2009 International Conference on Apperceiving Computing and Intelligence Analysis最新文献

筛选
英文 中文
Fuzzy PID control for landing gear based on magneto-rheological (MR) damper 基于磁流变阻尼器的起落架模糊PID控制
2009 International Conference on Apperceiving Computing and Intelligence Analysis Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361162
Liu Hua-lin, Chen Yong, Huang Qi, Li Jian
{"title":"Fuzzy PID control for landing gear based on magneto-rheological (MR) damper","authors":"Liu Hua-lin, Chen Yong, Huang Qi, Li Jian","doi":"10.1109/ICACIA.2009.5361162","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361162","url":null,"abstract":"Landing gear of aircraft is the key component. The magneto-rheological (MR) damper applied to landing gear can ensure stability and safety during the process of takeoff, landing and rollout. Because of landing gear is a nonlinear, multivariate and multi-degree of freedom system. The traditional PID control can't obtain ideal control effects. Based on the advantages of fuzzy control theory do not need a precise mathematical model, fuzzy PID control is proposed in this paper by combining PID control and fuzzy control. The models of landing gear are simulated and analyzed under passive control, PID control and fuzzy PID control. The simulation results indicate that fuzzy PID control can effectively lower the amplitude of fuselage vibration acceleration and improve the ride quality and safety of aircraft. It has an important influence in the optimal control of the landing gear system.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125649389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A hardware/software co-verification platform for ASIC design ASIC设计的硬件/软件协同验证平台
2009 International Conference on Apperceiving Computing and Intelligence Analysis Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361068
Xuefeng Dai, Bu-Min Liu, C. Xie, Wankuo Wang
{"title":"A hardware/software co-verification platform for ASIC design","authors":"Xuefeng Dai, Bu-Min Liu, C. Xie, Wankuo Wang","doi":"10.1109/ICACIA.2009.5361068","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361068","url":null,"abstract":"This paper presents a hardware/software co-verification platform for ASIC design, which is based on Windows-Linux operating systems. The platform is not only used for verifying the hardware/software compatibility of maintain-and-update development ASIC chips, but also used for achieving that the hardware and software develop synchronously when developing absolutely new ASIC chips. Adopting this platform, we can not only give full functional verifications to our hardware and software more efficiently, but can also shorten the entire developmental period of our productions. In this paper, the system scheme of this platform and its operating principles are introduced, and the arithmetic of the bus-functional-model interface is illustrated. The hardware/software compatibility of several maintain-and-update chips have been guaranteed by using this platform, and the final productions' time-to-market decreased 3 months on average.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123711712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of FII-based Image Retrieval Engine 基于fii的图像检索引擎实现
2009 International Conference on Apperceiving Computing and Intelligence Analysis Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361084
Tan Hao, Chen Yu, Q. Hang
{"title":"Implementation of FII-based Image Retrieval Engine","authors":"Tan Hao, Chen Yu, Q. Hang","doi":"10.1109/ICACIA.2009.5361084","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361084","url":null,"abstract":"An Image Feature Inverted Indexing(FII) method is proposed. Based on this method, a prototype of Content-Based Image Retrieval Engine named Eva is implemented. It extracts shape and texture feature from user's pictures, retrieves similar pictures with FII method. The efficiency of FII is also analyzed.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131623645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cache replacement strategy for streaming media based on semantic mining 基于语义挖掘的流媒体缓存替换策略
2009 International Conference on Apperceiving Computing and Intelligence Analysis Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361078
Ling Xing, Jianguo Ma, Hong Cheng
{"title":"Cache replacement strategy for streaming media based on semantic mining","authors":"Ling Xing, Jianguo Ma, Hong Cheng","doi":"10.1109/ICACIA.2009.5361078","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361078","url":null,"abstract":"In order to deal with the complicated network video data, the work focuses on the technologies of multilayer semantic mining and proxy cache for streaming media. Semantic mining method based on network parameter is presented. Quadratic regression popularity prediction model is introduced to analyze current popularity of streaming media. And then cache replacement strategy based on semantic mining is designed. Simulation results show that the cache replacement strategy is feasible and valid.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114165580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Early detection of all-zero coefficients in H.264 based on DCT coefficients distribution 基于DCT系数分布的H.264全零系数早期检测
2009 International Conference on Apperceiving Computing and Intelligence Analysis Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361088
Haotian Yang, Yuanjun Huang, Jie Li
{"title":"Early detection of all-zero coefficients in H.264 based on DCT coefficients distribution","authors":"Haotian Yang, Yuanjun Huang, Jie Li","doi":"10.1109/ICACIA.2009.5361088","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361088","url":null,"abstract":"Based on the discrete cosine transform (DCT) coefficients distribution, an effective method of early detecting all-zero discrete cosine coefficients blocks in H.264 is proposed. A mathematic model is established based on Laplacian distribution of DCT coefficients and a criterion under which each quantized coefficient becomes zero is derived. The simulation results show that compared to the Xie's method built on Gaussian distribution, the proposed method reduces encoding time averagely without video-quality degradation for low or middle bit-rate video sequences.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121215068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Analysis of group users' interests in audio/video programs in network backbone environment 网络骨干环境下群用户对音视频节目的兴趣分析
2009 International Conference on Apperceiving Computing and Intelligence Analysis Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361075
Qiang Ma, Ling Xing, Jianguo Ma
{"title":"Analysis of group users' interests in audio/video programs in network backbone environment","authors":"Qiang Ma, Ling Xing, Jianguo Ma","doi":"10.1109/ICACIA.2009.5361075","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361075","url":null,"abstract":"Unlike the common method based on log files to analyze user's interests, the proposed approach to analyze group users' interests in audio/video programs is devoted to deal with data packets from network backbone environment. This method has applied the Key-Value strategy to extract information from the network packets. Meanwhile, the relevant mathematical model is presented to calculate the group users' intersected interests and united interests. The results show that the method proposed can analyze the group users' interests properly.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124983276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptanalysis of a remote user authentication scheme based on bilinear pairing 基于双线性配对的远程用户认证方案的密码分析
2009 International Conference on Apperceiving Computing and Intelligence Analysis Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361150
Yue-hao Yan, Desong Wang, Jianping Li, Li-Gang Li
{"title":"Cryptanalysis of a remote user authentication scheme based on bilinear pairing","authors":"Yue-hao Yan, Desong Wang, Jianping Li, Li-Gang Li","doi":"10.1109/ICACIA.2009.5361150","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361150","url":null,"abstract":"Remote user authentication scheme is a mechanism which allows a server to authenticate a remote user over insecure channel. Recently, Goriparthi et al. made an enhancement based on Das et al.'s remote user authentication scheme using bilinear pairings. The scheme has the merits of no verification table, freely changing password and preventing the forgery attack and the replay attack. This paper, however, demonstrates that Goriparthi et al.'s improved scheme is vulnerable to the insider attack, the denial-of-service attack, and the server spooling attack.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132826115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An authenticated Mobile IPv6 Fast Handover scenario 经过认证的移动IPv6快速切换场景
2009 International Conference on Apperceiving Computing and Intelligence Analysis Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361105
Hongzhi Xing, Changyuan Luo, Hailin Li
{"title":"An authenticated Mobile IPv6 Fast Handover scenario","authors":"Hongzhi Xing, Changyuan Luo, Hailin Li","doi":"10.1109/ICACIA.2009.5361105","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361105","url":null,"abstract":"Mobile IPv6 enables a mobile node to keep its connectivity to the Internet when changing its access router. Because of link switching and IP operations, there is a period when the mobile node can not send and receive packets. The Mobile IPv6 Fast Handover protocol shortens the “handover latency”. However, after the handovers, a mobile node must pass the authentication during which it is still unable to communicate with the correspondent node. This document specifies a scenario combining Mobile IPv6 fast handover and authentication procedures. This scenario reduces the comprehensive delay and brings security to fast handovers.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134457916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The research on transaction system based on mainframe 基于大型机的事务处理系统研究
2009 International Conference on Apperceiving Computing and Intelligence Analysis Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361064
Qin Li, Di Liu
{"title":"The research on transaction system based on mainframe","authors":"Qin Li, Di Liu","doi":"10.1109/ICACIA.2009.5361064","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361064","url":null,"abstract":"In order to make all get the benefits of health care system, we need one platform which can hold very large scale data for all participation. And this platform is non-none other than IBM Z900 mainframe server system, DB2 Large-scale relational database and CICS transaction middleware. As the lowest bottom of all system dealing data, we store all concerned data through DB2 large-scale relational database which is at the mainframe. We also deal with data for program which concern many table data through the storage procedures of mainframe; of course, if the data is little, for example the small transaction-participation user medical clinic or medication card transactions, we use the CICS transaction middleware in the mainframe. The paper firstly introduces the background of system design, purpose and design goals. Following this, it mainly states system requirements, running environments, system structure, basic design concepts, functionality and system security precautions. The last gives the summary of this paper.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123477223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust person identification with face and iris by modified PUM method 基于改进PUM方法的人脸和虹膜鲁棒识别
2009 International Conference on Apperceiving Computing and Intelligence Analysis Pub Date : 2009-12-28 DOI: 10.1109/ICACIA.2009.5361089
Jie Lin, Jianping Li, Hui Lin, J. Ming
{"title":"Robust person identification with face and iris by modified PUM method","authors":"Jie Lin, Jianping Li, Hui Lin, J. Ming","doi":"10.1109/ICACIA.2009.5361089","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361089","url":null,"abstract":"In previous works, we have applied the modified PUM method in face recognition and demonstrated the effectiveness of this method for deal with partial occlusion and distortion. Based on the similitude between the face features and iris features, this paper proposes a new method for person recognition by the combining of iris and face. This new method combines the iris and face features as a new feature for representing persons and then acts the modified PUM on the new features for recognition. Generally, the iris features, however, is more reliable than the face features. Hence the iris feature should be given a higher weight. For this, this paper further improves the method to form a better strategy for combining the face and iris on recognition. The new improved approach has been evaluated on combined-face and iris databases, using face testing images subjected to various types of partial distortion and occlusion. The new system has demonstrated improved performance over other systems.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123920316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信