{"title":"Research on the Variation of the Computer Virus Based on Random Function","authors":"Huifen Xie, Zhi-gang Zhang, Rui Wu, Feng Nie","doi":"10.1109/CASE.2009.159","DOIUrl":"https://doi.org/10.1109/CASE.2009.159","url":null,"abstract":"Studying the variation principle of the computer virus can deeply understand and grasp the variation laws and trends of the computer virus; offer the theoretical foundation for technical research of the anti-virus. In the foundation of summarizing the principle and the development of the virus technology, we introduced the idea of joining the random function in the trigger module of computer virus, in order to realize the computer virus variation similar to the biological virus and achieve a certain degree of the evolution. Then the method of realizing random function which utilizes Windows time function and Logistic Map is presented. This research provides theoretical basis for the anti-virus technique study, prevents virus from spreading effectively and ensures the security of online information.","PeriodicalId":294566,"journal":{"name":"2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114543087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Networked Control Systems with Nonlinear Control and Novel Smith Predictor","authors":"F. Du, W. Du","doi":"10.1109/CASE.2009.160","DOIUrl":"https://doi.org/10.1109/CASE.2009.160","url":null,"abstract":"This paper aims to the random and uncertain network delays, as well as controlled plant might be time-variant or nonlinear, a novel approach is proposed that novel Smith predictor combined with nonlinear control for wireless networked control systems (WNCS). This novel Smith predictor comes true to hide predictor models of the network delays into real network data transmission processes, therefore network delays don’t need to be measured, identified or estimated on-line. Based on IEEE 802.15.4 (ZigBee), the results of simulation show validity of this control scheme, and indicate that system has better dynamic performance and anti-jamming ability.","PeriodicalId":294566,"journal":{"name":"2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116387038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Weighted Feature Abstracting Algorithm","authors":"Fanrong Meng, Mu Zhu","doi":"10.1109/CASE.2009.92","DOIUrl":"https://doi.org/10.1109/CASE.2009.92","url":null,"abstract":"In non-supervised data set, the importance of each feature is different. If the feature is setted with a proper weight, which can fully considers the lever of the influence on the cluster effect, then the clustering result will be improved. A feature evaluate function is proposed to obtain a set of feature weight vectors by minimizing the function, which is a multi-objective problem. So a fast and elitist multi-objective genetic algorithm is used to solve the problem and obtain the weight of feature. Finally, the weight of feature is introduced into the standard K-Means algorithm and the experiments on the UCI dataset show the validity of the algorithm.","PeriodicalId":294566,"journal":{"name":"2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133970607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Kernel LSSVM in Empirical Kernel Mapping Space","authors":"Bo Yang, Yingyong Bu","doi":"10.1109/CASE.2009.106","DOIUrl":"https://doi.org/10.1109/CASE.2009.106","url":null,"abstract":"Multiple kernel methods are superior to single kernel methods on treating multiple, heterogeneous data sources. Different from the existing multiple kernel methods which mainly work in implicit kernel space, we propose a novel multiple kernel method in empirical kernel mapping space. In empirical kernel mapping space, the combination of kernels can be treated as the weighted fusion of empirical kernel mapping samples. Based this fact, we developed a multiple kernel least squares support vector machine(LSSVM) to realize multiple kernel classification in empirical kernel mapping space. The experiments here illustrate that the proposed multiple LSSVM method is feasible and effective.","PeriodicalId":294566,"journal":{"name":"2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129319595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Container Terminal Scheduling System Based on Multi-agent","authors":"Zhao Hui, Sun Junqing","doi":"10.1109/CASE.2009.16","DOIUrl":"https://doi.org/10.1109/CASE.2009.16","url":null,"abstract":"In the near future, most container terminals will no longer be able to expand its surrounding land and will thus be unable to meet the storage requirements due to the boom in world trade. A solution is to improve utilization of the available resources. This paper presents a multi-agent theory based system for resource allocation and operation scheduling problems in container terminal to improve the productivity. The system defines distinct agent for ship, berth, quay cranes, yard crane, container truck and other factors. Solutions were determined with the intelligent character of agent and through the interaction among agents. Subsequently a partial implemented prototype of this system is given. Finally, a running instance in container terminal was simulated whose result excels the previous data to validate the feasibility of the methodology.","PeriodicalId":294566,"journal":{"name":"2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116781917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Design Based on Closed-Loop Reverse Logistics Recycling","authors":"Meng Xiangru, Song Wei","doi":"10.1109/CASE.2009.11","DOIUrl":"https://doi.org/10.1109/CASE.2009.11","url":null,"abstract":"With the people's attention to the product quality and the environmental protection consciousness enhancement, the reverse logistics start to cause continuously attention of people. More and more scholars research the origin, the concept, the classification of the reverse logistics. At present there are some researches of the reverse logistics, however, these researches are restricted only in the theory, and are few to the practical application research. In the process of the engineering to the implementation of enterprise reverse logistics, we must grasp its essence, carry on the analysis and the design based on this foundation, so it can guarantee the reverse logistics system running highly effectively and accurately. This paper presents solutions to closed-loop network designing based on the traditional designing for logistics facility location and capacity allocation model and combined with characteristics of reverse logistics. An optimization model is replied on linear programming and the objective is to minimize the sum of investment and operation costs of logistics facilities as well as transportation and environment protection costs of returned products among the facilities. To explain the method for the network of facility location and capacity allocation by the model, an example is presented.","PeriodicalId":294566,"journal":{"name":"2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122047006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework of Web-GIS for PCCP Risk Management System","authors":"Chunting Yang, Y. Liu, Jing Yu","doi":"10.1109/CASE.2009.77","DOIUrl":"https://doi.org/10.1109/CASE.2009.77","url":null,"abstract":"PCCP is usually used throughout many water and wastewater utilities as critical mains with high flow rates, sudden failures can have significant negative consequences. The world has experienced a number of failures of Prestressing Concrete Cylinder Pipe (PCCP) lines and as a result during the past ten years, much attention has been focused on reliably assessing the condition of PCCP mains. In this paper the framework of Web-GIS for PCCP risk management with wireless sensor network is proposed. Acoustic monitoring and comprehensive dynamic risk management modeling are important subsystem. It provides an assessment of remaining time to failure for each pipe segment. This strategy can provide the opportunity to identify problematic pipe sections and repair the pipe prior to failure, and also can assess the presence and extent of deterioration in these large-diameter water and wastewater pipelines.","PeriodicalId":294566,"journal":{"name":"2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125799636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nonlinear Control Strategies of Three-Phase Boost-Type PWM Rectifiers","authors":"Jiuhe Wang, Peirong Xia, Jinlong Zhang","doi":"10.1109/CASE.2009.102","DOIUrl":"https://doi.org/10.1109/CASE.2009.102","url":null,"abstract":"In order to improve the properties of three-phase boost-type PWM rectifiers, scholars in different countries have began to apply nonlinear control theory to study PWM rectifiers. For this purpose, this paper introduces the nonlinear control strategies of three-phase boost-type PWM rectifiers, which includes feedback linearization, passivity control based on Euler-Lagrange( EL) model, active disturbance rejection control (ADRC) strategy. Meanwhile this paper reviews nonlinear control strategies above and points to further research.","PeriodicalId":294566,"journal":{"name":"2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125825081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Structure Security Evaluation and Fault Diagnosis of Gate Crane Jib","authors":"Siqun Ma, Xiaopeng Wu, Yanbin Sun, Shaoze Zhou","doi":"10.1109/CASE.2009.166","DOIUrl":"https://doi.org/10.1109/CASE.2009.166","url":null,"abstract":"The service of gate crane is the age limit, and there are many problems, such as the fallen rivets and the thinner steel plates due to corrosion. The author makes three dimensional modeling and performs the finite element computation of jib system with the I-DEAS software in this paper, and then carries out failure and effects analyses and fault tree analyses based on the computations. Simulation results shown the stress computation values of jib system at certain observation points have surpassed allowable stress of structural strength. But they are smaller than the metal structure material strength limit. The RPN value and fault tree smallest cutest of the jib system got by the reliability can provide the important reference for the enterprise users in the use and maintenance of gate cranes in future.The research work indicates that the user should make the inspection regularly for jib systems and take measures to make reasonable repair in order to avoid grave accidents.","PeriodicalId":294566,"journal":{"name":"2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126176579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of CAN Network for VMS Based on XC164CS","authors":"Jinsong Kang, Ying Wu","doi":"10.1109/CASE.2009.137","DOIUrl":"https://doi.org/10.1109/CASE.2009.137","url":null,"abstract":"In the design of modern vehicles, CAN-bus network has been applied for the information exchange among the ECUs of the vehicle. The CAN communication network for vehicle management system (VMS) is designed based on XC164CS microcontroller in the paper. The characteristics and construction of Twin CAN module of XC164CS were introduced. The principle of time triggered controller area network (TTCAN) is described. The hardware interface circuit is developed to increase the stability and safety of the CAN nodes. The drive software and multitask application is realized on the platform of embedded operation system μC/OS-II. This CAN bus network can improve the anti-jamming and dependability effectively, which was applied to control and exchange the information of the vehicles.","PeriodicalId":294566,"journal":{"name":"2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124173685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}