Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183961
Zhihua Wei, Jinshuang Li
Attention received by the float process, whose structure of the furnace is very critical, and its design is reasonable, directly affect the production and quality of glass. while the size of melting department of melting furnace is reasonable which is key solution of designing the furnace. In the past, the size of melting department is determined by referring to or according to the same production scale of the furnaces which are existing. This paper is to use the method which includes the theory and numerical simulation which are combining the practice to establish two kinds of different small furnace design scheme of furnace structure of the physical models and mathematical models, as well as a 900d/t glass furnace's structure which is using of Fluent software simulation. At last, we compare it with the same production scale furnace which is existing and get the ideal results.
{"title":"Numerical simulation on the structure of glass furnace","authors":"Zhihua Wei, Jinshuang Li","doi":"10.1109/ICCIAUTOM.2011.6183961","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183961","url":null,"abstract":"Attention received by the float process, whose structure of the furnace is very critical, and its design is reasonable, directly affect the production and quality of glass. while the size of melting department of melting furnace is reasonable which is key solution of designing the furnace. In the past, the size of melting department is determined by referring to or according to the same production scale of the furnaces which are existing. This paper is to use the method which includes the theory and numerical simulation which are combining the practice to establish two kinds of different small furnace design scheme of furnace structure of the physical models and mathematical models, as well as a 900d/t glass furnace's structure which is using of Fluent software simulation. At last, we compare it with the same production scale furnace which is existing and get the ideal results.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127118157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183945
Yang Lianbo, Lv Juncheng, Zhang Guangya
In order to resolve the underpowered problem at low speed of micro-vehicle engine, designing optimally valve lift by using CAE method. Firstly building correct original engine model with engine performance software and multi-dynamic software based on test result. Choosing the optimal valve lifts which should meet performance and dynamic requirement. The method that has been proved true by test can decrease the cost and time.
{"title":"Simulation optimal design and application research of micro-vehicle engine's valve lift","authors":"Yang Lianbo, Lv Juncheng, Zhang Guangya","doi":"10.1109/ICCIAUTOM.2011.6183945","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183945","url":null,"abstract":"In order to resolve the underpowered problem at low speed of micro-vehicle engine, designing optimally valve lift by using CAE method. Firstly building correct original engine model with engine performance software and multi-dynamic software based on test result. Choosing the optimal valve lifts which should meet performance and dynamic requirement. The method that has been proved true by test can decrease the cost and time.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"84 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126077835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183952
L. Ping, Haifeng Yu, Li Jin, Xu Boyi
In order to respond the information security incident, we must make plans of incident response. We also need to summarize and analyze the past incident response method so as to accumulating successful incident response experience. Two problems were studied in this paper. At first we present a method of decomposing and describing complex incident response plans. The action decomposing method is used to decompose the incident response method. The second is an algorithm of analyzing incident responses plans that based on the method of decomposing and describing complex incident responses plans.
{"title":"A new algorithm of quantitative analyzing complex incident response plan","authors":"L. Ping, Haifeng Yu, Li Jin, Xu Boyi","doi":"10.1109/ICCIAUTOM.2011.6183952","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183952","url":null,"abstract":"In order to respond the information security incident, we must make plans of incident response. We also need to summarize and analyze the past incident response method so as to accumulating successful incident response experience. Two problems were studied in this paper. At first we present a method of decomposing and describing complex incident response plans. The action decomposing method is used to decompose the incident response method. The second is an algorithm of analyzing incident responses plans that based on the method of decomposing and describing complex incident responses plans.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"20 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116648910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183917
Wen Haijun, Hou Shiwang, Faning Long
Aiming at the uncertain factors in job shop scheduling problem, this paper proposed a scheduling model with the goal of maximum minimal customer satisfaction. Based on fuzzy theory, the uncertain machining time and due-date time were treated as triangle fuzzy number and trapezoidal fuzzy number. The hybrid PSO algorithm was adopted to solve the problem and its validity was validated with a simulation test. The results illustrate that the approach has good effect on solving the JSSP with fuzzy machining time and due-date time.
{"title":"Study on fuzzy job-shop scheduling problem base on particle swarm optimization","authors":"Wen Haijun, Hou Shiwang, Faning Long","doi":"10.1109/ICCIAUTOM.2011.6183917","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183917","url":null,"abstract":"Aiming at the uncertain factors in job shop scheduling problem, this paper proposed a scheduling model with the goal of maximum minimal customer satisfaction. Based on fuzzy theory, the uncertain machining time and due-date time were treated as triangle fuzzy number and trapezoidal fuzzy number. The hybrid PSO algorithm was adopted to solve the problem and its validity was validated with a simulation test. The results illustrate that the approach has good effect on solving the JSSP with fuzzy machining time and due-date time.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183996
G. Guo, Yuanqiang Shi
This paper introduces a technology for connecting an embedded device to the Internet with single-chip microprocessor chip STC89C52RC as the core chip .The internal structure and characteristics principles of the network interface chip are described, and the corresponding design of hardware and software programming are discussed. This design system can achieve embedding of network protocol stack and driving functions of the network interface card. Experimental results proved that the system could communicate with a remote machine via Ethernet interface for data transmission and obtain desired results.
{"title":"Design and implementation of Ethernet communication interface based on network controller","authors":"G. Guo, Yuanqiang Shi","doi":"10.1109/ICCIAUTOM.2011.6183996","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183996","url":null,"abstract":"This paper introduces a technology for connecting an embedded device to the Internet with single-chip microprocessor chip STC89C52RC as the core chip .The internal structure and characteristics principles of the network interface chip are described, and the corresponding design of hardware and software programming are discussed. This design system can achieve embedding of network protocol stack and driving functions of the network interface card. Experimental results proved that the system could communicate with a remote machine via Ethernet interface for data transmission and obtain desired results.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121745870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6184017
Jirong Wang, Xiaoqin Deng
The performance of the Gaussian kernel Support Vector Machine (SVM) for regression is influenced by the training algorithm. The training process of SVM is to resolve a Quadratic Programming (QP) problem. When there are amounts of samples, the needed memory will be bigger if we resolve the QP problem directly. At present the Sequential Minimal Optimization (SMO) is an effective method to resolve QP. SMO decompose the QP problem into series of QP problems of two variables, and resolve the problems analytically. There is no operation on matrix in SMO, therefore it is applied easily. The training points influence the convergent velocity of SMO, so a new method to select the training points is proposed, and the proposed approach is evaluated with a series of experiments. The experiments show that the approach is reasonable and effective.
{"title":"Selecting training points of the sequential minimal optimization algorithm for Support Vector Machine","authors":"Jirong Wang, Xiaoqin Deng","doi":"10.1109/ICCIAUTOM.2011.6184017","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184017","url":null,"abstract":"The performance of the Gaussian kernel Support Vector Machine (SVM) for regression is influenced by the training algorithm. The training process of SVM is to resolve a Quadratic Programming (QP) problem. When there are amounts of samples, the needed memory will be bigger if we resolve the QP problem directly. At present the Sequential Minimal Optimization (SMO) is an effective method to resolve QP. SMO decompose the QP problem into series of QP problems of two variables, and resolve the problems analytically. There is no operation on matrix in SMO, therefore it is applied easily. The training points influence the convergent velocity of SMO, so a new method to select the training points is proposed, and the proposed approach is evaluated with a series of experiments. The experiments show that the approach is reasonable and effective.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129065218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183957
Guixing Zheng, Bai Lina, Rui Zhao, Yuan Ning, L. Fengliang
According to characteristics of cloud computing, cloud computing is discussed and applied to 10Kv power grid fault intelligent processing system to resolve data sharing, mass storage, parallel computing, and so on, which are not easy to solve in traditional systems. Cloud computing platform architecture is proposed for 10Kv distribution grid fault processing automation system. At the point of software as a service, the lines and equipment management services, the distribution grid dispatch and control services, distribution grid fault locating, insulating, resuming and analyzing services, maintenance services and other services are carried out a detailed design.
{"title":"10Kv distribution grid fault intelligent processing system based on cloud computing","authors":"Guixing Zheng, Bai Lina, Rui Zhao, Yuan Ning, L. Fengliang","doi":"10.1109/ICCIAUTOM.2011.6183957","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183957","url":null,"abstract":"According to characteristics of cloud computing, cloud computing is discussed and applied to 10Kv power grid fault intelligent processing system to resolve data sharing, mass storage, parallel computing, and so on, which are not easy to solve in traditional systems. Cloud computing platform architecture is proposed for 10Kv distribution grid fault processing automation system. At the point of software as a service, the lines and equipment management services, the distribution grid dispatch and control services, distribution grid fault locating, insulating, resuming and analyzing services, maintenance services and other services are carried out a detailed design.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129078689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183975
Xiaohua Wang, Hongwei Wang, Zhaoan Chen
This paper, at first illustrates the current assembly line of XX diesel engine factory, then analyses current problem in this assembly line. Aiming at the requirements, designs assembly line based on RFID technology, gives out the whole technology solution, and analyses how to select key devices. The realization demonstrates the technology solution improves the production efficiency, reduces the work intensity.
{"title":"Design of assembly line of diesel engine factory based on RFID technology","authors":"Xiaohua Wang, Hongwei Wang, Zhaoan Chen","doi":"10.1109/ICCIAUTOM.2011.6183975","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183975","url":null,"abstract":"This paper, at first illustrates the current assembly line of XX diesel engine factory, then analyses current problem in this assembly line. Aiming at the requirements, designs assembly line based on RFID technology, gives out the whole technology solution, and analyses how to select key devices. The realization demonstrates the technology solution improves the production efficiency, reduces the work intensity.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114196559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6183923
An-Li Peng, Song Jia-tao
A personal identity management system based on RFID is widely used in attendance checking. This system is used for keeping the record of staff's of attendance quickly and automatically and the relevant data supplied to faculty staff to look up, which saves a lot of class time to sing upon. This paper introduces the basic function and component of class register system, and conducts a detailed analysis to each important part of the system. After tested, the system is confirmed to work as exactly as possible.
{"title":"Research on personal identity management system based on RFID technology","authors":"An-Li Peng, Song Jia-tao","doi":"10.1109/ICCIAUTOM.2011.6183923","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6183923","url":null,"abstract":"A personal identity management system based on RFID is widely used in attendance checking. This system is used for keeping the record of staff's of attendance quickly and automatically and the relevant data supplied to faculty staff to look up, which saves a lot of class time to sing upon. This paper introduces the basic function and component of class register system, and conducts a detailed analysis to each important part of the system. After tested, the system is confirmed to work as exactly as possible.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132759013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCIAUTOM.2011.6184014
Zhang Shao-bo, Zhu Geng-ming, Wang Ying
By introducing the current research status in software protection, the paper propose a multi-watermarking embedding algorithm to protect the whole software. The watermark information is separated at first and encrypted with the hyper-chaotic sequence, then each of the watermark is embedded into the core location of the program by the mapping fuction. Between the watermarks the effective tamper-proofing is established, if the tampering occurred, the watermark should sense and terminate the program immediately to protect the program. The experiments indicate its robustness is stronger.
{"title":"A strategy of software protection based on multi-watermarking embedding","authors":"Zhang Shao-bo, Zhu Geng-ming, Wang Ying","doi":"10.1109/ICCIAUTOM.2011.6184014","DOIUrl":"https://doi.org/10.1109/ICCIAUTOM.2011.6184014","url":null,"abstract":"By introducing the current research status in software protection, the paper propose a multi-watermarking embedding algorithm to protect the whole software. The watermark information is separated at first and encrypted with the hyper-chaotic sequence, then each of the watermark is embedded into the core location of the program by the mapping fuction. Between the watermarks the effective tamper-proofing is established, if the tampering occurred, the watermark should sense and terminate the program immediately to protect the program. The experiments indicate its robustness is stronger.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130939509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}