Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183917
Wen Haijun, Hou Shiwang, Faning Long
Aiming at the uncertain factors in job shop scheduling problem, this paper proposed a scheduling model with the goal of maximum minimal customer satisfaction. Based on fuzzy theory, the uncertain machining time and due-date time were treated as triangle fuzzy number and trapezoidal fuzzy number. The hybrid PSO algorithm was adopted to solve the problem and its validity was validated with a simulation test. The results illustrate that the approach has good effect on solving the JSSP with fuzzy machining time and due-date time.
{"title":"Study on fuzzy job-shop scheduling problem base on particle swarm optimization","authors":"Wen Haijun, Hou Shiwang, Faning Long","doi":"10.1109/ICCIAUTOM.2011.6183917","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183917","url":null,"abstract":"Aiming at the uncertain factors in job shop scheduling problem, this paper proposed a scheduling model with the goal of maximum minimal customer satisfaction. Based on fuzzy theory, the uncertain machining time and due-date time were treated as triangle fuzzy number and trapezoidal fuzzy number. The hybrid PSO algorithm was adopted to solve the problem and its validity was validated with a simulation test. The results illustrate that the approach has good effect on solving the JSSP with fuzzy machining time and due-date time.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6184001
Xiao Du, Yuan’an Liu, Kaiming Liu, F. Yuan
This article describes a new collision solutions mechanism for Collision Solutions Mechanism in Opportunistic Routing, named CSMOR, in wireless networks. The mechanism encourages the senders' signals to be interfered with each other in Opportunistic Routing. When two or more signals are transmited at the same time, the packets might be conflicted and interfered. In the mechanism, the nodes can decode the interfered signal and get the original packets. So, the mechanism of CSMOR encourages the sender to transmit data at the same time, the receiver can use network layer information to reconstruct the interfered signals, and decode the signal they need from the package. Therefore, CSMOR avoid the back-off time and the accuracy of received packets has a significant improvement. This mechanism could minimize the end-to-end delay, increase the network throughput. With the data packets flow increasing, the gain of the mechanism is also enhanced. Theoretical analysis and simulation results show that CSMOR improves the performance significantly in terms of the less end-to-end delay, the greater throughput, compared with the classic Opportunistic Routing ExOR and MORE.
{"title":"An Collision Solutions Mechanism in opportunistic routing in wireless mesh networks","authors":"Xiao Du, Yuan’an Liu, Kaiming Liu, F. Yuan","doi":"10.1109/ICCIAUTOM.2011.6184001","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184001","url":null,"abstract":"This article describes a new collision solutions mechanism for Collision Solutions Mechanism in Opportunistic Routing, named CSMOR, in wireless networks. The mechanism encourages the senders' signals to be interfered with each other in Opportunistic Routing. When two or more signals are transmited at the same time, the packets might be conflicted and interfered. In the mechanism, the nodes can decode the interfered signal and get the original packets. So, the mechanism of CSMOR encourages the sender to transmit data at the same time, the receiver can use network layer information to reconstruct the interfered signals, and decode the signal they need from the package. Therefore, CSMOR avoid the back-off time and the accuracy of received packets has a significant improvement. This mechanism could minimize the end-to-end delay, increase the network throughput. With the data packets flow increasing, the gain of the mechanism is also enhanced. Theoretical analysis and simulation results show that CSMOR improves the performance significantly in terms of the less end-to-end delay, the greater throughput, compared with the classic Opportunistic Routing ExOR and MORE.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116022757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183996
G. Guo, Yuanqiang Shi
This paper introduces a technology for connecting an embedded device to the Internet with single-chip microprocessor chip STC89C52RC as the core chip .The internal structure and characteristics principles of the network interface chip are described, and the corresponding design of hardware and software programming are discussed. This design system can achieve embedding of network protocol stack and driving functions of the network interface card. Experimental results proved that the system could communicate with a remote machine via Ethernet interface for data transmission and obtain desired results.
{"title":"Design and implementation of Ethernet communication interface based on network controller","authors":"G. Guo, Yuanqiang Shi","doi":"10.1109/ICCIAUTOM.2011.6183996","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183996","url":null,"abstract":"This paper introduces a technology for connecting an embedded device to the Internet with single-chip microprocessor chip STC89C52RC as the core chip .The internal structure and characteristics principles of the network interface chip are described, and the corresponding design of hardware and software programming are discussed. This design system can achieve embedding of network protocol stack and driving functions of the network interface card. Experimental results proved that the system could communicate with a remote machine via Ethernet interface for data transmission and obtain desired results.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121745870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183913
Jun-yan Zhang, Fan Min
Pattern mining is a popular issue in biological sequence analysis. In this paper, we propose new definitions related to the pattern frequency, where gaps are mined instead of specified. We develop algorithm with polynomial complexities. Patterns can grow from both sides, and Apriori property holds. Some interesting biological patterns are mined by our algorithm.
{"title":"Mining frequent patterns from sequences","authors":"Jun-yan Zhang, Fan Min","doi":"10.1109/ICCIAUTOM.2011.6183913","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183913","url":null,"abstract":"Pattern mining is a popular issue in biological sequence analysis. In this paper, we propose new definitions related to the pattern frequency, where gaps are mined instead of specified. We develop algorithm with polynomial complexities. Patterns can grow from both sides, and Apriori property holds. Some interesting biological patterns are mined by our algorithm.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125806650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183923
An-Li Peng, Song Jia-tao
A personal identity management system based on RFID is widely used in attendance checking. This system is used for keeping the record of staff's of attendance quickly and automatically and the relevant data supplied to faculty staff to look up, which saves a lot of class time to sing upon. This paper introduces the basic function and component of class register system, and conducts a detailed analysis to each important part of the system. After tested, the system is confirmed to work as exactly as possible.
{"title":"Research on personal identity management system based on RFID technology","authors":"An-Li Peng, Song Jia-tao","doi":"10.1109/ICCIAUTOM.2011.6183923","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183923","url":null,"abstract":"A personal identity management system based on RFID is widely used in attendance checking. This system is used for keeping the record of staff's of attendance quickly and automatically and the relevant data supplied to faculty staff to look up, which saves a lot of class time to sing upon. This paper introduces the basic function and component of class register system, and conducts a detailed analysis to each important part of the system. After tested, the system is confirmed to work as exactly as possible.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132759013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6184017
Jirong Wang, Xiaoqin Deng
The performance of the Gaussian kernel Support Vector Machine (SVM) for regression is influenced by the training algorithm. The training process of SVM is to resolve a Quadratic Programming (QP) problem. When there are amounts of samples, the needed memory will be bigger if we resolve the QP problem directly. At present the Sequential Minimal Optimization (SMO) is an effective method to resolve QP. SMO decompose the QP problem into series of QP problems of two variables, and resolve the problems analytically. There is no operation on matrix in SMO, therefore it is applied easily. The training points influence the convergent velocity of SMO, so a new method to select the training points is proposed, and the proposed approach is evaluated with a series of experiments. The experiments show that the approach is reasonable and effective.
{"title":"Selecting training points of the sequential minimal optimization algorithm for Support Vector Machine","authors":"Jirong Wang, Xiaoqin Deng","doi":"10.1109/ICCIAUTOM.2011.6184017","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184017","url":null,"abstract":"The performance of the Gaussian kernel Support Vector Machine (SVM) for regression is influenced by the training algorithm. The training process of SVM is to resolve a Quadratic Programming (QP) problem. When there are amounts of samples, the needed memory will be bigger if we resolve the QP problem directly. At present the Sequential Minimal Optimization (SMO) is an effective method to resolve QP. SMO decompose the QP problem into series of QP problems of two variables, and resolve the problems analytically. There is no operation on matrix in SMO, therefore it is applied easily. The training points influence the convergent velocity of SMO, so a new method to select the training points is proposed, and the proposed approach is evaluated with a series of experiments. The experiments show that the approach is reasonable and effective.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129065218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183957
Guixing Zheng, Bai Lina, Rui Zhao, Yuan Ning, L. Fengliang
According to characteristics of cloud computing, cloud computing is discussed and applied to 10Kv power grid fault intelligent processing system to resolve data sharing, mass storage, parallel computing, and so on, which are not easy to solve in traditional systems. Cloud computing platform architecture is proposed for 10Kv distribution grid fault processing automation system. At the point of software as a service, the lines and equipment management services, the distribution grid dispatch and control services, distribution grid fault locating, insulating, resuming and analyzing services, maintenance services and other services are carried out a detailed design.
{"title":"10Kv distribution grid fault intelligent processing system based on cloud computing","authors":"Guixing Zheng, Bai Lina, Rui Zhao, Yuan Ning, L. Fengliang","doi":"10.1109/ICCIAUTOM.2011.6183957","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183957","url":null,"abstract":"According to characteristics of cloud computing, cloud computing is discussed and applied to 10Kv power grid fault intelligent processing system to resolve data sharing, mass storage, parallel computing, and so on, which are not easy to solve in traditional systems. Cloud computing platform architecture is proposed for 10Kv distribution grid fault processing automation system. At the point of software as a service, the lines and equipment management services, the distribution grid dispatch and control services, distribution grid fault locating, insulating, resuming and analyzing services, maintenance services and other services are carried out a detailed design.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129078689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183961
Zhihua Wei, Jinshuang Li
Attention received by the float process, whose structure of the furnace is very critical, and its design is reasonable, directly affect the production and quality of glass. while the size of melting department of melting furnace is reasonable which is key solution of designing the furnace. In the past, the size of melting department is determined by referring to or according to the same production scale of the furnaces which are existing. This paper is to use the method which includes the theory and numerical simulation which are combining the practice to establish two kinds of different small furnace design scheme of furnace structure of the physical models and mathematical models, as well as a 900d/t glass furnace's structure which is using of Fluent software simulation. At last, we compare it with the same production scale furnace which is existing and get the ideal results.
{"title":"Numerical simulation on the structure of glass furnace","authors":"Zhihua Wei, Jinshuang Li","doi":"10.1109/ICCIAUTOM.2011.6183961","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183961","url":null,"abstract":"Attention received by the float process, whose structure of the furnace is very critical, and its design is reasonable, directly affect the production and quality of glass. while the size of melting department of melting furnace is reasonable which is key solution of designing the furnace. In the past, the size of melting department is determined by referring to or according to the same production scale of the furnaces which are existing. This paper is to use the method which includes the theory and numerical simulation which are combining the practice to establish two kinds of different small furnace design scheme of furnace structure of the physical models and mathematical models, as well as a 900d/t glass furnace's structure which is using of Fluent software simulation. At last, we compare it with the same production scale furnace which is existing and get the ideal results.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127118157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6184014
Zhang Shao-bo, Zhu Geng-ming, Wang Ying
By introducing the current research status in software protection, the paper propose a multi-watermarking embedding algorithm to protect the whole software. The watermark information is separated at first and encrypted with the hyper-chaotic sequence, then each of the watermark is embedded into the core location of the program by the mapping fuction. Between the watermarks the effective tamper-proofing is established, if the tampering occurred, the watermark should sense and terminate the program immediately to protect the program. The experiments indicate its robustness is stronger.
{"title":"A strategy of software protection based on multi-watermarking embedding","authors":"Zhang Shao-bo, Zhu Geng-ming, Wang Ying","doi":"10.1109/ICCIAUTOM.2011.6184014","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184014","url":null,"abstract":"By introducing the current research status in software protection, the paper propose a multi-watermarking embedding algorithm to protect the whole software. The watermark information is separated at first and encrypted with the hyper-chaotic sequence, then each of the watermark is embedded into the core location of the program by the mapping fuction. Between the watermarks the effective tamper-proofing is established, if the tampering occurred, the watermark should sense and terminate the program immediately to protect the program. The experiments indicate its robustness is stronger.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130939509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183892
Liu Tian-jian, Zhi-hai Sun
Tracking moving objects in dynamic scenarios involves considerable difficulty because of occlusions. We report a novel tracker - a new multiple-step particle filter based feature selection for helicopter tracking. The objective of the proposed system is to track helicopter more efficiently and more precisely under bad environments. Color, edge, and position information are used to track stochastic moving objects. Additionally, the proposed system will handle the occlusion problem in an effective manner. Based on the experimental results obtained in MATLAB, the proposed system tracks helicopter more efficiently and correctly, especially when occlusions happen.
{"title":"A new multiple-step particle filter based feature selection","authors":"Liu Tian-jian, Zhi-hai Sun","doi":"10.1109/ICCIAUTOM.2011.6183892","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183892","url":null,"abstract":"Tracking moving objects in dynamic scenarios involves considerable difficulty because of occlusions. We report a novel tracker - a new multiple-step particle filter based feature selection for helicopter tracking. The objective of the proposed system is to track helicopter more efficiently and more precisely under bad environments. Color, edge, and position information are used to track stochastic moving objects. Additionally, the proposed system will handle the occlusion problem in an effective manner. Based on the experimental results obtained in MATLAB, the proposed system tracks helicopter more efficiently and correctly, especially when occlusions happen.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129534591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}