{"title":"Research on the automatic visual inspection model based on extenics","authors":"Fenghua Ding, Maocong Lin, De Wu, D. Li","doi":"10.1109/WCICA.2010.5554614","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554614","url":null,"abstract":"This paper puts forward five-layer extension AVI model (EAVI) by combining the extension knowledge and automatic visual inspection(AVI)area knowledge. Then gives the detailed analysis process of the image acquisition layer and pre-processing layer according to the four extension thinking modes, and designs the AVI model evaluating methods. Describing and analyzing the AVI process using the methods provided by Extenics will be helpful to the research on the intelligence, generality, and the reconfigurablity of the AVI system.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134576535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A particle filtering method for odor-source localization in Wireless Sensor Network with mobile robot","authors":"Yong Zhang, Li Wang","doi":"10.1109/WCICA.2010.5554280","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554280","url":null,"abstract":"This paper presents a new method for odor source localization using a Wireless Sensor Network (WSN) by means of collaboration with a mobile robot. The method has two steps: an initial estimation of the position of odor-source is obtained centrally by one robot and is based on particle filtering. It does not require any prior information about the position of the nodes. In the second stage, the nodes refine their position estimates employing a decentralized information filter. The paper shows how the method is very suitable for outdoor odor-source localization with robotic systems. The paper includes several implementation aspects and experimental results.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132178279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective ID-based mobile business system","authors":"Maocai Wang, Guangming Dai, Hanping Hu, Yun Wang","doi":"10.1109/WCICA.2010.5553939","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5553939","url":null,"abstract":"With rapid development of mobile communication, mobile business is becoming one important part of our life. However, the security of mobile business is impacting its wide development. In traditional mobile business based CA, the certificate database is needed to distribute the digital certificate. And it is necessary to query certificate database for getting the public key. In order to solve these problems, an effective ID-based mobile business system is put forward in this paper. In the system, mobile business process is implemented by private key generator (PKG), while traditional mobile business by CA. In the process of verifying signature, the public key of mobile users can be directly computed by their identity without binding their public key and their identity to establish their relations. Moreover, mobile users don't need to access certificate authority, which simplifies the management and distribution of public key, avoids to building certificate database and decreases the cost and the corresponding security risk. Therefore, the ID-based mobile business system is widely used in modern E-Commerce.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and simulation of steam turbine based on multi-modules high temperature gas-cooled reactor","authors":"Z.-X. Chen, Y.-W. Li, Yuan-Chyau Chang, C.-W. Li","doi":"10.1109/WCICA.2010.5554459","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554459","url":null,"abstract":"The model of steam turbine based on multi-modules high temperature gas-cooled reactor is proposed. A series of procedure is adopted to reduce the model error. Simulation analysis on the presented model is conducted to verify the precision and suitability, and the influence of different regulation methods on the output power is studied.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115289551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aircraft longitudinal Critical State Limiter based on Adaptive Neural Fuzzy Inference System","authors":"D. Wenhan, Sun Xiuxia, Yang Pengsong","doi":"10.1109/WCICA.2010.5554387","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554387","url":null,"abstract":"Aircraft Pitching CSL (Critical State Limiter) is used to restrict the joystick's longitudinal displacement when a certain flight parameter oversteps the critical allowable value. It is a very important device to assure flying safety. In this paper, a design method of aircraft longitudinal CSL based on ANFIS (Adaptive Neural Fuzzy Inference System) is introduced. The simulation results (H=10km,Ma=0.8/1.5) show: 1. When pilot moves the joystick stably (2°/s), angle of attack α and plumb overload nz gradually grow until one of them oversteps the accepted value, and the joystick displacement is limited at last. 2. When pilot moves the joystick quickly (4°/s), the piston driver of Servo Mechanism can also tail after the movement of joystick at a rapid, and tends to become stabilization in 2–3 seconds. But after 5–7 seconds, the positive feedback appears in system, that is, the output of Servo Mechanism is limited. 3. When pilot moves the joystick fiercely (8°/s), joystick displacement will be limited ahead of time because the change of α or nz is too fast. All of these satisfy the flying safety demand.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115604616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel algorithm for naturally sampled space vector pulse width modulation","authors":"Yue Yuntao, Lin Yan","doi":"10.1109/WCICA.2010.5554509","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554509","url":null,"abstract":"A novel algorithm for the naturally sampled SVPWM in overmodulation region is proposed in this paper, the comparison between naturally sampled SVPWM and conventional SVPWM in overmodulation region is carried out. It was proved that naturally sampled SVPWM could be used not only in under modulation but also in overmodulation region by the results of analysis and simulation. The work was done by this paper shows a promising use of the naturally sampled SVPWM. The obviously advantage is that it could be implemented by using DSP with only simplified computation and short time of on line calculation, or just by using analog circuits without the help of microprocessor at all. All the work did by this paper provide a platform for the implementation of naturally sampled SVPWM operating in under modulation and over modulation region.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"665 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115675096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An algorithm for multi-label learning based on minimum threshold","authors":"Feng Qin, Jun Huang, Zekai Cheng","doi":"10.1109/WCICA.2010.5554938","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554938","url":null,"abstract":"Multi-label learning is a hot spot in machine learning and data mining. The multi-label learning model can predict one or more labels for a test instance. PT5 is a effective method to solving multi-label learning problem, it is critical to set an optimal threshold in this method. More error labels will be predicted if a lower threshold was set, and the labels will be predicted not entire if a big threshold was set. In this paper, a new algorithm TFEL (Threshold for Each Label) is proposed. An optimal threshold will be set for each label by learning from the training data set. When the score for a test instance to one label is bigger then threshold which is set for the label, the label will be added to the last classifying result for the test instance. The experiments results show that the TFEL method can get a well performance on classifying multi-label data set.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124395383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blind source separation based on improved natural gradient algorithm","authors":"Ji Ce, Yu Peng, Yu Yang","doi":"10.1109/WCICA.2010.5554217","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554217","url":null,"abstract":"The natural gradient algorithm is the most basic independent component analysis (ICA) algorithm. Because the traditional natural gradient algorithm adopts fixed-step-size, the choice of step size directly affects the convergence speed and steady-state performance. This paper proposes an improved natural gradient algorithm by using the difference between the separation matrixes to control the factor of step size. The algorithm is a good solution to the trade-offs problems of convergence speed and steady-state performance. Meanwhile, the complexity of the algorithm is lower than the algorithm of reference [2] and reference [11]. The computer simulations have proved the effectiveness of the algorithm.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123089352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of support vector machine (SVM) on serial number identification of RMB","authors":"Wenhong Li, Wenjuan Tian, Cao Xi-yan, Gao Zhen","doi":"10.1109/WCICA.2010.5554382","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554382","url":null,"abstract":"Serial numbers identification of RMB (the name of Chinese paper currency) is a nonlinear and high dimensions pattern recognition problem which sample is limited. It is one of many difficulty problems in pattern recognition. It also has great research and practical value. This thesis studies the multi-class optimize algorithm in statistical learning theory, analyzes SMOD algorithm and its precondition of serial number recognition. It applies the support vector machine into the serial number's machine recognition of paper currency. It puts forward the theory of serial number identification which based on SVM method, establishes the identification process of identification by SVM. Then we write the number identification algorithm and carrying on simulation test. The experimental results proved that sequential minimal optimized SVM has fairly low computing load and high precision of recognition. It fully shows the advantages of SVM in solving limited samples, non-linear and high dimension pattern recognition problems. Compared to neural network and fuzzy theory algorithm, its computing load is fairly low. So it can be easily realized with embedded controller.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115734067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of embedded network router for video based on security consideration","authors":"Zhenxin Zhang, Jigang Tong, Zenqiang Chen","doi":"10.1109/WCICA.2010.5554417","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554417","url":null,"abstract":"Full consideration of security and the characteristic of large amounts of data of video in network, the embedded router gets designed. The FPGA development system and uclinux are adopted as the platform. The Qi hyperchaotic, Logistic mapping, Baker mapping and Cat mapping algorithm is applied to video encryption and decryption. Additionally combination of on-line encryption and off-line encryption, random encryption and multiple encryption methods make the security of data stronger; create a protocol of IP fragment assembly to overcome the bug of the TCP / IP stack in uclinux and the problem of packet loss. The system has been tested to run a long time and it is proved to be stable with a high security. As a platform, the system implements the complex encryption algorithms at a very low cost of hardware: a 87MHz processor, and only 10M memory. But it still has the potential to develop more complex algorithms and applications. So the system has a broad prospect both in the area of application and research.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"56 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116686776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}