Electrocardiogram (ECG) monitoring is one of the most important patient vital sign. Many design for ECG amplifier has been established. In this paper we describe a unique design of a single supply isolated single Channel ECG amplifier, based on a standard 8051 micro controller. This micro controller system includes analog circuit, digital, ADC circuit and graphical LCD. In general, the analogue circuit module carries out differential amplification, band-pass filtering, power line interference elimination, and output amplification the digital circuit part consists of an 8051 standard micro controller, an 8-channel ADC (ADC0808) converter, and graphical LCD panel. Such system features with low power, low cost and small size which can be used for home use.
{"title":"A Single Supply Standard 8051 Microcontroller Based Medical K-grade Isolation ECG Module with Graphics LCD","authors":"A. AlMejrad","doi":"10.1109/ISDEA.2012.584","DOIUrl":"https://doi.org/10.1109/ISDEA.2012.584","url":null,"abstract":"Electrocardiogram (ECG) monitoring is one of the most important patient vital sign. Many design for ECG amplifier has been established. In this paper we describe a unique design of a single supply isolated single Channel ECG amplifier, based on a standard 8051 micro controller. This micro controller system includes analog circuit, digital, ADC circuit and graphical LCD. In general, the analogue circuit module carries out differential amplification, band-pass filtering, power line interference elimination, and output amplification the digital circuit part consists of an 8051 standard micro controller, an 8-channel ADC (ADC0808) converter, and graphical LCD panel. Such system features with low power, low cost and small size which can be used for home use.","PeriodicalId":267532,"journal":{"name":"2012 Second International Conference on Intelligent System Design and Engineering Application","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131370879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we define the concept of Projective Granule, Deficient Value, and Conjugate Pair, and achieve relevant formalized theorems and proofs. Then we find a Algorithm by which all Conjugated Pairs in the formal context can be obtained. The gain of the conjugate pair could classify the knowledge of concept lattice in accordance with some attributes (or objects) that users concern, and thus it has the significance in the extraction of useful knowledge.
{"title":"The Classification and Extraction of Effective Knowledge in Concept Lattices Based on the Conjugate Pair of Deficient Value","authors":"Jie Wu, Yuan Ma","doi":"10.1109/ISDEA.2012.429","DOIUrl":"https://doi.org/10.1109/ISDEA.2012.429","url":null,"abstract":"In this paper, we define the concept of Projective Granule, Deficient Value, and Conjugate Pair, and achieve relevant formalized theorems and proofs. Then we find a Algorithm by which all Conjugated Pairs in the formal context can be obtained. The gain of the conjugate pair could classify the knowledge of concept lattice in accordance with some attributes (or objects) that users concern, and thus it has the significance in the extraction of useful knowledge.","PeriodicalId":267532,"journal":{"name":"2012 Second International Conference on Intelligent System Design and Engineering Application","volume":"427 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133231591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
After the soft soil horizon have been disposed through cement injection pile, they change into non-uniform plastic or Uneven layer of solid, so they form into the formation of a composite foundation due to the composition of soil structure have changed. This essay proves the advantage of short time and the well-reinforce-effect good quality assurance through the success of the use of cement injection pile in Ashen-expressway project of bridge section, high fill, culvert base treatment in Henan Province.
{"title":"On the Processing of Composite Foundation","authors":"G. Jing","doi":"10.1109/ISDEA.2012.716","DOIUrl":"https://doi.org/10.1109/ISDEA.2012.716","url":null,"abstract":"After the soft soil horizon have been disposed through cement injection pile, they change into non-uniform plastic or Uneven layer of solid, so they form into the formation of a composite foundation due to the composition of soil structure have changed. This essay proves the advantage of short time and the well-reinforce-effect good quality assurance through the success of the use of cement injection pile in Ashen-expressway project of bridge section, high fill, culvert base treatment in Henan Province.","PeriodicalId":267532,"journal":{"name":"2012 Second International Conference on Intelligent System Design and Engineering Application","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131840726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new method that the hidden nodes of the neural network are chosen by the genetic algorithm is proposed in this paper. The experimental results show that the appropriate hidden nodes can be selected by the genetic algorithm, and the results from the identification indicate that the system is quite efficient for identifying multi-objective polluted infrared spectra.
{"title":"An Optimization for Identification System of the Simulated Infrared Spectra of Polluted Gasses Using Genetic Algorithm","authors":"Li Meijuan, Y. Shuai, Jing Lei, Zhang Jun","doi":"10.1109/ISDEA.2012.523","DOIUrl":"https://doi.org/10.1109/ISDEA.2012.523","url":null,"abstract":"A new method that the hidden nodes of the neural network are chosen by the genetic algorithm is proposed in this paper. The experimental results show that the appropriate hidden nodes can be selected by the genetic algorithm, and the results from the identification indicate that the system is quite efficient for identifying multi-objective polluted infrared spectra.","PeriodicalId":267532,"journal":{"name":"2012 Second International Conference on Intelligent System Design and Engineering Application","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133133181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper analyses the noise modulation and noise restrain characteristic of MUSIC algorithm on the condition of signal number under-estimation, and proposes a novel weak signal detection method: first modulate signal by stochastic noise, then detect weak signal by MUSIC algorithm. Its validity is tested by simulation.
{"title":"Novel Weak Signal Detection Method Based on Noise Modulation Theory for MUSIC Algorithm","authors":"Jiang Yi, Ju Hui","doi":"10.1109/ISDEA.2012.552","DOIUrl":"https://doi.org/10.1109/ISDEA.2012.552","url":null,"abstract":"This paper analyses the noise modulation and noise restrain characteristic of MUSIC algorithm on the condition of signal number under-estimation, and proposes a novel weak signal detection method: first modulate signal by stochastic noise, then detect weak signal by MUSIC algorithm. Its validity is tested by simulation.","PeriodicalId":267532,"journal":{"name":"2012 Second International Conference on Intelligent System Design and Engineering Application","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114591188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We present a real-time path planning method for on-road autonomous driving. This method utilizes a two-level hierarchy consisting of on-road behavior planning and online path generating to achieve feasible paths for autonomous vehicle in dynamic on-road environment which is characterized by lots of structured information and flat terrain. An on-road behavior planning technique is used to transform the uncertain path planning problem into several determined sub-ones. Then, the online path planning algorithm is applied to solve these sub-problems. This method contains three major components: anytime behavioral replanning, online path planning and mitigation strategy for time lag due to an agent system with asynchronous multi-sensor. We evaluate the proposed method on the KUAFU-1, an autonomous vehicle prototype modified by ourselves. Experimental results show that the proposed method can successfully provide real-time feasible paths in various on-road traffic sceneries.
{"title":"A Two-level Path Planning Method for On-road Autonomous Driving","authors":"Liang Ma, Jing Yang, Mengjie Zhang","doi":"10.1109/ISDEA.2012.607","DOIUrl":"https://doi.org/10.1109/ISDEA.2012.607","url":null,"abstract":"We present a real-time path planning method for on-road autonomous driving. This method utilizes a two-level hierarchy consisting of on-road behavior planning and online path generating to achieve feasible paths for autonomous vehicle in dynamic on-road environment which is characterized by lots of structured information and flat terrain. An on-road behavior planning technique is used to transform the uncertain path planning problem into several determined sub-ones. Then, the online path planning algorithm is applied to solve these sub-problems. This method contains three major components: anytime behavioral replanning, online path planning and mitigation strategy for time lag due to an agent system with asynchronous multi-sensor. We evaluate the proposed method on the KUAFU-1, an autonomous vehicle prototype modified by ourselves. Experimental results show that the proposed method can successfully provide real-time feasible paths in various on-road traffic sceneries.","PeriodicalId":267532,"journal":{"name":"2012 Second International Conference on Intelligent System Design and Engineering Application","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125434008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Fourier transform has been widely used in ISAR signal and image processing. In most cases, ISAR signals exhibit time-varying behavior in the Doppler spectrum. Thus, a joint time-frequency analysis (JTFA) for ISAR signals is more useful. In this paper, we introduce a new WVD algorithm jointed CLEAN technique. Meanwhile, the simulations of LFM signal in ISAR are adapted to compare their performance. It is shown that our algorithm is better than typical WVD and SPWVD algorithms.
{"title":"A New WVD Algorithm Jointed CLEAN Technique in ISAR Imaging","authors":"Hao-Yu Lu, Shunsheng Zhang, L. Kong","doi":"10.1109/ISDEA.2012.602","DOIUrl":"https://doi.org/10.1109/ISDEA.2012.602","url":null,"abstract":"The Fourier transform has been widely used in ISAR signal and image processing. In most cases, ISAR signals exhibit time-varying behavior in the Doppler spectrum. Thus, a joint time-frequency analysis (JTFA) for ISAR signals is more useful. In this paper, we introduce a new WVD algorithm jointed CLEAN technique. Meanwhile, the simulations of LFM signal in ISAR are adapted to compare their performance. It is shown that our algorithm is better than typical WVD and SPWVD algorithms.","PeriodicalId":267532,"journal":{"name":"2012 Second International Conference on Intelligent System Design and Engineering Application","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125657648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In Semiconductor IC failure analysis, failure localization is the most important step. However, as semiconductor circuits get more complex and devices trend to smaller dimension, failure localization becomes very difficult if failure is not caused during customer application, but by fab process. In this case, data analysis is recommended as a powerful addition to traditional failure analysis or yield analysis methods. This paper introduced a methodology of data analysis, which can build up correlation with distinctive view between several fields of data, such as electric analysis data, wafer process data. By this methodology, fail device related with fab process can be quickly localized. A real case of this methodology is presented.
{"title":"A Novel Data Analysis Methodology in Failure Analysis","authors":"Miao Wu, W. Wang, Li Tian, Chunlei Wu, Diwei Fan","doi":"10.1109/ISDEA.2012.398","DOIUrl":"https://doi.org/10.1109/ISDEA.2012.398","url":null,"abstract":"In Semiconductor IC failure analysis, failure localization is the most important step. However, as semiconductor circuits get more complex and devices trend to smaller dimension, failure localization becomes very difficult if failure is not caused during customer application, but by fab process. In this case, data analysis is recommended as a powerful addition to traditional failure analysis or yield analysis methods. This paper introduced a methodology of data analysis, which can build up correlation with distinctive view between several fields of data, such as electric analysis data, wafer process data. By this methodology, fail device related with fab process can be quickly localized. A real case of this methodology is presented.","PeriodicalId":267532,"journal":{"name":"2012 Second International Conference on Intelligent System Design and Engineering Application","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131487550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As a important step in SoC design, good architecture design is the foundation to ensure the final structure to meet the design specifications. In paper, the minimal SoC system used for performance compare between basic architectures is defined, which is consisted of embedded processor, on chip bus, on chip memory and IP (GPIO). Then six SoC architecture based on 32 bit embedded RISC processor is studied, and comparison and analysis are discussed.
{"title":"The Study of SoC Architecture Design Based on 32-bit Embedded RISC Processor","authors":"Yuan Ying, Wu Wuchen, Hou Ligang, Geng Shuqin, Zhou Zhonghua, Liu Qi","doi":"10.1109/ISDEA.2012.431","DOIUrl":"https://doi.org/10.1109/ISDEA.2012.431","url":null,"abstract":"As a important step in SoC design, good architecture design is the foundation to ensure the final structure to meet the design specifications. In paper, the minimal SoC system used for performance compare between basic architectures is defined, which is consisted of embedded processor, on chip bus, on chip memory and IP (GPIO). Then six SoC architecture based on 32 bit embedded RISC processor is studied, and comparison and analysis are discussed.","PeriodicalId":267532,"journal":{"name":"2012 Second International Conference on Intelligent System Design and Engineering Application","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116016140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The fuzzy clustering analytical method based on fuzzy equivalent relation has been described in this paper, the principle, model and procedure of this fuzzy clustering analytical method are illustrated in detail. All moving targets at sea have been classified. Based on this fuzzy clustering analytical method, the maritime targets of the specific characteristics are carried out clustering analysis. The result of calculation shows that this method is feasible and effective. Target I can be judged as one aircraft carrier, target X as one oil drilling platform. Analyzing the targets further can be identified as: the targets II ,HI are two destroyers; IV, V are two frigates; VI,VII,IX are three guided missile boats; VI is an auxiliary vessel. The method can be also applied to other fields, such as biology characteristic, character identification and pattern identification etc..
{"title":"Maritime Target Recognition Based on Fuzzy Clustering Analytical Method","authors":"Jiang Ning, Feng Jie","doi":"10.1109/ISDEA.2012.446","DOIUrl":"https://doi.org/10.1109/ISDEA.2012.446","url":null,"abstract":"The fuzzy clustering analytical method based on fuzzy equivalent relation has been described in this paper, the principle, model and procedure of this fuzzy clustering analytical method are illustrated in detail. All moving targets at sea have been classified. Based on this fuzzy clustering analytical method, the maritime targets of the specific characteristics are carried out clustering analysis. The result of calculation shows that this method is feasible and effective. Target I can be judged as one aircraft carrier, target X as one oil drilling platform. Analyzing the targets further can be identified as: the targets II ,HI are two destroyers; IV, V are two frigates; VI,VII,IX are three guided missile boats; VI is an auxiliary vessel. The method can be also applied to other fields, such as biology characteristic, character identification and pattern identification etc..","PeriodicalId":267532,"journal":{"name":"2012 Second International Conference on Intelligent System Design and Engineering Application","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126679366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}