首页 > 最新文献

2010 IEEE International Conference on Progress in Informatics and Computing最新文献

英文 中文
Speech recognition method based on weighed autoregressive HMM 基于加权自回归HMM的语音识别方法
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687878
Yamin Yang, Chaoli Wang, Y. Sun
For non-independent speech recognition, in order to solve the problem of the assumption that the observation vectors are independent and the amount of data is small in Hidden Markov Model, a weighted autoregressive Hidden Markov Model was presented based on the Continuous Hidden Markov Model in this paper. The weighted autoregressive process was exploited to extract the observation vector, which is more suitable for recognition of the actual voice signals with strong random characteristic.
对于非独立语音识别,为了解决隐马尔可夫模型中观测向量独立且数据量小的假设问题,本文在连续隐马尔可夫模型的基础上提出了一种加权自回归隐马尔可夫模型。利用加权自回归过程提取观测向量,更适合于对具有强随机特征的实际语音信号的识别。
{"title":"Speech recognition method based on weighed autoregressive HMM","authors":"Yamin Yang, Chaoli Wang, Y. Sun","doi":"10.1109/PIC.2010.5687878","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687878","url":null,"abstract":"For non-independent speech recognition, in order to solve the problem of the assumption that the observation vectors are independent and the amount of data is small in Hidden Markov Model, a weighted autoregressive Hidden Markov Model was presented based on the Continuous Hidden Markov Model in this paper. The weighted autoregressive process was exploited to extract the observation vector, which is more suitable for recognition of the actual voice signals with strong random characteristic.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123507213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Password guessing attack on a key exchange protocol based on ECDLP 基于ECDLP的密钥交换协议的猜密码攻击
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687584
Chungen Xu, Yanjiong Yang
Authentication and key exchange are fundamental for establishing secure communication channels over public insecure networks. Three-party key exchange protocol is an important technique for two clients to agree a session key with the help of a trusted server who shares a human password with each client. Many protocols have been proposed for the requirements of security and efficiency over the years. For security consideration, we are concerned with the off-line password-guessing attack. We make the attack to a three-party key exchange protocol based on Elliptic Curve Discrete Logarithm Problem(ECDLP) and show that it is vulnerable against the off-line password-guessing attack. In fact, the off-line password-guessing attack is available for malicious participants and is effective to similar protocols. To avoid this problem, we give a suggestion to eliminate it and enforce the security.
身份验证和密钥交换是在公共不安全网络上建立安全通信通道的基础。三方密钥交换协议是两个客户机在可信服务器的帮助下就会话密钥达成一致的一项重要技术,可信服务器与每个客户机共享人工密码。多年来,为了满足安全性和效率的要求,提出了许多协议。出于安全考虑,我们关注离线密码猜测攻击。对基于椭圆曲线离散对数问题(ECDLP)的三方密钥交换协议进行了攻击,证明了该协议易受离线猜密码攻击的攻击。事实上,离线猜密码攻击对恶意参与者是有效的,并且对类似的协议是有效的。为了避免这个问题,我们提出了消除它并加强安全性的建议。
{"title":"Password guessing attack on a key exchange protocol based on ECDLP","authors":"Chungen Xu, Yanjiong Yang","doi":"10.1109/PIC.2010.5687584","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687584","url":null,"abstract":"Authentication and key exchange are fundamental for establishing secure communication channels over public insecure networks. Three-party key exchange protocol is an important technique for two clients to agree a session key with the help of a trusted server who shares a human password with each client. Many protocols have been proposed for the requirements of security and efficiency over the years. For security consideration, we are concerned with the off-line password-guessing attack. We make the attack to a three-party key exchange protocol based on Elliptic Curve Discrete Logarithm Problem(ECDLP) and show that it is vulnerable against the off-line password-guessing attack. In fact, the off-line password-guessing attack is available for malicious participants and is effective to similar protocols. To avoid this problem, we give a suggestion to eliminate it and enforce the security.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123639634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of voltage doubling rectifier circuit in Wireless Sensor Networks 无线传感器网络中倍压整流电路的设计
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687582
Jianbin Zhang, Zhongning Jia
Wireless Sensor Networks (WSN) is a key technology of Internet of Things (IOT). WSN node is commonly powered by battery. However, battery capacity is limited, which affects the overall performance of WSN. The technology of environmental energy harvesting is presented for power supply of WSN node in this paper. Specifically, the basic voltage doubling rectifier circuit is analyzed, then the microwave voltage doubling rectifier circuit is derived in UHF band, and its main components and parameters are analyzed in detail. Lastly, the four-stages voltage doubling rectifier circuit of 900NHz is designed and simulated using ADS software. The simulation results indicated that the design scheme of voltage doubling rectifier circuit is correct and feasible.
无线传感器网络(WSN)是物联网的一项关键技术。WSN节点通常由电池供电。但由于电池容量有限,影响了无线传感器网络的整体性能。提出了一种用于无线传感器网络节点供电的环境能量收集技术。具体分析了基本倍压整流电路,推导了超高频微波倍压整流电路,并对其主要组成和参数进行了详细分析。最后,利用ADS软件对900hz四级倍压整流电路进行了设计和仿真。仿真结果表明了倍压整流电路设计方案的正确性和可行性。
{"title":"Design of voltage doubling rectifier circuit in Wireless Sensor Networks","authors":"Jianbin Zhang, Zhongning Jia","doi":"10.1109/PIC.2010.5687582","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687582","url":null,"abstract":"Wireless Sensor Networks (WSN) is a key technology of Internet of Things (IOT). WSN node is commonly powered by battery. However, battery capacity is limited, which affects the overall performance of WSN. The technology of environmental energy harvesting is presented for power supply of WSN node in this paper. Specifically, the basic voltage doubling rectifier circuit is analyzed, then the microwave voltage doubling rectifier circuit is derived in UHF band, and its main components and parameters are analyzed in detail. Lastly, the four-stages voltage doubling rectifier circuit of 900NHz is designed and simulated using ADS software. The simulation results indicated that the design scheme of voltage doubling rectifier circuit is correct and feasible.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic priority back-up algorithm based on IEEE802.11 DCF 基于IEEE802.11 DCF的动态优先级备份算法
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687987
Chao Liu, Zhengming Li, Wenjuan Li
The Distributed Coordination Function (DCF) in the IEEE 802.11 protocol is a random access scheme based on the carrier sense multiple access with collision avoidance (CSMA/CA). In recent years, there have been numerous research on the performance analysis and model of DCF under the assumption that the transmission queue is always nonempty (i.e. saturation state). In this paper, we propose a dynamic priority back-up algorithm (DPBA) for IEEE802.11 DCF, the basic idea of DPBA is each node should collect statistical data of other node's transmission while sensing the channel, and maintaining a sending data table for all node in network. When the node has data to transmit, it will calculate the dynamic priority and connection window according to the number of successful sending, the number of successful sending and the statistical data in sending table. Simulation results show that DPBA can properly assign channel among nodes in proportion to their dynamic priority as well as enhance the network saturation throughput.
IEEE 802.11协议中的分布式协调函数(Distributed Coordination Function, DCF)是一种基于CSMA/CA (carrier - sense multiple access with collision avoidance)的随机接入方案。近年来,在假设传输队列总是非空(即饱和状态)的情况下,对DCF的性能分析和模型进行了大量的研究。本文针对IEEE802.11 DCF提出了一种动态优先级备份算法(dynamic priority backup algorithm, DPBA), DPBA的基本思想是每个节点在感知信道的同时收集其他节点的传输统计数据,并维护网络中所有节点的发送数据表。当节点有数据需要传输时,根据发送成功次数、发送成功次数和发送表中的统计数据计算动态优先级和连接窗口。仿真结果表明,DPBA可以根据节点的动态优先级在节点间合理分配信道,提高网络饱和吞吐量。
{"title":"Dynamic priority back-up algorithm based on IEEE802.11 DCF","authors":"Chao Liu, Zhengming Li, Wenjuan Li","doi":"10.1109/PIC.2010.5687987","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687987","url":null,"abstract":"The Distributed Coordination Function (DCF) in the IEEE 802.11 protocol is a random access scheme based on the carrier sense multiple access with collision avoidance (CSMA/CA). In recent years, there have been numerous research on the performance analysis and model of DCF under the assumption that the transmission queue is always nonempty (i.e. saturation state). In this paper, we propose a dynamic priority back-up algorithm (DPBA) for IEEE802.11 DCF, the basic idea of DPBA is each node should collect statistical data of other node's transmission while sensing the channel, and maintaining a sending data table for all node in network. When the node has data to transmit, it will calculate the dynamic priority and connection window according to the number of successful sending, the number of successful sending and the statistical data in sending table. Simulation results show that DPBA can properly assign channel among nodes in proportion to their dynamic priority as well as enhance the network saturation throughput.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128690624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using 3G network components to enable NFC mobile transactions and authentication 使用3G网络组件实现NFC移动交易和身份验证
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687587
W. Chen, Gerhard P. Hancke, K. Mayes, Y. Lien, J. Chiu
The increasing technical capabilities of mobile phones have resulted in several m-payment methods being proposed. M-payment applications are being developed for both online and in-store purchases. Near Field Communication (NFC) technology has the potential to greatly impact the way mobile devices are used. NFC is a short range wireless communication interface that allows for the integration of a mobile device in existing contactless application infrastructure, such as using a mobile phone to pay at Point-of-Sale (POS). It is important to provide a simple method for implementing m-payment systems that offer both reasonable security protection as well as ease of use for the user. We propose a system that combines the existing 3G cryptographic primitives and algorithms, in addition to the identification and authentication capabilities of the USIM, with NFC technology to implement a m-payment system. Such a system could easily be integrated into current 3G infrastructure and provide improved scalability and ubiquity for m-payment services. Our proposed scheme focuses on a conventional in-store payment environment, with mutual authentication between entities and a subsequent trustworthy transaction being achieved through 3G and USIM security services.
随着移动电话技术能力的不断提高,人们提出了几种移动支付方式。移动支付应用程序正在开发中,用于在线和店内购物。近场通信(NFC)技术有可能极大地影响移动设备的使用方式。NFC是一种短距离无线通信接口,允许将移动设备集成到现有的非接触式应用基础设施中,例如使用移动电话在销售点(POS)支付。重要的是提供一种简单的方法来实现移动支付系统,既提供合理的安全保护,又便于用户使用。我们提出了一个结合现有3G加密原语和算法的系统,除了USIM的识别和认证功能外,还结合了NFC技术来实现移动支付系统。这样的系统可以很容易地集成到当前的3G基础设施中,并为移动支付服务提供改进的可扩展性和普遍性。我们提出的方案侧重于传统的店内支付环境,通过3G和USIM安全服务实现实体之间的相互认证和随后的可信交易。
{"title":"Using 3G network components to enable NFC mobile transactions and authentication","authors":"W. Chen, Gerhard P. Hancke, K. Mayes, Y. Lien, J. Chiu","doi":"10.1109/PIC.2010.5687587","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687587","url":null,"abstract":"The increasing technical capabilities of mobile phones have resulted in several m-payment methods being proposed. M-payment applications are being developed for both online and in-store purchases. Near Field Communication (NFC) technology has the potential to greatly impact the way mobile devices are used. NFC is a short range wireless communication interface that allows for the integration of a mobile device in existing contactless application infrastructure, such as using a mobile phone to pay at Point-of-Sale (POS). It is important to provide a simple method for implementing m-payment systems that offer both reasonable security protection as well as ease of use for the user. We propose a system that combines the existing 3G cryptographic primitives and algorithms, in addition to the identification and authentication capabilities of the USIM, with NFC technology to implement a m-payment system. Such a system could easily be integrated into current 3G infrastructure and provide improved scalability and ubiquity for m-payment services. Our proposed scheme focuses on a conventional in-store payment environment, with mutual authentication between entities and a subsequent trustworthy transaction being achieved through 3G and USIM security services.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129377433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Evaluating e-government websites in Jordan: Accessibility, usability, transparency and responsiveness 评估约旦的电子政务网站:可访问性、可用性、透明度和响应性
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5688017
A. Al-Soud, K. Nakata
Investigating e-government Web-based services and evaluating its development has become one of the evolving research areas in the information systems field. After a decade of launching the e-government program in Jordan, we examined thirty governmental Websites in terms of their accessibility, usability, transparency, and responsiveness to citizens' request. This study found that the majority of the Websites are still in the early stages of development, and there is a noticeable lack in Websites readiness for moving-up to the advanced level fundamental for providing transactional services. Based on the evaluation results and through a manual testing, it was found the majority of the Websites do not employ the same design, where there should be consistent and should be using the same standards and features.
对基于web的电子政务服务进行研究并对其发展进行评估已成为信息系统领域不断发展的研究方向之一。在约旦启动电子政务项目十年之后,我们对30个政府网站的可访问性、可用性、透明度和对公民请求的响应进行了检查。这项研究发现,大多数网站仍处于发展的早期阶段,而且明显缺乏向提供事务性服务的高级水平迈进的准备。根据评估结果和通过手动测试,发现大多数网站没有采用相同的设计,应该有一致的地方,应该使用相同的标准和功能。
{"title":"Evaluating e-government websites in Jordan: Accessibility, usability, transparency and responsiveness","authors":"A. Al-Soud, K. Nakata","doi":"10.1109/PIC.2010.5688017","DOIUrl":"https://doi.org/10.1109/PIC.2010.5688017","url":null,"abstract":"Investigating e-government Web-based services and evaluating its development has become one of the evolving research areas in the information systems field. After a decade of launching the e-government program in Jordan, we examined thirty governmental Websites in terms of their accessibility, usability, transparency, and responsiveness to citizens' request. This study found that the majority of the Websites are still in the early stages of development, and there is a noticeable lack in Websites readiness for moving-up to the advanced level fundamental for providing transactional services. Based on the evaluation results and through a manual testing, it was found the majority of the Websites do not employ the same design, where there should be consistent and should be using the same standards and features.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130979769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Probabilistic XML data exchange: An algorithm for materializing probabilistic solutions 概率性XML数据交换:实现概率性解决方案的算法
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687857
Haitao Ma, Changyong Yu, Miao Fang
Data exchange is the problem of finding an instance of a target schema, given an instance of a source schema and a specification of the relationship between the source and the target. In this paper, we look into the basic properties of XML data exchange in the presence of probabilistic data. This requires rethinking the very basic concepts of traditional XML data exchange, such as solution, universal solution, and certain answers of target queries. We develop a framework for XML data exchange over probabilistic XML documents, and give a polynomial-time materializing algorithm that computes target probabilistic documents.
数据交换是在给定源模式实例和源与目标之间的关系规范的情况下找到目标模式实例的问题。在本文中,我们研究了存在概率数据时XML数据交换的基本属性。这需要重新考虑传统XML数据交换的基本概念,如解决方案、通用解决方案和目标查询的某些答案。我们开发了一个基于概率性XML文档的XML数据交换框架,并给出了一个计算目标概率性文档的多项式时间物化算法。
{"title":"Probabilistic XML data exchange: An algorithm for materializing probabilistic solutions","authors":"Haitao Ma, Changyong Yu, Miao Fang","doi":"10.1109/PIC.2010.5687857","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687857","url":null,"abstract":"Data exchange is the problem of finding an instance of a target schema, given an instance of a source schema and a specification of the relationship between the source and the target. In this paper, we look into the basic properties of XML data exchange in the presence of probabilistic data. This requires rethinking the very basic concepts of traditional XML data exchange, such as solution, universal solution, and certain answers of target queries. We develop a framework for XML data exchange over probabilistic XML documents, and give a polynomial-time materializing algorithm that computes target probabilistic documents.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127875571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The evolution of computerized language teaching and learning: A terminological analysis 计算机语言教学的演变:一个术语分析
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687916
Shuli Zhao
Ever since its invention, the computer, by virtue of its multimedia capacity and its subsequent network technology, has been widely employed in language teaching and learning. During the process, computer technology has gradually changed its “subsidiary” position to play increasingly significant roles in language education. In the meantime, people are beginning to look at the relationship between language teaching and language learning with fresh new eyes. All these have enriched the theories of modern educational psychology, and given great impetus to the development of theories and applications of language teaching and learning.
计算机自发明以来,凭借其多媒体能力和随之而来的网络技术,在语言教学中得到了广泛应用。在这一过程中,计算机技术逐渐改变了“辅助”的地位,在语言教育中发挥着越来越重要的作用。与此同时,人们开始以新的眼光看待语言教学与语言学习的关系。这些都丰富了现代教育心理学的理论,极大地推动了语言教与学的理论和应用的发展。
{"title":"The evolution of computerized language teaching and learning: A terminological analysis","authors":"Shuli Zhao","doi":"10.1109/PIC.2010.5687916","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687916","url":null,"abstract":"Ever since its invention, the computer, by virtue of its multimedia capacity and its subsequent network technology, has been widely employed in language teaching and learning. During the process, computer technology has gradually changed its “subsidiary” position to play increasingly significant roles in language education. In the meantime, people are beginning to look at the relationship between language teaching and language learning with fresh new eyes. All these have enriched the theories of modern educational psychology, and given great impetus to the development of theories and applications of language teaching and learning.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131330702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on a kind of improved network transport model and its application in logistics industry 一种改进的网络运输模型及其在物流业中的应用研究
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687867
Renwang Li, Xinli Wu, Donglong Li, Hao Luo, Sirong Zhang
Logistics industry is becoming a more and more important field needed to be concentrated for all kinds of enterprises to reduce their own operation cost, and shorten their delivery time and so on. How to change the complicated logistics problem into abstract network model is elucidated here. Firstly, a directed graph G = (V, E) is used to describe the general logistics problem with some common restrictions such as cost and time etc. Secondly, considering the growth of logistics node, an improved network transport model was set forth. Thirdly, the combination of ant colony arithmetic with logistics network transport model is expounded, based on the similarity between logistics network transport model and Travelling Salesman Problem. Finally, the solution and analysis for the improved model is illustrated according to the ant colony arithmetic, and some related conclusions are detailed.
物流行业正成为各类企业为降低自身运营成本、缩短配送时间等而越来越需要集中关注的重要领域。阐述了如何将复杂的物流问题转化为抽象的网络模型。首先,用有向图G = (V, E)来描述具有成本和时间等约束条件的一般物流问题。其次,考虑到物流节点的增长,提出了一种改进的网络运输模型。第三,基于物流网络运输模型与旅行商问题的相似性,阐述了蚁群算法与物流网络运输模型的结合。最后,利用蚁群算法对改进后的模型进行了求解和分析,并给出了相关结论。
{"title":"Research on a kind of improved network transport model and its application in logistics industry","authors":"Renwang Li, Xinli Wu, Donglong Li, Hao Luo, Sirong Zhang","doi":"10.1109/PIC.2010.5687867","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687867","url":null,"abstract":"Logistics industry is becoming a more and more important field needed to be concentrated for all kinds of enterprises to reduce their own operation cost, and shorten their delivery time and so on. How to change the complicated logistics problem into abstract network model is elucidated here. Firstly, a directed graph G = (V, E) is used to describe the general logistics problem with some common restrictions such as cost and time etc. Secondly, considering the growth of logistics node, an improved network transport model was set forth. Thirdly, the combination of ant colony arithmetic with logistics network transport model is expounded, based on the similarity between logistics network transport model and Travelling Salesman Problem. Finally, the solution and analysis for the improved model is illustrated according to the ant colony arithmetic, and some related conclusions are detailed.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131702580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on intelligent control for ore grinding and grading process 磨矿分级过程智能控制研究
Pub Date : 2010-12-01 DOI: 10.1109/PIC.2010.5687954
Xinjian Zhou, N. Zuo, Huicai Su
This paper analyzes the technical process of the grinding machine system in detail, based on the ore grinding and grading process of Sizhou Concentrator of Dexing Copper Mine in Jiangxi Copper Corporation, and defines the control contents and requirements of the system. Because the grinding process is a complex system with big sluggishness, long time lag, serious non-linearity and time-varying, so only applying PID control can not make the ore grinding and grading process in the best state of control. There fore Intelligent PID control is applied to simple loop, and series intelligent PID control and fuzzy control strategy applied to complicated loop. The ore-feeding flow control loop, ore-feeding water control loop, ore-discharge water control loop, water level of pump pond control loop, pump pond concentration series control loop and inlet pressure of the water cyclone control loop are designed. By all these control strategies and control loops, intelligent control of the grinding machine is realized.
本文结合江西铜业公司德兴铜矿四洲选矿厂矿石磨矿分级过程,详细分析了磨矿机系统的工艺流程,明确了系统的控制内容和要求。由于磨矿过程是一个大滞缓、长滞后、非线性和时变严重的复杂系统,因此仅采用PID控制不能使矿石磨矿分级过程处于最佳控制状态。因此,将智能PID控制应用于简单回路,将串联智能PID控制和模糊控制策略应用于复杂回路。设计了进矿流量控制回路、进矿水控制回路、出矿水控制回路、泵池水位控制回路、泵池浓度串联控制回路和水旋流器入口压力控制回路。通过这些控制策略和控制回路,实现了对磨床的智能化控制。
{"title":"Study on intelligent control for ore grinding and grading process","authors":"Xinjian Zhou, N. Zuo, Huicai Su","doi":"10.1109/PIC.2010.5687954","DOIUrl":"https://doi.org/10.1109/PIC.2010.5687954","url":null,"abstract":"This paper analyzes the technical process of the grinding machine system in detail, based on the ore grinding and grading process of Sizhou Concentrator of Dexing Copper Mine in Jiangxi Copper Corporation, and defines the control contents and requirements of the system. Because the grinding process is a complex system with big sluggishness, long time lag, serious non-linearity and time-varying, so only applying PID control can not make the ore grinding and grading process in the best state of control. There fore Intelligent PID control is applied to simple loop, and series intelligent PID control and fuzzy control strategy applied to complicated loop. The ore-feeding flow control loop, ore-feeding water control loop, ore-discharge water control loop, water level of pump pond control loop, pump pond concentration series control loop and inlet pressure of the water cyclone control loop are designed. By all these control strategies and control loops, intelligent control of the grinding machine is realized.","PeriodicalId":142910,"journal":{"name":"2010 IEEE International Conference on Progress in Informatics and Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128854017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2010 IEEE International Conference on Progress in Informatics and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1