{"title":"Buildings Passageway Road Lighting Line Controller Based on Monolithic Computer","authors":"Hong Liu, Shengyuan Li, Xuejun Sun","doi":"10.1109/ICICTA.2011.159","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.159","url":null,"abstract":"According to the characteristics of the buildings passageway road lighting line, to adopt monolithic computer controlling the building passageway road lighting line is researched. There, monolithic computer input signal use the switch signal which reflect the strength of the light (this switch signal is produced by photoelectric sensor). Hence, it can meet the requirements to use MSC-51 Monolithic Computer minimum system, plus the photoelectric sensor, output drive circuit and actuators. Thus, the system hardware and software structure can are simplified, and the costs can is reduced. A road lighting line controller making in this plan, can take light control and light-time double control for multiple road lighting lines simultaneously, can solve the problems that the control number of road lighting line and the allowable load of each channel are restricted, and can automatically adjust the time of power transmission and power outage according to the weather and the season. It can not only be used to control the indoor road lighting lines such as building passageway, its basic methods can also be used to control the outdoor road lighting lines of factories, offices, schools, residential districts and other places.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130124217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Flight Control Design for the Unmanned Aerial Vehicles","authors":"Li Gao, Wen-hai Wu, Siyu Zhou","doi":"10.1109/ICICTA.2011.97","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.97","url":null,"abstract":"In this paper we use L1 adaptive controller to augment a baseline for improved command tracking of the unmanned aerial vehicle. The procedure included baseline and adaptive augmentation controllers design. The eigenstructure assignment (EA) controller was designed for the nominal case, and then was augmented with a L1 adaptive controller. The L1 adaptive control methodology offered an adaptive contributor to compensate unknown uncertainties and modeled errors. The proposed adaptive systematic framework has satisfactory performance both in transient and steady state, as well as error signals remain bounded. The simulation results demonstrate the adaptation scheme can improve transient command tracking performance, even in the presence of system uncertainties, and unmatched disturbances.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130251663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on Development of Information Security and Artificial Intelligence","authors":"Yao Xiao-Yang","doi":"10.1109/ICICTA.2011.72","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.72","url":null,"abstract":"Since the 21st century, artificial intelligence has deeply impacted the development process of every subject, such as Cybernetics, Information Theory, System Theory, Computer Science, physiology, etc., nearly involving any field and category in the human world in the theory and practice study. With the development of artificial intelligence, the internet has become a relatively new field. Today, with developed and easily accessible information, how to realize information security with the help of artificial intelligence will be a hot topic of bringing obvious economic benefits.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"7 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134023600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shih-Chieh Wei, W. Jianguo, Dong Zhanmin, Z. Wenxing, Cao Liying
{"title":"The Application of Template Matching Graphic Technology in LED Chip Testing","authors":"Shih-Chieh Wei, W. Jianguo, Dong Zhanmin, Z. Wenxing, Cao Liying","doi":"10.1109/ICICTA.2011.471","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.471","url":null,"abstract":"A new LED chip testing system based on template matching graphic technology is developed. A LED chip is located precisely free of touch, with digital graphic disposal technology involving acquisition, orientation, segmentation of graphic, edge detection, outlines distill, and so on. The system proves to be feasible.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132983621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Random Network Coding Model against Byzantine Attack Based on CBC","authors":"Feng Tao, Zhang Bingtao, M. Jianfeng","doi":"10.1109/ICICTA.2011.580","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.580","url":null,"abstract":"Aimed at the problem of Byzantine Attack in secure network communication, the network security assumptions which may contain Byzantine attacks are analyzed and described firstly. Then a secure random network coding model is proposed for resisting the Byzantine attacks where the CBC (Cipher Block Chaining) technology is combined with random network coding, we prove the correctness and security also, finally realize safety codes.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130823134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Algorithms for Optimal Block Motion Estimation","authors":"Zen Xiaohong, Ye Wenlong","doi":"10.1109/ICICTA.2011.389","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.389","url":null,"abstract":"This paper presents an efficient algorithm for reducing and dynamically controlling the computational complexity of an H.264 video encoder implemented in software. We also therefore address a power-aware Motion Estimator for H.264 which can adapt at run time according to the available energy level. Experiments prove that our algorithm is not only dramatically improve the performance of resource constrained multimedia systems but also can optimize the rate distortion optimization procedure to the four groups selectively.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131015190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"opEBPSK Based UNB Demodulation by Using Special Filters","authors":"Zhang Shikai","doi":"10.1109/ICICTA.2011.443","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.443","url":null,"abstract":"UNB modulation, for its good performance, is paid to more attention. Special filter design is the key to UNB realization. Using opEBSK as UNB modulation scheme, the article presents a special design to realize opEBSK based UNB demodulation. The article first introduces optimized EBPSK modulation method and gives its time and frequency domain characteristics, and compared to that of EBPSK in the same time, opEBSK can lower the sideband level, while keeping the modulation information un-lost. Then, filter design is discussed, two zero and two pole digital filter is related, which shows narrower bandwidths and a fast response speed to the opEBPSK based UNB modulated signals, the filtered time domain waveforms are given. Although the filter bandwidth is much narrower, the modulation information still can be seen after passing them. Last, a system diagram is presented, simulation of UNB modulation and demodulation based on opEBPSK is done, experiments show that opEBPSK based UNB modulation has high bandwidth efficiency and good, even better BER performance.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Port Privatization's Motivation, Objective and Model Selection in China: An Empirical Study","authors":"Min Tu, Jiaqi Yang","doi":"10.1109/ICICTA.2011.594","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.594","url":null,"abstract":"The focus of this paper is to find out the initiatives that triggering and pushing the process of Chinese port privatization, the objectives pursued by port privatization and the model selected to achieve the goals. Based on the framework of institutional change theory, the research analyzes the theoretical relationship between port privatization's motivation and objective, put forward the system of port privatization's model. In view of the reality that the quantitative analysis is still very weak in this field, the research designs a questionnaire to discuss the above three aspects' relationship in China. By using the method of canonical correlation analysis, the research verifies that there's strong relationship between port privatization's motivation and objective. By using the method of correspondence analysis, the research verifies that finance motivation and the model of property right has strong correspondent relationship, management motivation and the model of operation right has strong correspondence relationship, but the relationship between the other two motivation (stragetic and employment motivation ) and privatization's model is not clear.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130733542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Maximum Margin Segmentation Selection for Visual Object Detection","authors":"Yang Yang, Shanping Li","doi":"10.1109/ICICTA.2011.370","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.370","url":null,"abstract":"Visual object detection is to predict the bounding box and the label of each object from the target classes in realistic scenes. Previous detection algorithms focus on training models to fit pre-segmented local patches. However, the patches themselves are not always meaningful due to the unsupervised segmentation mistakes. In this paper, a maximum margin method is proposed to get the optimal patches and the corresponding models simultaneously. The learning task is formulated as a quadratic programming (QP) problem and implemented in its dual form. When testing, we compute multiple segmentations of each image and select one segmentation with the maximum margin to predict their labels. We evaluate the detection performance of our algorithm on Pascal VOC2007 challenge data set and show some improved results with other detection algorithms.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130977277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Antenna Design Using Self-adaptive Differential Evolution Algorithm","authors":"K. Qin, Sanyou Zeng, Zhengjun Li, Hongyong Jing","doi":"10.1109/ICICTA.2011.527","DOIUrl":"https://doi.org/10.1109/ICICTA.2011.527","url":null,"abstract":"As we knew, an evolved X-band antenna for NASA's Space Technology 5 (ST5) spacecraft had been deployed on schedule in 2006. This paper uses Self-adaptive Differential Evolution Algorithm (SaDE) to solve ST5 antenna design problem. The performance of SaDE is reported on the set of 24 benchmark functions provided by CEC2006 special session on real parameter optimization. The experimental result shows SaDE can solve ST5 antenna design problem effectively. The simulation result indicates our evolved antenna's voltage standing wave ratio performance is better than NASA evolved antenna and gain performance is competitive. Moreover, our evolved antenna was evolved on finite ground plane, the specified size for the ST5 antenna, while NASA's on infinite ground.","PeriodicalId":368130,"journal":{"name":"2011 Fourth International Conference on Intelligent Computation Technology and Automation","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133038062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}