This paper proposed a laser environment propagation model based on the split-step Fourier method and the phase screen for a continuous random medium that suitable for the virtual experiment. Combined with von K¨¢rm¨¢n PSD and Parsons law rain drop distribution Model, Fast-Fourier-transform-based model of phase screens are used to simulate the turbulence and continuous random medium induced phase variance. In the vacuum propagation, this paper adopted Angular-spectrum method to improve computational efficiency. The results of the laser propagation environment are compared with the known theoretical estimates coherence factor and the intensity attenuation in rain.
{"title":"Realization of a Virtual Experiment Laser Environment Propagation Model Based on Split-step Fourier Method in Rain","authors":"Jia Yanxi, Jiang Shou-da","doi":"10.1109/IMCCC.2011.109","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.109","url":null,"abstract":"This paper proposed a laser environment propagation model based on the split-step Fourier method and the phase screen for a continuous random medium that suitable for the virtual experiment. Combined with von K¨¢rm¨¢n PSD and Parsons law rain drop distribution Model, Fast-Fourier-transform-based model of phase screens are used to simulate the turbulence and continuous random medium induced phase variance. In the vacuum propagation, this paper adopted Angular-spectrum method to improve computational efficiency. The results of the laser propagation environment are compared with the known theoretical estimates coherence factor and the intensity attenuation in rain.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116592690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hao-miao Yang, E. Jin, Changyuan Liu, Hong-gang Wu
The model of public key encryption with keyword search (PEKS) proposed by Boneh et al. enables one to search encrypted keywords without revealing any information on the data. Baek et al. proposed an enhanced model called secure channel-free PEKS (SCF-PEKS) to removes the costly secure channel. However, most of the presented SCF-PEKS schemes were proved secure in the random oracle model. In 2009, Fang et al. presented a SCF-PEKS scheme without random oracles. But the scheme requires a strong and complicated assumption. In this paper, we propose a SCF-PEKS scheme that is under simple assumption in the standard model.
{"title":"A SCF-PEKS Scheme without Random Oracle under Simple Assumption","authors":"Hao-miao Yang, E. Jin, Changyuan Liu, Hong-gang Wu","doi":"10.1109/IMCCC.2011.228","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.228","url":null,"abstract":"The model of public key encryption with keyword search (PEKS) proposed by Boneh et al. enables one to search encrypted keywords without revealing any information on the data. Baek et al. proposed an enhanced model called secure channel-free PEKS (SCF-PEKS) to removes the costly secure channel. However, most of the presented SCF-PEKS schemes were proved secure in the random oracle model. In 2009, Fang et al. presented a SCF-PEKS scheme without random oracles. But the scheme requires a strong and complicated assumption. In this paper, we propose a SCF-PEKS scheme that is under simple assumption in the standard model.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116642953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the generalized cross-correlation method has high real-time in the delay Algorithm, when the experiment environment is the a priori knowable, Generalized cross-correlation algorithm is usually used. The pre-filtering of the generalized cross-correlation method has a greater impact on the accuracy of time delay estimation, for the problem that how to effectively use the generalized cross-correlation method in real time taking the accuracy into account, proposed generalized cross correlation algorithm based on wavelet analysis in this paper. Receiving the same sound signals for different microphones, the basic features of the signal is the same. Wavelet transform can effectively strengthen the basic features of the acoustic signal, and improve the accuracy of the generalized cross correlation method. The simulation shows that the generalized cross correlation algorithm based on wavelet analysis has good accuracy.
{"title":"Research of Generalized Cross Correlation to Time Delay Estimation Based on Wavelet Analysis","authors":"Wang Hongkai, Fan Liqing, Xiong Chao","doi":"10.1109/IMCCC.2011.28","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.28","url":null,"abstract":"As the generalized cross-correlation method has high real-time in the delay Algorithm, when the experiment environment is the a priori knowable, Generalized cross-correlation algorithm is usually used. The pre-filtering of the generalized cross-correlation method has a greater impact on the accuracy of time delay estimation, for the problem that how to effectively use the generalized cross-correlation method in real time taking the accuracy into account, proposed generalized cross correlation algorithm based on wavelet analysis in this paper. Receiving the same sound signals for different microphones, the basic features of the signal is the same. Wavelet transform can effectively strengthen the basic features of the acoustic signal, and improve the accuracy of the generalized cross correlation method. The simulation shows that the generalized cross correlation algorithm based on wavelet analysis has good accuracy.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121123627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sampling is a vital step in computer aided inspection planning. This paper proposes a novel sampling method for similar section surface inspection by using tactile sensor. The method considers Gaussian curvature as surface mass density function and generates grids by dividing surface with equal surface mass. Then extended Hammersley algorithm which is extensively used in concise surface inspection sampling is applied to determine the sample point location. Simulations on typical similar section surface are performed to validate its effect. A practical case on impeller blade surface is tested. The experimental result shows that the proposed method can achieve higher inspection precise compared equaparametric method with the same sample point number.
{"title":"Sampling Method for Similar Section Surface Inspection","authors":"Luxi Mu, Z. Yin, Y. Xiong","doi":"10.1109/IMCCC.2011.43","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.43","url":null,"abstract":"Sampling is a vital step in computer aided inspection planning. This paper proposes a novel sampling method for similar section surface inspection by using tactile sensor. The method considers Gaussian curvature as surface mass density function and generates grids by dividing surface with equal surface mass. Then extended Hammersley algorithm which is extensively used in concise surface inspection sampling is applied to determine the sample point location. Simulations on typical similar section surface are performed to validate its effect. A practical case on impeller blade surface is tested. The experimental result shows that the proposed method can achieve higher inspection precise compared equaparametric method with the same sample point number.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127157019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The fractional Fourier transform (FrFT) is a potent tool to analyze the chirp signal. However, it fails in some applications, such as the echo is NFLM signal when the radar detects the high speed target. The short-time fractional Fourier transform (STFrFT) is proposed to solve this problem. It displays the time and FrFD-frequency information jointly in the short-time fractional Fourier domain. According to characteristic of high speed target, we establish the echo signal model with high-order phase, then analyze the target detection performance by numerical simulation to get the relationship among the optimal number of pulses, signal-to-noise ratio and acceleration changing rate. Finally, the simulations verify that the principle of the method is correct and can provide guidance for practical applications.
{"title":"A High Speed Target Detection Approach Based on STFrFT","authors":"Pang Cunsuo, R. Tao","doi":"10.1109/IMCCC.2011.189","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.189","url":null,"abstract":"The fractional Fourier transform (FrFT) is a potent tool to analyze the chirp signal. However, it fails in some applications, such as the echo is NFLM signal when the radar detects the high speed target. The short-time fractional Fourier transform (STFrFT) is proposed to solve this problem. It displays the time and FrFD-frequency information jointly in the short-time fractional Fourier domain. According to characteristic of high speed target, we establish the echo signal model with high-order phase, then analyze the target detection performance by numerical simulation to get the relationship among the optimal number of pulses, signal-to-noise ratio and acceleration changing rate. Finally, the simulations verify that the principle of the method is correct and can provide guidance for practical applications.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127243479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li Ji, Z. Qi, Chen Dixiang, Pan Mengchun, Luo Feilu
Getting accurate measurements is one of the key technologies in geomagnetic navigation. The output deviation of magnetometers fixed on the vehicles is caused not only by sensor errors but also by vehicle magnetic field interference. In order to compensate the output error, this paper presents a new integrated method. By analyzing the reasons causing deviation of measurements from the corresponding magnetic field value, an integrated measurement model is achieved. In order to evaluate the parameters of the model, a non-linear observation equation about vector measurements and scalar truth is derived, and non-linear least square method is used to evaluate the unknown parameters of the equation. Finally simulation and experiment are carried out to assess the validity of the method. The results show that the integrated method is simpler, quick and effective in error compensation of three-axis magnetometer.
{"title":"Integrated Compensation Method of Three-axis Magnetometer in Geomagnetic Navigation","authors":"Li Ji, Z. Qi, Chen Dixiang, Pan Mengchun, Luo Feilu","doi":"10.1109/IMCCC.2011.234","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.234","url":null,"abstract":"Getting accurate measurements is one of the key technologies in geomagnetic navigation. The output deviation of magnetometers fixed on the vehicles is caused not only by sensor errors but also by vehicle magnetic field interference. In order to compensate the output error, this paper presents a new integrated method. By analyzing the reasons causing deviation of measurements from the corresponding magnetic field value, an integrated measurement model is achieved. In order to evaluate the parameters of the model, a non-linear observation equation about vector measurements and scalar truth is derived, and non-linear least square method is used to evaluate the unknown parameters of the equation. Finally simulation and experiment are carried out to assess the validity of the method. The results show that the integrated method is simpler, quick and effective in error compensation of three-axis magnetometer.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125032220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adaptive modulation and coding (AMC) is a powerful technique adopted by TETRA Release 2 to improve throughput, especially in wireless packet oriented channels. It is characterized by the adaptation of different modulation and coding schemes (MCS) to the channel state. In this paper, by taking advantage of the Threshold Adjustment (TA) algorithm, an improved Timed Window (TW) algorithm, named the TA-TW combined algorithm is proposed. Analytical expressions for performance metrics of the improved algorithm, such as throughput and channel occupancy, are derived. The numerical results show that TA-TW combined algorithm provides a better performance than the TW algorithm by adjusting the thresholds to the channel condition adaptively.
{"title":"Threshold Adjustment-Timed Window Combined Algorithm in Adaptive Modulation and Coding","authors":"Wang Yunyun, Li Hai, Hou Shujuan","doi":"10.1109/IMCCC.2011.156","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.156","url":null,"abstract":"Adaptive modulation and coding (AMC) is a powerful technique adopted by TETRA Release 2 to improve throughput, especially in wireless packet oriented channels. It is characterized by the adaptation of different modulation and coding schemes (MCS) to the channel state. In this paper, by taking advantage of the Threshold Adjustment (TA) algorithm, an improved Timed Window (TW) algorithm, named the TA-TW combined algorithm is proposed. Analytical expressions for performance metrics of the improved algorithm, such as throughput and channel occupancy, are derived. The numerical results show that TA-TW combined algorithm provides a better performance than the TW algorithm by adjusting the thresholds to the channel condition adaptively.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126169687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Satellite communications are used more and more widely. But this kind of communication has a lot of particular characteristics, such as long link delay and high bit error rate. Our research aimed to find out the new algorithm based on template analysis to improve the accuracy and recognition efficiency of identification.
{"title":"Research on Satellite Network Protocol Identification Algorithm Based on Template Analysis","authors":"Li Hua, Wang Tao, Zheng Tianming","doi":"10.1109/IMCCC.2011.142","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.142","url":null,"abstract":"Satellite communications are used more and more widely. But this kind of communication has a lot of particular characteristics, such as long link delay and high bit error rate. Our research aimed to find out the new algorithm based on template analysis to improve the accuracy and recognition efficiency of identification.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116124960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A distributed framework for network forensics is presented in this paper, which tries to capture and store the digital evidence of the information leaking through the network. The architecture of the frame work is composed of the distributed data agents and the forensic center. The former can extract and compress the text of the content of all target network transmission, and the latter can locate the address of the host which illegally transmitted classified or improper information in the network, based on the evidence data gathered from the data agents. The time of the data being stored is longer than a year with the high compression ratio of the text, so the user can confirm the events of the information leaking that happened fairly long time ago.
{"title":"A Distributed Framework for Forensics Based on the Content of Network Transmission","authors":"Tang Hong, Zou Tao, Jin Qi, Jianbo Zhang","doi":"10.1109/IMCCC.2011.215","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.215","url":null,"abstract":"A distributed framework for network forensics is presented in this paper, which tries to capture and store the digital evidence of the information leaking through the network. The architecture of the frame work is composed of the distributed data agents and the forensic center. The former can extract and compress the text of the content of all target network transmission, and the latter can locate the address of the host which illegally transmitted classified or improper information in the network, based on the evidence data gathered from the data agents. The time of the data being stored is longer than a year with the high compression ratio of the text, so the user can confirm the events of the information leaking that happened fairly long time ago.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114489953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a control framework for the flocking behaviors of UAVs. The cooperative control problem is decomposed into elementary behaviors to be achieved based on local information concerning neighbors. The behavior of each UAV is merged using null-space-based behavioral control which is capable of dealing with conflicts among behaviors. Simulations prove the effectiveness of the proposed technique.
{"title":"The Null-Space-Based Behavioral Control for Swarm Unmanned Aerial Vehicles","authors":"Dong Shiyou, Zhuang Xiaoping, Long Guoqing","doi":"10.1109/IMCCC.2011.253","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.253","url":null,"abstract":"This paper presents a control framework for the flocking behaviors of UAVs. The cooperative control problem is decomposed into elementary behaviors to be achieved based on local information concerning neighbors. The behavior of each UAV is merged using null-space-based behavioral control which is capable of dealing with conflicts among behaviors. Simulations prove the effectiveness of the proposed technique.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129815050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}