Upload
others
View
4
Download
0
Embed Size (px)
Citation preview
2010 First International
Conference on Pervasive
Computing, Signal Processingand Applications
(PCSPA 2010)
Harbin, China
17 - 19 September 2010
Pages 1-656
IEEE Catalog Number: CFP1064K-PRT
ISBN: 978-1-4244-8043-2
1/2
2010 First International
Conference on Pervasive
Computing, Signal Processingand Applications
PCSPA 2010
Table of Contents
Preface. xxvhi
Organizing Committee xxix
Program Committee xxx
Reviewers xxxii
Track I - Pervasive Computing: Advanced Concepts and Methods for Pervasive
Computing
Thin Bed Prediction Processing Technique Based on Generalized S Transform I
Liu Ji-cheng and Sun Chang-ping
Estimation and Registration of Relative System Biases in Fire-Control Radar
Network 5
Hong Xu, Zhuangzhi Han, Qiang He, and Chaoxuan Slicing
Research of Pervasive Computing System Support Theory 9
Liu Yanjun, Wu Wei, Li Bo, and He Chengming
Image Denoising Based on Curvelet Transform and Continuous Threshold 13
Yuan Ruihong, Tang Liwei, Wang Ping, and Yao Jiajun
Dynamical Approach for Spectral Estimation under Reverberation 17
Clnmyun Song, Yahui Lei, and Guo Lin
Study on the Corrosion and Anodic Oxidation of Carbide Thin Films 21
Wang Jian, Hu Ya, Yang Xuecheng, Li Jie, Gu Qiang, Nie Yongtao, He Fujun,
Nie Jicmhong, andRen Xinhua
Order Tracking of Speed-Up Signals for Gearbox Based on TMS320C5402 25
Wen Zheng-gang, Luan Jun-ying, Yang Tongqiang, and Li Yong-hua
Logistics Management System Design under Pervasive Computing
Environment 29
Tiening Wang andNansong Hu
v
Research on Optical Air Chamber of Infrared Gas Sensor 33
Yu Han, Ting Liang, Xu-jun Yang, Xiao-li Ren, and Ya-fei Yin
The Methods of Smart Structural Dynamic Response Analysis of SINS 37
Lili Hu, Jie Li, Li Qin, Xining Yu, and Ruiping Tao
A Robust Joint Space Tracking Method Based on Particle Filter 41
Xin Sim, Hongxim Yuo, Zhongqian Sun, and Bineng Zhong
Provably Secure Certificatcless Authenticated Key Agreement Protocol in
the Standard Model 45
Xiaofen Wang and Xiongda Li
Track I - Pervasive Computing: Software Infrastructure, Middlewareand Frameworks for Pervasive Computing
A Comprehensive Approach of SA Based Software Deployment Reliability
Estimation in Neural Networks 49
Xihong Su, Zhibu Wu, Hongwei Liu, Decheng Zuo, andXiaozong Yang
A New Spam Traffic Characterizatione Mechanism 54
Yang Sun
The Implement of UBL in the E-Business 58
Yi Liu
Universal Generic Object Design 62
Shi-chang Hu and Jkm Yu
Simulation of Pulsed Current Wire Behavior in Magnetic Field Using FEA 66
Wang Xiaoming and Lei Tao
An Efficient Routing Protocol in a Bus-Based Vehicular Ad Hoc Network 70
Chen Li, Li Zhijun, and Jiang Shouxu
Fast Pedestrian Detection Using Slice-Based Motion Analysis 74
Jingjing Yang, Xiaohong Su, and Peijun Ma
On-Line Discriminative Appearance Modeling for Robust Object Tracking 78
Xin Sun, Hongxim Yao, Shengping Zhang, and Bineng Zhong
Private Small-Cloud Computing in Connection with Linux Thin Client 82
Bao Rang Chang, Hsiu Fen Tsui, Chien-Feng Huang, and Hsi-Chung Huang
A Novel Synchronization Scheme for IDMA with Low Complexity 88
Zuo-Hang Yin, Xing-peng Mao, and Jim Cai
Track I - Pervasive Computing: Mobile and Wearable Computing
Universal Methodologies: Decomposition, Integration and Transformation 93
Shi-chang Hu andJian Yu
On-Line Traffic Forecasting of Mobile Communication System 97
Shaojim Wang, Jia Guo, Qi Liu, andXiyuan Peng
Research on CMM Best Practice in Component-Based System Construction 101
Shu-guo Fan and Liying Bian
vi
Research on Improved Increment Maintenance in Data Wearhouse 104
Shu-guo Fan and Yue-hong Zhang
Application Research of MQ Series in the Iron and Steel MES Message
Communication System 108
Jie Liu and Chang-xing Qi
An Improved Hybrid Peer-to-Peer Routing Algorithm 112
Yun Yang, Guyu Hu, Shize Guo, and Saisai Yu
Imbalanced Classification Algorithm in Botnet Detection 116
Yun Yang, Guyu Hu, Shize Guo, andJun Luo
Trust Propagation Mode! in Pervasive Computing Environment 120
Liu YuLong, Guo Shize, Tang Ye, and Ding YouZhi
Design and Analysis of Security Policy System in GSM/UMTS HybridNetwork 124
Zhang Lei, Guo Shize, and Liu Yulong
Identification ofWeb Query Intent Based on Query Text and Web Knowledge 128
Dayong Wu, Yu Zhang, Shiqi Zhao, and Ting Liu
Track I - Pervasive Computing: Wireless Networks for Pervasive Computing
An Enhanced HCRL Algorithm in Wireless Sensor Networks for Pervasive
Computing 132
YinLong Wang, Xiwu Wang, Lei Yang, Shanguo Peng, Zhixiang Li, Qianjin Li,
and Kecheng Lin
An Energy-Driven Adaptive Cluster-Head Rotation Algorithm for Cognitive
Radio Network 138
Guisen Xu, Xuezhi Tan, Slumming Wei, Shizeng Guo, andBin Wang
A Novel Weighted Clustering Algorithm Based on Power Distribution
for Cooperative Communication Network 142
Na Zhang, Ningqing Liu, Weixiao Meng, and Qiyue Yu
A Channel-Aware Queue-Aware Resource Allocation Algorithm for OFDMA
System with Heterogenous Delay Requirements 146
Qing Guo, Zhixin Zhao, Xin Liu, and Liang Chang
Actor Deployment Strategies in WSANs 150
Che Nan, Li Zhijun, and Jiang Shouxu
Narrowband Physical Layer Design for WBAN System 154
BoKeun Choi, ByungSoo Kim, SangSeol Lee, KyuYeul Wang, YongJun Kim,
andDucldin Chung
A Mobile Node Filter Method in Wireless Sensor Network Based on Improved
MH Particle 158
Sun Liying, Ding Mingli, Liu Zhen, and Zhang Zhongda
vii
Optimization of WLAN Indoor Location Network Based on Signal Coverage
Requirement 162
Yubin Xu, Mu Zhou, and Lin Ma
Accuracy Enhancement for Fingerprint-Based WLAN Indoor Probability
Positioning Algorithm 167
Ma Lin, Xu Yubin, and Zhou Mu
EERM: Energy Efficient Routing Metric for Wireless Sensor Networks 171
Ding Yang and Qin Xiao-Ming
Study on Dynamic Modeling and Simulation for a Air-Based Three-Axis ISP
System 175
Li Jianping and Zhou Xiangyang
Track I - Pervasive Computing: Cross-Media for Pervasive Computing
Distributed Low-Complexity H.264 Video Combining for Multipoint Video
Conferencing 179
Wei Zhang and Weimin Lei
A Uniform Session-Based Media Controlling Framework for IMS Terminal 185
JunyingJia, Hit Lin, Bo Yu, and Huili Wang
A Review of the Policy-Based QoS Architecture in IMS 189
Bo Yu, Dong Yu, Junying Jia, and Jinghua Lin
Design and Implementation of Performance Testing Utility for RTSP
Streaming Media Server 193
Yong Liu, Bin Du, Shilling Wang, Hatha Yang, andXingwei Wang
A Dynamic RWA Algorithm for Optical Networks with Wavelength
Conversion Capacity 197
Du Li, Bi Xiao-Hong, and WangXiaa-Jing
Research of Detection Platform in Fire Control System Based on CAN Bus 202
Cheng Yuanzeng, Dong Zhilnia, Gao Qing, Yao Zhigang, and Zheng Baiyuan
A Controllable P2P Streaming Delivery Network in IMS 206
Jinghua Lin, Dong Yu, JunyingJia, and Junchao Li
A Detector of DTTB Based Passive Radar Using FRFT and Hough Transform 212
Jin-lu Yang, Tao Shan, and Ran Tao
Consensus-Based Distributed Control of Multi-agent Systems 216
Fan Zhang, Shijie Zhang, Yingchun Zhang, Haibo Guo, and Anhui Zhang
viii
Track I - Pervasive Computing: Device Interface and Standardization for Pervasive
Computing
An Embedded GIS Integrating GSM and GPS under VxWorks Platform 220
Peng Yu and Lin Ynye
Communication Network-Oiented Analysis of Transmission Mechanism
ofNature Orb-Web 224
Xiaosheng Liu, Liang Zhang, and Jianwei Lin
Nonlinear Dynamic Behaviors in Voltage-Mode Controlled Single-Phase
Half-Bridge Inverters via Varying Input Voltage 230
Fei-Hu Hsieh, Hen-Kung Wang, Po-Lun Chang, and Hsuan-Chiang Wu
Researches on New Non-uniformity Correction Algorithm for Resistor Array 235
Yang Chunling, Zhu Houcun, and Yu Chunna
Integrated Powertrain Control of Gearshift for Automatic Transmission 239
Jinwa Gao andZhiyuan Liu
Chinese Text Classification Based on Extended Nai've Bayes Model
with Weighed Positive Features 243
Yaying Qiu, Guangming Yang, and Zhenhua Tan
Model Computing and Merging Algorithm for Anonymous Router in Network
Topology 247
Zhang Yong, Guo Shize, Niu Wei, and Yang Yun
3D Reconstruction Method from Biplanar Radiography Using DLT
Algorithm: Application to the Femur 251
Bin Zhang, Shaohin Sun, Jinwei Sun, Zhiyong Chi, and Chunyang Xi
MEMS Gyro Denoising Based on Second Generation Wavelet Transform 255
Mao Ben, Wu Jun Wei, Wu Jian Tong, and Zhou Xue Mei
A Solution of Service Platform Supporting Service Integration
and Optimization 259
Cheng Zhen, Zhan Dechen, Nie Lanshun, and Xu Xiaofei
Track I - Pervasive Computing: Data Grid and Knowledge Managementfor Pervasive Computing
3D Object Reconstruction Based on Motion Vision 263
Guangming Yang, Long Yan, Haoyu Zhang, Qi Wang, and Jin Chang
A New Color Image Encryption Algorithm Based on 3D Lorenz Chaos
Sequences 269
Mu Xiu-chun and Song E-Nuo
Effective Dissolve Detection Based on Accumulating Histogram Difference
and the Support Point 273
Qing-Ge Ji, Jian- Wei Feng, Jie Zhao, and Zhe-Ming Lu
ix
Face Recognition with Single Training Image per Person Based on Wavelet
Transform and Virtual Information 277
Yingnan Zhao, Yan Ma, and Shiwei Ji
Real-Time Image Semantic Retrieval Based on VQ 281
Mei-Lei Lv, Bei-Bei Liu, and Zhe-Ming La
Study on Sliding Mode Fuzzy Control for the Subsystem of a Stream
Generator 285
Zhang Gui-feng
Book Information Retrieval System Based on Deep-Web Data Integration 289
Wang Xiaoyu, Cui Xiangyang, Chen Deyun, and Jiang Feng
Comparative Analysis of Feature Extraction Algorithms with Different Rules
for Hyperspectral Anomaly Detection 293
Zhenlin Liu, Yanfeng Gu, and Ye Zhang
Speed Up Temporal Median Filter for Background Subtraction 297
Mau-Hsiung Hung, Jeng-Shyang Pan, and Chaw-Heh Hsieh
New Approach to Path Explosion Problem of Symbolic Execution 301
Xu Xiao, Xiao-song Zhang, and Xkmg-da Li
Track I - Pervasive Computing: Pervasive Sensing, Perception and Inference
A Dependability Model to Enhance Security of Cloud Environment Using
System-Level Virtualization Techniques 305
Dawd Sun, Guiran Chang, QiangGuo, Chuan Wang, andXingwei Wang
Power Qualify Disturbances Recognition Based on HS-transform 311
Nantian Huang, Dianguo Xu, andXiaosheng Liu
Integrated Coverage Control and Security Connectivity in Mobile Sensor
Networks 315
JiaJie, Zhang Zhaoyang, Chen Man, Zhao Linliang, and Wang Xingwei
The Adaptive Routing Algorithm Depending on the Traffic Prediction Model
in Cognitive Networks 319
Tie Li, Xingwei Wang, Ruiyun Yu, andJieJia
Topology Optimization of Mobile P2P Ad Hoc Networks 323
Ying Zhang, Guiran Chang, andJieJia
A Study of Zero-Crossings with Peak-Amplitudes in Speech Emotion
Classification 328
Sun Ying andXueying Zhang
Speaker Independent Recognition on OLLO French Corpus by Using
Different Features 332
Lixia Huang, Xueying Zhang, and Gianpaolo Evangelista
Speech Recognition Based on Support Vector Machine and Error Correcting
Output Codes 336
Liu Xiao-feng, Zhang Xue-ying, and Duan Ji-kang
x
Real-Time Analysis of Laser Speckle Patterns for Precision Positioning 340
Ping S. Huang, Chih-Ming Liao, and Chung-Cheng Chin
Research on Signal Processor of Data Link Terminal Based on Pervasive
Computing 344
Zhou Cfnmmei, Zhang Clnmxia, Dong Wenjie, Zhang Jim, andLin Jinyong
Flying Control System Architecture of Informationization for Pervasive
Computing 348
Lin Jinyong, Zhang Jim, Dong Wenjie, Gao Xiaoying, and Qi Chuntang
Track I - Pervasive Computing: Security, Trust, Privacy and Other Socio-technicalIssues in Pervasive Computing
CBD: A Counter-Based Detection Method for VMM in Hardware
Virtualization Technology 352
NingJian, Wang Huaim'm, Guo Shize, andLiu Bo
Print-and-Scan Resilient Watermarking for Authenticating Paper-Based
Certificates 357
Yuan-Liang Tang and Yin-Tai Huang
Research on the Anomaly Discovering Algorithm of the Packet Filtering Rule
Sets 362
Zhe Chen, Shize Guo, and Rong Duan
Image Secret Sharing and Hiding with Authentication 367
Peng Li, Peijun Ma, andXiaohong Su
Image Error Detection and Error Concealment Technique Based
on Interleaving Prediction and Direction Information Hiding 371
Kuo-Lung Hung and Chen Husan Tsai
An Adaptive Image Compression Method Based on Vector Quantization 377
Jau-Ji Sheii and Hsiu-Chuan Huang
Secret Image Sharing with Steganography and Authentication Using Dynamic
Programming Strategy 382
Chi-Shiang Chan and Ping-En Sung
An Anonymous Attestation Scheme in Inter-domain Environment
with Enhanced Security 386
Lina Sun, Guiran Chang, Dawei Sun, Xingwei Wang, and Chunguang Tan
Privacy Protection in Ubiquitous Computing 391
Ping Zhang, Jianping Fan, and Weimin Zheng
A Novel Crossbar Scheduling for Mulri-FPGA Parallel SAR Imaging System 394
Huanghui Shen, Jing Wang, Chenyu Yuan, Zhensong Wang, and Weimin Zheng
xi
Track I - Pervasive Computing: Analysis, Design, Implementation and Evaluationof Pervasive Devices and Systems
Analysis and Design of a High Power Density Axial Flux Permanent Magnet
Linear Synchronous Machine Used for Stirling System 398
Ping Zheng, Xahui Gun, and Lin Li
Design and Analysis of Compound-Structure Permanent-Magnet Synchronous
Machine Used for Hybrid Electric Vehicles 402
Ping Zheng, Sluicing Yu, Jingang Bai, and Yi Sui
Low Noise CCD System Design and Implementation Based on Thermoelectric
Refrigerating Unit 406
Zheng Dezhi, Gong Jing/ie, Song Xinbo, and Guan Ming
Research on the Reliability of MAC Protocols for Multi-radio Sensor
Networks 410
Yahong Guo andDesheng Zhang
Power Integrity Analysis for High-Speed PCB 414
WongLi-x'm, Zhang Yu-xki, am)Zhang Gang
The Reading/Writing SD Card System Based on FPGA 419
Zhenlin La, Jingjiao Li, and Yao Zhang
A RFID Field Operation System Design for Agricultural Traceability 423
Yu-Chih Huang, Wen-Chung Kuo, and Min-Chih Kao
Research and Design of Embedded Radar Information Processor Oriented
to Pervasive Computing 427
Zhang Chunxia, Dong Wenjie, Tian Xiyan, Zhang Jim, Zhou Chunmei, and Lin Jinyong
Design of Simulation Software for Mission Change Real-Time Control Based
on Pervasive Computing 432
Zhang Jun, Dong Wenjie, Zhang Chunxia, Zhou Chunmei, Lin Jinyong, and Li Shuangxi
Design of the Embedded Serial and Parallel Communication Protocol
Controller 436
Jie Liang and Ran Duan
Design ofHardware-in-Loop Simulation System Based on Pervasive
Computing Technology 440
Ma Jifeng
Track I - Pervasive Computing: Soft Computing
An Improvement and Simulation ofLEACH Protocol for Wireless Sensor
Network 444
Linlin Wang, Jie Liu, and Wei Wang
A Reformative KMSE Algorithm Based on the Numerical Analysis ofMatrix 448
Jinrong Cut
Face View Recognition and Facial Feature Extraction 452
Chuan-Yu Chang, Jia-Sin Li, andJui-Yi Kao
xii
Logic Circuit Design by Neural NeTwork and PSO Algorithm 456
Jen-Pin Yang, Chih-Kung Kung, Fang-Tsung Liu, Yu-Ju Chen, Chuo-Yean Chang,
and Rey-Chue Hwang
Signal Processing by Polynomial NN and Equivalent Polynomial Function 460
Chih-Chien Huang, Wei-Chih Chen, Chi-Yen Shen, Yu-Ju Chen, Chuo-Yean Chang,
and Rey-Chue Hwang
Ontology-Based Image Retrieval with SIFT Features 464
Xuejun Liu, Zhenfeng Shao, andJim Liu
A Fast Data Fusion Algorithm Based on Matrix Analysis for Target
Recognition in Sensor Networks 468
Li Quanlong, Xu Xiaofei, Yan Oingjim, and Wang Zhaobo
Entropy Based Fuzzy Comprehensive Evaluation of University Teachers 475
Li-Fang Shi
A New Method to Improve the Dependability of Key Nodes in Pervasive
Computing Environment 479
Hongwei Wang, Zhibo Wu, Hangwei Liu, and Jian Dong
Parameter Optimization of Support Vector Machine Based on Combined
Algorithm of QPSO and SA 483
Shi Yan, Li Xiao-Min, and QiXiao-Hui
Track II - Signal Processing: Parameter Estimation and Spectral Analysis
Parameter Estimation of LFM Signal with Narrowband Jamming Based on CS 487
Bing Lin and Ping Fu
An Improved Window and Interpolation Algorithm Using Trispectrum
for Measuring Power Plarmonics Based on FFT 491
Zhang Bing and Hu Hong
Study on Fault Detection Method Based on SVMs 495
Wang Li-bing and Shang Chao-xuan
Fractional Low Order Cyclostationary Spectrum Sensing Based on Eigenvalue
Matrix in Alpha-Stable Distribution Noise 500
Shuang Ma, Chunhui Zhao, and Ying Wang
Branch Parameter Error Identification and Estimation in Power Systems 504
Jianquan Zhu, Feng Liu, and Shengwei Mei
Research on Different Features between Direct and Reflected Ultrasonic
Signals from Air Leakage Sources 508
Xu Qiyue, Liao Pingping, and Cai Maolin
Research on ISAR Imaging Method ofParameter Estimation Based
on Optimal Imaging Period 513
Jiang Yicheng and Yin Songqiao
Research of Tracking Models Based on SURF 517
Zhigang Bing, Yongxia Wang, HailongLu, Shigang Cul, andHongda Chen
xiii
Research on Noise-Eliminating Method for Large Structure Vibration Signals
Based on the Prony Algorithm 521
Tian dicing, Yu Gui-bo, Ma Ya-fei, Ttmg Li-wei, and Zheng Hai-qi
Frequency Estimation Based on Modulation FFT and MUSIC Algorithm 525
Tong Li and Yinlnii Tang
Frequency Compensation Technology Based on Spectrum Analysis 529
Ji Tiejun and Gai Jianxin
Track II - Signal Processing: Signal Representation and Transforms
Large Margin Dimensionality Reduction for Time Series 533
Xiao Yu, Aiiqi Wu, and Daren Yu
Research on Frequency Envelope Mapping Based on GMM 537
Xuan Liping, Xiang Xuezhi, and Zhang Lei
Band Energy Based GMM Speech with Noise Classification Algorithm 541
Shi-Ze Guo, Lung-Jiang Yu, and Guang-Yu Kang
Application of Mathematics Morphological De-nosing in Fault State
Identifying of Bearing 545
Guan Zhen-zhen and Huo Qian
ICA and Its Application in the Phase Information Extraction of Oil-Gas-Water
Three-Phase Flow 549
Kong Lingfu, Gao Fan, Li Yingwei, Liu Xingbin, and Hu JinHai
The Research of Fast Vector Transform and Its Implementation 553
Wang Qiitsheng, Yuan Haiwen, and Liu Yingyi
A Technique for Suppressing Periodic Linear Frequency Modulation
Interference in PN Spread-Spectrum Systems 557
Hao Huan and Ran Tao
Interference Suppression in Spread Spectrum Systems Using
the CR-Fractional Fourier Transform 560
Kewu Huang and Ran Tao
Research on Wavelet Denoising for Pulse Signal Based on Improved Wavelet
Thresholding 564
Fengxiang Chang, Wenxue Hong, Tao Zhang, Jim Jing, and Xulong Liu
Multichannel Epileptic EEG Classification Using Quaternions and Neural
Network 568
Yong Zhao, Wenxue Hong, YonghongXu, and Tao Zhang
xiv
Track II - Signal Processing: Digital Filter Design
Improved Algorithm for Denoising Based on Wavelet Threshold
and Performance Analysis 572
Ma Liyuan, Duan Yonggang, Li Yongjun, and Wang Ticmhui
Optimization of Soft Morphological Filters with Parallel Annealing-Genetic
Strategy 576
Ye Tian and Chun-hui Zhao
Parameter Estimation of LFM Signal in the Fractional Fourier Domain
via Curve-Fitting Optimization Technique 582
Fang Zhang, Lin Qi, Enqing Chen, andXiaomin Mu
Blind Separation of Noisy Mixed Speech Signals Based Independent
Component Analysis 586
Li Hongyan and Ren Guanglong
Automatic Modulation Recognition of Digital Communication Signals 590
Wu Juan-ping, Han Ying-zheng, Zhang Jin-mei, and Wang Hua-kui
Modulation Recognition Scheme Using Mixed Model 594
Hua-kui Wang, Xu-qing Yao, Juan-ping Wu, Ying-zhen Han, and Li-U Feng
Research on Image Recognition Based on Invariant Moment and SVM 598
Shi Jian-fang and Sun Bei
The Study and Improvement on Constant Modulus Algorithm for MIMO
System 603
YingzhengHan, Feifei Cao, and Tito Zheng
New BSS Algorithm of Four Order Cyclic Cumulant 607
Li Deng-ao, Zhao Ju-min, Zhang Hai-yan, and Ma Qing-hm
Design of a Silicon-Micro Piezoresistive Multi-ranged Accelerometer 610
Tao Guo and Jie Li
Structure Enhancing Bilateral Filtering of Images 614
Bin Yan andAl-Dossaiy Saleh
Track II - Signal Processing: Array Signal Processing
Linearly Constrained Coherent Sidelobe Canceller for Ionosphere Interference
Suppression for HFSWR 618
Tian Wen-long, Li Gao-peng, andXu Rong-qing
Medical Image Enhancement Algorithm Based on Contourlet Transform 624
Aiping Jiang, Ping Ren, and Pingyuan Yang
Performance Analysis of Frequency Domain Channel Estimation
of DS-CDMA Communication System 628
Wu Xuan-li, Shen Qing-hua, and Sun Xiang-xia
Fractional Fourier-Contourlet Deblurring of Space Variant Degradation
Coupled with Noise 632
Hui Wan, Ran Tao, and Yue Wang
XV
High Precise Attitude Algorithm for SINS 636
Jie Li, Jun Liu, and Bo Wang
Infrared-Light Interference System Based on Linnik-Type Interferometric
Microscope for Three-Dimension Profile Measurement 640
Xiujian Chcni, Kangkang Niu, Yi Liu, Chenyang Xne, and IVendong Zhang
Methodology for Attitudes Precisely Testing of Rolling Projectiles 644
Jim Liu, Jie Li, Wei Yang, andXiaa-min Duan
Research and Implementation of Watershed Segmentation Algorithm Based
on CCD Infrared Images 648
Qiao Sun, Wei Yang, and Lina Yu
Root-MUSIC Algorithm with Real-Valued Eigendecomposition for Acoustic
Vector Sensor Array 652
Peng Wang, Guo-jun Zhang, Ji-jun Xiong, Chen-rangXue, and Wen-dong Zhang
xvi