{"title":"Fuzzy PID control for landing gear based on magneto-rheological (MR) damper","authors":"Liu Hua-lin, Chen Yong, Huang Qi, Li Jian","doi":"10.1109/ICACIA.2009.5361162","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361162","url":null,"abstract":"Landing gear of aircraft is the key component. The magneto-rheological (MR) damper applied to landing gear can ensure stability and safety during the process of takeoff, landing and rollout. Because of landing gear is a nonlinear, multivariate and multi-degree of freedom system. The traditional PID control can't obtain ideal control effects. Based on the advantages of fuzzy control theory do not need a precise mathematical model, fuzzy PID control is proposed in this paper by combining PID control and fuzzy control. The models of landing gear are simulated and analyzed under passive control, PID control and fuzzy PID control. The simulation results indicate that fuzzy PID control can effectively lower the amplitude of fuselage vibration acceleration and improve the ride quality and safety of aircraft. It has an important influence in the optimal control of the landing gear system.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125649389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hardware/software co-verification platform for ASIC design","authors":"Xuefeng Dai, Bu-Min Liu, C. Xie, Wankuo Wang","doi":"10.1109/ICACIA.2009.5361068","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361068","url":null,"abstract":"This paper presents a hardware/software co-verification platform for ASIC design, which is based on Windows-Linux operating systems. The platform is not only used for verifying the hardware/software compatibility of maintain-and-update development ASIC chips, but also used for achieving that the hardware and software develop synchronously when developing absolutely new ASIC chips. Adopting this platform, we can not only give full functional verifications to our hardware and software more efficiently, but can also shorten the entire developmental period of our productions. In this paper, the system scheme of this platform and its operating principles are introduced, and the arithmetic of the bus-functional-model interface is illustrated. The hardware/software compatibility of several maintain-and-update chips have been guaranteed by using this platform, and the final productions' time-to-market decreased 3 months on average.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123711712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of FII-based Image Retrieval Engine","authors":"Tan Hao, Chen Yu, Q. Hang","doi":"10.1109/ICACIA.2009.5361084","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361084","url":null,"abstract":"An Image Feature Inverted Indexing(FII) method is proposed. Based on this method, a prototype of Content-Based Image Retrieval Engine named Eva is implemented. It extracts shape and texture feature from user's pictures, retrieves similar pictures with FII method. The efficiency of FII is also analyzed.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131623645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cache replacement strategy for streaming media based on semantic mining","authors":"Ling Xing, Jianguo Ma, Hong Cheng","doi":"10.1109/ICACIA.2009.5361078","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361078","url":null,"abstract":"In order to deal with the complicated network video data, the work focuses on the technologies of multilayer semantic mining and proxy cache for streaming media. Semantic mining method based on network parameter is presented. Quadratic regression popularity prediction model is introduced to analyze current popularity of streaming media. And then cache replacement strategy based on semantic mining is designed. Simulation results show that the cache replacement strategy is feasible and valid.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114165580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Early detection of all-zero coefficients in H.264 based on DCT coefficients distribution","authors":"Haotian Yang, Yuanjun Huang, Jie Li","doi":"10.1109/ICACIA.2009.5361088","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361088","url":null,"abstract":"Based on the discrete cosine transform (DCT) coefficients distribution, an effective method of early detecting all-zero discrete cosine coefficients blocks in H.264 is proposed. A mathematic model is established based on Laplacian distribution of DCT coefficients and a criterion under which each quantized coefficient becomes zero is derived. The simulation results show that compared to the Xie's method built on Gaussian distribution, the proposed method reduces encoding time averagely without video-quality degradation for low or middle bit-rate video sequences.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121215068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of group users' interests in audio/video programs in network backbone environment","authors":"Qiang Ma, Ling Xing, Jianguo Ma","doi":"10.1109/ICACIA.2009.5361075","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361075","url":null,"abstract":"Unlike the common method based on log files to analyze user's interests, the proposed approach to analyze group users' interests in audio/video programs is devoted to deal with data packets from network backbone environment. This method has applied the Key-Value strategy to extract information from the network packets. Meanwhile, the relevant mathematical model is presented to calculate the group users' intersected interests and united interests. The results show that the method proposed can analyze the group users' interests properly.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124983276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of a remote user authentication scheme based on bilinear pairing","authors":"Yue-hao Yan, Desong Wang, Jianping Li, Li-Gang Li","doi":"10.1109/ICACIA.2009.5361150","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361150","url":null,"abstract":"Remote user authentication scheme is a mechanism which allows a server to authenticate a remote user over insecure channel. Recently, Goriparthi et al. made an enhancement based on Das et al.'s remote user authentication scheme using bilinear pairings. The scheme has the merits of no verification table, freely changing password and preventing the forgery attack and the replay attack. This paper, however, demonstrates that Goriparthi et al.'s improved scheme is vulnerable to the insider attack, the denial-of-service attack, and the server spooling attack.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132826115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An authenticated Mobile IPv6 Fast Handover scenario","authors":"Hongzhi Xing, Changyuan Luo, Hailin Li","doi":"10.1109/ICACIA.2009.5361105","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361105","url":null,"abstract":"Mobile IPv6 enables a mobile node to keep its connectivity to the Internet when changing its access router. Because of link switching and IP operations, there is a period when the mobile node can not send and receive packets. The Mobile IPv6 Fast Handover protocol shortens the “handover latency”. However, after the handovers, a mobile node must pass the authentication during which it is still unable to communicate with the correspondent node. This document specifies a scenario combining Mobile IPv6 fast handover and authentication procedures. This scenario reduces the comprehensive delay and brings security to fast handovers.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134457916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The research on transaction system based on mainframe","authors":"Qin Li, Di Liu","doi":"10.1109/ICACIA.2009.5361064","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361064","url":null,"abstract":"In order to make all get the benefits of health care system, we need one platform which can hold very large scale data for all participation. And this platform is non-none other than IBM Z900 mainframe server system, DB2 Large-scale relational database and CICS transaction middleware. As the lowest bottom of all system dealing data, we store all concerned data through DB2 large-scale relational database which is at the mainframe. We also deal with data for program which concern many table data through the storage procedures of mainframe; of course, if the data is little, for example the small transaction-participation user medical clinic or medication card transactions, we use the CICS transaction middleware in the mainframe. The paper firstly introduces the background of system design, purpose and design goals. Following this, it mainly states system requirements, running environments, system structure, basic design concepts, functionality and system security precautions. The last gives the summary of this paper.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123477223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust person identification with face and iris by modified PUM method","authors":"Jie Lin, Jianping Li, Hui Lin, J. Ming","doi":"10.1109/ICACIA.2009.5361089","DOIUrl":"https://doi.org/10.1109/ICACIA.2009.5361089","url":null,"abstract":"In previous works, we have applied the modified PUM method in face recognition and demonstrated the effectiveness of this method for deal with partial occlusion and distortion. Based on the similitude between the face features and iris features, this paper proposes a new method for person recognition by the combining of iris and face. This new method combines the iris and face features as a new feature for representing persons and then acts the modified PUM on the new features for recognition. Generally, the iris features, however, is more reliable than the face features. Hence the iris feature should be given a higher weight. For this, this paper further improves the method to form a better strategy for combining the face and iris on recognition. The new improved approach has been evaluated on combined-face and iris databases, using face testing images subjected to various types of partial distortion and occlusion. The new system has demonstrated improved performance over other systems.","PeriodicalId":423210,"journal":{"name":"2009 International Conference on Apperceiving Computing and Intelligence Analysis","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123920316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}