According to the strict aerodynamic heating environment in the reentry process, a new reentry trajectory planning method is presented. A reasonable Heat Flux Rate (HFR) curve is designed with the energy of the aircraft, and the real-time instruction of the Angle of Attack (AOA) is decoded. Then, the flight corridor is planned by the multi-constraint conditions. After that, the flight trajectory could be optimized through applying the pseudo-spectral method. At last, the simulation experiment under Matlab is carried out with an example lifting flight. The results show that the aircraft's total heat absorption (THA), which got through the new planning method, is smaller than that by the traditional method.
{"title":"A Reentry Trajectory Planning Based on the Optimization of Angle of Attack","authors":"Yang Zhuo, Zhang Qingzhen, Tao Xiaoqiang","doi":"10.1109/IMCCC.2011.236","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.236","url":null,"abstract":"According to the strict aerodynamic heating environment in the reentry process, a new reentry trajectory planning method is presented. A reasonable Heat Flux Rate (HFR) curve is designed with the energy of the aircraft, and the real-time instruction of the Angle of Attack (AOA) is decoded. Then, the flight corridor is planned by the multi-constraint conditions. After that, the flight trajectory could be optimized through applying the pseudo-spectral method. At last, the simulation experiment under Matlab is carried out with an example lifting flight. The results show that the aircraft's total heat absorption (THA), which got through the new planning method, is smaller than that by the traditional method.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129402370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A wireless Ad Hoc network is an infrastructureless self-organizing network. Access control problem of strangers may happen because of its strong openness. Trust management based on policy can dealt with such problem, which can deliver access control policies to strangers through credential-delegation to give them permissions. But the delegation frameworks are somewhat coarse-grained and subjective. This paper proposes a trust evaluation based authorization model for ad hoc networks (TEAMA), which extends the basic model TBM with trust degree, which is generated by trust evaluation and helps the decisions of credential-grants in trust management based on policy, gives a more objective fine-grained evaluation than usual subjective methods.
{"title":"TEAMA: Trust Evaluation Based Authorization Model for Ad Hoc Networks","authors":"Qi Jing, Jian-bin Hu, Zhi Guan, Zhong Chen","doi":"10.1109/IMCCC.2011.123","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.123","url":null,"abstract":"A wireless Ad Hoc network is an infrastructureless self-organizing network. Access control problem of strangers may happen because of its strong openness. Trust management based on policy can dealt with such problem, which can deliver access control policies to strangers through credential-delegation to give them permissions. But the delegation frameworks are somewhat coarse-grained and subjective. This paper proposes a trust evaluation based authorization model for ad hoc networks (TEAMA), which extends the basic model TBM with trust degree, which is generated by trust evaluation and helps the decisions of credential-grants in trust management based on policy, gives a more objective fine-grained evaluation than usual subjective methods.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128678529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li-Xin Wang, Xi-sheng Jia, Wen-sheng Li, Li-ying Cai
We proposed a new approach for target value sequencing problem using grey analytic network process(ANP). Target value evaluation index system was constructed located at artillery battlefield, the index weight was decided based on analytic network process, the evaluated grey league and the general grey evaluated weight vector were decided based on grey system theory. The case proves the reliability of the results and the validity of this method. This method provides the artillery commander with a reference to the theoretic basis of decision-making of the target value sequencing.
{"title":"Target Value Sequencing Based on Grey ANP","authors":"Li-Xin Wang, Xi-sheng Jia, Wen-sheng Li, Li-ying Cai","doi":"10.1109/IMCCC.2011.15","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.15","url":null,"abstract":"We proposed a new approach for target value sequencing problem using grey analytic network process(ANP). Target value evaluation index system was constructed located at artillery battlefield, the index weight was decided based on analytic network process, the evaluated grey league and the general grey evaluated weight vector were decided based on grey system theory. The case proves the reliability of the results and the validity of this method. This method provides the artillery commander with a reference to the theoretic basis of decision-making of the target value sequencing.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129618833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shuffled frog leaping algorithm (SFLA) is meta-heuristic for solving complex optimization problems. It is one of promising optimistic methods which are based on swarm intelligence. SFLA combines the advantages of memetic algorithm and particle swarm optimization and has been widely used in engineering fields. In order to overcome the shortcomings of local search in the classic SFLA, a novel update method with convergence property is presented in this paper. On the basis of the proposed approach, the modified SFLA is presented afterwards. Experimental results show that the efficiency and convergence of the modified SFLA can be enhanced significantly.
{"title":"A Modified Shuffled Frog Leaping Algorithm with Convergence of Update Process in Local Search","authors":"Wang Qiusheng, Yang Hao, Sun Xiaoyao","doi":"10.1109/IMCCC.2011.256","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.256","url":null,"abstract":"Shuffled frog leaping algorithm (SFLA) is meta-heuristic for solving complex optimization problems. It is one of promising optimistic methods which are based on swarm intelligence. SFLA combines the advantages of memetic algorithm and particle swarm optimization and has been widely used in engineering fields. In order to overcome the shortcomings of local search in the classic SFLA, a novel update method with convergence property is presented in this paper. On the basis of the proposed approach, the modified SFLA is presented afterwards. Experimental results show that the efficiency and convergence of the modified SFLA can be enhanced significantly.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper devotes into the technology of network topology visualization, introduces several current network topology visualization algorithms firstly. Then aimed to the display problem for large size network, puts forward a new network topology visualization algorithm which contains two policies: one is the layer model determined by network characters, another is the dynamic layout process by force-directed. After the analysis of algorithm efficiency, we implement it in our visualization tool. In our experiment, it can effectively and clearly display moderate computer network topology. We also design a valid route visualization finding method based on this displayed network topology.
{"title":"A New Network Topology Visualization Algorithm","authors":"Yong Guozheng, L. Yuliang, Chen Huixian","doi":"10.1109/IMCCC.2011.99","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.99","url":null,"abstract":"This paper devotes into the technology of network topology visualization, introduces several current network topology visualization algorithms firstly. Then aimed to the display problem for large size network, puts forward a new network topology visualization algorithm which contains two policies: one is the layer model determined by network characters, another is the dynamic layout process by force-directed. After the analysis of algorithm efficiency, we implement it in our visualization tool. In our experiment, it can effectively and clearly display moderate computer network topology. We also design a valid route visualization finding method based on this displayed network topology.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131057048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In virtual environment, social Influence exists in interpersonal relationships. It is also important for developing individual attitude. The paper begins with the introduction of social influence theory. Then, a social influence model based on interpersonal relationship is presented. At last, three experiments are performed. Results of the experiments show that quantity preponderance, shortening the distance between individuals and enhancing individual influence by ameliorating images are effective way enhancing social influence.
{"title":"A Social Influence Model Based on Interpersonal Relationship","authors":"Liu De-sheng, Si Guang-ya","doi":"10.1109/IMCCC.2011.150","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.150","url":null,"abstract":"In virtual environment, social Influence exists in interpersonal relationships. It is also important for developing individual attitude. The paper begins with the introduction of social influence theory. Then, a social influence model based on interpersonal relationship is presented. At last, three experiments are performed. Results of the experiments show that quantity preponderance, shortening the distance between individuals and enhancing individual influence by ameliorating images are effective way enhancing social influence.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130735714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Underwater acoustic communication systems need Doppler compensation for the server Doppler effects. OFDM (Orthogonal Frequency Division Multiplexing) is widely applied in the underwater acoustic communication systems. FFT is the most computational kernels in the OFDM systems. By exploring the two typical digital signal processing kernels and other basic kernels, an ASIP (Application Specific Instruction set Processor) has been proposed. The proposed composite function unit can reach high MOPS in most DSP kernels with less read/write ports. Also, the proposed composite function unit reduce the memory access and register file access of the FFT, which is the bottleneck of the certain implementation of the FFT. The clock speed of the proposed ASIP can reach up to 600MHz under the CMOS 90nm technology.
{"title":"Application Specific Instruction Set Processor Design for Underwater Acoustic Communication Systems","authors":"Wang Wei, Qian Liang, Chih-Wei Liu","doi":"10.1109/IMCCC.2011.254","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.254","url":null,"abstract":"Underwater acoustic communication systems need Doppler compensation for the server Doppler effects. OFDM (Orthogonal Frequency Division Multiplexing) is widely applied in the underwater acoustic communication systems. FFT is the most computational kernels in the OFDM systems. By exploring the two typical digital signal processing kernels and other basic kernels, an ASIP (Application Specific Instruction set Processor) has been proposed. The proposed composite function unit can reach high MOPS in most DSP kernels with less read/write ports. Also, the proposed composite function unit reduce the memory access and register file access of the FFT, which is the bottleneck of the certain implementation of the FFT. The clock speed of the proposed ASIP can reach up to 600MHz under the CMOS 90nm technology.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130260052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A novel circuit topology for photovoltaic charge system with high efficiency and complete protection functions was presented in the paper. A modified P&O algorithm for better tracking performance with adaptive step length adjustment was proposed. And a comprehensive strategy for maximum power point tracking (MPPT) combined with the Constant Voltage Tracking (CVT) algorithm and the modified adaptive Perturbation and Observation (P&O) algorithm was developed. A prototype was implemented to very the feasibility of the proposed scheme. The experimental results showed that high MPPT accuracy and high power conversion efficiency were achieved under PWM operation mode.
{"title":"Design and Implementation of a Novel Photovoltaic Charge System with Maximum Power Point Tracking","authors":"Junliang Han, Haibo Xu, Qinghua Song, Shaozhong Zheng","doi":"10.1109/IMCCC.2011.58","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.58","url":null,"abstract":"A novel circuit topology for photovoltaic charge system with high efficiency and complete protection functions was presented in the paper. A modified P&O algorithm for better tracking performance with adaptive step length adjustment was proposed. And a comprehensive strategy for maximum power point tracking (MPPT) combined with the Constant Voltage Tracking (CVT) algorithm and the modified adaptive Perturbation and Observation (P&O) algorithm was developed. A prototype was implemented to very the feasibility of the proposed scheme. The experimental results showed that high MPPT accuracy and high power conversion efficiency were achieved under PWM operation mode.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aircraft autonomous formation flying control system have uncertain and unknown and disperse characterists, so conventional mathematical modeling method is hard to solve the modeling problems of formation system. Drawing lessons from already researched fruits of mobile robot and unmanned aircraft and satellite in autonomous formation flying, also the large systems cybernetics is adopted, this paper proposes the large systems cybernetics based generalized modeling method according to the mechanism, characteristic, mission requirements of the large scale system of multi-aircrafts autonomous formation flying, and establishes the global model and sub-model to four members of formation, then the simulation results of relation model and control model based on co-information show the modeling method is feasible.
{"title":"Modeling Investigation of Aircraft Formation Based on the Large Systems Cybernetics and Co-information","authors":"Lin Jin-yong, Dong Wenjie, Zhang Jun, Ma Jifeng","doi":"10.1109/IMCCC.2011.165","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.165","url":null,"abstract":"Aircraft autonomous formation flying control system have uncertain and unknown and disperse characterists, so conventional mathematical modeling method is hard to solve the modeling problems of formation system. Drawing lessons from already researched fruits of mobile robot and unmanned aircraft and satellite in autonomous formation flying, also the large systems cybernetics is adopted, this paper proposes the large systems cybernetics based generalized modeling method according to the mechanism, characteristic, mission requirements of the large scale system of multi-aircrafts autonomous formation flying, and establishes the global model and sub-model to four members of formation, then the simulation results of relation model and control model based on co-information show the modeling method is feasible.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129165658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Future space exploration missions need a robust, efficient and reliable communication infrastructure. This implies new communications and networking challenges, which are the elements of the so called Inter PlaNetary (IPN) Internet. This paper introduces the essential research challenges of the IPN environment, analyzes an envisaged IPN network infrastructure and illustrates and surveys the topological designs and solutions for IPN Backbone Network, PN Satellite Network and PN Surface Network respectively. For the heterogeneous pervasive environments, interplanetary communications challenge the development of communication technologies and ground infrastructure.
{"title":"Communications and Architectures for Interplanetary Internet","authors":"Y. Chen, Haitao Wu","doi":"10.1109/IMCCC.2011.226","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.226","url":null,"abstract":"Future space exploration missions need a robust, efficient and reliable communication infrastructure. This implies new communications and networking challenges, which are the elements of the so called Inter PlaNetary (IPN) Internet. This paper introduces the essential research challenges of the IPN environment, analyzes an envisaged IPN network infrastructure and illustrates and surveys the topological designs and solutions for IPN Backbone Network, PN Satellite Network and PN Surface Network respectively. For the heterogeneous pervasive environments, interplanetary communications challenge the development of communication technologies and ground infrastructure.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115221154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}