Mounting machine is the most critical bottleneck equipment in the SMT, the production efficiency of which restricts the entire assembly line's productivity dramatically. In order to enhance the virtual manufacture of paste simulation for PCB circuit modular, it is essential and critical for virtual reality simulation to build 3D model for the mounting machine in an efficient and accurate way. Based on the modeling principles, we have done extensive research on critical techniques on VRML geometric modeling. We have proposed the VRML based method that utilizes several modeling tools to build the geometric models efficiently. Using the boom mounting machine as an example, we have focused on the interior and the exterior cases of the mounting machine, to illustrate the construction of its static model that is based on VRML. The result of the simulation has proved the efficiency of the modeling methodology. The models generated have high degree of fidelity. This paper has built the foundation for visual system of mounting machine.
{"title":"Modeling and Simulation of Mounting Machine Based on VRML","authors":"Lan Li","doi":"10.1109/ICCIS.2012.185","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.185","url":null,"abstract":"Mounting machine is the most critical bottleneck equipment in the SMT, the production efficiency of which restricts the entire assembly line's productivity dramatically. In order to enhance the virtual manufacture of paste simulation for PCB circuit modular, it is essential and critical for virtual reality simulation to build 3D model for the mounting machine in an efficient and accurate way. Based on the modeling principles, we have done extensive research on critical techniques on VRML geometric modeling. We have proposed the VRML based method that utilizes several modeling tools to build the geometric models efficiently. Using the boom mounting machine as an example, we have focused on the interior and the exterior cases of the mounting machine, to illustrate the construction of its static model that is based on VRML. The result of the simulation has proved the efficiency of the modeling methodology. The models generated have high degree of fidelity. This paper has built the foundation for visual system of mounting machine.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126373922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper adresses a shortest path problem in network optimization, and proposes a model with constraints. In order to solve the problem, we present an improved genetic algorithm through optimal selection and crossover strategy of genetic algorithm, and explore the framework and key steps of improved genetic algorithm for solving shortest path problem. This algorithm with advantages of intelligent computation has the strong optimization ability and simple structure, which can handle the constraints easily. The results of experiment demonstrate the effectiveness of the improved genetic algorithm and show the search efficiency and solution quality of the algorithm.
{"title":"A Study on the Shortest Path Problem Based on Improved Genetic Algorithm","authors":"Zongyan Xu, Haihua Li, Ye Guan","doi":"10.1109/ICCIS.2012.52","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.52","url":null,"abstract":"This paper adresses a shortest path problem in network optimization, and proposes a model with constraints. In order to solve the problem, we present an improved genetic algorithm through optimal selection and crossover strategy of genetic algorithm, and explore the framework and key steps of improved genetic algorithm for solving shortest path problem. This algorithm with advantages of intelligent computation has the strong optimization ability and simple structure, which can handle the constraints easily. The results of experiment demonstrate the effectiveness of the improved genetic algorithm and show the search efficiency and solution quality of the algorithm.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"453 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125788352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the small sample of missile range trial successive test data, a random weighting method is used to get the prior distribution function of population's parameter with the known prior information under the situation that the parameters' format of general distribution is unknown. Bayesian method is adopted to determine the posterior distribution by using the prior information, population information and sample information. The illustration shows that this method can greatly improve the accuracy of statistic inference, and overcome the shortage of small sample size.
{"title":"Prior Distribution of Missile Range Trial Successive Test Data Based on Random Weighting","authors":"Jin Sun, Guolin Li, Cheng Xu","doi":"10.1109/ICCIS.2012.212","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.212","url":null,"abstract":"Aiming at the small sample of missile range trial successive test data, a random weighting method is used to get the prior distribution function of population's parameter with the known prior information under the situation that the parameters' format of general distribution is unknown. Bayesian method is adopted to determine the posterior distribution by using the prior information, population information and sample information. The illustration shows that this method can greatly improve the accuracy of statistic inference, and overcome the shortage of small sample size.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121861717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the rapid development of information construction around the world, it needs special storage system to provide a stable, reliable, safe data storage service. This paper develops a Dual-Controller system which adds the hardware level redundant relative to Single-Controller system, so it has high stability and reliability in the level of disk and controller. It can satisfy the requirements of storage service stability of higher industry. The Dual-Controller system uses the special heart module between the controllers for communication. So when the system is running, one controller is always getting the mirror controller's state, which helps to detect the fault when the mirror controller is fault. We create the CACHE module to maintain two types of data of CACHE and MIRROR. The experimental result shows the performance of Dual-Controller system is almost the same with the Single-Controller system, but the Dual-Controller system won't loss the data and can continue to provide data services.
{"title":"The Research and Implement of a Dual-Controller System","authors":"Yi Chen, Yihua Lan, H. Ren","doi":"10.1109/ICCIS.2012.340","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.340","url":null,"abstract":"With the rapid development of information construction around the world, it needs special storage system to provide a stable, reliable, safe data storage service. This paper develops a Dual-Controller system which adds the hardware level redundant relative to Single-Controller system, so it has high stability and reliability in the level of disk and controller. It can satisfy the requirements of storage service stability of higher industry. The Dual-Controller system uses the special heart module between the controllers for communication. So when the system is running, one controller is always getting the mirror controller's state, which helps to detect the fault when the mirror controller is fault. We create the CACHE module to maintain two types of data of CACHE and MIRROR. The experimental result shows the performance of Dual-Controller system is almost the same with the Single-Controller system, but the Dual-Controller system won't loss the data and can continue to provide data services.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127940283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
3D human model is widely used in various fields, especially real human model. Along with the development of 3D scanning techniques, real human body data can be acquired by 3D scanner. But the number of point cloud data is huge. Human model data processing requires massive calculation although the computer hardware performance is better and better. In order to overcome the problem, this paper presents a rapid surface remodeling of human body based on scanned data. The results show that this method can quickly and effectively simplify large point cloud data and get satisfied real human models. This method can be applied to reconstruct a large number of human models and display their human figure in real time.
{"title":"A Rapid Surface Remodeling of Human Body Based on Scanned Data","authors":"Xiaofang Huang, Shouqian Sun","doi":"10.1109/ICCIS.2012.39","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.39","url":null,"abstract":"3D human model is widely used in various fields, especially real human model. Along with the development of 3D scanning techniques, real human body data can be acquired by 3D scanner. But the number of point cloud data is huge. Human model data processing requires massive calculation although the computer hardware performance is better and better. In order to overcome the problem, this paper presents a rapid surface remodeling of human body based on scanned data. The results show that this method can quickly and effectively simplify large point cloud data and get satisfied real human models. This method can be applied to reconstruct a large number of human models and display their human figure in real time.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131370382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the design of database-based application, effective use of object-oriented programming methodology to optimize the database access code is related to the structure and maintainability of the entire application. Without proper optimization of the access code will cause significant incensement of the degree of coupling between modules, and increase the cost of application maintenance. This paper discusses how to effectively apply thoughts of Design Patterns and technique of Object Oriented Programming to construct the database applications, which will be made to well formed, easy to understand and maintain. Practice has proved that effective apply of appropriate design patterns make database application structure be easy to understand, thereby greatly improve the scalability and maintainability of the whole application.
{"title":"Effective Apply of Design Pattern in Database-Based Application Development","authors":"Haoyue Dai","doi":"10.1109/ICCIS.2012.138","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.138","url":null,"abstract":"In the design of database-based application, effective use of object-oriented programming methodology to optimize the database access code is related to the structure and maintainability of the entire application. Without proper optimization of the access code will cause significant incensement of the degree of coupling between modules, and increase the cost of application maintenance. This paper discusses how to effectively apply thoughts of Design Patterns and technique of Object Oriented Programming to construct the database applications, which will be made to well formed, easy to understand and maintain. Practice has proved that effective apply of appropriate design patterns make database application structure be easy to understand, thereby greatly improve the scalability and maintainability of the whole application.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130275941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The overall objective of the network security situation assessment is to establish security situation assessment system. This system can unify the large-scale network. First, it provides a security policy unified the whole network. It also provides the techniques for wide-area situation assessment. At the same time this system provides situational awareness and decision support tools for the implementation of network security command. Firstly, the information model of security situation was studied based on XML. Then the security situation value of system including three levels: service, host and network was analyzed and calculated. The-support vector regression machine was chosen for predicting the network security situation and determined the parameter values. Finally, the effectiveness of the method was verified through experimental analysis.
{"title":"Research on Network Security Situation Assessment and Prediction","authors":"Xiaorong Cheng, S. Lang","doi":"10.1109/ICCIS.2012.249","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.249","url":null,"abstract":"The overall objective of the network security situation assessment is to establish security situation assessment system. This system can unify the large-scale network. First, it provides a security policy unified the whole network. It also provides the techniques for wide-area situation assessment. At the same time this system provides situational awareness and decision support tools for the implementation of network security command. Firstly, the information model of security situation was studied based on XML. Then the security situation value of system including three levels: service, host and network was analyzed and calculated. The-support vector regression machine was chosen for predicting the network security situation and determined the parameter values. Finally, the effectiveness of the method was verified through experimental analysis.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130277615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Association rule is an important model in data mining. However, traditional association rules are mostly based on the support and confidence metrics, and most algorithms and researches assumed that each attribute in the database is equal. In fact, because the user preference to the item is different, the mining rules using the existing algorithms are not always appropriate to users. By introducing the concept of weighted dual confidence, a new algorithm which can mine effective weighted rules is proposed in this paper, which is on the basis of the dual confidence association rules used in algorithm. The case studies show that the algorithm can reduce the large number of meaningless association rules and mine interesting negative association rules in real life.
{"title":"Research of Mining Effective and Weighted Association Rules Based on Dual Confidence","authors":"Yihua Zhong, Yuxin Liao","doi":"10.1109/ICCIS.2012.232","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.232","url":null,"abstract":"Association rule is an important model in data mining. However, traditional association rules are mostly based on the support and confidence metrics, and most algorithms and researches assumed that each attribute in the database is equal. In fact, because the user preference to the item is different, the mining rules using the existing algorithms are not always appropriate to users. By introducing the concept of weighted dual confidence, a new algorithm which can mine effective weighted rules is proposed in this paper, which is on the basis of the dual confidence association rules used in algorithm. The case studies show that the algorithm can reduce the large number of meaningless association rules and mine interesting negative association rules in real life.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130450933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li Guorong, H. Jingjing, Liao Tai-ping, Lin Zhicheng, Z. Furong
For analysis of the reservoir, due to complexity of the reservoir heterogeneity, the relationship between the logging response value and the non-homogenous reservoir is complex and fuzzy. The use of fuzzy clustering method of neural network combines the adaptivity and the fault tolerance of the neural network organic manner with the fuzzy comprehensive discrimination in the human thinking simulation of fuzzy logic, so as to recognize the reservoir heterogeneity through multi-factor fuzzy comprehensive judgment and reasoning. This method has been used to treat the data about the 135 wells in Xujiahe Group in central Sichuan, and has shown good results, with a coincidence rate as high as 87.6%. The result demonstrates that this method enjoys good adaptivity against the problem of automatic recognition of the reservoir heterogeneity, and could improve the precision of automatic recognition of the reservoir heterogeneity.
{"title":"Research Method of Fuzzy Neural Network of Reservoir Heterogeneity","authors":"Li Guorong, H. Jingjing, Liao Tai-ping, Lin Zhicheng, Z. Furong","doi":"10.1109/ICCIS.2012.229","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.229","url":null,"abstract":"For analysis of the reservoir, due to complexity of the reservoir heterogeneity, the relationship between the logging response value and the non-homogenous reservoir is complex and fuzzy. The use of fuzzy clustering method of neural network combines the adaptivity and the fault tolerance of the neural network organic manner with the fuzzy comprehensive discrimination in the human thinking simulation of fuzzy logic, so as to recognize the reservoir heterogeneity through multi-factor fuzzy comprehensive judgment and reasoning. This method has been used to treat the data about the 135 wells in Xujiahe Group in central Sichuan, and has shown good results, with a coincidence rate as high as 87.6%. The result demonstrates that this method enjoys good adaptivity against the problem of automatic recognition of the reservoir heterogeneity, and could improve the precision of automatic recognition of the reservoir heterogeneity.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"428 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134291560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes the MPLS VPN technology and IPSec protocol, and explains how the technology which is based on the IPSec MPLS VPN technology works and how to put this kind of technology into practice. Through the profound research of the advantages and disadvantages of the MPLS VPN and the IPSec technology, I have worked out a solution named the MPLS VPN ALL-in-One Card Network based on IPSec and its practicable model. This solution has not only the high-speed exchange of MPLS VPN, excellent quality of QoS and good expandability, but also the assurance of the high security and dependability of IPSec. This paper gives the detailed description of the comprehensive and effective applications of the MPLS VPN network technology used in the all-in-one campus card network in universities with multi-campuses in the multi-service system like the teaching, management, finance and the campus life, etc, by showing the campus network construction example between one university's main campus and its other campuses.
{"title":"Application Research of MPLS VPN All-in-One Campus Card Network Based on IPSec","authors":"Mu Zhang, Zhongping Tao","doi":"10.1109/ICCIS.2012.86","DOIUrl":"https://doi.org/10.1109/ICCIS.2012.86","url":null,"abstract":"This paper describes the MPLS VPN technology and IPSec protocol, and explains how the technology which is based on the IPSec MPLS VPN technology works and how to put this kind of technology into practice. Through the profound research of the advantages and disadvantages of the MPLS VPN and the IPSec technology, I have worked out a solution named the MPLS VPN ALL-in-One Card Network based on IPSec and its practicable model. This solution has not only the high-speed exchange of MPLS VPN, excellent quality of QoS and good expandability, but also the assurance of the high security and dependability of IPSec. This paper gives the detailed description of the comprehensive and effective applications of the MPLS VPN network technology used in the all-in-one campus card network in universities with multi-campuses in the multi-service system like the teaching, management, finance and the campus life, etc, by showing the campus network construction example between one university's main campus and its other campuses.","PeriodicalId":269967,"journal":{"name":"2012 Fourth International Conference on Computational and Information Sciences","volume":"70 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131748912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}