2011 Fourth International Conference on Intelligent Computation Technology and Automation最新文献

筛选
英文 中文
Buildings Passageway Road Lighting Line Controller Based on Monolithic Computer 基于单片机的建筑物通道道路照明线路控制器
Hong Liu, Shengyuan Li, Xuejun Sun
{"title":"Buildings Passageway Road Lighting Line Controller Based on Monolithic Computer","authors":"Hong Liu, Shengyuan Li, Xuejun Sun","doi":"10.1109/ICICTA.2011.159","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.159","url":null,"abstract":"According to the characteristics of the buildings passageway road lighting line, to adopt monolithic computer controlling the building passageway road lighting line is researched. There, monolithic computer input signal use the switch signal which reflect the strength of the light (this switch signal is produced by photoelectric sensor). Hence, it can meet the requirements to use MSC-51 Monolithic Computer minimum system, plus the photoelectric sensor, output drive circuit and actuators. Thus, the system hardware and software structure can are simplified, and the costs can is reduced. A road lighting line controller making in this plan, can take light control and light-time double control for multiple road lighting lines simultaneously, can solve the problems that the control number of road lighting line and the allowable load of each channel are restricted, and can automatically adjust the time of power transmission and power outage according to the weather and the season. It can not only be used to control the indoor road lighting lines such as building passageway, its basic methods can also be used to control the outdoor road lighting lines of factories, offices, schools, residential districts and other places.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130124217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Flight Control Design for the Unmanned Aerial Vehicles 无人机自适应飞行控制设计
Li Gao, Wen-hai Wu, Siyu Zhou
{"title":"Adaptive Flight Control Design for the Unmanned Aerial Vehicles","authors":"Li Gao, Wen-hai Wu, Siyu Zhou","doi":"10.1109/ICICTA.2011.97","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.97","url":null,"abstract":"In this paper we use L1 adaptive controller to augment a baseline for improved command tracking of the unmanned aerial vehicle. The procedure included baseline and adaptive augmentation controllers design. The eigenstructure assignment (EA) controller was designed for the nominal case, and then was augmented with a L1 adaptive controller. The L1 adaptive control methodology offered an adaptive contributor to compensate unknown uncertainties and modeled errors. The proposed adaptive systematic framework has satisfactory performance both in transient and steady state, as well as error signals remain bounded. The simulation results demonstrate the adaptation scheme can improve transient command tracking performance, even in the presence of system uncertainties, and unmatched disturbances.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130251663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study on Development of Information Security and Artificial Intelligence 信息安全与人工智能发展研究
Yao Xiao-Yang
{"title":"Study on Development of Information Security and Artificial Intelligence","authors":"Yao Xiao-Yang","doi":"10.1109/ICICTA.2011.72","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.72","url":null,"abstract":"Since the 21st century, artificial intelligence has deeply impacted the development process of every subject, such as Cybernetics, Information Theory, System Theory, Computer Science, physiology, etc., nearly involving any field and category in the human world in the theory and practice study. With the development of artificial intelligence, the internet has become a relatively new field. Today, with developed and easily accessible information, how to realize information security with the help of artificial intelligence will be a hot topic of bringing obvious economic benefits.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"7 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134023600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Application of Template Matching Graphic Technology in LED Chip Testing 模板匹配图形技术在LED芯片测试中的应用
Shih-Chieh Wei, W. Jianguo, Dong Zhanmin, Z. Wenxing, Cao Liying
{"title":"The Application of Template Matching Graphic Technology in LED Chip Testing","authors":"Shih-Chieh Wei, W. Jianguo, Dong Zhanmin, Z. Wenxing, Cao Liying","doi":"10.1109/ICICTA.2011.471","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.471","url":null,"abstract":"A new LED chip testing system based on template matching graphic technology is developed. A LED chip is located precisely free of touch, with digital graphic disposal technology involving acquisition, orientation, segmentation of graphic, edge detection, outlines distill, and so on. The system proves to be feasible.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132983621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Random Network Coding Model against Byzantine Attack Based on CBC 基于CBC的拜占庭攻击安全随机网络编码模型
Feng Tao, Zhang Bingtao, M. Jianfeng
{"title":"Security Random Network Coding Model against Byzantine Attack Based on CBC","authors":"Feng Tao, Zhang Bingtao, M. Jianfeng","doi":"10.1109/ICICTA.2011.580","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.580","url":null,"abstract":"Aimed at the problem of Byzantine Attack in secure network communication, the network security assumptions which may contain Byzantine attacks are analyzed and described firstly. Then a secure random network coding model is proposed for resisting the Byzantine attacks where the CBC (Cipher Block Chaining) technology is combined with random network coding, we prove the correctness and security also, finally realize safety codes.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130823134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Efficient Algorithms for Optimal Block Motion Estimation 一种高效的最优块运动估计算法
Zen Xiaohong, Ye Wenlong
{"title":"An Efficient Algorithms for Optimal Block Motion Estimation","authors":"Zen Xiaohong, Ye Wenlong","doi":"10.1109/ICICTA.2011.389","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.389","url":null,"abstract":"This paper presents an efficient algorithm for reducing and dynamically controlling the computational complexity of an H.264 video encoder implemented in software. We also therefore address a power-aware Motion Estimator for H.264 which can adapt at run time according to the available energy level. Experiments prove that our algorithm is not only dramatically improve the performance of resource constrained multimedia systems but also can optimize the rate distortion optimization procedure to the four groups selectively.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131015190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
opEBPSK Based UNB Demodulation by Using Special Filters 基于opEBPSK的特殊滤波器UNB解调
Zhang Shikai
{"title":"opEBPSK Based UNB Demodulation by Using Special Filters","authors":"Zhang Shikai","doi":"10.1109/ICICTA.2011.443","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.443","url":null,"abstract":"UNB modulation, for its good performance, is paid to more attention. Special filter design is the key to UNB realization. Using opEBSK as UNB modulation scheme, the article presents a special design to realize opEBSK based UNB demodulation. The article first introduces optimized EBPSK modulation method and gives its time and frequency domain characteristics, and compared to that of EBPSK in the same time, opEBSK can lower the sideband level, while keeping the modulation information un-lost. Then, filter design is discussed, two zero and two pole digital filter is related, which shows narrower bandwidths and a fast response speed to the opEBPSK based UNB modulated signals, the filtered time domain waveforms are given. Although the filter bandwidth is much narrower, the modulation information still can be seen after passing them. Last, a system diagram is presented, simulation of UNB modulation and demodulation based on opEBPSK is done, experiments show that opEBPSK based UNB modulation has high bandwidth efficiency and good, even better BER performance.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Port Privatization's Motivation, Objective and Model Selection in China: An Empirical Study 中国港口民营化的动因、目标与模式选择:实证研究
Min Tu, Jiaqi Yang
{"title":"Port Privatization's Motivation, Objective and Model Selection in China: An Empirical Study","authors":"Min Tu, Jiaqi Yang","doi":"10.1109/ICICTA.2011.594","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.594","url":null,"abstract":"The focus of this paper is to find out the initiatives that triggering and pushing the process of Chinese port privatization, the objectives pursued by port privatization and the model selected to achieve the goals. Based on the framework of institutional change theory, the research analyzes the theoretical relationship between port privatization's motivation and objective, put forward the system of port privatization's model. In view of the reality that the quantitative analysis is still very weak in this field, the research designs a questionnaire to discuss the above three aspects' relationship in China. By using the method of canonical correlation analysis, the research verifies that there's strong relationship between port privatization's motivation and objective. By using the method of correspondence analysis, the research verifies that finance motivation and the model of property right has strong correspondent relationship, management motivation and the model of operation right has strong correspondence relationship, but the relationship between the other two motivation (stragetic and employment motivation ) and privatization's model is not clear.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130733542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Maximum Margin Segmentation Selection for Visual Object Detection 一种用于视觉目标检测的最大边缘分割选择
Yang Yang, Shanping Li
{"title":"A Maximum Margin Segmentation Selection for Visual Object Detection","authors":"Yang Yang, Shanping Li","doi":"10.1109/ICICTA.2011.370","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.370","url":null,"abstract":"Visual object detection is to predict the bounding box and the label of each object from the target classes in realistic scenes. Previous detection algorithms focus on training models to fit pre-segmented local patches. However, the patches themselves are not always meaningful due to the unsupervised segmentation mistakes. In this paper, a maximum margin method is proposed to get the optimal patches and the corresponding models simultaneously. The learning task is formulated as a quadratic programming (QP) problem and implemented in its dual form. When testing, we compute multiple segmentations of each image and select one segmentation with the maximum margin to predict their labels. We evaluate the detection performance of our algorithm on Pascal VOC2007 challenge data set and show some improved results with other detection algorithms.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130977277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Antenna Design Using Self-adaptive Differential Evolution Algorithm 基于自适应差分进化算法的天线自动设计
K. Qin, Sanyou Zeng, Zhengjun Li, Hongyong Jing
{"title":"Automated Antenna Design Using Self-adaptive Differential Evolution Algorithm","authors":"K. Qin, Sanyou Zeng, Zhengjun Li, Hongyong Jing","doi":"10.1109/ICICTA.2011.527","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.527","url":null,"abstract":"As we knew, an evolved X-band antenna for NASA's Space Technology 5 (ST5) spacecraft had been deployed on schedule in 2006. This paper uses Self-adaptive Differential Evolution Algorithm (SaDE) to solve ST5 antenna design problem. The performance of SaDE is reported on the set of 24 benchmark functions provided by CEC2006 special session on real parameter optimization. The experimental result shows SaDE can solve ST5 antenna design problem effectively. The simulation result indicates our evolved antenna's voltage standing wave ratio performance is better than NASA evolved antenna and gain performance is competitive. Moreover, our evolved antenna was evolved on finite ground plane, the specified size for the ST5 antenna, while NASA's on infinite ground.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133038062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信