Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation

+ Advanced search
118 articles

Multiple-input Single-output Voltage-mode Universal Biquadratic Filter Uisng URC and CCCDBA

Sorapong Wachirarattanapornkul
In this paper, a new three-input single-output voltage-mode universal biquadratic filter using two uniformly distributed RC (URC) and current-controlled current differencing buffered amplifier (CCCDBA) are presented. The proposed circuit can realize to low-pass (LPF), high-pass (HPF), band-pass (BPF)...

A Novel Remote Attestation Platform for SOA

Songzhu Mei, Haihe Ba, Jiangchun Ren, Zhiying Wang, Geming Xia, Huaizhe Zhou
Service-oriented architecture is a design paradigm for the larger-scaled heterogeneous enterprise information systems, and it is the enabling technology for remote and cross-organization e-business transaction. Trust and reputation among the cooperating parties are becoming increasingly vital in this...

Local Binary Pattern Guided Bilateral Spatial Error Reconstruction

Chen Yao, Lijuan Hong, Yunfei Cheng, Jin Huang
In many communication occasions, packet loss or data corruption often occurs. Data incompleteness results in video degradation, which greatly affect visual quality. Error concealment is needed for the robustness of video transmission. In this paper, we introduce a local binary pattern guided bilateral...

The Study and Implementation of Phong Shading Algorithm Parallelization

Xin Zhang, Jungang Han
In order to speed up operations and improve operational efficiency, The parallel algorithms of phong shading model is proposed and validated by using the simulation system for PAAG(Polymorphous Array Architecture Graphic), the compilation system, the debugging environment and the parameter extraction...

Fuzzy Inference System for Physical Activity Recognition Based on General Features and PCA

Tongbi Kang, Lian Ying, Jiankang Wu, Yi Sun, Xiaoli Meng
This paper presents an approach of applying principal component analysis (PCA) and fuzzy inference system (FIS) to recognition of activity of daily life (ADL). To overcome the non-intuitiveness of single acceleration signal and difficulties of feature selection manually, 32 common features are computed...

Co-learning of Functions by Probabilistic Algorithms

Kucevalovs Ilja, Balodis Kaspars, Freivalds Rusinš
We investigate properties of an identification type of recursive functions, called co-learning. The inductive process refutes all possible programs but one, and, by definition, this program is demanded to be correct. This type of identification was introduced in [6]. M. Kummer in the paper [9] showed...

Robust Visual Tracking via Parallel Kernel Sparse Representation and NormalHedge

Jinjun Kuang, Cheng Cheng
In this paper, a novel visual object tracking method based on NormalHedge (NH) and parallel kernel sparse representation (PKSR) is proposed to achieve robust tracking accuracy under challenging conditions such as the target and its background sharing similar patterns, occlusion and deformation. Kernel...

Comprehensive Equipment Management System Based on Web Service

Peng Li, Mingrui Shi
A comprehensive equipment management system based on web service is introduced, and design idea is described from the perspective of function scope, main functions and system integration. The key technologies of foreground model and background services are described. The system is integrated in web service...

Human Prediction of Computer Generated Value Based on Statistical Experimental Approach Intuition in Human-Computer Interaction Research

Radim Brixí
Paper describes statistically significant anomaly in statistical results from test scenarios of human prediction success rate of right button generated by computer. The prediction success rate seems to be slightly higher than the theoretical probability. Paper presents seven test runs with different...

Design of 3D Visual Reservoir Modeling System Based on VB OpenGL Library

Rui Huang, Ruihe Wang, Xiaodong Wu, Hui Li
Under the condition of VB, the study shows it is easy to realize 3D visual reservoir modeling system with the OpenGL library and grid modeling theory, which has the function of scaling, rotating, moving, multilayer interval displaying. Meanwhile, the research proposed specific ideas and case studies...

Dynamic Bandwidth Allocation for Next-generation OFDMA-PON to Improve QoS

Yunfeng Peng, Xiuping Guo
This work proposes a Dynamic Bandwidth Allocation (DBA) scheme for next-generation OFDMA-PON to accommodate wireless signals. We transform DBA into a multi-objective optimization problem, and Non-dominated Sorting Genetic Algorithm is applied to get best-fitted individuals for each Optical Network Unit...

Maritime Mobile Channel Transmission Model Based on ITM

Yuwei Zhao, Jia Ren, Xun Chi
Aiming to characteristics of transmission path loss in mobile channel which is caused by complex electromagnetic environment on an open sea area, an improved Irregular Terrain Methodology ITM model is proposed in this paper. The algorithm first uses a Two-Path Model to calculate the transmission loss...

Undesired Changes in PID Controller Model Due to Simulators

A. Paz-Peña, C. Vargas-Jarillo
In this work we propose the simulation of a PID controller to solve two problems, namely: 1) Recovery signal with perturbation, using Simulink. 2) Tracking signal for a motor with perturbation in two ways, using Simulink and using a Matlab program. The aim of this work is to show particular examples,...

Attenuation of Oscillations in a Mechanical System Using a Vibrational Parameter

J. Tellez, J. Collado
In this work we attenuate the oscillations of a mechanical system using a vibrational control term introduced in the elasticity of a spring. First we must analyze the stability of the system due to the induction of periodic excitation can cause parametric resonance.

Peak Detection Algorithm for Laser Induced Breakdown Spectroscopy

Bo Zhang, Haibin Yu, Lanxiang Sun
Peak detection is an essential step in LIBS data analysis. We present a peak detection method, which is based on continuous wavelet transform. We compare three commonly methods of peak detection and discuss their performance.

Review on the Techniques and Features of Forensic Examination of Image in Surveillance Video

Xiao Zhang
With the widespread applications of surveillance video facilities, surveillance tape as evidence presented in the proceedings also becomes more and more popular in many cases. However, whether the video evidences forged or altered turns important before being considered as the support of the facts of...

Agent-Based Social Network Information Management Mechanism

Ming-Chiao Chen, Jen-Min Wang, Jia-Jing Li, Ru-Yu Jian
Social Network Service (SNS) plays a significant role in everyday life; it provides online interpersonal relationship networks for Internet users. With the rapid spread of interpersonal relationship through various social network sites, Internet users seem overwhelmed by mass data, and it turns out that...

Research on WLAN Networking Mode Based on Ad Hoc

Zengyou Sun, Chuanhui Hao
To enhance the WLAN data transmission capacity and improve network coverage, with ad hoc relay nodes introduced in WLANS, proposed a network structure, which can construct multi-hop network and realize ad-hoc networking. This paper first introduced network model structure of WLAN multiple hops ad hoc,...

Emotional Development Method of Virtual High Differences Emotional Speech Based on the Baseband Mapping

Hongbo Zhang, Teng Wang, Xiang Yang
Emotion mismatch between training and testing is one of the important factors causing the performance degradation of speaker recognition system. In this paper, we proposed an emotional development method based on virtual high differences emotional speech of the baseband mapping to build the speech closer...

Experimental Research and Analysis on Smart Car with Electromagnetic Runway

Juntao Qu, Ming Hou, Linghui Li
In this paper, a smart car which is able to independently identify wire line is made. With a car model, a dc motor and chargeable batteries, it is based on the multi-function MCU. The smart car is guided by the electromagnetic field and along a certain path. The whole system is a closed-loop control...

Reversible Data Hiding Algorithm Using Dual Domain Embedding

Po-Whei Huang, Yung-Kuan Chan, Chia-Yi Chuang, Hao-Cheng Wang
The image data hiding technique can embed the secret message into the digital image. For military or medical applications the reversible data hiding technique is preferred because it offers the advantage to recover the original image after the message extraction, yet it still maintains the reversibility....

Research on Static Comprehensive Detection Method for Mission Electronic System

Hang Lian, Jianghua Lv, Shilong Ma
In the weapon system, with the improvement of the equipment performance, the system complexity also increases. Functional failure will cause the system to malfunction or even become a disaster. Therefore, system-level comprehensive detection for Mission Electronic System is the urgent issue in the field...

Study on Day and Night Sighting Device Target Imaging Simulation System

Lifeng Diao, Ming Dai, Cheng Yang, Jilin Wu, Guangdong Zha
Describes the design idea of an airborne day and night sighting device target imaging simulation system, the composition and working principle of simulation system is discussed from two aspects of hardware and software. The experimental result shows that the simulation system is with excellent image...

Relation Model of Soil Nutrients and Tobacco Quality Based on Principal Component and Regression Analysis

Houli Hu, Jiande Wu, Xiaodong Wang, Kuake Huang
In order to study the relationship of tobacco soil nutrients and chemical indicators, principal component analysis and stepwise regression analysis were used to establish the relation model between soil nutrients and tobacco quality. In the first, discussing the correlation of soil nutrients and the...

A Fine-grained Fault Recovery Strategy for Task Pipeline

Jiantao He, Hong Ning
With the development of space technology, data processing and computational grow exponentially, leading to future spaceflight hardware platform structure changed from the traditional monolithic processor to multicore platforms. Thus the high-performance computing in space should be considered. Flowing...

A Study on Hidden Curriculum of Ability Grouping Instruction in College English Classes

Su-Lien Liao
A lot of colleges in Taiwan apply ability grouping on English instruction owing to the poor English of vocational college students, the huge differences of their English ability, and the large classes in English instruction. Previous studies on ability grouping instruction focus on the analysis of the...

Blind Identification and Digital Calibration of Volterra Model Based on Least Mean Square Method

Peng Liang, Haihua Deng, Ming Chen
Nonlinear distortions and memory effect of broadband receiver’s front-end are canceled out simultaneously using a digital post-calibration technique based on Volterra model. This paper develops a least mean squared blind identification criterion for the measurement of the model parameters without prior...

Design and Research on Traffic Signal of Wireless Sensor Network Based on Labview

Kuangang Fan, Jianjun Chen, Qingmei Cao
In order to solve the increasingly serious traffic problems in the city, how to achieve effective management and control of the traffic information has become an urgent problem that should be solved in transportation of our country. This paper proposes a design on traffic signal of wireless sensor network...

Image Matching Algorithm Based on an Improved Hausdorff Distance

XiaoHong Li, YiZhen Jia, Feng Wang, Yuan Chen
As for the rotation, scaling, cropping in image matching, corresponding algorithm based on Hausdorff distance is deduced. The proposed algorithm extracts feature points by SIFT operator in original image and target image, and determines whether there is a kind of affine transformation between two images...

SOA Distributed Bundles with QoS-aware

Sutheera Puntheeranurak, Aekkawit Chanpen
Service replication is leveraged in a Service-Oriented Architecture (SOA) system for distributing services to different servers. It prevents the system from bottle neck and overload problem to improve the availability and reliability of the system. For this work, we focus on dynamic replication that...

Analysis of WeChat on IPhone

Feng Gao, Ying Zhang
With the popularization of smart phone, more and more applications emerge especially in the aspect of social network services. Take China for example, WeChat has become the most universal communication applications in recently several years. In the meantime, forensic technicians start to pay attention...

The Relationship Between Agents and Simulated Annealing Using BottsTrica

Qi Wang, Jun Li, Zhenglong Wu, Yu Zhang
Cryptographers agree that peer-to-peer modalities are an interesting new topic in the field of compact cryptoanalysis, and cyberneticists concur [1]. In fact, few cryptographers would have different points about the deployment of context-free grammar, which includes the confusing principles of software...

Systems Model Analysis for Iterative Concurrent Design Processes and Its Application to Design of Precision Mechatronics

Chee Khiang Pang, Cao Vinh Le, Tsan Sheng Ng, Hoang Long Ngoc Nguyen
We propose a novel methodology of knowledge sharing in mechatronic R&D department by the integration of information repository (IR) using minimal organizational restructure. Through computer simulation and system dynamics, we successfully encompass this concept into a systematic, top-down and inclusive...

Informatization of Shipbuilding Enterprises and Countermeasures

Jishen Zhou, XiaoFang Zu
Informatization of shipbuilding enterprises is the only way to achieve modernization for the shipping companies in line with international standards. This paper puts forward some typical problems existing in the process of shipbuilding enterprises informatization in our country by combining the status...

Study of ICI Suppression Method Based on Affine Fourier Transform

Zengyou Sun, Xia Ling
The time-frequency double selective characteristic of wireless fading channel destroys the orthogonality among subcarriers, thus generating ICI, which affects the quality of communication seriously. Starting from subcarriers, an ICI suppression scheme based on affine fourier transform was proposed to...

Applications of TestWizard in the Fibre Channel Test System

Xiucai Zhao, Panwei Wang
As more and more Fiber Channel related products are being used, the needs of a FC test & analysis system are more urgent now. A FC system is a test & analysis system that can test the performance of the network, can capture the Fiber Channel data and can simulate and analysis the protocols. This paper...

Simple and Symmetric U Shape Radiating Patch with Rectangular Ground Wideband Microstrip Antenna

Vijay K. Sambhe, R. N. Awale, Abhay Wagh
In this paper, simple and low profile wideband U- shape radiating structure with rectangular ground microstrip monopole antenna is proposed. Designed antenna has control over the entire ultra wideband. It is suitable for 3.5 to 13.6 GHz by controlling the dimension of U-shape radiating structure and...

A New Meta-Heuristic Technique for Engineering Design Optimization: Seven-Spot Ladybird Algorithm

Peng Wang, Zhouquan Zhu, Shuai Huang
Increasing attention is being paid to solving engineering design optimization problems which are generally nonlinear and constrained. In this paper, the Seven-spot Ladybird Optimization (SLO) algorithm is developed to obtain the solution of such optimization problems. This paper presents the basic concepts...

The IOT of Coal Mine Production of Remote Data Acquisition System Design

Chun-lei Wang
The system described in this paper want to solve several problems such as data safety, clock synchronous and mistake redundancy etc. while the system running on wide area IP network. The system involves the Internet of Things (Hereinafter referred to as “IOT”) technology and data to achieve robustness...

Enforcing Multiple Security Policies for Android System

Tao Guo, Puhan Zhang, Hongliang Liang, Shuai Shao
The popularity of Android makes it the prime target of the latest surge in mobile malware. Protecting privacy and integrity of information is helpful for Android users. Currently, malicious software often achieve the purpose of privacy theft and malicious chargeback by sending short messages, making...

Dorsal Hand Vein Image Enhancement for Improve Recognition Rate Based on SIFT Keypoint Matching

Sathaporn Chanthamongkol, Boonchana Purahong, Attasit Lasakul
The important step in hand vein matching is the quality of image that is significance for hand recognition automatic system. The input image is obvious that bring to high recognize rate important for identifying individual person. in this paper, we will enhance quality of input hand vein image by CLAHE(Contrast...

Comprehensive Optimization Method on Navigation Performance of the Planing-Hydrofoil USV

Songlin Yang, Baoming Wang, Qiang Yu, Yiyan Wen
In this paper, a comprehensive optimization mathematical model of the planing-hydrofoil USV performance was established. A hierarchical parallel genetic-complex algorithm is advanced basing on parallel strategy, genetic algorithm and complex algorithm and it is called H-P-GA-C. The new algorithm for...

Design and Analysis of Self-tuned Nonlinear PID Controller for XY Table Ballscrew Drive System

L. Abdullah, Z. Jamaludin, J. Jamaludin, M.R. Salleh, B. Abu Bakar, M.N. Maslan, T.H Chiew, N.A. Rafan
Positioning systems in machine tools lately insists for high accuracy and self adjusting mechanism to be implemented into the system in order to sustain against various disturbance forces. The disturbance forces are in the form of both cutting forces and friction forces. The aim of this paper is to propose...

Analysis of Maximum Ratio Transmission in Ad Hoc Networks with Imperfect Channel State Information

Mingzhu Deng, Guangming Liu, Yuran Hu
In this paper, the performance of maximum ratio transmission (MRT) with imperfect channel state information (CSI) is analyzed. Different from previous works, a multiuser scenario is considered. By modeling the source nodes as a homogeneous Poisson point process, the outage probability is derived in closed...

Wireless Monitoring and Control System Via Android Tablet PC

Zhen Huang, Yunhan Lu
Typical industrial remote monitoring and control systems are usually based on PC, but it can hardly be applied to fields that need mobile communication. Along with the developing of wireless communication technology and mobile device, using mobile devices to realize wireless remote monitoring and control...

A 60 GSa/s InP-DHBT-THA with 50 GHz Bandwidth for High Bit Rate Communication Systems

J. Deza, A. Ouslimani, A. Konczykowska, A. E. Kasbari, J. Godin, G. Pailler
A 60 GSa/s THA is designed and realized in InP-DHBT process. The THA presents a small signal bandwidth of 50 GHz. For +4 dBm and -4 dBm input powers, 60 GSa/s spectral measurements give a THD of -37.3 dB and -51.3 dB for input frequency up to 2 GHz and a THD of -30.1 dB and -38.7 dB up to 15 GHz. Temporal...

Low-Voltage Low-Power Pipelined Input Subsampled Replica Algorithmic Noise-Tolerant Motion Estimation Circuit Design

I-Chyn Wey, Zhe-Yu Lin, Yu-Jie Tian, Sheng-Hong Yu, Pin-Si Lin
In this paper, we proposed a new pipelined ISR-ANT ME design to further shorten the critical path of the ISR-ANT ME circuit [1], which can make it operate in a lower operating voltage. The proposed design is very simple, which only needs to insert the pipelined register to cut the critical path of ISR-ANT...

Applying Multisets for Software Design at the Initial Stages

Yulia A. Orlova, Alexey B. Petrovsky
The paper describes how to apply multisets for software design. Developed system for automation of the initial stages of multi-component software design is based on the semantic analysis of text. Automation lead to increasing in the quality of software development. The paper considers an approach to...

Testing and Evaluation for the Atomic Clock in Different Location

Wei Li, Yongliang Xu, Shifeng Li
The national standard time, UTC NTSC kept by NTSC takes part in the international time comparison for a long time, which has high stability and accuracy. It can test and evaluate the atomic clock in different location through the technology of remote time comparison. In the BPL system, time-frequency...

An Approach to Fault Diagnosis Considering False Alarm and Middle State

Xiangqian Li, Shikai Jing, Jingtao Zhou
In order to monitor the false alarm and fault middle state in the process of fault diagnosis simultaneously, a mixed Hidden Markov Model HMM considering the false alarm and fault middle state was proposed to reduce the false alarm and monitor the middle state of the system. First of all, the state classification...