{"title":"Stability analysis for nonlinear switched neutral systems","authors":"Du-yu Liu, S. Zhong, Xiaomei Wang","doi":"10.1109/ICACIA.2009.5361137","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361137","url":null,"abstract":"In this paper, a class of switched neutral systems composed of a finite number of nonlinear neutral systems is discussed. Under the condition of all the subsystems being stability, stability conditions for nonlinear switched neutral systems are established in terms of multiple Lyapunov functionals and functions, respectively. The stability conditions in terms of multiple functions are obtained by using Razumikhin techniques.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121556763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speed control of brushless DC motor with grey predictor","authors":"Zhaoxia Xiao, Hong-wei Fang","doi":"10.1109/ICACIA.2009.5361071","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361071","url":null,"abstract":"A speed control approach with grey control theory is proposed based on the state-space model of the star-connected three-phase brushless DC motor in line-voltage mode. The algorithm of the grey predictor is given. Double-loop PI controllers and the GM (1, 2) are used to compensate the disturbance from the load and internal parameters of the motor, while the uncertainty part is considered as a grey system. To assure the system responds to the newest behavior in time, the initial discrete state sequence in GM (1, 2) model is established by the equal dimension and new information method. The simulation results have shown that the GM (1, 2) predictor can reduce the disturbance in the speed and current loops, and proved the effectiveness and good anti-disturbance ability of the proposed control method.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130081242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A design of efficient metadata cluster in large distributed storage systems","authors":"Lin Xia, H. Duan, Lin Li, Xiao-wen Nie","doi":"10.1109/ICACIA.2009.5361095","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361095","url":null,"abstract":"Searching and managing information are becoming increasingly important for large distributed storage systems. This paper presents a metadata management mechanism named CBMM, which is based on the Chord protocol to organize the metadata server cluster. Utilizing the advantages of Chord protocol for distributing metadata across a cluster of metadata servers can highly improve the throughput, balance metadata distribution, and afford dynamic scalability of metadata servers.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132679845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automation Power Dispatching sheet System based Multi-Agent","authors":"Sufang Chen","doi":"10.1109/ICACIA.2009.5361097","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361097","url":null,"abstract":"The electric power system operation sheet is an effective security measures to prevent misuse in China's electric power system operation and management.This paper designed a fully functional Automation Dispatching Operation System of Power Network, in which Multi-Agent System(MAS) theory is applied. This paper based on Multi-Agent System theory to establish the overall framework of system, and integrate the knowledge of Expert System theory, Object Oriented Programming technology and Database Management.The MAS model is constructed. On the basis of this model, this paper researched in the communications between MAS and the SCADA system, focus on the MAS collaboration between the control strategy and communications coordination mechanism. Through the communications and coordination between agents, the sheet generation function is realized. The system is used in one county dispatch center. Practice has proved that the MAS model is effective and practical.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133254562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discrete nonlinear inequalities in time control systems","authors":"Ke Zheng, S. Zhong, Maoqiao Ye","doi":"10.1109/ICACIA.2009.5361069","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361069","url":null,"abstract":"In this paper, more general discrete integral inequalities with more than one nonlinear term are established. These inequalities generalize some results in the literature and provide a convenient tool to study the conditions for stability of discrete time control systems.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115913466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ishikawa iterative process for variational inclusions with (H,η)-accretive operators in Banach spaces","authors":"Xianjun Yu, Jian-Ping Li, Guang-Qiang Xiao, Xing Chen","doi":"10.1109/ICACIA.2009.5361153","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361153","url":null,"abstract":"An Ishikawa iterative process for approximating the solution of a class of variational inclusions involving (H,η)-accretive operator in Banach spaces is developed by making use of the resolvent operator technique. The existence and uniqueness of solutions for the class of variational inclusions are proved and the convergence criteria of iterative process are also discussed.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122104514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed stealthy traffic anomaly detection based on wavelet packet analysis","authors":"Zonglin Li, Guangmin Hu, Xingmiao Yao","doi":"10.1109/ICACIA.2009.5361117","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361117","url":null,"abstract":"Distributed anomalous traffic is difficult to detect, since it is simultaneously dispersed in many links and tend to not present any obvious anomalous features in a single link. This paper proposed a multi-scale spatial detection method against distributed stealthy traffic anomaly, it can deploy early-stage detection on key nodes of network. Multi-scale wavelet packet analysis is performed separately on links at which information is available on each node, with the aim of getting abnormal frequency ranges at different time sections and reconstructing signals with anomalous features. Then from a spatial point of view, evaluate deviation degree of high dimension vectors that composed of reconstructions by kernel density estimation as anomaly indicator. Detection results on both real anomalies of American education backbone network and synthetic distributed anomalies shows, our method performs better than existing method.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117190680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incorporated scheduling strategy for streaming media based on popularity","authors":"Chao Yu, Ling Xing, Jianguo Ma, Rong Fu","doi":"10.1109/ICACIA.2009.5361077","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361077","url":null,"abstract":"Stream scheduling strategy used in streaming media server can improve largely system service capability by increasing system efficiency and reducing bandwidth requirement. In this study, an incorporated scheduling strategy, which combines period-patching and batching scheduling strategy, is proposed. It uses period-patching scheduling to transmit the group-broadcasting streams, and then incorporates the nearby patching streams in a shared patching stream. The bandwidth resource and Qos of system can be improved at the expense of a little longer average waiting time. The simulation results show that incorporated scheduling strategy is more efficient and economical, in aspect of patching stream number and bandwidth requirement, than the typical period- patching scheduling under the circumstances of high visiting frequency for media resources or bursts of rapidly occurring events of user requests.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124004188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The comparison of two types of whitenization weight function","authors":"Xiu-wen Yang, Song-lin Wu, Chuan-rong Xu, Chen Jie, Zeng Shun-peng","doi":"10.1109/ICACIA.2009.5361149","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361149","url":null,"abstract":"According to the linear relationship between the measuring data of Yangtze river, the index weight is decided by mean-variance method, triangle whitenization weight function and trapezoid whitenization weight function are established respectively to make grey evaluation for the present situation of water pollution of Yangtze river, finally the expectation results are approximate. This explains that whitenization weight function has bigger flexibility, subjectivity.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125874910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synthetic utilizing differential and filter operator to construct WNN for image edge detection","authors":"Maozhi Wang, Sheng Gou, Ke Guo","doi":"10.1109/ICACIA.2009.5361079","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361079","url":null,"abstract":"This paper constructs a Wavelet Neural Network (WNN) for image edge detection based on the fact that image edge detection is essentially a classification problem and WNN has powerful classification and identification capacity. The innovations of this paper include utilizing information of differential and filter operators in constructing the network and integrating the advantages of Canny and LOG operators in the selection of network training samples. Experimental results indicate that the method proposed in this paper can extract the image edge information effectively and the network presents good generalization ability. Also, a new edge detection based on wavelet transform of modulus maxima threshold is also proposed in this paper during the research on WNN. Finally, the selection of threshold, wavelet function and other parameters is discussed of WNN.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122360310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}