The prediction of stock trading signal is studied in this paper. Considering the excellent performance of Support Vector Machine (SVM) in pattern recognition, we apply SVM to construct a prediction model to find the stock trading signal. In addition, Piecewise linear representation (PLR) is good at extracting valuable information from a time sequence. PLR is used for checking of turning points in this study. The experiments on some real stocks show that SVM obtains a better result in prediction accuracy and profitability than traditional Back Propagation neural network does.
{"title":"Prediction of Stock Trading Signal Based on Support Vector Machine","authors":"X. Chen, Zhi-Jie He","doi":"10.1109/ICICTA.2015.165","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.165","url":null,"abstract":"The prediction of stock trading signal is studied in this paper. Considering the excellent performance of Support Vector Machine (SVM) in pattern recognition, we apply SVM to construct a prediction model to find the stock trading signal. In addition, Piecewise linear representation (PLR) is good at extracting valuable information from a time sequence. PLR is used for checking of turning points in this study. The experiments on some real stocks show that SVM obtains a better result in prediction accuracy and profitability than traditional Back Propagation neural network does.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133322556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on the STC12C5A60S MCU, the electric cooker which has the feature of rice option has been developed. This paper expounds its working principle, and the hardware circuit and software of controlling system are designed.
{"title":"The Application of STC12C5A60S MCU in the Electric Cooker","authors":"Yanli Su, Weiguo Han, Tianyang Huang","doi":"10.1109/ICICTA.2015.238","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.238","url":null,"abstract":"Based on the STC12C5A60S MCU, the electric cooker which has the feature of rice option has been developed. This paper expounds its working principle, and the hardware circuit and software of controlling system are designed.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132237148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multisite protein sub-cellular localization prediction has become the hot topic relating biological information in recent years. Quite a lot of researchers have researched multisite protein sub-cellular localization for a long time. However, the accuracy still needs to be improved. As one of the researchers, I should explore new methods to improve the prediction accuracy. I choose Gpos-mPLOC data set in this paper. In addition, combining the pseudo amino acid composition, position vector and entropy density three effective feature extraction methods arbitrarily to extract protein features. Then, putting these features into multi-label k nearest neighbor classifier to predict protein sub-cellular location. The experiment proves that different feature combination methods can result in different prediction accuracy through the Jack-knife test and I can choose the best feature combination method to predict multisite protein sub-cellular location.
{"title":"Using Different Feature Combination Methods to Study Multisite Protein Sub-cellular Localization Prediction","authors":"Qing Zhao, Dong Wang, Yuehui Chen, Xumi Qu","doi":"10.1109/ICICTA.2015.272","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.272","url":null,"abstract":"Multisite protein sub-cellular localization prediction has become the hot topic relating biological information in recent years. Quite a lot of researchers have researched multisite protein sub-cellular localization for a long time. However, the accuracy still needs to be improved. As one of the researchers, I should explore new methods to improve the prediction accuracy. I choose Gpos-mPLOC data set in this paper. In addition, combining the pseudo amino acid composition, position vector and entropy density three effective feature extraction methods arbitrarily to extract protein features. Then, putting these features into multi-label k nearest neighbor classifier to predict protein sub-cellular location. The experiment proves that different feature combination methods can result in different prediction accuracy through the Jack-knife test and I can choose the best feature combination method to predict multisite protein sub-cellular location.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129439797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In electronic commerce, the supply of peculiar commodity is not adequate to users' requirements. Many users are inclined to use malicious software to order scarce commodities instead of legal purchasing processes. To solve this problem, designers of E-commerce websites use CAPTCHA to distinguish if the purchase request is applied by human rather than software. It does not work because malicious software (malware) can identify various CAPTCHA by specific function. So websites attempt to use more complex CAPTCHA to resist malware, however, users cannot identify it either. As a result, using CAPTCHA is not a perfect method to deal with distinguishing problems. In this paper, we propose a novel dynamic authentication CAPTCHA to enhance security and overcome limitations existing in static scheme. Our system can distinguish human from software by the negotiation between host and mobile terminal. The security analysis shows that the method we proposed can resist known types of attacks efficiently.
{"title":"A New Dynamic Authentication Captcha Based on Negotiation Between Host and Mobile Terminal for Electronic Commerce","authors":"Yang Guangming, Ni Jingyu, Tan Zhenhua","doi":"10.1109/ICICTA.2015.21","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.21","url":null,"abstract":"In electronic commerce, the supply of peculiar commodity is not adequate to users' requirements. Many users are inclined to use malicious software to order scarce commodities instead of legal purchasing processes. To solve this problem, designers of E-commerce websites use CAPTCHA to distinguish if the purchase request is applied by human rather than software. It does not work because malicious software (malware) can identify various CAPTCHA by specific function. So websites attempt to use more complex CAPTCHA to resist malware, however, users cannot identify it either. As a result, using CAPTCHA is not a perfect method to deal with distinguishing problems. In this paper, we propose a novel dynamic authentication CAPTCHA to enhance security and overcome limitations existing in static scheme. Our system can distinguish human from software by the negotiation between host and mobile terminal. The security analysis shows that the method we proposed can resist known types of attacks efficiently.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114291983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A virtual operation system of well drilling control installation is introduced based on LabVIEW. 3D model of a blow-out preventer (BOP) is created with 3Ds Max. The animation of starting the BOP by virtual operation instrument is also designed to imitate the interaction between the well control equipment and men. The virtual simulation of well control operation system demonstrated in this paper can be used not only to train the workers, but also analysis the intricate problems in the drilling process.
{"title":"Virtual Simulation of Well Control Operation System","authors":"Jiangping Wang, Zhiqin Yang","doi":"10.1109/ICICTA.2015.277","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.277","url":null,"abstract":"A virtual operation system of well drilling control installation is introduced based on LabVIEW. 3D model of a blow-out preventer (BOP) is created with 3Ds Max. The animation of starting the BOP by virtual operation instrument is also designed to imitate the interaction between the well control equipment and men. The virtual simulation of well control operation system demonstrated in this paper can be used not only to train the workers, but also analysis the intricate problems in the drilling process.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134344620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Highway central station centrally manages the roads and toll stations within the scope of the jurisdiction, and it's also responsible for emergency rescue work. It's a very important management department of Highway. Rational distribution and location of the central station can not only reduce the waste of resources and economic losses, but also improve the efficiency of operational management and emergency rescue of the highway. Therefore, considering the management demands of toll station and the potential traffic accident black spots, this paper builds a model about central station location, aiming at minimizing the operating costs and rescuing timely and efficiently and then applies immune genetic algorithm to solve the model. Finally a case analysis using Mat lab verifies the superiority and validity of the model.
{"title":"Selection of Highway Central Station's Location Based on Immune Genetic Algorithm","authors":"Li Rongrong, L. Weiming, Wang Chao","doi":"10.1109/ICICTA.2015.205","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.205","url":null,"abstract":"Highway central station centrally manages the roads and toll stations within the scope of the jurisdiction, and it's also responsible for emergency rescue work. It's a very important management department of Highway. Rational distribution and location of the central station can not only reduce the waste of resources and economic losses, but also improve the efficiency of operational management and emergency rescue of the highway. Therefore, considering the management demands of toll station and the potential traffic accident black spots, this paper builds a model about central station location, aiming at minimizing the operating costs and rescuing timely and efficiently and then applies immune genetic algorithm to solve the model. Finally a case analysis using Mat lab verifies the superiority and validity of the model.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129390955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liao Bin, T. Xianguo, Wang Honghui, Xu Shaobo, Zhang Tao
According to the statistical properties of the nuclear signal pulse on the amplitude and time, a random pulse generator for simulating nuclear radiation signals is designed in this paper. The noise of the ADC acquisition circuit is used to obtain two-way seeds of random number. The obtained seeds of random number are processed by linear feedback shift register (LFSR) to generate high-speed and uniformly distributed random number continuously, then random numbers of Gaussian distribution are produced based on lookup table method and random numbers of exponential distribution are produced by setting the threshold value. Random numbers of Gaussian distribution are sent to the D/A converter to convert digital signal to analog signal, and random numbers of exponential distribution are sent to control time interval between two pulse signals. Eventually the random pulse that follows the gauss distribution on the amplitude and the exponential distribution on the time interval between two adjacent pulse signals is shaped by pulse shaped circuit. The practical test results show that the random pulse follows the gauss distribution on the amplitude and the exponential distribution on the time interval between two adjacent pulse signals, meeting statistical regularity of nuclear signal.
{"title":"A Random Pulse Generator for Simulating Nuclear Radiation Signals","authors":"Liao Bin, T. Xianguo, Wang Honghui, Xu Shaobo, Zhang Tao","doi":"10.1109/ICICTA.2015.27","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.27","url":null,"abstract":"According to the statistical properties of the nuclear signal pulse on the amplitude and time, a random pulse generator for simulating nuclear radiation signals is designed in this paper. The noise of the ADC acquisition circuit is used to obtain two-way seeds of random number. The obtained seeds of random number are processed by linear feedback shift register (LFSR) to generate high-speed and uniformly distributed random number continuously, then random numbers of Gaussian distribution are produced based on lookup table method and random numbers of exponential distribution are produced by setting the threshold value. Random numbers of Gaussian distribution are sent to the D/A converter to convert digital signal to analog signal, and random numbers of exponential distribution are sent to control time interval between two pulse signals. Eventually the random pulse that follows the gauss distribution on the amplitude and the exponential distribution on the time interval between two adjacent pulse signals is shaped by pulse shaped circuit. The practical test results show that the random pulse follows the gauss distribution on the amplitude and the exponential distribution on the time interval between two adjacent pulse signals, meeting statistical regularity of nuclear signal.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133376352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a novel risk assessment algorithm for accounting information system using analytic hierarchy process. In order to assess the risk of accounting information system, we design an index system with two layers. In the first layer, there are four risk categories, which are technical risk, operational risk, Management risk and Emergency risk. Furthermore, each risk category consists of some second layer risks. The main innovations of this paper are to introduce the analytic hierarchy process to solve the accounting information system risk assessment problem. In particular, AHP is able to compute a priority of the importance of each alternative, that is, an overall object is located on the top level, and then the criteria in the middle level denotes the overall object. Finally, experimental results testify the effectiveness of our algorithm.
{"title":"A Novel Risk Assessment Algorithm for Accounting Information System Using Analytic Hierarchy Process","authors":"Yuan Li-sheng, Dong Ru-Ping","doi":"10.1109/ICICTA.2015.24","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.24","url":null,"abstract":"In this paper, we propose a novel risk assessment algorithm for accounting information system using analytic hierarchy process. In order to assess the risk of accounting information system, we design an index system with two layers. In the first layer, there are four risk categories, which are technical risk, operational risk, Management risk and Emergency risk. Furthermore, each risk category consists of some second layer risks. The main innovations of this paper are to introduce the analytic hierarchy process to solve the accounting information system risk assessment problem. In particular, AHP is able to compute a priority of the importance of each alternative, that is, an overall object is located on the top level, and then the criteria in the middle level denotes the overall object. Finally, experimental results testify the effectiveness of our algorithm.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132581531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the problem of airfield security guard, an early warning system of airfield security defense is designed. The system is a computer controlled platform which is visualization and interactive mode based on wireless sensor network. Also, it has some functions that are interactive operation in the 3D, inspection and deployment, monitoring target of invasion, video monitor in real time and linkage alerting, which improves the level of airfield security governance.
{"title":"Design and Implementation for Early Warning System of Airfield Security Defense","authors":"Fu Xinhua, Yang Yongjia","doi":"10.1109/ICICTA.2015.98","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.98","url":null,"abstract":"Aiming at the problem of airfield security guard, an early warning system of airfield security defense is designed. The system is a computer controlled platform which is visualization and interactive mode based on wireless sensor network. Also, it has some functions that are interactive operation in the 3D, inspection and deployment, monitoring target of invasion, video monitor in real time and linkage alerting, which improves the level of airfield security governance.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116242290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Miao Tian, Zheng Chao, Zhou Zongchuan, Dong Xiaojing, Ren Da-jiang, Liu Guanqi, Song Yun-ting
Fast automatic recognition helps to find out vulnerable branch in weakness section. Taking timely control strategies after recognition is good for maintaining power system stability. At first, sending and receiving system is used to prove the phenomenon that two peaks appear in active power trajectory when it is disturbed to stability margin. Secondly, fast identification method is put forward to find out critical branch. In order to facilitate its online usage, judge formula and flow chart is given to help to make the decision. Finally, computing example of New England system is used to prove theory above and to verify control effect.
{"title":"Identification of Critical Branch in Weakness Section Based on Disturbed Tie-Line Electrical Characteristic","authors":"Miao Tian, Zheng Chao, Zhou Zongchuan, Dong Xiaojing, Ren Da-jiang, Liu Guanqi, Song Yun-ting","doi":"10.1109/ICICTA.2015.120","DOIUrl":"https://doi.org/10.1109/ICICTA.2015.120","url":null,"abstract":"Fast automatic recognition helps to find out vulnerable branch in weakness section. Taking timely control strategies after recognition is good for maintaining power system stability. At first, sending and receiving system is used to prove the phenomenon that two peaks appear in active power trajectory when it is disturbed to stability margin. Secondly, fast identification method is put forward to find out critical branch. In order to facilitate its online usage, judge formula and flow chart is given to help to make the decision. Finally, computing example of New England system is used to prove theory above and to verify control effect.","PeriodicalId":231694,"journal":{"name":"2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121928250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}