{"title":"Harmonic Current Detection and Simulation with Active Power Filter Based on Simulink","authors":"Shihong Wu, Junnan Wang, Rui Huang, Dan Guo","doi":"10.1109/ICICTA.2011.209","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.209","url":null,"abstract":"The key to guarantee the filter better performance is the accurateness and fast detection of harmonic components of current in power system. The method of reactive current detection and simulation verification based on instantaneous reactive power theory was introduced in this paper. The corresponding design project is given according to the key part in the detection of harmonics. Simulink is applied for modeling and simulation analysis.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125357632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"H Infinite Robust Control for Ceramic Manipulators Based on Networked Control Systems","authors":"Dong Wang, Yonghong Zhu","doi":"10.1109/ICICTA.2011.119","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.119","url":null,"abstract":"The state feedback control problem for networked control systems of 2-DOF ceramic manipulators with disturbances was studied. At first, a networked robust control model of ceramic manipulators is made. Then, sufficient conditions of robust stability is given for networked control systems of ceramic manipulators under the maximum network time-delay condition. In addition, the state feedback control law were proposed by using the linear matrix inequality method. In the end, a simulation is given. Simulation results show that the networked robust control strategy proposed can effectively attenuate perturbations of ceramic manipulators based on networked control systems. and render the closed loop system stable.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115331303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Press Mounting Force Monitoring of Rolling Bearing of the Freight Train Considering Cylinder Friction","authors":"Zhang Congpeng, Luo Xueke, Wang Li, Dong Deying","doi":"10.1109/ICICTA.2011.177","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.177","url":null,"abstract":"An automatic press mounting system of rolling bearing is introduced, which is used to execute the press mounting tasks of the rolling bearing in the bearing overhaul workshop of the railway system. As the datum gathered by the acquisition system has contained friction force of the press mounting hydro cylinder, the press mounting monitoring precision is reduced and the press mounting result judgment is affected. To eliminate the influence of the cylinder friction, friction modeling and compensation of the press mounting hydro cylinder were studied. The friction models of the cylinders were identified through experiments and parameters regression analysis. Based on the friction models, the press mounting force datum was corrected. The experiments results show that the monitoring datum considering the hydro cylinder friction is closer to the real press mounting force, and the misjudgment of the mounting result is obviously reduced.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122970131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dynamic Data Mining Method Using Evolutionary and Immune Characteristics","authors":"Huang Wei","doi":"10.1109/ICICTA.2011.88","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.88","url":null,"abstract":"An evolution-immunity principle in dynamic miming process has been shown. Then a framework for evolution immune integration with fuzzy tacking is designed. A robust coordinator is used to set the robust index and dynamically evaluate the evolution in order to solve the problems such as degeneration, missing optimum and local optimum. An algorithm for Web mining based on the framework is feasible and effective. In the future, the theoretical basis for the integration should be further strengthened in order to extend the framework design. More possible applications for the approach should be explored.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114410568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wang Mingfeng, Liu Shaojun, Hu Qiong, Zeng Yihui, Pan Xin
{"title":"The Control Methods Research and Performance Test on the Deep-sea Mining Ship Motion Simulator","authors":"Wang Mingfeng, Liu Shaojun, Hu Qiong, Zeng Yihui, Pan Xin","doi":"10.1109/ICICTA.2011.473","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.473","url":null,"abstract":"A motion simulator of deep-sea mining ship is designed for the 6000m deep-sea poly-metallic mining system, the control methods and the performance of the simulator are researched and tested. PID control is chosen. To determine PID control parameters, mathematical model of valve controlled cylinder system is established and validated by simulation tests. Based on the mathematical model, PID control parameters are adjusted in Simulink and further readjusted during the tests to ensure better control effect. The motion tests are performed and the results show that the deep-sea mining ship motion simulator can move in the light of given periods and amplitudes under the predetermined attitudes, and is able to simulate the random motion of mining ship.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122063568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Agent Model for Network Security Evaluation Based on AIS","authors":"Jin Yang, Tianfei Wang, Cai MingLiu, Bin Li","doi":"10.1109/ICICTA.2011.46","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.46","url":null,"abstract":"This paper proposes a novel distributed agent model for network security evaluation. The method, which uses antibody concentration to quantitatively describe the degree of intrusion danger, is demonstrated. A new network security evaluation method using antibody concentration to quantitatively analyze the degree of intrusion danger level is presented. The method which uses antibody concentration to quantitatively describe the degree of intrusion danger is presented. Additionally, the hierarchical and distributed management framework of the proposed model is built, avoiding neglecting uncertain factors that the traditional method often does. Our experimental results show the model which enhances detection efficiency and assures steady performance in the ability of intrusion detection.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116807548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Unified Location Management Framework of the Ubiquitous Wireless Networks","authors":"Zhaori Cong, Guo Wei","doi":"10.1109/ICICTA.2011.483","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.483","url":null,"abstract":"Mobile Ubiquitous Network (MUN) is an integrated network that consists of cellular network, ad hoc network, as well as local area networks (LAN) and so on. In such heterogeneous environment, the location management is one of the most important problems. It is studied in this paper the location management of the ubiquitous wireless networks. A unified location management framework is proposed which uses the coordinates mapping approach, and in which the location management of the familiar heterogeneous networks and the future networks could be achieved without changing the exiting networking much. The analyzing at the end of the paper shows that it has better performance than that of the architecture in existence.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117037326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Best Wavelet Packet Power Measurement Based on Energy Threshold Entropy","authors":"W. Xuewei, Zhao Yong, Wang Lin","doi":"10.1109/ICICTA.2011.100","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.100","url":null,"abstract":"Firstly, a sub-band energy threshold entropy was proposed as information measurement cost function. Then a novel best wavelet packet power measurement algorithm was proposed, which can decompose power signals into sub-bands adaptively according to the energy distribution, meanwhile, this algorithm can perform the decomposition of power energy in one wavelet packet process. The simulation using db40 wavelets shows that: the measurement relative errors of root mean square (RMS) and the active power are less than 6×10-5 in the total band, and the quoted errors of active power are less than 8.2×10-5 in the sub-bands.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129721977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Kill Tree Analysis Method and CAD Tool for Aircraft Complex System Vulnerability Assessment and Safety Design","authors":"Pei Yang, Guo Ting, Dong Qiang, Song Bifeng","doi":"10.1109/ICICTA.2011.533","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.533","url":null,"abstract":"In vulnerability assessment of aircraft complex systems subjected to traditional weapons, kill tree is used as a visual illustration of the critical components and all component redundancies. This research applies fault tree analysis method in reliability field to analyze the kill tree and determine the minimal cut sets for different kill levels, such as KK, K, A, B and C attrition kill. The tree is first translated to its equivalent Boolean equations and then the top-down substitution method is used. Two Boolean laws, the distributive law and the law of absorption, are used to remove the redundancies. In addition, a CAD tool based on the simple constructs (parallel, series, k-out-of-n) is developed to facilitate the analyzers to identify the contributions of critical component kill to aircraft system kill. A hypothesis aircraft complex system composed of several non-redundant components and several sets of redundant components is used as an example to illustrate the feasibility of the method and the developed tool.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128323564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Song Yongxian, Feng Yuan, Gong Chenlong, He Naibao
{"title":"Design of Electric Power Parameter Monitoring System Based on DSP and CPLD","authors":"Song Yongxian, Feng Yuan, Gong Chenlong, He Naibao","doi":"10.1109/ICICTA.2011.168","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.168","url":null,"abstract":"In this article, we introduce a set of online power quality monitor who is based on DSP (Digital Signal Processor). The monitor makes full use of DSP chip's strong operation capability. It can monitor power quality online, display real-time measure data and save super scalar data, which can provide accurate data to power quality evaluation and improvement. On the hardware side, the system takes DSP and CPLD as core of power parameter detection circuit, and complex programmable logic device (CPLD) and phase-locked loop (PLL) as synchronous sampling circuit, TO the software, designed relative software arithmetic. At the same time, the main program of electric power parameter detection was introduced. Experiments show the proposed system is of fast response, high accuracy, and real-time processing.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128326431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}