for delay systems are mainly divided into two categories: delay-independent conditions and delay-dependent ones. In general, delay-dependent conditions are less conservative than those of delay-independent ones. In order to reduce conservativeness of these results, many researchers have made unremitting efforts. In particular, with improved Lyapunov-Krasovskii functionals, together with linear matrix inequalities (LMI) approach, we study robust stability of time-varying delay systems with parametric uncertainties. In this paper we first re-visit some delay-dependent LMI stability criteria. Then the stability analysis process is made more concise by simplifying Lyapunov-Krasovskii functionals, which can be graded more easily, and thus results in stability conditions of less conservativeness. Finally, using the single-machine-infinite-bus system as application, we illustrate upper bounds of time delay in the system that are allowable for the system to be robustly stable. Numeric simulation verifies validity of the suggested methods.
{"title":"Stability analysis of uncertain systems with time-varying delays via simplified Lyapunov-Krasovskii functionals","authors":"Zhenyu Li, Jun Zhou, Yonghui Sun","doi":"10.1109/ICIST.2013.6747551","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747551","url":null,"abstract":"Uncertainties and time delays exist in practical control systems, which often lead to instability or performance degradation. The existing stability conditions for delay systems are mainly divided into two categories: delay-independent conditions and delay-dependent ones. In general, delay-dependent conditions are less conservative than those of delay-independent ones. In order to reduce conservativeness of these results, many researchers have made unremitting efforts. In particular, with improved Lyapunov-Krasovskii functionals, together with linear matrix inequalities (LMI) approach, we study robust stability of time-varying delay systems with parametric uncertainties. In this paper we first re-visit some delay-dependent LMI stability criteria. Then the stability analysis process is made more concise by simplifying Lyapunov-Krasovskii functionals, which can be graded more easily, and thus results in stability conditions of less conservativeness. Finally, using the single-machine-infinite-bus system as application, we illustrate upper bounds of time delay in the system that are allowable for the system to be robustly stable. Numeric simulation verifies validity of the suggested methods.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132522632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747721
Guoche Qin, Ming Yan, Guorong Hu
Orthogonal frequency division multiplexing (OFDM) system performance degrades due to symbol misalignment. We propose a symbol synchronization scheme based on channel estimation (CE). We applied linear interpolation in time domain and Winner filter in frequency domain to implement CE. The first path time delay of channel determines symbol timing offset. We perform inverse fast Fourier transform (IFFT) to obtain channel impulse response (CIR) after linear interpolation in CE. Zero-padding and windowing are used to increase accuracy before IFFT. We propose a criteria to judge the first path time delay and search for the first path of channel according to CIR profile. The criteria is statistically based on a large amount of simulation results. The simulation results illustrate that the proposed solution is effective to eliminate the effect of multipath fading channel in digital radio mondiale (DRM) system.
{"title":"Symbol timing offset tracking for DRM receiver","authors":"Guoche Qin, Ming Yan, Guorong Hu","doi":"10.1109/ICIST.2013.6747721","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747721","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) system performance degrades due to symbol misalignment. We propose a symbol synchronization scheme based on channel estimation (CE). We applied linear interpolation in time domain and Winner filter in frequency domain to implement CE. The first path time delay of channel determines symbol timing offset. We perform inverse fast Fourier transform (IFFT) to obtain channel impulse response (CIR) after linear interpolation in CE. Zero-padding and windowing are used to increase accuracy before IFFT. We propose a criteria to judge the first path time delay and search for the first path of channel according to CIR profile. The criteria is statistically based on a large amount of simulation results. The simulation results illustrate that the proposed solution is effective to eliminate the effect of multipath fading channel in digital radio mondiale (DRM) system.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131007922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747644
Yong Li, R. An, Huayi Wu
For facilitating the analysis and representation of geology disaster, the three-dimensional dynamic simulation techniques of landslide disaster are presented in this paper. Combining with practical survey data, virtual geographic environments are reconstructed. Landslide disaster process and the generated impulse wave are simulated by three-dimensional visual techniques. The details of geology disaster are successfully exhibited, e.g. landslide motion, water wave propagation and run-up with wave divergence and amplitude fading. The experimental results based on reservoir bank slope demonstrated the practicability and effectiveness of the methodology.
{"title":"Three-dimensional dynamic simulation of landslide disaster","authors":"Yong Li, R. An, Huayi Wu","doi":"10.1109/ICIST.2013.6747644","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747644","url":null,"abstract":"For facilitating the analysis and representation of geology disaster, the three-dimensional dynamic simulation techniques of landslide disaster are presented in this paper. Combining with practical survey data, virtual geographic environments are reconstructed. Landslide disaster process and the generated impulse wave are simulated by three-dimensional visual techniques. The details of geology disaster are successfully exhibited, e.g. landslide motion, water wave propagation and run-up with wave divergence and amplitude fading. The experimental results based on reservoir bank slope demonstrated the practicability and effectiveness of the methodology.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127951223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747691
Yuhao Luo, Dawu Gu, Juanru Li
Although Android has introduced many security mechanisms, users often expose privacy information to attacker due to the system's defensive privacy protecting policy. The problem is that for most inexperienced users, no mandatory protection is provided. To address this issue, we propose a data-centric privacy enhancement design to actively restrict privacy violation on Android. The main idea is to first build trusted database by introducing secure enhanced kernel and data-at-rest encryption. Then, the system enforces an isolation of applications with privacy data access privilege mode. The design focuses on data protection and keeps persistent mandatory access control model from kernel to application layer, and could resist most common privacy leakage attacks. Compared with other heavyweight isolation scheme, the overhead is also controlled into an acceptable range due to our lightweight design principle.
{"title":"Toward active and efficient privacy protection for Android","authors":"Yuhao Luo, Dawu Gu, Juanru Li","doi":"10.1109/ICIST.2013.6747691","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747691","url":null,"abstract":"Although Android has introduced many security mechanisms, users often expose privacy information to attacker due to the system's defensive privacy protecting policy. The problem is that for most inexperienced users, no mandatory protection is provided. To address this issue, we propose a data-centric privacy enhancement design to actively restrict privacy violation on Android. The main idea is to first build trusted database by introducing secure enhanced kernel and data-at-rest encryption. Then, the system enforces an isolation of applications with privacy data access privilege mode. The design focuses on data protection and keeps persistent mandatory access control model from kernel to application layer, and could resist most common privacy leakage attacks. Compared with other heavyweight isolation scheme, the overhead is also controlled into an acceptable range due to our lightweight design principle.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125296839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747739
Yinfen Xie
The holding of large special events usually cause great pressure on urban traffic in short time. How to ensure the smooth flow of traffic during large special events and minimize the impact on urban normal traffic is an urgent problem to solve. Intelligent traffic management system plays an important role in traffic management of large special events, and traffic signal control is one of its the most basic and important method. This paper studies the plan for traffic signal control, the primary functions of traffic signal control system and the optimization method.
{"title":"Design of urban intelligent traffic signal control system for large special events","authors":"Yinfen Xie","doi":"10.1109/ICIST.2013.6747739","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747739","url":null,"abstract":"The holding of large special events usually cause great pressure on urban traffic in short time. How to ensure the smooth flow of traffic during large special events and minimize the impact on urban normal traffic is an urgent problem to solve. Intelligent traffic management system plays an important role in traffic management of large special events, and traffic signal control is one of its the most basic and important method. This paper studies the plan for traffic signal control, the primary functions of traffic signal control system and the optimization method.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126673721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747829
Jianhua Peng, Wenjian Zhang, Kaizhi Huang
The security mechanism of LTE system, which provides radio communication and its services with secure network, is much more perfect than that of 3G. This paper puts forward a novel method for key derivation based on the idea of combination of vulnerabilities in both radio interface and core-network in perspective of eavesdropper. The radio child-keys are produced according to the security algorithm list provided by plain radio message and parent-key obtained, and the right key is decided by comparing the plain context with the decrypted context. It is proved that the radio child-key is able to be obtained in this way according to the analysis of feasibility and complexity.
{"title":"A novel key derivation method for eavesdropper in LTE system","authors":"Jianhua Peng, Wenjian Zhang, Kaizhi Huang","doi":"10.1109/ICIST.2013.6747829","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747829","url":null,"abstract":"The security mechanism of LTE system, which provides radio communication and its services with secure network, is much more perfect than that of 3G. This paper puts forward a novel method for key derivation based on the idea of combination of vulnerabilities in both radio interface and core-network in perspective of eavesdropper. The radio child-keys are produced according to the security algorithm list provided by plain radio message and parent-key obtained, and the right key is decided by comparing the plain context with the decrypted context. It is proved that the radio child-key is able to be obtained in this way according to the analysis of feasibility and complexity.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114159234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747627
Jingfu Wang, Ruiying Li, Wuyue Ren
In order to improve the accuracy of sampling and reduce resource consumption in network availability testing, a new kind of adaptive sampling method is proposed in this paper. It adjusts sampling probability over time according to network condition. Its basic sampling method is simple random sampling. The network availability is predicted based on exponential smoothing method. Comparing the measured value of availability with the predicted one, we can decide whether the sampling parameter now used is suitable for the network condition. A liner rule is advanced to decide how to adjust the sampling probability over time. Taking the tactical Internet as an example, efficiency of this sampling method is compared with that of simply random sampling. The result shows that the accuracy of the sampling method is higher than simply random sampling when the size of sample is equal, and the result would be more obvious when traffic burst occurs.
{"title":"Adaptive packet sampling method based on the prediction of availability using exponential smoothing","authors":"Jingfu Wang, Ruiying Li, Wuyue Ren","doi":"10.1109/ICIST.2013.6747627","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747627","url":null,"abstract":"In order to improve the accuracy of sampling and reduce resource consumption in network availability testing, a new kind of adaptive sampling method is proposed in this paper. It adjusts sampling probability over time according to network condition. Its basic sampling method is simple random sampling. The network availability is predicted based on exponential smoothing method. Comparing the measured value of availability with the predicted one, we can decide whether the sampling parameter now used is suitable for the network condition. A liner rule is advanced to decide how to adjust the sampling probability over time. Taking the tactical Internet as an example, efficiency of this sampling method is compared with that of simply random sampling. The result shows that the accuracy of the sampling method is higher than simply random sampling when the size of sample is equal, and the result would be more obvious when traffic burst occurs.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121340795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the demand of glass curtain wall cleaning, an Omni-directional moving adsorption mechanism with moving, adsorption, climbing obstacle, surface-to-surface conversions functions was developed. The mechanism incorporates one motor, one driving module, one steering module. This Omni-directional moving adsorption mechanism can make the wall climbing robot not only run towards all directions in line but also rotate along definite angle at its original position without changing its posture. The vacuum coupling delivery adsorption system is designed to provide necessary adsorption force for the robot. The climbing obstacle ability and the surface-to-surface conversion course of the mechanism are analyzed. Mobile safety analysis and kinematical analysis of the wall-climbing robot with above Omni-directional moving adsorption mechanisms are discussed. The wall-climbing robot with above mechanisms can be used for operation of glass curtain plane wall and curved wall of large curvature with hidden window frames and no window frames, which is with high moving velocity, stable adsorption capability and strong wall adaptability.
{"title":"Research on omni-directional moving adsorption mechanism and its application in wall-climbing robot","authors":"Meiting Wang, Yongfeng Qi, Wei Jiang, Shengquan Li, Honghui Cheng, Jiatong Bao, Liuyan Lu","doi":"10.1109/ICIST.2013.6747539","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747539","url":null,"abstract":"Aiming at the demand of glass curtain wall cleaning, an Omni-directional moving adsorption mechanism with moving, adsorption, climbing obstacle, surface-to-surface conversions functions was developed. The mechanism incorporates one motor, one driving module, one steering module. This Omni-directional moving adsorption mechanism can make the wall climbing robot not only run towards all directions in line but also rotate along definite angle at its original position without changing its posture. The vacuum coupling delivery adsorption system is designed to provide necessary adsorption force for the robot. The climbing obstacle ability and the surface-to-surface conversion course of the mechanism are analyzed. Mobile safety analysis and kinematical analysis of the wall-climbing robot with above Omni-directional moving adsorption mechanisms are discussed. The wall-climbing robot with above mechanisms can be used for operation of glass curtain plane wall and curved wall of large curvature with hidden window frames and no window frames, which is with high moving velocity, stable adsorption capability and strong wall adaptability.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125098106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747633
Wenjie Xiao, Zhongxue Yang
Epistemic states is an important model introduced by Bochman for nonmonotonic inference and belief change. Taking Epistemic States as the object, a notion of similarity is presented. In order to explore the relationship between similarity and the reasoning behaviors of epistemic states, a new notion called quasi-skeptically equivalence and an operator par(.) over epistemic states were introduced. The main results show that any pair of pure finite epistemic states are quasi-skeptically equivalent if and only if their par-images are similar.
{"title":"Similarity and equivalence of epistemic states","authors":"Wenjie Xiao, Zhongxue Yang","doi":"10.1109/ICIST.2013.6747633","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747633","url":null,"abstract":"Epistemic states is an important model introduced by Bochman for nonmonotonic inference and belief change. Taking Epistemic States as the object, a notion of similarity is presented. In order to explore the relationship between similarity and the reasoning behaviors of epistemic states, a new notion called quasi-skeptically equivalence and an operator par(.) over epistemic states were introduced. The main results show that any pair of pure finite epistemic states are quasi-skeptically equivalent if and only if their par-images are similar.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122497728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-23DOI: 10.1109/ICIST.2013.6747675
Liwen Dong
In order to preserve fine details in image denoising, we propose a scheme by assuming that the deviations of the noisy and the original wavelet coefficients of image are not always the same across the scales. The proposed algorithm considers not only the correlation of inter-scale wavelet coefficients but also the mentioned assumptions. In the process of denoising, the proposed denoising threshold can adaptively adjust itself on the basis of its position and decomposition scale. We demonstrate its effectiveness through simulations with images contaminated by additive white Gaussian noise and compare it with the classical threshold method. Experimental results show that the performance of our method can preserve image details well both in visual effect and in terms of peak signal-to-noise ratio.
{"title":"Adaptive image denoising using wavelet thresholding","authors":"Liwen Dong","doi":"10.1109/ICIST.2013.6747675","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747675","url":null,"abstract":"In order to preserve fine details in image denoising, we propose a scheme by assuming that the deviations of the noisy and the original wavelet coefficients of image are not always the same across the scales. The proposed algorithm considers not only the correlation of inter-scale wavelet coefficients but also the mentioned assumptions. In the process of denoising, the proposed denoising threshold can adaptively adjust itself on the basis of its position and decomposition scale. We demonstrate its effectiveness through simulations with images contaminated by additive white Gaussian noise and compare it with the classical threshold method. Experimental results show that the performance of our method can preserve image details well both in visual effect and in terms of peak signal-to-noise ratio.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}