2010 8th World Congress on Intelligent Control and Automation最新文献

筛选
英文 中文
Research on the automatic visual inspection model based on extenics 基于可拓学的自动视觉检测模型研究
2010 8th World Congress on Intelligent Control and Automation Pub Date : 2010-08-23 DOI: 10.1109/WCICA.2010.5554614
Fenghua Ding, Maocong Lin, De Wu, D. Li
{"title":"Research on the automatic visual inspection model based on extenics","authors":"Fenghua Ding, Maocong Lin, De Wu, D. Li","doi":"10.1109/WCICA.2010.5554614","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554614","url":null,"abstract":"This paper puts forward five-layer extension AVI model (EAVI) by combining the extension knowledge and automatic visual inspection(AVI)area knowledge. Then gives the detailed analysis process of the image acquisition layer and pre-processing layer according to the four extension thinking modes, and designs the AVI model evaluating methods. Describing and analyzing the AVI process using the methods provided by Extenics will be helpful to the research on the intelligence, generality, and the reconfigurablity of the AVI system.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134576535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A particle filtering method for odor-source localization in Wireless Sensor Network with mobile robot 移动机器人无线传感器网络中气味源定位的粒子滤波方法
2010 8th World Congress on Intelligent Control and Automation Pub Date : 2010-07-29 DOI: 10.1109/WCICA.2010.5554280
Yong Zhang, Li Wang
{"title":"A particle filtering method for odor-source localization in Wireless Sensor Network with mobile robot","authors":"Yong Zhang, Li Wang","doi":"10.1109/WCICA.2010.5554280","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554280","url":null,"abstract":"This paper presents a new method for odor source localization using a Wireless Sensor Network (WSN) by means of collaboration with a mobile robot. The method has two steps: an initial estimation of the position of odor-source is obtained centrally by one robot and is based on particle filtering. It does not require any prior information about the position of the nodes. In the second stage, the nodes refine their position estimates employing a decentralized information filter. The paper shows how the method is very suitable for outdoor odor-source localization with robotic systems. The paper includes several implementation aspects and experimental results.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132178279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An effective ID-based mobile business system 一个有效的基于id的移动商务系统
2010 8th World Congress on Intelligent Control and Automation Pub Date : 2010-07-07 DOI: 10.1109/WCICA.2010.5553939
Maocai Wang, Guangming Dai, Hanping Hu, Yun Wang
{"title":"An effective ID-based mobile business system","authors":"Maocai Wang, Guangming Dai, Hanping Hu, Yun Wang","doi":"10.1109/WCICA.2010.5553939","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5553939","url":null,"abstract":"With rapid development of mobile communication, mobile business is becoming one important part of our life. However, the security of mobile business is impacting its wide development. In traditional mobile business based CA, the certificate database is needed to distribute the digital certificate. And it is necessary to query certificate database for getting the public key. In order to solve these problems, an effective ID-based mobile business system is put forward in this paper. In the system, mobile business process is implemented by private key generator (PKG), while traditional mobile business by CA. In the process of verifying signature, the public key of mobile users can be directly computed by their identity without binding their public key and their identity to establish their relations. Moreover, mobile users don't need to access certificate authority, which simplifies the management and distribution of public key, avoids to building certificate database and decreases the cost and the corresponding security risk. Therefore, the ID-based mobile business system is widely used in modern E-Commerce.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and simulation of steam turbine based on multi-modules high temperature gas-cooled reactor 基于多模块高温气冷堆的汽轮机建模与仿真
2010 8th World Congress on Intelligent Control and Automation Pub Date : 2010-07-07 DOI: 10.1109/WCICA.2010.5554459
Z.-X. Chen, Y.-W. Li, Yuan-Chyau Chang, C.-W. Li
{"title":"Modeling and simulation of steam turbine based on multi-modules high temperature gas-cooled reactor","authors":"Z.-X. Chen, Y.-W. Li, Yuan-Chyau Chang, C.-W. Li","doi":"10.1109/WCICA.2010.5554459","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554459","url":null,"abstract":"The model of steam turbine based on multi-modules high temperature gas-cooled reactor is proposed. A series of procedure is adopted to reduce the model error. Simulation analysis on the presented model is conducted to verify the precision and suitability, and the influence of different regulation methods on the output power is studied.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115289551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Aircraft longitudinal Critical State Limiter based on Adaptive Neural Fuzzy Inference System 基于自适应神经模糊推理系统的飞机纵向临界状态限制器
2010 8th World Congress on Intelligent Control and Automation Pub Date : 2010-07-07 DOI: 10.1109/WCICA.2010.5554387
D. Wenhan, Sun Xiuxia, Yang Pengsong
{"title":"Aircraft longitudinal Critical State Limiter based on Adaptive Neural Fuzzy Inference System","authors":"D. Wenhan, Sun Xiuxia, Yang Pengsong","doi":"10.1109/WCICA.2010.5554387","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554387","url":null,"abstract":"Aircraft Pitching CSL (Critical State Limiter) is used to restrict the joystick's longitudinal displacement when a certain flight parameter oversteps the critical allowable value. It is a very important device to assure flying safety. In this paper, a design method of aircraft longitudinal CSL based on ANFIS (Adaptive Neural Fuzzy Inference System) is introduced. The simulation results (H=10km,Ma=0.8/1.5) show: 1. When pilot moves the joystick stably (2°/s), angle of attack α and plumb overload nz gradually grow until one of them oversteps the accepted value, and the joystick displacement is limited at last. 2. When pilot moves the joystick quickly (4°/s), the piston driver of Servo Mechanism can also tail after the movement of joystick at a rapid, and tends to become stabilization in 2–3 seconds. But after 5–7 seconds, the positive feedback appears in system, that is, the output of Servo Mechanism is limited. 3. When pilot moves the joystick fiercely (8°/s), joystick displacement will be limited ahead of time because the change of α or nz is too fast. All of these satisfy the flying safety demand.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115604616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel algorithm for naturally sampled space vector pulse width modulation 一种自然采样空间矢量脉宽调制的新算法
2010 8th World Congress on Intelligent Control and Automation Pub Date : 2010-07-07 DOI: 10.1109/WCICA.2010.5554509
Yue Yuntao, Lin Yan
{"title":"A novel algorithm for naturally sampled space vector pulse width modulation","authors":"Yue Yuntao, Lin Yan","doi":"10.1109/WCICA.2010.5554509","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554509","url":null,"abstract":"A novel algorithm for the naturally sampled SVPWM in overmodulation region is proposed in this paper, the comparison between naturally sampled SVPWM and conventional SVPWM in overmodulation region is carried out. It was proved that naturally sampled SVPWM could be used not only in under modulation but also in overmodulation region by the results of analysis and simulation. The work was done by this paper shows a promising use of the naturally sampled SVPWM. The obviously advantage is that it could be implemented by using DSP with only simplified computation and short time of on line calculation, or just by using analog circuits without the help of microprocessor at all. All the work did by this paper provide a platform for the implementation of naturally sampled SVPWM operating in under modulation and over modulation region.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"665 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115675096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An algorithm for multi-label learning based on minimum threshold 基于最小阈值的多标签学习算法
2010 8th World Congress on Intelligent Control and Automation Pub Date : 2010-07-07 DOI: 10.1109/WCICA.2010.5554938
Feng Qin, Jun Huang, Zekai Cheng
{"title":"An algorithm for multi-label learning based on minimum threshold","authors":"Feng Qin, Jun Huang, Zekai Cheng","doi":"10.1109/WCICA.2010.5554938","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554938","url":null,"abstract":"Multi-label learning is a hot spot in machine learning and data mining. The multi-label learning model can predict one or more labels for a test instance. PT5 is a effective method to solving multi-label learning problem, it is critical to set an optimal threshold in this method. More error labels will be predicted if a lower threshold was set, and the labels will be predicted not entire if a big threshold was set. In this paper, a new algorithm TFEL (Threshold for Each Label) is proposed. An optimal threshold will be set for each label by learning from the training data set. When the score for a test instance to one label is bigger then threshold which is set for the label, the label will be added to the last classifying result for the test instance. The experiments results show that the TFEL method can get a well performance on classifying multi-label data set.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124395383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blind source separation based on improved natural gradient algorithm 基于改进自然梯度算法的盲源分离
2010 8th World Congress on Intelligent Control and Automation Pub Date : 2010-07-07 DOI: 10.1109/WCICA.2010.5554217
Ji Ce, Yu Peng, Yu Yang
{"title":"Blind source separation based on improved natural gradient algorithm","authors":"Ji Ce, Yu Peng, Yu Yang","doi":"10.1109/WCICA.2010.5554217","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554217","url":null,"abstract":"The natural gradient algorithm is the most basic independent component analysis (ICA) algorithm. Because the traditional natural gradient algorithm adopts fixed-step-size, the choice of step size directly affects the convergence speed and steady-state performance. This paper proposes an improved natural gradient algorithm by using the difference between the separation matrixes to control the factor of step size. The algorithm is a good solution to the trade-offs problems of convergence speed and steady-state performance. Meanwhile, the complexity of the algorithm is lower than the algorithm of reference [2] and reference [11]. The computer simulations have proved the effectiveness of the algorithm.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123089352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of support vector machine (SVM) on serial number identification of RMB 支持向量机在人民币序列号识别中的应用
2010 8th World Congress on Intelligent Control and Automation Pub Date : 2010-07-07 DOI: 10.1109/WCICA.2010.5554382
Wenhong Li, Wenjuan Tian, Cao Xi-yan, Gao Zhen
{"title":"Application of support vector machine (SVM) on serial number identification of RMB","authors":"Wenhong Li, Wenjuan Tian, Cao Xi-yan, Gao Zhen","doi":"10.1109/WCICA.2010.5554382","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554382","url":null,"abstract":"Serial numbers identification of RMB (the name of Chinese paper currency) is a nonlinear and high dimensions pattern recognition problem which sample is limited. It is one of many difficulty problems in pattern recognition. It also has great research and practical value. This thesis studies the multi-class optimize algorithm in statistical learning theory, analyzes SMOD algorithm and its precondition of serial number recognition. It applies the support vector machine into the serial number's machine recognition of paper currency. It puts forward the theory of serial number identification which based on SVM method, establishes the identification process of identification by SVM. Then we write the number identification algorithm and carrying on simulation test. The experimental results proved that sequential minimal optimized SVM has fairly low computing load and high precision of recognition. It fully shows the advantages of SVM in solving limited samples, non-linear and high dimension pattern recognition problems. Compared to neural network and fuzzy theory algorithm, its computing load is fairly low. So it can be easily realized with embedded controller.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115734067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Design of embedded network router for video based on security consideration 基于安全考虑的嵌入式视频网络路由器设计
2010 8th World Congress on Intelligent Control and Automation Pub Date : 2010-07-07 DOI: 10.1109/WCICA.2010.5554417
Zhenxin Zhang, Jigang Tong, Zenqiang Chen
{"title":"Design of embedded network router for video based on security consideration","authors":"Zhenxin Zhang, Jigang Tong, Zenqiang Chen","doi":"10.1109/WCICA.2010.5554417","DOIUrl":"https://doi.org/10.1109/WCICA.2010.5554417","url":null,"abstract":"Full consideration of security and the characteristic of large amounts of data of video in network, the embedded router gets designed. The FPGA development system and uclinux are adopted as the platform. The Qi hyperchaotic, Logistic mapping, Baker mapping and Cat mapping algorithm is applied to video encryption and decryption. Additionally combination of on-line encryption and off-line encryption, random encryption and multiple encryption methods make the security of data stronger; create a protocol of IP fragment assembly to overcome the bug of the TCP / IP stack in uclinux and the problem of packet loss. The system has been tested to run a long time and it is proved to be stable with a high security. As a platform, the system implements the complex encryption algorithms at a very low cost of hardware: a 87MHz processor, and only 10M memory. But it still has the potential to develop more complex algorithms and applications. So the system has a broad prospect both in the area of application and research.","PeriodicalId":315420,"journal":{"name":"2010 8th World Congress on Intelligent Control and Automation","volume":"56 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116686776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信