2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)最新文献

筛选
英文 中文
Prediction of Stock Trading Signal Based on Support Vector Machine 基于支持向量机的股票交易信号预测
X. Chen, Zhi-Jie He
{"title":"Prediction of Stock Trading Signal Based on Support Vector Machine","authors":"X. Chen, Zhi-Jie He","doi":"10.1109/ICICTA.2015.165","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.165","url":null,"abstract":"The prediction of stock trading signal is studied in this paper. Considering the excellent performance of Support Vector Machine (SVM) in pattern recognition, we apply SVM to construct a prediction model to find the stock trading signal. In addition, Piecewise linear representation (PLR) is good at extracting valuable information from a time sequence. PLR is used for checking of turning points in this study. The experiments on some real stocks show that SVM obtains a better result in prediction accuracy and profitability than traditional Back Propagation neural network does.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133322556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Application of STC12C5A60S MCU in the Electric Cooker STC12C5A60S单片机在电饭煲中的应用
Yanli Su, Weiguo Han, Tianyang Huang
{"title":"The Application of STC12C5A60S MCU in the Electric Cooker","authors":"Yanli Su, Weiguo Han, Tianyang Huang","doi":"10.1109/ICICTA.2015.238","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.238","url":null,"abstract":"Based on the STC12C5A60S MCU, the electric cooker which has the feature of rice option has been developed. This paper expounds its working principle, and the hardware circuit and software of controlling system are designed.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132237148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Different Feature Combination Methods to Study Multisite Protein Sub-cellular Localization Prediction 利用不同特征组合方法研究多位点蛋白亚细胞定位预测
Qing Zhao, Dong Wang, Yuehui Chen, Xumi Qu
{"title":"Using Different Feature Combination Methods to Study Multisite Protein Sub-cellular Localization Prediction","authors":"Qing Zhao, Dong Wang, Yuehui Chen, Xumi Qu","doi":"10.1109/ICICTA.2015.272","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.272","url":null,"abstract":"Multisite protein sub-cellular localization prediction has become the hot topic relating biological information in recent years. Quite a lot of researchers have researched multisite protein sub-cellular localization for a long time. However, the accuracy still needs to be improved. As one of the researchers, I should explore new methods to improve the prediction accuracy. I choose Gpos-mPLOC data set in this paper. In addition, combining the pseudo amino acid composition, position vector and entropy density three effective feature extraction methods arbitrarily to extract protein features. Then, putting these features into multi-label k nearest neighbor classifier to predict protein sub-cellular location. The experiment proves that different feature combination methods can result in different prediction accuracy through the Jack-knife test and I can choose the best feature combination method to predict multisite protein sub-cellular location.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129439797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Dynamic Authentication Captcha Based on Negotiation Between Host and Mobile Terminal for Electronic Commerce 一种新的基于主机与移动终端协商的电子商务动态验证码
Yang Guangming, Ni Jingyu, Tan Zhenhua
{"title":"A New Dynamic Authentication Captcha Based on Negotiation Between Host and Mobile Terminal for Electronic Commerce","authors":"Yang Guangming, Ni Jingyu, Tan Zhenhua","doi":"10.1109/ICICTA.2015.21","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.21","url":null,"abstract":"In electronic commerce, the supply of peculiar commodity is not adequate to users' requirements. Many users are inclined to use malicious software to order scarce commodities instead of legal purchasing processes. To solve this problem, designers of E-commerce websites use CAPTCHA to distinguish if the purchase request is applied by human rather than software. It does not work because malicious software (malware) can identify various CAPTCHA by specific function. So websites attempt to use more complex CAPTCHA to resist malware, however, users cannot identify it either. As a result, using CAPTCHA is not a perfect method to deal with distinguishing problems. In this paper, we propose a novel dynamic authentication CAPTCHA to enhance security and overcome limitations existing in static scheme. Our system can distinguish human from software by the negotiation between host and mobile terminal. The security analysis shows that the method we proposed can resist known types of attacks efficiently.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114291983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Simulation of Well Control Operation System 井控作业系统的虚拟仿真
Jiangping Wang, Zhiqin Yang
{"title":"Virtual Simulation of Well Control Operation System","authors":"Jiangping Wang, Zhiqin Yang","doi":"10.1109/ICICTA.2015.277","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.277","url":null,"abstract":"A virtual operation system of well drilling control installation is introduced based on LabVIEW. 3D model of a blow-out preventer (BOP) is created with 3Ds Max. The animation of starting the BOP by virtual operation instrument is also designed to imitate the interaction between the well control equipment and men. The virtual simulation of well control operation system demonstrated in this paper can be used not only to train the workers, but also analysis the intricate problems in the drilling process.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134344620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selection of Highway Central Station's Location Based on Immune Genetic Algorithm 基于免疫遗传算法的高速公路中心站选址
Li Rongrong, L. Weiming, Wang Chao
{"title":"Selection of Highway Central Station's Location Based on Immune Genetic Algorithm","authors":"Li Rongrong, L. Weiming, Wang Chao","doi":"10.1109/ICICTA.2015.205","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.205","url":null,"abstract":"Highway central station centrally manages the roads and toll stations within the scope of the jurisdiction, and it's also responsible for emergency rescue work. It's a very important management department of Highway. Rational distribution and location of the central station can not only reduce the waste of resources and economic losses, but also improve the efficiency of operational management and emergency rescue of the highway. Therefore, considering the management demands of toll station and the potential traffic accident black spots, this paper builds a model about central station location, aiming at minimizing the operating costs and rescuing timely and efficiently and then applies immune genetic algorithm to solve the model. Finally a case analysis using Mat lab verifies the superiority and validity of the model.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129390955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Random Pulse Generator for Simulating Nuclear Radiation Signals 模拟核辐射信号的随机脉冲发生器
Liao Bin, T. Xianguo, Wang Honghui, Xu Shaobo, Zhang Tao
{"title":"A Random Pulse Generator for Simulating Nuclear Radiation Signals","authors":"Liao Bin, T. Xianguo, Wang Honghui, Xu Shaobo, Zhang Tao","doi":"10.1109/ICICTA.2015.27","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.27","url":null,"abstract":"According to the statistical properties of the nuclear signal pulse on the amplitude and time, a random pulse generator for simulating nuclear radiation signals is designed in this paper. The noise of the ADC acquisition circuit is used to obtain two-way seeds of random number. The obtained seeds of random number are processed by linear feedback shift register (LFSR) to generate high-speed and uniformly distributed random number continuously, then random numbers of Gaussian distribution are produced based on lookup table method and random numbers of exponential distribution are produced by setting the threshold value. Random numbers of Gaussian distribution are sent to the D/A converter to convert digital signal to analog signal, and random numbers of exponential distribution are sent to control time interval between two pulse signals. Eventually the random pulse that follows the gauss distribution on the amplitude and the exponential distribution on the time interval between two adjacent pulse signals is shaped by pulse shaped circuit. The practical test results show that the random pulse follows the gauss distribution on the amplitude and the exponential distribution on the time interval between two adjacent pulse signals, meeting statistical regularity of nuclear signal.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133376352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel Risk Assessment Algorithm for Accounting Information System Using Analytic Hierarchy Process 基于层次分析法的会计信息系统风险评估新算法
Yuan Li-sheng, Dong Ru-Ping
{"title":"A Novel Risk Assessment Algorithm for Accounting Information System Using Analytic Hierarchy Process","authors":"Yuan Li-sheng, Dong Ru-Ping","doi":"10.1109/ICICTA.2015.24","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.24","url":null,"abstract":"In this paper, we propose a novel risk assessment algorithm for accounting information system using analytic hierarchy process. In order to assess the risk of accounting information system, we design an index system with two layers. In the first layer, there are four risk categories, which are technical risk, operational risk, Management risk and Emergency risk. Furthermore, each risk category consists of some second layer risks. The main innovations of this paper are to introduce the analytic hierarchy process to solve the accounting information system risk assessment problem. In particular, AHP is able to compute a priority of the importance of each alternative, that is, an overall object is located on the top level, and then the criteria in the middle level denotes the overall object. Finally, experimental results testify the effectiveness of our algorithm.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132581531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and Implementation for Early Warning System of Airfield Security Defense 机场安全防范预警系统的设计与实现
Fu Xinhua, Yang Yongjia
{"title":"Design and Implementation for Early Warning System of Airfield Security Defense","authors":"Fu Xinhua, Yang Yongjia","doi":"10.1109/ICICTA.2015.98","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.98","url":null,"abstract":"Aiming at the problem of airfield security guard, an early warning system of airfield security defense is designed. The system is a computer controlled platform which is visualization and interactive mode based on wireless sensor network. Also, it has some functions that are interactive operation in the 3D, inspection and deployment, monitoring target of invasion, video monitor in real time and linkage alerting, which improves the level of airfield security governance.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116242290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identification of Critical Branch in Weakness Section Based on Disturbed Tie-Line Electrical Characteristic 基于扰动联络线电气特性的软弱段临界支路识别
Miao Tian, Zheng Chao, Zhou Zongchuan, Dong Xiaojing, Ren Da-jiang, Liu Guanqi, Song Yun-ting
{"title":"Identification of Critical Branch in Weakness Section Based on Disturbed Tie-Line Electrical Characteristic","authors":"Miao Tian, Zheng Chao, Zhou Zongchuan, Dong Xiaojing, Ren Da-jiang, Liu Guanqi, Song Yun-ting","doi":"10.1109/ICICTA.2015.120","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.120","url":null,"abstract":"Fast automatic recognition helps to find out vulnerable branch in weakness section. Taking timely control strategies after recognition is good for maintaining power system stability. At first, sending and receiving system is used to prove the phenomenon that two peaks appear in active power trajectory when it is disturbed to stability margin. Secondly, fast identification method is put forward to find out critical branch. In order to facilitate its online usage, judge formula and flow chart is given to help to make the decision. Finally, computing example of New England system is used to prove theory above and to verify control effect.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121928250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信