Yadong Meng, Chang-chun Li, Hao Yan, Xiao-dong Liu
{"title":"Design of Electro-Hydraulic Servo Force Feedback System Based on the GPC with Simplified Model","authors":"Yadong Meng, Chang-chun Li, Hao Yan, Xiao-dong Liu","doi":"10.1109/ICACTE.2008.108","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.108","url":null,"abstract":"An electro-hydraulic servo force feedback system is disturbed by a band-limited white noise, it adopted the conventional PID control algorithm. Simulated its dynamic characteristics. Constructed the system simplified model, Designed the GPC Controller and summarized its design procedure. The simulation based on the GPC with simplified model has been done. Compared the two simulation results, The GPC controller is more suitable when the system is disturbed by serious noise interference, It had been validated in project. This research have proved that design the electro-hydraulic system and choose the control algorithm can be proceed simultaneously, The efficiency and accuracy of the electro-hydraulic servo system design can be improved.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129223028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Benefiting from Data Mining Techniques in a Hybrid Peer-to-Peer Network","authors":"M. Ebrahimi, M. Bazyar, M. Tahmasbi, R. Boostani","doi":"10.1109/ICACTE.2008.173","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.173","url":null,"abstract":"The fast growing role of peer-to-peer networks in various distributed services and technologies as a well distributed, highly scalable and fault tolerant networking infrastructure together with large number of users inherent to these special networks has introduced P2P systems as a potential domain for data mining processes. Nevertheless, the distributed nature of P2P networks is in explicit contradiction with centralized characteristics of classical data analysis algorithms. Although there has recently been studies on Distributed Data Mining (DDM) as a possible solution, proposed DDM algorithms cover a small portion of the problem space and lack a theoretical proof of convergence. By considering the available potentials in well-known hybrid P2P architectures, we proposed a layered data-gathering and computing infrastructure on top of the hierarchical hybrid P2P networks. These layers provide optional computing and administrational capabilities for the entire network, without interrupting the underlying networkpsilas functionalities.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"27 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128658622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Virtual History Reappearance System Oriented Education","authors":"Haiyan Wu, Xun Wang","doi":"10.1109/ICACTE.2008.46","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.46","url":null,"abstract":"A virtual history reappearance system oriented education is constructed in this paper. First we discussed the integration model of virtual reality technology and history education.Then we researched the visibility clipping and management techniques in dynamic large-scale virtual scene, texture mapping method on complex objects and extended script techniques. Finally, the architecture of virtual history reappearance system oriented education was constructed. On this basis, we presented a virtual history reappearance prototype system. the boring knowledge of history to be shown by fascinating interactive scenes in the system, it provides an aided way for history education, people can experience history by historical role-play and gain experience and lessons form historical events.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117050715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of E-Government Security System Based on Information Security Model","authors":"X.F. Zhang","doi":"10.1109/ICACTE.2008.192","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.192","url":null,"abstract":"Government departments play an important role in the country's economic development and building, along with the continuous deepening of network application, some important contents such as the government services have gradually started on the Internet. Based on information security model, we designed and implemented a security system of e-government information. And introduced the various components of the system and detailed described the overall design and concrete realization of these components.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117337587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Communication Analysis and Algorithm for the Efficiency of Data Distribution in High Performance Computing","authors":"Jinchuan Ke, M. Jiang","doi":"10.1109/ICACTE.2008.157","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.157","url":null,"abstract":"To alleviate the data transfer communication cost among the processor elements, many of the hardware interconnects enable data transfer to be performed at the same time as computation. The assignment of tasks to processors problem is well known to be NP-complete except in a few special cases. To improve the overall performance of high performance computing (HPC), this paper develops a scheme of HPC code generator and presents a data partitioning algorithm for the efficiency of data distribution. The algorithm generates a efficient data partitions, from which the optimized assignments can be selected for reducing the processor element communications, and the complexity is greatly reduced from exponential to polynomial. The algorithm is tested and integrated in HPC tools running on CRAY-T3E, YMP, IBM Regatta, and SGI workstation.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"19 S6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114100446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shenglin Gui, Liang Ma, Lei Luo, Limeng Yin, Yun Li
{"title":"UCaG: An Automatic C Code Generator for AADL Based upon DeltaOS","authors":"Shenglin Gui, Liang Ma, Lei Luo, Limeng Yin, Yun Li","doi":"10.1109/ICACTE.2008.68","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.68","url":null,"abstract":"Architecture analysis and design language (AADL), which is a modeling language standard brought forward by the Society of Automotive Engineers and Avionics Systems Division, is becoming a hot research topic for many organizations and institutes in the world. Though there are some tools could generate C code or Java code from a subset of AADL models as application program directly, it could not be applied in complex application without real-time embedded operating system. Based upon the hard-time operating system Delta OS, which is designed and developed by Coretek Systems Inc., this paper presents the mapping rules between the AADL elements and the elements in C language, designs an automatic C code generator and integrates it into OSATE which is an open-source tool developed by SEI, Carnegie Mellon University, and then, we use a case developed by Lambda tool that is the development and simulation environment for Delta OS to show the correctness of UCaG. Finally, we give the related work and future research directions.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126946146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reconfigurable Instruction Set Processor Design Using Software Based Configuration","authors":"M. Iqbal, U. S. Awan","doi":"10.1109/ICACTE.2008.74","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.74","url":null,"abstract":"Due to the potential enhancements in the execution of software based applications shown by Reconfigurable Instruction Set Processors (RISPs), reconfigurable computing has become a subject of great deal of research in the field of computer sciences. Its key feature is the ability to perform the computations in hardware to increase the performance on one hand while retaining much of the flexibility of the software on the other hand. The VLSI development is continuously improving and new ways must be obtained to become able to fully take the advantages of the emerging technology. Reconfigurable hardware might be the next step which will give computer performance a big leap forward. The idea is to use the now a daypsilas high performance FPGA technology to adapt the hardware to the problem. This research paper presents an alternative design of a RISP which supports multiple threads running concurrently, all with instant hardware support. Core of Xilinx FPGAs like Virtex series has been used to adapt the possibilities of loading partial hardware configurations while retaining the execution of the remaining active parts of the application.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126788094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective Remote Control System Based on TCP/IP","authors":"Xueyu Geng, Shunyao Wu, Jinlong Wang, Peng Li","doi":"10.1109/ICACTE.2008.202","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.202","url":null,"abstract":"With the network technology development, remote technology is gradually occupying the technology mainstream. It has become more and more popular in the home office and distance education. The rapid development provides a broad world to the remote control software. Pcanywhere, damewhere, QQ remote assistance, and other remote-control software have emerged. In remote control, improving efficiency and ensuring accuracy of the transmission are paramount to evaluate the success of a remote control software. This paper has developed a remote control system, and focuses on intercepting the control and the images, and TCP-stick packages. Solving these problems well is useful to improve the efficiency of the system and ease the pressure on network. Finally, through analysis and experiments, methods are proved to be effective.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"434 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124246577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Multi-function Fault Management System Model Based on SNMP","authors":"Y. Sun","doi":"10.1109/ICACTE.2008.193","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.193","url":null,"abstract":"The improving network technology and application make it a challenge to the network manager. A feasible and efficient network management strategy will become an important method to insure the network running well. Therefore, itpsilas meaningful to be familiar with the network and network management technology. In accordance with practical network environment, we design and implement fault management system FMS based on SNMP. Using Client/Server architecture, our system established a distributed management model which is compose of Console/Manager/Agent, finished network status monitoring, event processing, fault alarm and log etc.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ultra Sonic Sensor Based Blind Spot Accident Prevention System","authors":"R. Mahapatra, K. Kumar, G. Khurana, R. Mahajan","doi":"10.1109/ICACTE.2008.165","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.165","url":null,"abstract":"A blind spot detection device for protection against misshapenness such as automobiles collisions, obstacles, and accident that leads to great loss of human lives and can have disastrous results.Technology used for this purpose worked by detecting the other automobiles, obstacles and bystanders. Upon detecting, the device triggers a timer that delays the activation of alarm circuitry for a brief period of time.This time delay is instituted to minimize the triggers of nuisance alarm by a momentary intrusion in the hazard zone. If the obstaclepsilas presence is still detected after the delay time, LED's and audible alarms are triggered to alert the system operator of the dangerous situation. The alarms remain activated for a time period, allowing the operator to clear the hazard zone.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131526212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}