Skip to main content

2012 | Buch

Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19-20, 2011, Melbourne, Australia

Volume 1: Intelligent Control and Network Communication

insite
SUCHEN

Über dieses Buch

The volume includes a set of selected papers extended and revised from the International Conference on Informatics, Cybernetics, and Computer Engineering.

Intelligent control is a class of control techniques, that use various AI computing approaches like neural networks, Bayesian probability, fuzzy logic, machine learning, evolutionary computation and genetic algorithms.

Intelligent control can be divided into the following major sub-domains:

Neural network control

Bayesian control

Fuzzy (logic) control

Neuro-fuzzy control

Expert Systems

Genetic control

Intelligent agents (Cognitive/Conscious control)

New control techniques are created continuously as new models of intelligent behavior are created and computational methods developed to support them.

Networks may be classified according to a wide variety of characteristics such as medium used to transport the data, communications protocol used, scale, topology, organizational scope, etc.

ICCE 2011 Volume 1 is to provide a forum for researchers, educators, engineers, and government officials involved in the general areas of Intelligent Control and Network Communication to disseminate their latest research results and exchange views on the future research directions of these fields. 90 high-quality papers are included in the volume. Each paper has been peer-reviewed by at least 2 program committee members and selected by the volume editor

Special thanks to editors, staff of association and every participants of the conference. It’s you make the conference a success. We look forward to meeting you next year.

Inhaltsverzeichnis

Frontmatter

Intelligent Control and Network Communication

A Trust Management Model Based on Reputation for Virtual Community

To improve the accuracy of trust value among members in virtual community(VC), a trust model based on reputation was proposed. Superior to the existing approaches, the activity degree and the length of the trust chain were taken into account and corresponding punishment mechanism was introduced, and a novel computational method was put forward. In addition, the model can motivate members to participate in activities. Simulations show that this model is effective and feasible to virtual communities.

Shuqin Zhao, Yucui Guo, Shang Lv
Fault Location of Aircraft Cable Based on One-Terminal Electrical Quantities

An airplane cable fault location method is proposed to solve the problem of being difficult to locate the fault. The differential equation mathematical model of aircraft cable fault location based on the one-terminal electrical quantities is created. The BP neural network is selected as the control algorithm which can identify the unknown parameters of the model. The experiment result shows that the mathematical model is rational and effective.

Xiaolin Liu, Zhenzhen Zhang, Tao Jing, Xudong Shi
Application Research on Computer Rank Examination Basing on Data Mining

Analyzed the grade of C language of computer rank examination of Jiangsu province and questionnaire data by using of data mining technology. Design and Realize the data mining process of computer rank examination performance based classification of decision tree. Identify the hidden curriculum information to provide guidance for the C language.

Xue Xiao-feng, Xue Xiang-hong, Ye Fei-yue
Popular Misunderstandings and Improvement Strategies for Network Marketing

with the development of information technology, network marketing is active in the business of enterprises. However some enterprises have failed to grasp the network marketing because of the network marketing misunderstandings. This paper listed five misunderstandings of network marketing and gave the brief description of the causes. At the same time, it also put forward five improvement strategies to help some SMEs (Small and medium-sized enterprises) out of the failure of network marketing.

Ling Feng, Anbao Wang
Research of RFID Service Frame Based on OSGi

The paper researches RFID service frame based on OSGi, OSGi is an oriented-service model, RFID provides a new type of service. The paper presents related research, and proposes a new RFID service frame based on OSGi, the frame may be used in mobile device. The paper presents the structure, and describes realized method for each part. Because mobile devices are popular the frame will has a widely use in future.

He Fugui, Zhang Mei
Analysis of the Radiation Mode of the Leaky Coaxial Cable with Vertical Slots

Starting from the Floquet theorem, the radiation mode of leaky coaxial cable is studied detailedly in this article, the existing condition of the radiation mode is given, the work frequency band of the radiation direction is analyzed and the radiation direction mode under each radiation mode is discussed. To manifest the leaky cable’s each radiation mode intuitively, some concrete parameter is designed in the paper. By using the matlab software simulation, the field pattern and radiation direction pattern are emulated in this paper.

Qian Jiansheng, Yang Chen, Hu Qianqian, Zhou Liujun
Decision-Making Modeling of Military Engineering Repair Operations Based on Organizational Design

A decision-making modeling method was proposed towards military engineering repair operations based on Organizational Design Theory. According to material, energy, and information shape features, “material flow” and “information flow” was designed, which described organizational process on wartime repair operations, and then repair decision-making organizational design method was elaborated under the resource restraints and optimization. In this method, decision-making optimized model was established on wartime military engineering repair operations, which successfully achieved conformity and optimization on resource, task, entity, and other elements.

Fengshan Wang, Wanhong Zhu, Houqing Lu
Wartime Repair Decision-Making Framework for Military Engineering on Complex System Theory

To achieve conformity and optimization on resource, task, entity, and other elements, wartime repair decision-making framework was proposed towards military engineering based on complex system theory. On the basis of conceptual description about wartime military engineering damage and repair system, system characteristics were posted in repair structure, and then system laws in military engineering repair structure were constructed with complex system science. According to material, energy, and information shape features, wartime engineering repair operations were abstracted, decision-making framework was presented in the complex operation system. It provided certain reference on predominating repair laws thoroughly, and aimed to gain best operational efficiency.

Fengshan Wang, Wanhong Zhu, Houqing Lu
A Study on the Customer Profitability Analysis Using Activity-Based Costing

Activity-Based Costing (ABC) which has become an important aspect of manufacturing or service organizations can be defined as a methodology that measures the cost and performance of activities, resources and cost objects. It can be considered as an alternative paradigm to traditional cost-based accounting systems. Customer Profitability Analysis (CPA) is an important path to a more successful business operation, offering new insights into enhancing company performance. A well-designed and implemented ABC system is a powerful aid to management evaluation and decision-making, thereby improving organizational performance. This paper was aimed at unravelling the practical complexities of implementing ABC for CPA purposes.

Zhao Wei
Study and Design on the Model of Personalized Recommendation System in E-Commerce Based on Multi-Agent

With the development of the Internet, e-commerce has become an important form for current consumer purchases or browsing commodity. It was a problem on how to provide personalized recommendation e-commerce service for users under growing and changes in the amount of commodity information. According to the Agent and Web data mining technology, this paper presents a base on Agent of e-commerce personalized recommendation system structure that is composed of customers, personalized recommendation system and e-commerce sites. The personalized recommendation system is divided into 3 layers, including the presentation layer, the business logic layer and the data service layer. The function of each part and multi-Agent cooperative work flow of the personalized recommendation system are designed. The system could meet intelligent personalized recommendation and personalized demand for consumers under the e-commerce environment, which has certain practical and promoted value in the future.

Yun Xue, Xiaoping Shen, Jianbin Chen
Nonlinear Regression for Analog Data Based on BP Neural Network

In order to solve the nonlinear regression problem in analog data collection system and achieve nonlinear analog correction by programming, a design method based on artificial neural network (ANN) is presented. After analyzing the lack of other regression methods, Error back-propagation (BP) algorithm is selected. The software on PC is designed to verify the feasibility and effectiveness of the BP algorithm, which is compared to least squares (LS) algorithm.

Yin-Zhen Jiang, Yi-Huai Wang
A New Type of Control Algorithm of High-Power Active Power Filter

In view of active power filter’s control is difficult to keep better unity in the dynamic performance and control precision, it puts forward a improved quasi-sliding mode variable structure control algorithm based on repetitive prediction control in HAPFSIC. For the control reference signal is a cycle volume, combined with rapid response of sliding mode variable structure control algorithm and the advantages of a good real-time non-steady-state error of repeated prediction control algorithm, it imports the control volume of repetitive prediction control algorithm as the equivalent control of improved discrete quasi-sliding mode variable structure controller, which makes it has three change state of switching on both sides as well as the within band. The simulation shows that: this new type of compound control method that overcomes the sliding mode variable structure control’s discrepancy regulation, a larger burr of current switch, and also avoids the shortcomings of repeated control’s longer time to reach steady-state, achieves organic combination of two control methods.

Fen Gong, Xiangyang Xia, Shiwu Luo, Feng Zhou, Linju Xu
High-Capacity Hybrid Active Power Filter for the Power Substation

Non-linear loads, such as diode, thyristor converters and arc furnaces are typical sources of harmonic currents. A capacitor clamped voltage source inverter for high-capacity hybrid active power filter (HHAPF) to compensate harmonics and reactive power. If the utility voltage is distorted, APF allows similar level of distortion in the compensated source current. The HHAPF which is composed of series resonators injection APF and passive filter (PF) by parallel hybrid can make static compensation of reactive power by capacitor and it can eliminate harmonics by the co-function of active filter and passive filter. The serial resonant LC network resonance occurs in the fundamental frequency, its fundamental current impedance is approximate 0, the fundamental current will all flow to this network, but not to flow into the coupling transformer and the inversion. Practice shows that the HHAPF has good filter effect and certain capacity of reactive power compensation.

Fen Gong, Xiangyang Xia, Shiwu Luo, Feng Zhou
Research on the Tender Evaluation of Scientific and Technical Projects Based on Fuzzy Comprehension Assessment

In this paper, a complete method of evaluating tenders which is based on fuzzy mathematics theory was mainly put forward solving the existing problems in the bidding tender assessment. Then we applied this method to evaluating the tender of the scientific and technical projects. The results have proved that this method could make the evaluation of tenders more comprehensive, rational, and scientific.

Zhang Min, Yin Zhongfeng, Tang Zhaojie
Study of Resource Allocation Efficiency in Diversified Railway Logistics under Administrative Monopoly’s Influence

The paper analyzed whole resource allocation efficiency in diversified railway logistics from the broad aspect by constructing welfare loss formula. The result shows: since the major reform from 2003 in diversified railway, the trend of overall resource allocation efficiency in diversified railway logistics continues to increase, in which warehousing industry has optimal resource allocation efficiency, and the worst is transport supporting industry.

Lipeng Feng, Jiwei Qin
A New Condition Monitoring and Fault Diagnosis Method of Engine Based on Spectrometric Oil Analysis

According to statistics, wear fault is about sixty percent to eighty percent of all the machinery faults. Spectrometric oil analysis is an important condition monitoring technique for machinery maintenance and fault diagnosis. Now, there are two existing mathematics analysis models based on spectrometric oil analysis, namely concentration model and gradient model. However, the above two models have respective disadvantages in condition monitoring and fault diagnosis of the engine. Then in this paper a new mathematics model, proportional model, was put forward monitoring wear condition and diagnosing wear faults of the engine. Proportional model use the relationship and correlation among the elements in the lubricating oil to detect wear condition and occurring faults in the engine. The steps of establishment of proportional model were described firstly. Then we used the experiments data to verify the feasibility of proportional model and gave limit values of proportional model. In order to validate the feasibility of proportional model, proportional model was applied to monitor wear condition and diagnose wear faults of an engine. The results from this paper have proved that the method based on proportional model is applicable in condition monitoring and fault diagnosis of the engine.

Gao Jingwei, Hu Niaoqin, Jiang Lehua, Fu Jianyi
Object Tracking by Mean Shift Dealing with Scale Increasing

In the process of object tracking, the scale of object changes along with the movement of object. But the opposite location of corner point only changes Rendering affine transform. At first, corner points were Distilled in different periods of time using an advanced Harris algorithm, and then the object Skeleton was reformed using these corners. Meanwhile, the displacement coefficient, the zoom coefficient, the rolling coefficient and the misplace coefficient were ascertained. At last, the tracking window was updated on line. The Mean Shift algorithm is used in this paper to adjust window. The experiment indicates that this algorithm can cope with the situation of scale changing, especial on the condition of Scale increasing.

Hai-ling Bi, Bao-feng Yuan, Yu Fu
Wireless Alarm System Basing on FPGA and SOPC

The sending system designed basing on FPGA (Field Programmable Gate Array) is great reliable, and includes the coding control circuit, modulation circuit, power amplifier circuit and the launching of circuit. The receiving system designed to SOPC (System on a Programmable Chip) as the core is good flexible and includes the power amplifier circuit, the demodulated circuit, the alarm circuit as well as the decoded circuit. Wireless alarm system which is small, easily installed, long in transmission distance, strong in anti-interference, low in false alarm rate, reliable as well as it is scalable and easy to modify, As time goes on, new features can be also added in if needed.

Yuemin Wan, Xiaoping Wang, Lei Xing, Peng Zhang
The Opportunities, Challenges and Tendency of Reverse Logistics

With the governments’ emphasis on environmental issues, product resources shortage, waste materials recycling and re-using; the reverse logistics is changing its status. It is no longer “been looked upon as a necessary evil” [1]; today, more and more companies are viewing reverse logistics as a strategic activity to put it into organizational strategic consideration. Based on above reasons, this paper tried to discover the opportunities, challenges and tendency of reverse logistics. Firstly, it introduced the concept and drivers of reverse logistics; next, analyzed the opportunities and challenges of development reverse logistics; and then, displayed the practice of reverse logistics in the USA; at last, it discussed the tendency of reverse logistics management. This paper also implied that developing the third-party reverse logistics is the best solution for reverse management.

Ma Fen
Research on Optimization of Equipment Maintenance Plan Based on Entropy and TOPSIS

In order to ensure the decision-making of equipment maintenance plan more scientific and accomplish equipment support mission, this paper proposes the index system of the plan, applies the entropy to figure out the weight of the assessment index and optimizes equipment maintenance plan based on analyzing the influencing factors and optimizating purpose. The entropy and TOPSIS method is applied in the optimization of equipment maintenance plan. The result indicates that the method is more logical and has certain practical in the decision-making of the equipment maintenance plan.

Fujiang Zhou, Xiaodo Zhu, Hongwen Chen
Face Detection and Tracking Based on Weighted Histogram and Shape Constraints

In this article, a robust Two-dimensional face tracking is proposed which is based on histogram matching and shape constrain. First, an adaptive weighted histogram matching is used to describe the face of the regional information, make model for a more reasonable description of the regional characteristics, and increased robustness. Not only to avoid a model of skin color, but also increase the robustness described. Moreover, rotating or point of view in order to deal with the impact of changes or point of view, in the process of tracking the use of tracking the results of the current frame modified adaptive Histogram Matching, use shape constraints to the target position more accurately. The experimental results have shown that the proposed method not only attains high face detection rate, but also for block, illumination and face Pose variations are adaptability and real-time.

Qin Ling, Tong Xian Hui
Chirplet-Fractal Characteristics of Leakage Current on HV Insulators

With the increase of voltage grade in power transmission system and the aggravation of industrial pollution, flashover of contaminated insulators is getting more and more serious in high-voltage (HV) and ultra-high-voltage (UHV) systems, this threatens the security of power transmission severely. The key to improve the security of power system is to explore methods of monitoring states of insulator’s surface by some eigenvalues. A new idea, using chirplet as the ruler to define fractal dimension, was proposed in this paper. Chirplet-fractal dimension is defined as the sum of residues of decomposed signals in formula 8. The fractal characteristics of leakage current (LC) are gotten from this dimension. The results show in figure 11, which the chirplet-fractal dimension efficiently describes the information of arcs discharge in LC, and it is also a good eigenvalue for flashover discrimination and risk prediction.

Ali Hui, Hui Lin
An Supply Chain Network Evolving Model Based on Preferential Attachment of Path and Degree

Supply chain network is a complex giant system, and its complexity is determined by the structure of network. Empirical studies have been shown: the supply chain network had the scale-free and cluster characteristics, but today supply chain network models could not describe cluster characteristic of real network. This paper introduced a concept of path, and presentes a supply chain network model DPPA, which based on path and degree preferential attachment mechanism. This model depictes the scale-free feature of supply chain network, while also reflecting the cluster characteristic. The average cluster coefficient of this model with 5000 vertices in the network reached 0.5754, which can be controlled by the adjusting parameters of DPPA model.

Peihua Fu, Yanchu Liu
Researches on Content Delivery Policies for Interactive Video Network

Interactive video network, such as Video-on-Demand (VoD) or IPTV system, is the primary part of the Next Generation Network (NGN), in which the application server resources are typically shared by multiple end users. Content delivery policy is one of the most important issues in such kind of network due to the huge storage and bandwidth required by video streaming. While the deployment of commercial interactive video network, we developed a series of content delivery policies, among them the mathematical definitions of object popularity, the measure methods for the inequality of object popularity, and a Dynamic-Resource-Allocation (DRA) based flash crowd mitigation algorithm are presented in this paper. The simulation results show that our researches are helpful to deploy QoS guaranteed video network in a cost-effective way.

Dao-yi Wang, Wenan Zhou, Yuanan Liu
Study on the Distribution and Computer Simulation of Metro Rail Potential

Through simplifying and limiting the practical metro models, the bilateral power supplying system has been studied by using the resistance network model and a theoretical analytic model of the rail potential distribution in the bilateral power supplying system has been established. Computer simulation of rail potential distribution in different traction current is carried out. The results show that the rail potential is affected by substation pitch, the amount of current taken by locomotive, railway portrait resistor, rail-to-ground transition resistor and other factors, the distribution of rail potential is provided from a macro on the qualitative. This gives theoretical basis on solving high rail potential and how to set the distance of substation. Ultimately it provides a good solution to reduce the stray current corrosion.

Yu-qiao Wang, Wei Li, Xue-feng Yang, Guo Ye, Qi-gao Fan, Li-ping Zhang
Study on Method of Data Fusion in Metro Stray Current Monitoring

According to the characteristics and demands of metro stray current corrosion monitoring and protection, the monitoring parameters are reasonably selected and on-line monitoring methods of various parameters are analyzed. Data fusion model is established to make the data more reliability and accurate. The data fusion methods for measurements of stationary potential of reference electrode and rail potential are proposed and verified with the testing data. The result shows that the data fusion method can make the monitoring data more reasonable and effective, and it is important for the overall comprehensive analysis of metro stray current corrosion.

Yu-qiao Wang, Wei Li, Xue-feng Yang, Guo Ye, Xi-yun Ge, Xiu-ping Su
How to Effectively Manage the Cost and the Time of Logistics Quick Response

Quick Response has become an important strategy to increase competitiveness in logistics. Variables affecting logistics quick response capability have been widely studied from the perspectives of assessment on logistics performance or supply chain performance. This paper analyzes the key variables to assess logistics quick response capability in China. It analyzes empirical data collected from 50 logistics experts and professionals to identify the importance sequence of the variables. The results indicate that, in the Chinese context, the three most important variables affecting logistics quick response capability are customer service, time management and logistics cost. It’s critically important to manage the latter two variables in order to achieve improved customer service. A methodology of non-linear cost-profit balance is proposed for effective logistics quick response implementation.

Junbo Li
The Application of SOM and GRNN in Creativity Measurement for Middle School Students

In this paper, creativity measurement data was analyzed by neural networks. Williams Creativity Test B(WCTB) and Adolescent Scientific Creativity Scale(ASCS) were used to measure the creative affective and scientific creativity for 550 middle school students. The data was clustered with SOM neural network, and three categories were obtained. There were significant differences for creativity factors except imagination among the categories. In 550 students, 70% of them were used as modeling group, and the other as testing group. Generalized regression neural network (GRNN) and multivariable linear regression (MLR) were used for modeling and testing. Risk-taking curiosity, imagination and complexity scores used as input and independent variable, scientific creative scores used as output and dependent variable. The result showed the predictive error of GRNN was lower than the error of MLR. The neural networks could analyze creativity measurement data very well.

Jiayuan Yu
A General Throughput Model for Parallel Cluster Tools

To effectively evaluate and analyze performance of cluster tools in semiconductor manufacturing, the paper presents a throughput model for parallel cluster tools .For developping this model, the timing diagram is applied to describe the usage of the chamber and robot in parallel processing of cluster tools. Finally, the theoretical model which indicates the relationship between the number of chamber, processing time, transport time, and throughtput is deduced. This model can analyze and computer the wafer period and the batch period fast and accurately.

Zheng Xiuhong, Yu Haibin, Hu Jingtao
Two Level Strategies for Supply Chain Knowledge Innovation

Analyzed the strategy of knowledge innovation in supply chain level after discussing the Characteristic of supply chain knowledge innovation, presented enterprise level strategies according to difference in market station and technical character of product.

Wei-hua Wang, Nie Qing
Analysis and Design of RFID Tag Ownership Transfer Protocol

In some radio frequency identification (RFID) applications, the tag may change owner during the course of its lifetime. In the conference RFIDsec 2008, Song proposed an RFID tag ownership transfer protocol. In this paper, we point out that the protocol can not satisfy the security requirement of Old Owner Privacy, i.e., the new owner can track the previous communication between the old owner and the tag. Based on a recently proposed efficient secure mutual authentication protocol [5], we present an efficient tag ownership transfer protocol, and the analysis show the protocol can reach the security requirement of privacy, authentication, old owner privacy and new owner privacy.

Wang Shaohui
Image Detection to Vehicle Queue Length of Crossroad Based on DSP

An image detection to vehicle queue length at crossroad based on DSP is presented in this paper. It describes the hardware structure and the main program of the image detection system, as well as the vehicle queue length extraction method. The system is applied to the city traffic signal control machine, and it shows the system is better than the means of using inductance coil on precision, fixing and etc.

Lu Weina, Wang Haifang, Ma Yuquan, Zhang Lihong, Wang Qingzhu
SI-NS Diagram Program Design and Development Method

His paper attempts to exemplify SI-NS diagram technology and its related program design and development method. With this method programmers can always focus on the SI-NS diagram, which is much easier to be understood than the abstruse program itself. This new development model could guarantee the quality of the developed programs and a high success rate of development, which naturally shortens the software development cycle and reduces the software costs.

Si Chuangen, Si Ximing, Zhang Chunjuan
Linear Detection Research of Remote Sensing Image Based on Morphological Filter and Hough Transformation

Because remote sensing image is characterized by abundant grayscale change, great amount of information, complicated background noise, some methods can successfully detect binary image, however, detection of these methods in the remote sensing image is difficult to meet actual needs. The paper summed up the key problems of Hough transformation, and a modified algorithm for peak value cluster round phenomena in the peak value extraction of Hough transformation is proposed in this paper, the experiments have shown that peak value extraction algorithm proposed in this paper can greatly increase the accuracy of parameter estimation. Combining the modified Hough transformation and morphological filter in the linear detection of remote sensing image, the paper put forward a linear detection method based on morphological filter and Hough transformation, comparing to the simulation results of classical Hough transformation, the algorithm in this paper can achieve good results in the detection speed and the target location precision.

Gaohua Chen, Zhicheng Zhao, Tiemei Yang
The Research on How Social Capital Facilitates Knowledge Sharing between Individuals

As the knowledge activity is always embedded in networks of social context, so the net structure relationship quality and common social cognition have an important impact on knowledge sharing effect. Based on reviewing the theory of social capital, we researched on how social capital facilitates knowledge sharing between individuals. Conclusions from theoretical study are as following. (1) Each Social capital variable (namely structure variable, relationship variable and cognitive variable) has significant influence on knowledge sharing. (2) There are inter-relationships among the variables of social capital. Structure variable has positive effect on relationship variable and cognitive variable. Cognitive variable has positive effect on relationship variable. (3) The knowledge tacit moderates the impact of social capital on knowledge sharing effect.

Jin Hui, Chen Yijia
Research on the Organization Performance Appraisal in the Information Era

Performance appraisal can make the organization strategy come true and keep the organization sustainable development. The information era characterized in more and more knowledge workers and corporations informationization has lead the new challenges for the current performance appraisal. Knowledge-based employees are playing increasingly important role in the modern organization. The working place is not only in office and the working time is unfixed any more. Some of the organizations depend on the informationization too much. All these changes are changing the way of the current performance appraisal. This paper suggests the performance appraisal should combine with the ability appraisal, individual appraisal combine with the team appraisal, eHR (electronic human resource) combine with the traditional appraisal, which can exactly assess the employ’s contribution in the organization in the information era.

Maofeng Li, Lunqu Yuan
Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term Keys

Parallel key-insulated encryption (PKIE) allows two independent long-term keys to be alternately used in short-term key update operations. At least half of short-term keys would be exposed and at least half of ciphertexts could be decrypted if one of the long-term keys is exposed. In this paper, we propose a new PKIE scheme with n long-term keys in the identity-based setting. If one of the long-term keys is exposed, only 1/n short-term keys would be exposed and 1/n ciphertexts could be decrypted, so the new PKIE scheme can greatly decrease loss due to key exposure. The scheme is adaptive-ID secure without random oracles, and it has a tight reduction. Moreover, its public key has a constant size, while sizes of ciphertexts and short-term keys depend on the number of long-term keys.

Yanli Ren, Shuozhong Wang, Xinpeng Zhang, Zhenxing Qian
A Novel Approach to Calibrating the Line Scan Camera of Vehicle-Borne 3D Data Acquisition System

It proposed a novel approach to calibrate the line scan camera (LSC) based on the characters of the line scan camera and the vehicle-borne 3D data acquisition system. Using the angle information from the laser scanner data, combing the principle of the line scan camera, it built a calibration model for LSC and designed some experiments for that. Then it computed high precision calibration parameters, which provides basis for the data peocessiong of the whole vehicle-boren 3D data aquisition system and gives references to the similar sensors calibration.

Youmei Han, Liuzhao Wang
The Bartered-Type Return Policy Based on Strategic Customer Behavior

Considering strategic customer behavior (SCR), this paper studies the bartered-type return policy, and builds an extended newsvendor model with the bartered-type return policy based SCR. By analyzing our model we obtain the expression of the seller’s optimal price and inventory. The optimal price is related to the distribution function of the value of the product, and the optimal inventory is related to the price of the replaced product when the cost and the salvage price is given. At last we simulate the actual data using the software matlab, and clearly illustrates the application of our model in the real condition.

Hong Jiang, Ershi Qi, Yanfang Huo, Daojian Yang
Runtime-Based Boot Components Re-measurement Scheme for Trusted Platform

Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions (binary code) is measured and recorded before it is executed. Especially, all of boot components which be recorded in pre-boot stage can’t be re-measured until the platform is rebooted. However, the reality is that many components belong to pre-boot stage, such as BIOS, Boot Loader and MBR, are easily modified or updated in runtime environment. If these updated results of components are treated as configuration requirements for a remote server-side to verify the access request, the remote network access connection will fail. It must restart the host to re-measure there components, and the result of the new measure is not guaranteed right absolutely. We solve this problem by embedding Integrity Measurement Agency Component (IMAC) which has the capability of monitoring transformation, verifying credibility, updating Platform Configuration Registers and recording integrity measurement logs in Linux kernel. The result of performance analysis demonstrates that the method is feasible and credible.

Peng Weiping, Zhou Yajian, Wang Cong, Yang Yixian
Multi-invariance MUSIC Algorithm for DOA Estimation in Acoustic Vector-Sensor Array

This paper discusses the problem of direction of angle (DOA) for acoustic vector-sensor array, and derives multi-invariance MUSIC (MI-MUSIC) algorithm therein. The proposed MI-MUSIC, which only requires one-dimension searching, can avoid the high computational cost within two-dimension MUSIC algorithm (2D-MUSIC). Our proposed algorithm can resolve the DOAs estimation of acoustic vector-sensor array. We illustrate that MI-MUSIC algorithm has better performance than ESPRIT algorithm, and it also can be viewed as a generalization of MUSIC. Simulation results verify the usefulness of our algorithm.

Weiyang Chen, Zhongwei Sun, Xiaofei Zhang
The Design of the Internal Combustion Engine Based on the Intelligent PID Control Algorithm

At present, the technology of the traditional relay controller and honeywell digital controller are adopted in many combustion machine control systems. But the two technologies show some shortcomings in practice. A new combustion machine control system based on PLC was presented in which the intelligent PID control algorithm was adopted. In the new proposed system, the temperature is controlled by the analog outputs. The practical application results show that the proposed system with properties of high accuracy, good stability and high reliability. The design of software and hardware of the new system is introduced in this paper.

Wang Dongyun, Wang Kai
Research on Knowledge Management from the Perspective of Human Resource Management

Based on the theory of knowledge management and human resource management, this paper explored the relationship between knowledge management and human resource management and analyzed the problems in knowledge management in China’s enterprises. In addition, this paper put forward some suggestions to improve the level of knowledge management according to the China’s practice. The paper argued that the integration of human resource management and knowledge management can achieve effective management of knowledge innovation. On the one hand, the knowledge management can improve the knowledge innovation through more effective system and method of human resource management; on the other hand, combining with human resource management can dispel misconceptions of knowledge management, and knowledge management can achieve further development by taking people as the core of management.

Liu Fengwei
Design and Application of Fieldbus OPC DA Server

OPC is one of the most important communication specification in the industrial control community. Taking one kind of LonWork fieldbus products developed by our self as one case study, we implement an OPC DA Server for the fieldbus based on the given APIs of the device driver. The implementation principles of four important parts: real-time database, GUI, OPC data access, I/O read and write, are probed in detail. This opc server, together with several popular SCADA software such as iFix and KingView, has successfully applied in many intelligent buildings’ projects.

Jianchun Xing, Qiliang Yang, Ping Wang, Ronghao Wang
Security Enhancement on an Authentication Method for Proxy Mobile IPv6

Proxy Mobile IPv6 (PMIPv6) is an emerging network-based localized mobility management scheme. Recently, Zhou, Zhang and Qin proposed an authentication method for PMIPv6. However, this paper shows that their scheme fails to achieve mutual authentication between the Mobile Node (MN) and network. It performs only unilateral authentication of the MN to network, and the MN has no information about the authenticity of the network, thus it is susceptible to network spoofing attack and malicious MAG attack. Then, an improved scheme is proposed to remedy these security flaws.

Qi Jiang, Jianfeng Ma, Guangsong Li, Ayong Ye
Software Piracy Prevention: Punish Buyer or Seller?

Software piracy is illegal and the government should adopt effective measures against it. After many years of fighting against it, software piracy does not die out, but rather becomes more serious. In this paper, the phenomenon of software piracy is investigated from the perspective of game theory. An evolution model is proposed and several simulations of the software market trend are followed this model. They simulated the market without punishment, with punishment on buyers, on sellers and on both of them. Through these analyses, a conclusion can be drawn that punishing the buyers is a necessary measure against software piracy.

Hong Ding, Xiaofeng Zhang
Two Propositions about Geographical Distributions of BitTorrent File Resources

Recently, much attention has been paid to applying underlay information in optimizing BitTorrent (BT) systems. However, most of these approaches have taken such an assumption that BT file resources are distributed uniformly on the earth, which directly results in performance degradation on BT. In this paper, we study the geographical distribution of BT file resources. By measuring and analyzing BT systems, BT file resources are found to be non-uniformly distributed both in country level and AS level. Consequently, two propositions about the characteristics of geographical distribution of BT files resources are derived. These propositions overthrow the foundation based on which many P2P locality-based algorithms used to optimize cross ISPs traffic, i.e., BT file resources were thought to follow uniform distributions geographically. Finally, a general and adaptive traffic optimizing algorithm called GeoDTO is proposed and analyzed.

Ming Chen, Lidong Yu, Huali Bai
The Strategic Decisions and Evaluation System of Chinese Logistics Agency Enterprises in Green Logistics Development

Green logistics is an inevitable trend of international economic development. But Chinese logistics agency enterprises in green logistics development are restricted by external environment and internal condition. With SWOT analysis, the paper analyses the opportunities, threats, strengths and weaknesses of Chinese logistics agency enterprises in green logistics development. On the basis, the paper puts forward the strategic decisions of Chinese logistics agency enterprises in green logistics development, and puts forward the corresponding countermeasures in both hardware and software and evaluation system supporting the strategic decisions.

Xu Deling, Geng Fengchun
Research on Methods of Optimal Road Transportation Routing for Dangerous Goods

The transportation of dangerous goods is increasing greatly with the development of economy; the risks of it, to our human being’s safety and health, are expanding, the consequence is very serious once the accident arises. So the problems that how to choose an optimal path for it to ensure transport safety and arrive at their destinations quickly need to solve urgently. The essay takes the special nature of dangerous goods into account, builds and optimizes a model, ultimately selects a transportation route of lower risk and cost.

Huo Hong, Xiong Zhenyu
Design of Active Disturbance Rejection Controller for Main Drive System of Rolling Mill with Uncertainty Parameters

The output and quality of metal plate and strip are heavily affected by performance of the main drive system of rolling mill. Aim at the characteristics of main drive system of rolling mill, such as uncertain external load disturbance and unmodelled dynamics, the model of main drive system of rolling mill is established, where uncertain external load disturbance and unmodelled dynamics are regarded as one integrated disturbance. Then, using extended states observer (ESO), a new observer is proposed to observe and compensate this integrated disturbance, and a robust controller of speed system of rolling mill is designed based on active disturbance rejection control (ADRC) technology. This controller has very strong robustness not only to external load disturbance, but also to unpredictable plant parameter variations such as inertia of load, resistance of armature. Its effectiveness is verified by the simulated result.

Zhang Ruicheng, Chen Zhikun
Design of Active Disturbance Rejection Controller for the Rolling Mill Automatic Position Control Stopping System

A nonlinear model of the rolling mill automatic position control system is derived based on analyzing the friction between roll and metal plate, the flexibility and the roll eccentricity force. The nonlinear characteristic of the automatic position control (APC) system is analysed. The result shows the APC system has chaotic characteristics. Aim at the characteristics of the APC system,such as nonlinear and variable parameter,a robust controller of the APC system is designed based on active disturbance rejection control(ADRC) technology. The simulation results show that the ADRC controller has very strong robustness to the system chaos and the large load disturbance, and rapid and smooth control process and high steady precise performances can be implemented.

Zhang Ruicheng, Li Guide
Wire Communication System Based on DSP in Feeder Automation

The requirements of feeder automation are that the communication system had the characteristic of lower cost, stronger anti-interference ability, higher reliability and much more real time ability. So wire (twister-pair) relay communication manner is chosen in the feeder automation system in the design, and the communication distance can reach to 10km. In the system, OFDM(orthogonal frequency division multiplexing)technology is applied to transfer data. The OFDM signal is produced and demodulated by way of IFFT (Inverse Fast Fourier Transformer) and FFT(Fast Fourier Transformer). A general DSP (Digital signal process) chip TMS320C54 act as the key of digital signal process to perform almost all the function including arithmetic calculation, modulating and demodulating the data. The OFDM signal Modem, designed basing on the DSP chip, had met the need of the communication system.

Yanfang Wang, Yongjun Liu, Xiaoping Wang, Shenlin
Influence of Supply Voltage of Node on RSSI-Based Localization Performance and Calibration Technique

Location accuracy is one of the key indicators in measuring the performance of wireless sensor localization systems. Apparently, the localization performance is largely determined by ranging precision in the distance-based localization system. In the RSSI-based distance estimation techniques, the accuracy of their estimation is vulnerable to the change of RSSI measured values. As is known, the Received Signal Strength Indicator (RSSI) is environment dependent in certain extent. In addition, the received signal strength mainly depends on the emitting power of the sender. In this paper, the RSSI measured values are investigated when the sending power gets changed due to low supply voltage of the sender, and then a calibrated method is proposed. Experiments show that the proposed method can significantly mitigate distance estimation errors caused by low supply voltage, thus it can be widely used in battery powered wireless sensor localization systems.

Zhang Rongbiao, Guo Jianguang, Chu Fuhuan, Song Yongxian
Weak Signal Detection Method under the Strong Noise Background

In response to the instability phenomenon of the weak signal detection process based on the single chaotic oscillator, an improved method which detects the weak signal by adjusting the system to reach a stable chaotic state is proposed. This method combines the chaotic attractor and double differential oscillator detection, and decides the critical value from chaos to period by the double differential oscillators at the same time. The simulation shows that this method can avoid misjudgment effectively and has a good real-time performance, which is beneficial to weak signal detection under the strong noise background, and it provides a referential method for practical engineering application.

Zhang Rongbiao, Chu Fuhuan, Ran Li, Guo Jianguang
Design of Rapid Control Prototyping Platform Based on RTX

The rapid control prototyping(RCP) system that based on Simulink model and RTX real time system was designed. The RCP system can rapidly convert the Simulink model into the RTX real time model and realize: the automatic compilation and downloading of the Simulink model, the on-line modification of simulation parameters, real time storage of simulation data, automatic distribution simulation, configuration file administration. The simulation results, given in Fig. 8 and Table 1, show preliminarily that the RCP system designed by us is not only reliable but also gives good precision.

Zhi Xu, Shuo Tang
VxWroks-Based Mass Storage Driver Stack Framework and Application

Universal Serial Bus (USB) driver is a module that has not been developed in VxWorks5.5. In this study, implementation of USB mass storage driver has been analyzed, including USB Driver (USBD) and Host Controller Driver (HCD) in USB1.1 protocol and Operation System Abstraction Layer (OSAL). Further, an application of USB block driver including configuration of components has been implemented.

Gong Yun, Sun Li-hua
An Improved Anomaly Detection Method Based on Fuzzy Association Rules

The discovery of association rule is a crucial aspect in database mining. In order to further improve the ability of fuzzy association mining in identifying the unknown intrusion data in anomaly detection, an improved algorithm called Hapriori using hash list on mining fuzzy association rules is proposed in this paper. Equivalence classes are used to search frequent items, so that the usual practice of reputedly database scanning can be avoided. At last, experimental results show that our proposed method to some extent increased recognition of the intrusion data.

Zifen Yang
A Utility Quality of Service for Grid Resource Brokers

Grid computing promise the ability to share geographically and organizationally distributed resource to increase effective computational power and resource utilization. However, for the grid computing to be successful, it is very important to provide middleware services that assist grid users to easily interact with grid environments. The paper presents a utility quality of service for grid resource brokers. Resource Brokers on the grid consult a number of distributed information service to select the best data source based on user requirements. The consultation task increases the design complexity of Resource Brokers. We have designed and implemented a utility quality of service for grid resource brokers to hide the underlying complexity of the grid resources from users and to meet not only grid user’s requirements but also resource owner’s policies. It focuses on the discovering and scheduling dynamic resources scattered across multiple organizations. Furthermore, it can be integrated with various scheduling services.

Jun Xie, Ming Chen
Research and Realization of Streaming Media Digital Rights Management

Digital rights management (DRM) is becoming a key enabling technology to protect intellectual property of digital contents, control their dissemination and usage. Combining the actual application situation of the current stream license technology and the new generation of DRM technology, and then poses a concrete scheme for the digital right management system. What’s more, it realizes the streaming media digital rights management system finally according to the scheme.

Jun Xie, Chuanzhong Li
The Attitude towards Translation Exposure and Its HedgingTechniques

It is highly debatable whether the Multinational Enterprises(MNEs) should hedge the translation exposure. The paper examined the stock market reaction to the translation adjustment gains and losses. Through reviewing the survey of current practices of hedging translation exposure, it indicated the management choice of whether to hedge translation exposure and which the most effective way to hedge is. The conclusion is that the existence of loan covenant, chief executive’s commitment of profit and enjoy of a premium might force MNEs to hedge the translation exposure. Other factors discourage MNEs to engage in such hedging activities. And matching is still the most used internal hedging technique, while swap and forward contracts are prevailing but cursory external techniques.

Ying Zhang, Yunlin Zheng
The Econometric Analysis of the Contribution Degree of Technological Progress in Bohai Rim Region

In this paper, utilizing the econometric regression method, using the provincial panel data of Bohai Rim region, and selecting the factors of the technological progress in Bohai Rim region, the author created a space econometric regression model and analyzed the contribution degree of technological progress in Bohai Rim region. The results indicate that the effect of the domestic technology diffusion path spillover to the technological progress of Bohai Rim region is greater than the role of the foreign technology diffusion path spillover and the spillover of domestic R&D capital stock plays a leading role in the technological progress of Bohai Rim region.

Zhang Jingqiang, Zhou Hong, Huang Zilang
The Application of Information Fusion and Extraction in Maize Seed Breeding

It has been the irresistible trend of agriculture informationization which uses information technologies to treat enormous data and finds out potential useful rules to direct the development and reformation of agriculture. Aiming at the specific application of maize seed breeding, this paper effectively integrates several data mining technologies and presents a new method called CA to analyze the whole maize information. The algorithm achieves transverse dimension reduction by combining PCA and other methods, and also achieves longitudinal dimension reduction by improving CURE and k-means. The decision-tree method of CA algorithm introduces three different classifiers in order to enhance the accuracy of trees. By comparing the results of improved algorithm with traditional methods, we can find that the new algorithm is better in performance and degree of parallelism.

Ji Dan, Qiu Jianlin, Dai Xiaoyu, Gu Xiang, Chen Li
Wavelet Based Affine Projection Adaptive Filter

A wavelet transform based affine projection algorithm is proposed, with a variable step-size scheme. The numerical simulations and engineering application verify the performance of the algorithm. On the same conditions, the proposed algorithm has a faster convergence and the same steady state MSE compare to normal affine projection algorithm. That means to achieve the same rate of convergence less order is needed by this algorithm, which counteract the computing expenses induced by wavelet transform. By means of variable step-size scheme, the proposed algorithm has a faster convergence rate and a lower steady state MSE or misadjustment than the corresponding normal variable step-size affine projection algorithms.

Wei-Wei Wu, Yan-Song Wang
Research of the New Principal Component Analysis Algorithm Based on the Dynamic Model

An extension algorithm, exponentially weighted dynamic principal component analysis (EWDPCA) algorithm is proposed to monitor the dynamic process, in particular for disturbances and set points changes in process. The technique is validated through simulation in the process of actual chemical polymerization. The results show that the EWDPCA algorithm can eliminate the linear relationship among variables and reflect the real-time information in dynamic process.

You Zhou, Qinglin Wang, Guangda Yang, Dehui Qiu
Control Method Research of Three-DOF Helicopter Based on Active Disturbances Rejection Controller

The flight control system of helicopter is difficult to control for their performance of high-order, multi-inputs multi-outputs and strong non-linear. This paper proposed a stability control algorithm of three-DOF laboratory helicopter based on active disturbances rejection controller (ADRC). Controlling the motion of axis guaranteed the tracking control in degrees of helicopter respectively. The stability analysis is carried through Lyapunov method. The results show that the algorithm compensate the disturbance and improve the system performance effectively.

You Zhou, Qinglin Wang, Dehui Qiu
Study and Simulation of Crane Lifter Sensorless System Based on Sliding Mode Variable Structure

The mathematical model of crane lifter system is established based three-phase permanent magnet synchronous motor as the power source. To achieve sensorless closed-loop control of crane lifter system, speed controller is designed using sliding mode variable structure and the system lifting speed is estimated applying model reference adaptive observer. Simulation studies have shown that adaptive observer can estimate the speed of movements accurately, sliding mode variable structure speed controller can ensure that the system has good static and dynamic speed performance and strong anti-disturbance capacity of the load.

Feipeng Lou, Xinjin Wang, Lingzhi Cao
Weigh in Motion Based on Dynamic Tire Force Separation

Dynamic tire forces are the main factor affecting the measurement accuracy of the axle weight of moving vehicles. This paper focuses on separating dynamic tire forces from axle-weight signal, and proposes a new method to measure the axle weigh of vehicle based on improved EMD (empirical mode decomposition). First, the characteristics of axle-weight signal and related concepts and process of EMD are briefly introduced. Then the causes and the influences on weighing accuracy of end effect and pseudo-IMF (intrinsic mode function) are analyzed in detail. The AR (auto-regressive) model prediction method and the correlation coefficient method are employed to extend the data points outside of signal end points and judge the pseudo-IMFs, respectively. The pseudo-IMFs and the residual are added to form a new residual, and the average value of new residual is regarded as the axle-weight estimation. Lastly, the simulation and real experiments are given to illustrate the proposed method. The max weighing error of axle-weight is 4.34% at the speed no higher than 20km/h.

Zhou Zhi-feng
The Improving of Initial Exchanges in IKEv2

This paper proposed an approach to provide an efficient authentication and key agreement in IKEv2. We used Elliptic Curve Cryptography Diffie-Hellman (ECDH) to exchange keys between two communicating parties during IKE negotiation. Also we designed and implemented ECC X.509v3 certificate for identity authentication. The results of performance comparisons show that the proposed method provides greater security using fewer key sizes, and improves the execution efficiency of the initial exchanges in IKEv2.

Jieru Lu, Bing Su, Hongyuan Wang, Yihan Zhang
Research on Lane Detection Based on Machine Vision

In order to enhance the real-time and stability of lane detection based on machine vision, a method for line detection based on combined road model is proposed. After image classification according to illumination, the image is processed by different algorithms during image pretreatment. For straight line and curve line in the vicinity, improved Hough Transform (HT) is adopted for line detection and tracking. Both of the road boundaries are fitted using Catmull-Rom Splines based on control points search algorithm for curve line in the distance. For various kinds of lanes on most structural road, experiment results indicate that the method has good robustness and stability.

Xining Yang, Dezhi Gao, Jianmin Duan, Lei Yang
Chaotic Dynamics and Chaos Control of Cournot Model with Heterogenous Players

We analyze a Cournot duopoly game, where players have heterogeneous expectations and nonlinear cost function. Two types of players are considered: bounded rational and naive expectation. By using the theory of bifurcations of dynamical systems, the existence and stability for the equilibrium points of this system are obtained. Numerical simulations used to show bifurcations diagrams for various parameters and sensitive dependence on initial conditions. We observe that an increase of the players’ speed of adjustment may change the stability of Nash equilibrium point and cause bifurcation and chaos to occur, and the system can return to stable state from chaotic state by delayed feedback chaos control method while suitable controlling factor is chosen. The analysis and results in this paper are interesting in mathematics and economics.

Rong Hu, Qi Chen
Study on SCM of Construction Enterprise Based on IT

The supply chain management idea originally from the manufacture industry provides a new management mode for the construction industry, and thus it has become an effective channel for creating and promoting the competitiveness to suit the increasingly intense market competition. This paper first discussed the concept and model of the supply chain management of a construction enterprise and analyzed the problems of construction supply chain Management; then on this basis, extends the construction enterprise’s supply chain, including internal supply chain, external chain and customer supply chain based on the information technology; uses the appropriate information technology to build the integration, flexible and intelligent supply chain to enhance competitiveness.

Wang Lian-yue, Dong Lan-guo
A Comprehensive Approach to ERP Selection

This Empirical research has shown that selecting an inappropriate system is a major reason for ERP (Enterprise Resource Planning) implementation failures. Review of literature has identified a need for approaches to assist organizations in the ERP system and vendor selection process. This paper therefore proposes an approach that differs from existing models in that it that has a broader, more comprehensive focus by simultaneously developing, defining and aligning the organization’s strategies, infrastructure, processes and information with the ERP evaluation and selection process. The methodology consists of a conceptual framework, a risk model for ERP selection, and a process model for the ERP selection process. The final output for the organization is a choice of ERP system and vendor that ensures strategic fit and functional integration in the organization.

Huo Lingyu, Liu Bingwu, Yan Fang
Research on High-Current Source Control and Protection Technology in the HVDC Synthetic Test System

To evaluate the current bearing capacity of high voltage direct current transmission (HVDC) converter valve, “DC high-current source" is one of the important device used in the synthesis test system of converter valve, so it is very important to research the control and protection strategies of this DC high-current source. The paper introduces the steady flow control, protection measures, hardware features, software process, etc. The idea of DSP technology, CAN communication technology and embedded six pulse generator triggered technology integrated in the control and protection systems of three-phase full-controlled rectifier bridge is proposed, which forms a complete control and protection system of DC high-current source applied in the synthetic test for converter valve.

Guang Ping Yao, Jian Dong Chen
Realization of Control Algorithm for Electro-Hydraulic Power Steering System Based on MC9S08AW32 Microcontroller

Electro-hydraulic power steering system (EHPS) can get over the bug of assist power that can’t be regulated in the traditional hydraulic power steering system (HPS). Because its assist power is greater than electronic power steering system (EPS), it is suitable for medium and heavy vehicles. In this paper, based on the EHPS system parameters, the control algorithm of the non-linear relations among steering wheel angular velocity, vehicle speed and motor speed of EHPS, which was designed to meet the steering portability at low speed and obvious steering feel and rapid response at high speed and save energy, was given. MC9S08AW32 was applied to design the control system of BLDCM and the scheme of hardware and software were given. The controller communicates with the computer through a special chip. Therefore the digital transmission between the controller and external device is realized. Finally the rationality and validity of the design is verified by the experimental results.

Xia Chang-gao, Zhu Zhong-ming, Zheng Rong-liang
Research on the Improvement of Program Organization Structure Based on Information Management

The existence of complexity of information and various interfaces within program leads to improvement on organizational structure. Based on literature review and in the perspective of information management, this paper summarizes essential characteristics of program organization structure, and finally makes three recommendations on optimization of organizational structure: establishing program management office, flattening organization structure and virtual organization.

Feixue Yang, Qianru Guo
A Simulation Research of Nonlinear Control Method in Triple Inverted Pendulum

To linearize the triple inverted pendulum model, which has the features of nonlinear, high-order,multivariable and strong-coupling, proposed a method of partial feedback lineariation based on differential geometry theory. A Single neuron adaptive Proportion-Differential (SNPD) control was used to the system, compared with Linear Quadratic Regulator (LQR) strategy. The former improves the stability and enhances anti-jamming capability of the system. The results of simulation show that the proposed linearization and control method perform well.

Zhang Ling, Qiao Wei, Zheng Enrang
Uncertainty Study of Measured Results for Electronic Thermometer Auto-verification System

We have developed an electronic thermometer auto-verification system to improve efficiency of calibration. The uncertainty study of measured results is an important step to evaluate the performance of system. This paper gives the sources of uncertainty and their impact on the overall measurement. The standard uncertainty, composite uncertainty and extended uncertainty are calculated and discussed in detail. After the uncertainty is analyzed, it shows that the electronic thermometer auto-verification system is reliable.

Huang Yanyan, Xu Hongwei
Design of a Novel Radix-2 Floating-Point FFT Processor Based on FPGA

Aiming at the speed and accuracy bottleneck of FFT processor in harmonic analyzer, proposed a method of using parallel processing, pipelinine structure floating-point operation, and an improved butterfly unit based on FPGA to design the processor. Used bottom-up method and VHDL language to program function modules, futher used the tool of quartus II to simulate the 1024 complex points. The results show that the processor improves the speed based on the high accuracy, could meet the real-time requirement of harmonic analyzer.

Zhengyan Liu, Enrang Zheng, Lingkun Ma
Research on Fuzzy Clustering Algorithm WEKA-Based

The data in Internet has a large scale and dynamic peculiarity, the discovered knowledge or rules are likely to be imprecise or incomplete generally. Owing to the introduction of Fuzzy theory and information entropy into the clustering analysis, we ravel out the difficulties and achieve the best the results for clustering by looking for Fuzzy similarity upper approximation. Moreover, we improved on the algorithm by making use of building Fuzzy similarity relationship on the data sets. The process of embedding the Fuzzy approximation algorithm into the WEKA platform in which the classes and visualization functions of open source WEKA is fully utilized. The Fuzzy approximation algorithms extended the clustering algorithm in the WEKA system. The experiment proves that it has a higher accuracy for the nominal data.

Yang Jun-qiang, Du Jia, Zheng Shi-ming, Dong Lei, Qiao Bing
Research on Trustworthiness-Based Grid Resource Selection Optimized Algorithm

Resource selection is the central part and a prime concern of Grid research. This paper analyses the character of grid, taking into account the performance of algorithm and frequency used in grid domain. The reputation is calculated according to history experience and immediate situation. Our algorithm has dynamic and overall situation in resource selection, considering the trust for history accumulation, introducing into the function depend on time, It provides a method for selecting the value of recommend trust relationship in Grid resource selection, and suffices requirement of user and provider. Experimental results show that the model is exact and robust.

Xu Shun-fu, Wang Bing, Zhang Xue-jie, Zheng Shi-ming, Shao Rong-ming
Research on the Evaluation of Contingency Plan System of Emergency Management in Supply Chain: Based on Two-Tuple Linguistic Information

The emergency events on the supply chain may have adverse impact on the enterprises as well as the supply chain itself, which may also directly put threat on building up a harmonious society. As a result, a specific contingency plan for emergency management should be set up in order to deal with the emergency events. For the purpose of ensuring that the emergency events can be perfectly handled under the existing contingency plan, it is vital to make an accurate evaluation on the ability of the contingency plan to settle these events. This paper aims to set up the evaluation criteria for the contingency plan based on theoretical research and empirical study, and meanwhile, the contingency plan is assessed comprehensively by the two-tuple linguistic information model as well as IT-WAA operators. In addition, the effectiveness and practicability of the evaluation criteria and model are also verified through the empirical study.

Lu Shan
Research on Vendor Selection Based on Intuitionistic Fuzzy Sets

Supply chain management is the advanced management mode of the present time for it can make the goal of win-win situation achievable for enterprises on the junctions of supply chain. And to evaluate and select vendors has become the key for enterprises to improve their competitive advantage because vendors are the very source of the whole supply chain. The objectives of the paper are twofold: One is to establish the criteria for evaluation of vendors on the basis of theoretical research and empirical investigation. The other is to make comprehensive evaluation of vendors, employing the TOPSIS approach which is based on intuitionistic fuzzy sets (IFS).Through empirical research, the validity and practicability of the evaluation criteria and method are verified.

Lu Shan
An Empirical Study of the Influencing Factors of Relationship Capital in the Supply Chain

In recent years, more and more enterprises begin to realize that the relationship resources accumulated in the supply chain is one of the key parts of the social resources for a company. With the existing research done both at home and abroad as well as the current situation of Chinese enterprises, this paper proposes the structure and the influencing factors of relationship capital, and verifies the scientific attribute of the factors by reliability and validity analysis. It shows that the factors influencing relationship capital are ability, reputation and organizational adaptability of the partner enterprises, resources input and switching costs while the ability index can fall into two categorise: “managerial ability” and “production ability”.

Lu Shan, Yu-lei Li
Low Complexity Synchronization Algorithms for HART C8PSK

This paper not only describes novel fast synchronization algorithms for HART C8PSK carrier recovery and symbol timing, but also provides a solution for HART C8PSK low power design. Synchronization is divided into two parts: initialization and tracking, the former part of which uses novel algorithms to attain equilibrium state quickly, and the later part of which is time-divided carried out. On basis of the proposed algorithms, high power component—equalizer and interpolator, can work at lowest rate, which indirectly reduces the system power. The implementation of those algorithms needs no additional hardware resource except a few lookup tables, and at the same time, they add negligible power consumption to the whole system. Simulations showed that the proposed synchronization algorithms can work very well in low SNR.

Jin Zhenghua, Wang Hong, Yang Zhijia
Foreign Experts Foreign Languages Teaching Pattern Optimization Management under Current Chinese Educational Context

Foreign experts who teach foreign languages in P.R. China, due to their group special characteristics, adopt and implement foreign languages teaching in their special own ways. Under current Chinese educational context, investigation and analysis on their special teaching patterns need to be conducted. Based on this, a realistic, practical and productive foreign experts foreign languages teaching pattern optimization plan is proposed combined with Chinese educational circumstances. The plan takes Northern International College of Shandong Jiaotong University as an example. English, Japanese and Russian are taken as the three main foreign languages at the school. With the development and implementation of the plan, foreign experts teaching are standardized and improved with perfect combination of western style under current Chinese educational context and reality.

Dong Yang
The Application of Geomagnetic Spatial Frequency Spectrum in Geomagnetic Localization

In order to reduce the bad impact of the geomagnetic signal’s error on geomagnetic localization, this paper pay much attention on studying the character of geomagnetic signal and error using method of spatial frequency spectrum analysis. First, Fourier analysis method is used to study frequency feature of geomagnetic signal and error, an important result is get that in Fourier domain the character of geomagnetic signal is almost the same with signal which contains noise. Secondly, based on the above result, Time-Frequency Matching (TFM) method is used to carry out geomagnetic localization. Finally, this paper compares TFM with Contour Constraint Matching method in application of geomagnetic localization, and the results show that when the geomagnetic signal contains white noise, the localization error of TFM is smaller. So the analysis of Geomagnetic Spatial Frequency Spectrum has great importance in geomagnetic localization application.

Yunxiao Lv, Shitu Luo, Meiping Wu
A RF Card System for the Management of Cow Health

RF reader mainly consists of transponder and reader. Coding on the transponder based on AT89C2051 can be realized. Coded signals are modulated through resistance attached coupling LC circuit. Decoding and displaying can be completed using SCM on reader. Carrier signals at 125KHz produced by oscillator and frequency divider composed of CD4060 are emitted by a push-pull circuit consisted of transistor. The design has a novel thinking in the advantage of small volume, low cost, low power dissipation, high reliability and self-test function.

He Baoxiang, Lu Guirong, Chu Kaibin, Zhu Zhengwei
Theoretical Derivation of Terahertz Birefringence in Liquid Crystal

We discussed the use and the meaning of the study in Terahertz phase shifter field and presented the argumentation on birefringence in liquid crystals.

Xiaoguang Zhang, Guangda Yang, You Zhou, Xiusheng Yan, Huai Yang
Cognitive Radio Decision Engine Based on CMOPSO

Cognitive radio decision engine based on CMOPSO is proposed. Through the introduction of external species, adaptive mutation, adaptive grid method, multi-objective particle swarm optimization is improved. Multi-objective functions to be optimized are derived. CMOPSO is used to adjust and optimize the radio parameters. MATLAB-Simulink simulation is used to analyze the performance of algorithm. The correctness and effectiveness of the module of multi-objective particle swarm optimization is shown.

Zhijun Teng, Zhiqian Li, Na Wang, Xiaoxia Li, Lijuan Zhao
Combination Method of Rules and Statistics for Abbreviation and Its Full Name Recognition

This paper proposes a Combination of rules and statistics algorithm. Firstly, this research uses the rule-based approach to identify the abbreviation. Secondly, the full name candidates of the abbreviation are recognized based on n-gram feature. Thirdly, we use the rule and statistic based algorithm to identify the best candidate for the abbreviation. The method of abbreviation recognition has achieved a high accuracy rate, and it is independent, portable and efficient. The method of the full name recognition is superior to the approach introduced in related work on the basis of analyzing and comparing experiment results.

Yang Hua, Hong Yu, Hua Zhenwei, Yao Jianmin, Zhao Mingming, Feng Yanhui
Backmatter
Metadaten
Titel
Proceedings of the 2011 International Conference on Informatics, Cybernetics, and Computer Engineering (ICCE2011) November 19-20, 2011, Melbourne, Australia
herausgegeben von
Liangzhong Jiang
Copyright-Jahr
2012
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-25185-6
Print ISBN
978-3-642-25184-9
DOI
https://doi.org/10.1007/978-3-642-25185-6