The basic particle swarm optimization algorithm updated particles velocity only by the current particles velocity, the personal best position and the excellent particle position. Considering the influence of the previous changes among the current particles velocity, in this paper, the updating formula of particles velocity was mended by appending momentum factor, an improved particle swarm optimization algorithm with momentum factor was proposed. The simulation results show that the improved algorithm has higher accuracy and quicker convergence velocity than the basic particle swarm optimization algorithm.
{"title":"A Particle Swarm Optimization Algorithm with Momentum Factor","authors":"Jinxia Ren, Shuai Yang","doi":"10.1109/ISCID.2011.13","DOIUrl":"https://doi.org/10.1109/ISCID.2011.13","url":null,"abstract":"The basic particle swarm optimization algorithm updated particles velocity only by the current particles velocity, the personal best position and the excellent particle position. Considering the influence of the previous changes among the current particles velocity, in this paper, the updating formula of particles velocity was mended by appending momentum factor, an improved particle swarm optimization algorithm with momentum factor was proposed. The simulation results show that the improved algorithm has higher accuracy and quicker convergence velocity than the basic particle swarm optimization algorithm.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124661607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
the problem of multi-target multi-sensor management for tracking midcourse targets using sensors located on the low-earth orbit (LEO) satellite constellation is studied. The coverage model of tracking sensor and the satellite-borne infrared sensor measurement model are reviewed. The sensor management algorithm for tracking multi-target is studied by using the covariance control strategy. The optimistic model aiming to minimize the switch of sensors during tracking period is established. Furthermore, the detailed management algorithm is presented. The numerical simulations are implemented to confirm that the proposed management algorithm is provided with the feasibility, superiority and adaptability confronted with the scenario with varying number of targets. Comparison with the algorithm based on PCRLB shows that it provides with a scheduling order which makes the sensors less relocated from the targets.
{"title":"Sensor Management Based on Covariance Control Strategy for LEO Satellite Constellation","authors":"Bing-shan Liu, Yan Zhao, Dong-yun Yi","doi":"10.1109/ISCID.2011.78","DOIUrl":"https://doi.org/10.1109/ISCID.2011.78","url":null,"abstract":"the problem of multi-target multi-sensor management for tracking midcourse targets using sensors located on the low-earth orbit (LEO) satellite constellation is studied. The coverage model of tracking sensor and the satellite-borne infrared sensor measurement model are reviewed. The sensor management algorithm for tracking multi-target is studied by using the covariance control strategy. The optimistic model aiming to minimize the switch of sensors during tracking period is established. Furthermore, the detailed management algorithm is presented. The numerical simulations are implemented to confirm that the proposed management algorithm is provided with the feasibility, superiority and adaptability confronted with the scenario with varying number of targets. Comparison with the algorithm based on PCRLB shows that it provides with a scheduling order which makes the sensors less relocated from the targets.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116876009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiuqing Mao, Xing-yuan Chen, Yingjie Yang, Junfeng Li
The detection of failure is a fundamental component for highly reliable systems. Taking the QoS of failure detection into consideration, a Framework of Disaster-Tolerance Oriented Adaptive Failure Detection (DTO-FDF) is presented, which adopts hierarchical modularity design and constructs the DTO-FDF and algorithm from the system view and data circulation sequence. DTO-FDF mainly includes three modules: Monitoring module, Processing module, Responding module. By monitoring and gathering the data of node, according to evaluating index and configuring policy, combining with the designed failure detection algorithm, the system judges the machine is alive or not. Based on the result of decision, the system makes the take-over response and the system migration. The framework made some benefic work for the study of failure detection module of universality and independence.
{"title":"An Improved Framework of Disaster-Tolerance Oriented Adaptive Failure Detection","authors":"Xiuqing Mao, Xing-yuan Chen, Yingjie Yang, Junfeng Li","doi":"10.1109/ISCID.2011.65","DOIUrl":"https://doi.org/10.1109/ISCID.2011.65","url":null,"abstract":"The detection of failure is a fundamental component for highly reliable systems. Taking the QoS of failure detection into consideration, a Framework of Disaster-Tolerance Oriented Adaptive Failure Detection (DTO-FDF) is presented, which adopts hierarchical modularity design and constructs the DTO-FDF and algorithm from the system view and data circulation sequence. DTO-FDF mainly includes three modules: Monitoring module, Processing module, Responding module. By monitoring and gathering the data of node, according to evaluating index and configuring policy, combining with the designed failure detection algorithm, the system judges the machine is alive or not. Based on the result of decision, the system makes the take-over response and the system migration. The framework made some benefic work for the study of failure detection module of universality and independence.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116997479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new approach for the simulation of feather based on a statistical method is presented. The feather boundary can be firstly detected according to its configuration, and then its contour shape can also be simulated on the basis of a curve-fitting technique. The components within its boundary are divided into two parts, i.e. the heavier one and the softer one. The former region may be filled with the black and white patterns depending upon the necessary information detected before. And the latter region may be represented by the two parts, i.e. the softer rachis and down. Distribution probability of the rachis curve shape is derived from the detected information so that the simulation can be realized. The softer down may be represented by the statistical method after efficiently analysis its 2D gray image information.
{"title":"Feather Animation Based on an Intelligence Algorithm","authors":"B. Li","doi":"10.1109/ISCID.2011.12","DOIUrl":"https://doi.org/10.1109/ISCID.2011.12","url":null,"abstract":"A new approach for the simulation of feather based on a statistical method is presented. The feather boundary can be firstly detected according to its configuration, and then its contour shape can also be simulated on the basis of a curve-fitting technique. The components within its boundary are divided into two parts, i.e. the heavier one and the softer one. The former region may be filled with the black and white patterns depending upon the necessary information detected before. And the latter region may be represented by the two parts, i.e. the softer rachis and down. Distribution probability of the rachis curve shape is derived from the detected information so that the simulation can be realized. The softer down may be represented by the statistical method after efficiently analysis its 2D gray image information.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121352669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A novel method to recognize human activities based on videos is proposed in this paper. These videos are captured by a camera mounted to a human body. We can estimate the activity from the changes of scenes in videos. In this paper, we use the improved diamond search block-matching method to calculate the motion vector. Then we extract key information from the motion vector filed, and design a feature descriptor to describe the motion in frames in a video which can distinguish different motions. After getting feature descriptors, we use SVM classifier to classify different motions with a machine learning method. Experimental results show that our method successfully identifies simple motion such as walking, running, going upstairs and going downstairs. And the block size and the frequency of videos have impacts on classification precision.
{"title":"Human Activity Recognition Based on Improved Diamond Search Block-Matching Method","authors":"Wenjuan Qi, B. Yin, Jiaojiao Wu","doi":"10.1109/ISCID.2011.67","DOIUrl":"https://doi.org/10.1109/ISCID.2011.67","url":null,"abstract":"A novel method to recognize human activities based on videos is proposed in this paper. These videos are captured by a camera mounted to a human body. We can estimate the activity from the changes of scenes in videos. In this paper, we use the improved diamond search block-matching method to calculate the motion vector. Then we extract key information from the motion vector filed, and design a feature descriptor to describe the motion in frames in a video which can distinguish different motions. After getting feature descriptors, we use SVM classifier to classify different motions with a machine learning method. Experimental results show that our method successfully identifies simple motion such as walking, running, going upstairs and going downstairs. And the block size and the frequency of videos have impacts on classification precision.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122987570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the description of the MC-VRPTW, we construct the corresponding mathematical formulation and use the improved taboo search algorithm to solve it. Besides, the practical problem of the product oil is also simulated. We get the superior optimal distribution scheme and prove the applicability and efficiency of the proposed algorithm.
{"title":"Application of Improved TS Algorithm for MC-VRPTW","authors":"J. Ge, Xiong Ying","doi":"10.1109/ISCID.2011.10","DOIUrl":"https://doi.org/10.1109/ISCID.2011.10","url":null,"abstract":"Based on the description of the MC-VRPTW, we construct the corresponding mathematical formulation and use the improved taboo search algorithm to solve it. Besides, the practical problem of the product oil is also simulated. We get the superior optimal distribution scheme and prove the applicability and efficiency of the proposed algorithm.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126443407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article introduces a type of embedded MCU network measure and control system based on Ethernet, which adopts high speed MCU with kernel of 8052. Through controlling the special chip for Ethernet, the system realized the function of TCP/IP protocol. Since the system can be used as a independent system, any computer on the net can control the system or transmit order and data to the system through standard TCP/IP protocol. Equipped the system by digital temperature sensor, it can be used to measure industry field temperature and transmit the results to computer through network, and then get temperature curve. And its measure and control range are all £10¡«£«125°C, the accuracy is ±1°C, the resolution reaches 0.1°C. This system have many advantages such as simple structure, better universal, communicating through network, flexible usage, low cost etc. It can be adapted by various of intelligent sensor and has better extend ability. It can be used in the fields of remote data acquisition, remote measurement and control and so on.
{"title":"Ethernet-based Network Measure and Control Systems Embedded MCU","authors":"Yunfeng Xu, Yan Zhang, Rui Ma","doi":"10.1109/ISCID.2011.119","DOIUrl":"https://doi.org/10.1109/ISCID.2011.119","url":null,"abstract":"This article introduces a type of embedded MCU network measure and control system based on Ethernet, which adopts high speed MCU with kernel of 8052. Through controlling the special chip for Ethernet, the system realized the function of TCP/IP protocol. Since the system can be used as a independent system, any computer on the net can control the system or transmit order and data to the system through standard TCP/IP protocol. Equipped the system by digital temperature sensor, it can be used to measure industry field temperature and transmit the results to computer through network, and then get temperature curve. And its measure and control range are all £10¡«£«125°C, the accuracy is ±1°C, the resolution reaches 0.1°C. This system have many advantages such as simple structure, better universal, communicating through network, flexible usage, low cost etc. It can be adapted by various of intelligent sensor and has better extend ability. It can be used in the fields of remote data acquisition, remote measurement and control and so on.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126098326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, the public security techniques of the Internet of Things, including IOT-MW (Internet of Things - Middleware), encryption, decryption, secret key management, privacy homomorphism, and access control etc. especially the cryptograph query, are studied, and then the data in the HIS (Hospital Information System) are analyzed, moreover the safe HIS is designed by applying the security technologies of the Internet of Things, and it can give decision-making support to the administrator too. Finally the performance of the safe HIS is tested perfectly, so it has an extensive business prospect.
{"title":"Study and Design of the Safe HIS on the Internet of Things","authors":"Xin Bai, Hongyan Yan, Xiaojuan Zhang","doi":"10.1109/ISCID.2011.52","DOIUrl":"https://doi.org/10.1109/ISCID.2011.52","url":null,"abstract":"In this paper, the public security techniques of the Internet of Things, including IOT-MW (Internet of Things - Middleware), encryption, decryption, secret key management, privacy homomorphism, and access control etc. especially the cryptograph query, are studied, and then the data in the HIS (Hospital Information System) are analyzed, moreover the safe HIS is designed by applying the security technologies of the Internet of Things, and it can give decision-making support to the administrator too. Finally the performance of the safe HIS is tested perfectly, so it has an extensive business prospect.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"499 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125721063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A binocular vision system having the ability of actively tracking moving objects is designed and implemented. Management software is also developed for further study. Then the crucial technologies concerned with active tracking of one moving object by such a binocular system have been studied. The general architecture is firstly analyzed, and then the realization of target detection and tracking algorithm is given. Finally, a complete corresponding mechanism in the tracking process for the two cameras in case that they track different targets is proposed and discussed.
{"title":"Binocular Vision System Design and its Active Object Tracking","authors":"Longfei Tian, Licheng Wu, Yan Wang, Guosheng Yang","doi":"10.1109/ISCID.2011.77","DOIUrl":"https://doi.org/10.1109/ISCID.2011.77","url":null,"abstract":"A binocular vision system having the ability of actively tracking moving objects is designed and implemented. Management software is also developed for further study. Then the crucial technologies concerned with active tracking of one moving object by such a binocular system have been studied. The general architecture is firstly analyzed, and then the realization of target detection and tracking algorithm is given. Finally, a complete corresponding mechanism in the tracking process for the two cameras in case that they track different targets is proposed and discussed.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116119558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a method for multivarible symbolic regression modeling and predicting. The method based on gene expression programming, a recently proposed evolutionary computation technique. We explain in details the techniques of gene expression programming and multivarible symbolic regression with gene expression programming. Furthermore, we give an example to explain this technique, and experiment results show that the model set up by gene expression programming is better than statistiacal linear regression techniques.
{"title":"Multivarible Symbolic Regression Based on Gene Expression Programming","authors":"Ming-fang Zhu, Jian-bin Zhang, Yan-ling Ren, Yu Pan, Guanghui Zhu","doi":"10.1109/ISCID.2011.177","DOIUrl":"https://doi.org/10.1109/ISCID.2011.177","url":null,"abstract":"This paper presents a method for multivarible symbolic regression modeling and predicting. The method based on gene expression programming, a recently proposed evolutionary computation technique. We explain in details the techniques of gene expression programming and multivarible symbolic regression with gene expression programming. Furthermore, we give an example to explain this technique, and experiment results show that the model set up by gene expression programming is better than statistiacal linear regression techniques.","PeriodicalId":224504,"journal":{"name":"2011 Fourth International Symposium on Computational Intelligence and Design","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127311388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}