{"title":"Design and Realization of Web-Based E-Mail Subscription and Distribution System","authors":"Xiaoqun Liao, Mei Zhang","doi":"10.1109/IHMSC.2013.10","DOIUrl":"https://doi.org/10.1109/IHMSC.2013.10","url":null,"abstract":"Based on the analysis on actual needs and features of the email direct marketing, the paper gives an implementation scheme of Web Based e-mail subscription and distribution system. This scheme uses MVC design pattern and iBatis architecture, makes use of mature Extjs framework and J2EE framework to integrate Ajax application. Many key technical aspects are expounded including system architecture design, dispatch module, etc., a set of secure, stable and scalable network application system is constructed. And it also improves the system friendly interface in the functions of the system and the efficiency of development at the same time.","PeriodicalId":222375,"journal":{"name":"2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics","volume":"371 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124153802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Role-Based Access Control Scheme in USB Cryptographic Card","authors":"Houtao Ji, Xiaoqian Guan, Yuan-bin Wang","doi":"10.1109/IHMSC.2013.12","DOIUrl":"https://doi.org/10.1109/IHMSC.2013.12","url":null,"abstract":"Role-Based Access Control (RBAC) is a kind of access control mechanism which is convenient and secure. To protect the resources of USB cryptographic card, a RBAC method is purposed and implemented in this paper, which meets the need of access control, least privilege, small computation and managed easily. Analyses the need of the USB cryptographic card, compares several main access control models, introduces the characteristic and application advantages of RBAC, finally demonstrates in detail how to apply RBAC in USB cryptographic card.","PeriodicalId":222375,"journal":{"name":"2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics","volume":"342 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124314167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey over Switching Filters for Salt & Pepper Noise Removal","authors":"Weixia Liu, Zuoyong Li, Zuchang Zhang","doi":"10.1109/IHMSC.2013.81","DOIUrl":"https://doi.org/10.1109/IHMSC.2013.81","url":null,"abstract":"Switching filters for image salt & pepper noise removal have received considerable interests in recent years. Many switching median or mean filters have been developed. In this paper, a survey and comparative analysis are conducted among several newly developed switching filters. Their noise detection schemes are first analyzed and quantitatively assessed via two widely used measures, i.e., miss detection (MD) and false alarm (FA). Subsequently, several noise restoration ways are compared according to peak signal-to-noise ratio (PSNR).","PeriodicalId":222375,"journal":{"name":"2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114988657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empirical Study on Financial Risk Identification of Chinese Listed Companies Based on ART-2 and SOFM Neural Network Model","authors":"Guangrong Li","doi":"10.1109/IHMSC.2013.287","DOIUrl":"https://doi.org/10.1109/IHMSC.2013.287","url":null,"abstract":"This paper aims at comparing Adaptive Resonance Theory (\"ART\" for short) and Self-organizing Feature Map (\"SOFM\" for short) of neural network on the study of Chinese listed company's financial risk identification. The empirical results show that the ART-2 neural network model has better recognition effect than Logistic statistical model, BP and PNN network algorithm, while the SOFM network algorithm is better than ART-2.","PeriodicalId":222375,"journal":{"name":"2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114998471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Backstepping Based Nonlinear Adaptive Control of Magnetic Levitation System with Unknown Disturbances","authors":"Baobin Liu, Wei Zhou","doi":"10.1109/IHMSC.2013.9","DOIUrl":"https://doi.org/10.1109/IHMSC.2013.9","url":null,"abstract":"The magnetic ball levitation is a nonlinear system with disturbances. This paper proposes a back stepping Based adaptive controller with strong robustness for the magnetic system. In the design process, we present a parameter-strict-feedback model with complex disturbances and then reversely calculate control variable according to Lyapunov's second method. Barbalat lemma proves global asymptotical stability of the system. Simulation examples are given to illustrate the effectiveness of the control scheme.","PeriodicalId":222375,"journal":{"name":"2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116193508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Zhang, Lei Zhang, Xia Sun, Shanshan Wang, Liang Li
{"title":"Multi-level Label Propagation Algorithm Based on Data Reconstruction","authors":"M. Zhang, Lei Zhang, Xia Sun, Shanshan Wang, Liang Li","doi":"10.1109/IHMSC.2013.109","DOIUrl":"https://doi.org/10.1109/IHMSC.2013.109","url":null,"abstract":"Due to standard label propagation algorithm does not use the correct posterior probability of each iteration, and the propagation information of labeled data and unlabeled data are not distinguished during the label propagation process, this paper proposes a multi-level label propagation algorithm Based on data reconstruction. It adds the data which is correctly labeled for each iteration into the labeled data by the nearest neighbor rule Based data editing technique named Depuration, reconstructs the labeled data set, classifies the transition probability matrixes of both labeled and unlabeled data according to their importance. Experimental results show that the proposed algorithm is effective on the performance and convergence rate.","PeriodicalId":222375,"journal":{"name":"2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116377009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sparse Non-negative Matrix Factorization Based on Spatial Pyramid Matching for Face Recognition","authors":"Xianzhong Long, Hongtao Lu, Yong Peng","doi":"10.1109/IHMSC.2013.27","DOIUrl":"https://doi.org/10.1109/IHMSC.2013.27","url":null,"abstract":"The non-negative matrix factorization (NMF) is a part-Based image representation method which allows only additive combinations of non-negative basis components. NMF has been widely used as a dimensionality reduction technique to solve problems in computer vision and pattern recognition fields. The sparse representation and spatial information of image are also important, however, existing NMF methods do not take these two aspects into consideration simultaneously. In this paper, we propose a novel NMF method with spatial information for face recognition, which is called sparse non-negative matrix factorization Based on spatial pyramid matching (SNMFSPM). Experimental results on several benchmark databases show that the proposed scheme outperforms some classical methods.","PeriodicalId":222375,"journal":{"name":"2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Three-Phase Inverter SVPWM Modulation Based on FPGA","authors":"Chun-Yan Wang, T. Tian, Yuanqian Ye","doi":"10.1109/IHMSC.2013.201","DOIUrl":"https://doi.org/10.1109/IHMSC.2013.201","url":null,"abstract":"With the rapid development of power electronic technology, Many electrical equipment needs to convert DC supplied by the battery or generator into AC which the amplitude and frequency parameters meet the respective requirements. The inverter can flexibly adjust the size and frequency of the output voltage, current, driven by the different types of loads, to meet the demand for high-quality, high-reliability power of civil, industrial and military industries In this paper, Based on the Lab VIEW FPGA modules for the simulation platform, using SVPWM modulation method for three-phase inverter simulation study. The simulation results show that: three-phase AC voltage of the inverter power supply waveform is stable, less harmonic, the system has good dynamic performance and steady-state performance, the size of the output voltage, frequency and switch frequency of the system are adjustable, So can be applied to different occasions.","PeriodicalId":222375,"journal":{"name":"2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116834407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trajectory Planning for Multi-robot Formation by One Hybrid Particle Swarm Optimization Algorithm","authors":"Jingwen Wang, X. Ren, Jun Liu","doi":"10.1109/IHMSC.2013.88","DOIUrl":"https://doi.org/10.1109/IHMSC.2013.88","url":null,"abstract":"A hybrid particle swarm optimization (PSO) algorithm which consists of continuous and discrete PSO algorithm is introduced to solve the trajectory planning problem of multi-robot formation. The continuous PSO algorithm is utilized to optimize the center position and rotation angle of the desired formation, while the discrete PSO algorithm is to optimize the matching relationship between the initial and target positions. To demonstrate the correctness and validity of the proposed algorithm, simulation results of the trajectory planning for typical formation and another transformed formation are presented.","PeriodicalId":222375,"journal":{"name":"2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124504741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability Model of Distribution Network with Distributed Generation","authors":"Ninghui Guo, Lijun Qin","doi":"10.1109/IHMSC.2013.155","DOIUrl":"https://doi.org/10.1109/IHMSC.2013.155","url":null,"abstract":"Islanding operation may occur under circumstance of connection of distributed generation (DG) into power grid. Therefore, the paper proposes principle and strategy for island partition and builds multi-objective mathematical model which takes maximum loading capacity in the island and minimum switch motion as target function. In accordance to characters of the model. The paper presents two-step method for solution, which is characterized by simplicity, convenience in use effective solution and acceptable for practical engineering. Correctness and effectiveness of the solution method and the model are testified by analysis and calculation on a practical system.","PeriodicalId":222375,"journal":{"name":"2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125742530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}