Pub Date : 2009-12-28DOI: 10.1109/ICACIA.2009.5361162
Liu Hua-lin, Chen Yong, Huang Qi, Li Jian
Landing gear of aircraft is the key component. The magneto-rheological (MR) damper applied to landing gear can ensure stability and safety during the process of takeoff, landing and rollout. Because of landing gear is a nonlinear, multivariate and multi-degree of freedom system. The traditional PID control can't obtain ideal control effects. Based on the advantages of fuzzy control theory do not need a precise mathematical model, fuzzy PID control is proposed in this paper by combining PID control and fuzzy control. The models of landing gear are simulated and analyzed under passive control, PID control and fuzzy PID control. The simulation results indicate that fuzzy PID control can effectively lower the amplitude of fuselage vibration acceleration and improve the ride quality and safety of aircraft. It has an important influence in the optimal control of the landing gear system.
{"title":"Fuzzy PID control for landing gear based on magneto-rheological (MR) damper","authors":"Liu Hua-lin, Chen Yong, Huang Qi, Li Jian","doi":"10.1109/ICACIA.2009.5361162","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361162","url":null,"abstract":"Landing gear of aircraft is the key component. The magneto-rheological (MR) damper applied to landing gear can ensure stability and safety during the process of takeoff, landing and rollout. Because of landing gear is a nonlinear, multivariate and multi-degree of freedom system. The traditional PID control can't obtain ideal control effects. Based on the advantages of fuzzy control theory do not need a precise mathematical model, fuzzy PID control is proposed in this paper by combining PID control and fuzzy control. The models of landing gear are simulated and analyzed under passive control, PID control and fuzzy PID control. The simulation results indicate that fuzzy PID control can effectively lower the amplitude of fuselage vibration acceleration and improve the ride quality and safety of aircraft. It has an important influence in the optimal control of the landing gear system.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125649389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/ICACIA.2009.5361068
Xuefeng Dai, Bu-Min Liu, C. Xie, Wankuo Wang
This paper presents a hardware/software co-verification platform for ASIC design, which is based on Windows-Linux operating systems. The platform is not only used for verifying the hardware/software compatibility of maintain-and-update development ASIC chips, but also used for achieving that the hardware and software develop synchronously when developing absolutely new ASIC chips. Adopting this platform, we can not only give full functional verifications to our hardware and software more efficiently, but can also shorten the entire developmental period of our productions. In this paper, the system scheme of this platform and its operating principles are introduced, and the arithmetic of the bus-functional-model interface is illustrated. The hardware/software compatibility of several maintain-and-update chips have been guaranteed by using this platform, and the final productions' time-to-market decreased 3 months on average.
{"title":"A hardware/software co-verification platform for ASIC design","authors":"Xuefeng Dai, Bu-Min Liu, C. Xie, Wankuo Wang","doi":"10.1109/ICACIA.2009.5361068","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361068","url":null,"abstract":"This paper presents a hardware/software co-verification platform for ASIC design, which is based on Windows-Linux operating systems. The platform is not only used for verifying the hardware/software compatibility of maintain-and-update development ASIC chips, but also used for achieving that the hardware and software develop synchronously when developing absolutely new ASIC chips. Adopting this platform, we can not only give full functional verifications to our hardware and software more efficiently, but can also shorten the entire developmental period of our productions. In this paper, the system scheme of this platform and its operating principles are introduced, and the arithmetic of the bus-functional-model interface is illustrated. The hardware/software compatibility of several maintain-and-update chips have been guaranteed by using this platform, and the final productions' time-to-market decreased 3 months on average.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123711712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/ICACIA.2009.5361084
Tan Hao, Chen Yu, Q. Hang
An Image Feature Inverted Indexing(FII) method is proposed. Based on this method, a prototype of Content-Based Image Retrieval Engine named Eva is implemented. It extracts shape and texture feature from user's pictures, retrieves similar pictures with FII method. The efficiency of FII is also analyzed.
{"title":"Implementation of FII-based Image Retrieval Engine","authors":"Tan Hao, Chen Yu, Q. Hang","doi":"10.1109/ICACIA.2009.5361084","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361084","url":null,"abstract":"An Image Feature Inverted Indexing(FII) method is proposed. Based on this method, a prototype of Content-Based Image Retrieval Engine named Eva is implemented. It extracts shape and texture feature from user's pictures, retrieves similar pictures with FII method. The efficiency of FII is also analyzed.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131623645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/ICACIA.2009.5361078
Ling Xing, Jianguo Ma, Hong Cheng
In order to deal with the complicated network video data, the work focuses on the technologies of multilayer semantic mining and proxy cache for streaming media. Semantic mining method based on network parameter is presented. Quadratic regression popularity prediction model is introduced to analyze current popularity of streaming media. And then cache replacement strategy based on semantic mining is designed. Simulation results show that the cache replacement strategy is feasible and valid.
{"title":"Cache replacement strategy for streaming media based on semantic mining","authors":"Ling Xing, Jianguo Ma, Hong Cheng","doi":"10.1109/ICACIA.2009.5361078","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361078","url":null,"abstract":"In order to deal with the complicated network video data, the work focuses on the technologies of multilayer semantic mining and proxy cache for streaming media. Semantic mining method based on network parameter is presented. Quadratic regression popularity prediction model is introduced to analyze current popularity of streaming media. And then cache replacement strategy based on semantic mining is designed. Simulation results show that the cache replacement strategy is feasible and valid.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114165580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/ICACIA.2009.5361088
Haotian Yang, Yuanjun Huang, Jie Li
Based on the discrete cosine transform (DCT) coefficients distribution, an effective method of early detecting all-zero discrete cosine coefficients blocks in H.264 is proposed. A mathematic model is established based on Laplacian distribution of DCT coefficients and a criterion under which each quantized coefficient becomes zero is derived. The simulation results show that compared to the Xie's method built on Gaussian distribution, the proposed method reduces encoding time averagely without video-quality degradation for low or middle bit-rate video sequences.
{"title":"Early detection of all-zero coefficients in H.264 based on DCT coefficients distribution","authors":"Haotian Yang, Yuanjun Huang, Jie Li","doi":"10.1109/ICACIA.2009.5361088","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361088","url":null,"abstract":"Based on the discrete cosine transform (DCT) coefficients distribution, an effective method of early detecting all-zero discrete cosine coefficients blocks in H.264 is proposed. A mathematic model is established based on Laplacian distribution of DCT coefficients and a criterion under which each quantized coefficient becomes zero is derived. The simulation results show that compared to the Xie's method built on Gaussian distribution, the proposed method reduces encoding time averagely without video-quality degradation for low or middle bit-rate video sequences.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121215068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/ICACIA.2009.5361075
Qiang Ma, Ling Xing, Jianguo Ma
Unlike the common method based on log files to analyze user's interests, the proposed approach to analyze group users' interests in audio/video programs is devoted to deal with data packets from network backbone environment. This method has applied the Key-Value strategy to extract information from the network packets. Meanwhile, the relevant mathematical model is presented to calculate the group users' intersected interests and united interests. The results show that the method proposed can analyze the group users' interests properly.
{"title":"Analysis of group users' interests in audio/video programs in network backbone environment","authors":"Qiang Ma, Ling Xing, Jianguo Ma","doi":"10.1109/ICACIA.2009.5361075","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361075","url":null,"abstract":"Unlike the common method based on log files to analyze user's interests, the proposed approach to analyze group users' interests in audio/video programs is devoted to deal with data packets from network backbone environment. This method has applied the Key-Value strategy to extract information from the network packets. Meanwhile, the relevant mathematical model is presented to calculate the group users' intersected interests and united interests. The results show that the method proposed can analyze the group users' interests properly.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124983276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/ICACIA.2009.5361150
Yue-hao Yan, Desong Wang, Jianping Li, Li-Gang Li
Remote user authentication scheme is a mechanism which allows a server to authenticate a remote user over insecure channel. Recently, Goriparthi et al. made an enhancement based on Das et al.'s remote user authentication scheme using bilinear pairings. The scheme has the merits of no verification table, freely changing password and preventing the forgery attack and the replay attack. This paper, however, demonstrates that Goriparthi et al.'s improved scheme is vulnerable to the insider attack, the denial-of-service attack, and the server spooling attack.
{"title":"Cryptanalysis of a remote user authentication scheme based on bilinear pairing","authors":"Yue-hao Yan, Desong Wang, Jianping Li, Li-Gang Li","doi":"10.1109/ICACIA.2009.5361150","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361150","url":null,"abstract":"Remote user authentication scheme is a mechanism which allows a server to authenticate a remote user over insecure channel. Recently, Goriparthi et al. made an enhancement based on Das et al.'s remote user authentication scheme using bilinear pairings. The scheme has the merits of no verification table, freely changing password and preventing the forgery attack and the replay attack. This paper, however, demonstrates that Goriparthi et al.'s improved scheme is vulnerable to the insider attack, the denial-of-service attack, and the server spooling attack.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132826115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/ICACIA.2009.5361105
Hongzhi Xing, Changyuan Luo, Hailin Li
Mobile IPv6 enables a mobile node to keep its connectivity to the Internet when changing its access router. Because of link switching and IP operations, there is a period when the mobile node can not send and receive packets. The Mobile IPv6 Fast Handover protocol shortens the “handover latency”. However, after the handovers, a mobile node must pass the authentication during which it is still unable to communicate with the correspondent node. This document specifies a scenario combining Mobile IPv6 fast handover and authentication procedures. This scenario reduces the comprehensive delay and brings security to fast handovers.
{"title":"An authenticated Mobile IPv6 Fast Handover scenario","authors":"Hongzhi Xing, Changyuan Luo, Hailin Li","doi":"10.1109/ICACIA.2009.5361105","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361105","url":null,"abstract":"Mobile IPv6 enables a mobile node to keep its connectivity to the Internet when changing its access router. Because of link switching and IP operations, there is a period when the mobile node can not send and receive packets. The Mobile IPv6 Fast Handover protocol shortens the “handover latency”. However, after the handovers, a mobile node must pass the authentication during which it is still unable to communicate with the correspondent node. This document specifies a scenario combining Mobile IPv6 fast handover and authentication procedures. This scenario reduces the comprehensive delay and brings security to fast handovers.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134457916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/ICACIA.2009.5361163
Zhanghong Hao, You-xi Tang, Jin-Xiang Xia
In this paper, we develop a distributed cooperative spectrum sensing algorithm based on network code to decrease the need for bandwidth in cognitive radios. The model of the distributed cooperative spectrum sensing is analyzed, and the algorithm of distributed scheme based on network code is described. The simulation results show that compared with the distributed scheme without network code and the non-cooperative one, the throughput of secondary users is increased apparently, and also, the probability of detection of the distributed scheme with network code is improved about 10% and 20%, respectively, further, the optimal sensing time is shorter about 82% and 88%, respectively.
{"title":"A distributed cooperative spectrum sensing based on network code in cognitive radios","authors":"Zhanghong Hao, You-xi Tang, Jin-Xiang Xia","doi":"10.1109/ICACIA.2009.5361163","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361163","url":null,"abstract":"In this paper, we develop a distributed cooperative spectrum sensing algorithm based on network code to decrease the need for bandwidth in cognitive radios. The model of the distributed cooperative spectrum sensing is analyzed, and the algorithm of distributed scheme based on network code is described. The simulation results show that compared with the distributed scheme without network code and the non-cooperative one, the throughput of secondary users is increased apparently, and also, the probability of detection of the distributed scheme with network code is improved about 10% and 20%, respectively, further, the optimal sensing time is shorter about 82% and 88%, respectively.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121788317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-28DOI: 10.1109/ICACIA.2009.5361072
Zheng Qiao, Hu Wei-dong, Liu Li
In the field of embedded wireless data communication system, such as remote measurement and control, wireless meter reading, information appliances, wireless mouse or keyboard, it usually needs to design a small custom protocol to directly access the hardware. To solve this problem, designed an embedded wireless data communication protocol, Using special data frame format to solve unreliable data link problem, Using roll-call polling methods to achieve multi-point access, Using UART to achieve transceiver between MCU and RF chip, Using stop-waiting protocol to achieve the flow and error control.
{"title":"An embedded short-range wireless data communication protocol design","authors":"Zheng Qiao, Hu Wei-dong, Liu Li","doi":"10.1109/ICACIA.2009.5361072","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361072","url":null,"abstract":"In the field of embedded wireless data communication system, such as remote measurement and control, wireless meter reading, information appliances, wireless mouse or keyboard, it usually needs to design a small custom protocol to directly access the hardware. To solve this problem, designed an embedded wireless data communication protocol, Using special data frame format to solve unreliable data link problem, Using roll-call polling methods to achieve multi-point access, Using UART to achieve transceiver between MCU and RF chip, Using stop-waiting protocol to achieve the flow and error control.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115987719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}