Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182411
T. Sun, Zhaohui Nie, Rong Liu
Central heating system is a big lag, time-varying, nonlinear complex system, the parameter self-tuning fuzzy PID control can use the fuzzy control rules to modify the PID parameters online, and therefore has good adaptive ability. This paper analyzes the central heating system in the model, and designed a fuzzy parameter self-tuning PID controller. PID control and fuzzy PID control simulation of the model were studied. The results show that: Fuzzy PID control over traditional PID control has better control effect.
{"title":"Application on fuzzy PID technology for central heating","authors":"T. Sun, Zhaohui Nie, Rong Liu","doi":"10.1109/ICCSNT.2011.6182411","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182411","url":null,"abstract":"Central heating system is a big lag, time-varying, nonlinear complex system, the parameter self-tuning fuzzy PID control can use the fuzzy control rules to modify the PID parameters online, and therefore has good adaptive ability. This paper analyzes the central heating system in the model, and designed a fuzzy parameter self-tuning PID controller. PID control and fuzzy PID control simulation of the model were studied. The results show that: Fuzzy PID control over traditional PID control has better control effect.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114141037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182474
Ji Yaowu
Regression analysis is a kind of mathematical modeling approach to find the relation which hidden in variables through experiment and observation. This method can describe a perfect relation in many problems usually. But the amount of computation is high because we must use a complexity mathematical expression when wanted to get a satisfying result. This paper analyzes mathematical behavior of linear regression in high dimensional space, and finds the relation between variables and their functions with dependent variables in measurement space. Experiment proved the approach is well-defined, low computation complexity and effective.
{"title":"A new mathematical modeling method based on space geometry theory","authors":"Ji Yaowu","doi":"10.1109/ICCSNT.2011.6182474","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182474","url":null,"abstract":"Regression analysis is a kind of mathematical modeling approach to find the relation which hidden in variables through experiment and observation. This method can describe a perfect relation in many problems usually. But the amount of computation is high because we must use a complexity mathematical expression when wanted to get a satisfying result. This paper analyzes mathematical behavior of linear regression in high dimensional space, and finds the relation between variables and their functions with dependent variables in measurement space. Experiment proved the approach is well-defined, low computation complexity and effective.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114143408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182355
Qing Chang, Mei Han
Unbalanced load on railway freight vehicles is an important factor of affecting the railway operation safety. At present, traditional manual detection methods are mainly used among the railway stations that have no condition operating railway detecting equipment, which lead to heavy workload and inaccuracy. It is of great importance to take more available scientific means instead of manual way to detect and manage cargo loading position rapidly, simply and accurately. Digital image processing technology is fast, accurate and highly flexible. But it is rarely used in detecting loading position of railway cargo. On the background of enhancing safety in the railway freight management and information construction, this paper designs a detection system of cargo loading position on vehicles based on CCD image sampling equipment. An adaptive combined method of Butterworth high-pass filter and Canny edge detector is proposed and finally implemented through MATLAB to process the cargo loading image. The result of the processed image demonstrates that the method has following features: quick processing speed, less noise, single response to an edge and continuous edges, which lay a foundation for obtaining changes of cargo position by calculating pixels distance.
{"title":"Study on a combined method of Butterworth high-pass filter and Canny edge detector in the application of detecting cargo loading position on railway vehicles","authors":"Qing Chang, Mei Han","doi":"10.1109/ICCSNT.2011.6182355","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182355","url":null,"abstract":"Unbalanced load on railway freight vehicles is an important factor of affecting the railway operation safety. At present, traditional manual detection methods are mainly used among the railway stations that have no condition operating railway detecting equipment, which lead to heavy workload and inaccuracy. It is of great importance to take more available scientific means instead of manual way to detect and manage cargo loading position rapidly, simply and accurately. Digital image processing technology is fast, accurate and highly flexible. But it is rarely used in detecting loading position of railway cargo. On the background of enhancing safety in the railway freight management and information construction, this paper designs a detection system of cargo loading position on vehicles based on CCD image sampling equipment. An adaptive combined method of Butterworth high-pass filter and Canny edge detector is proposed and finally implemented through MATLAB to process the cargo loading image. The result of the processed image demonstrates that the method has following features: quick processing speed, less noise, single response to an edge and continuous edges, which lay a foundation for obtaining changes of cargo position by calculating pixels distance.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128391003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182300
Fajie Li, Shu-bo Zhan, Lili Li
In modern society, more and more companies have introduced call center system into their enterprise management to improve customer relationships. In the meantime, the scale of the call center system increases hugely. As a result, the traditional RDBMS cannot well satisfy the requirements of high-frequency access and performance becomes a key issue to be considered. Memcached is a high-performance, distributed memory object caching system, which is widely used in storage system to improve data access performance. This paper first briefly introduces the conception and features of memcached, and then discusses the integration of memcached with call center in detail. Finally, we promote a new idea to use memcached based on Web Service technology, which proves to be safe and flexible.
{"title":"Research on using memcached in call center","authors":"Fajie Li, Shu-bo Zhan, Lili Li","doi":"10.1109/ICCSNT.2011.6182300","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182300","url":null,"abstract":"In modern society, more and more companies have introduced call center system into their enterprise management to improve customer relationships. In the meantime, the scale of the call center system increases hugely. As a result, the traditional RDBMS cannot well satisfy the requirements of high-frequency access and performance becomes a key issue to be considered. Memcached is a high-performance, distributed memory object caching system, which is widely used in storage system to improve data access performance. This paper first briefly introduces the conception and features of memcached, and then discusses the integration of memcached with call center in detail. Finally, we promote a new idea to use memcached based on Web Service technology, which proves to be safe and flexible.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128747431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182084
L. Juan
The GM(1,1) model is the kernel of grey system which can point at the small sample data and uncertain information to predict, and is applied widely in prediction. However, the general grey model is disturbed by old information, which is inadequate to predict accurately. So it is necessary to replace old information with new information. An improved grey model is proposed in this paper, which can realize by amending exponent of the GM(1,1) model. Finally, the improved model and general method were respectively applied to predict Jingdezhen's tourism revenues from 2003 to 2010. The result shows that the improved model can improve prediction precision and obtain a much better prediction result.
{"title":"Application of improved grey GM(1,1) model in tourism revenues prediction","authors":"L. Juan","doi":"10.1109/ICCSNT.2011.6182084","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182084","url":null,"abstract":"The GM(1,1) model is the kernel of grey system which can point at the small sample data and uncertain information to predict, and is applied widely in prediction. However, the general grey model is disturbed by old information, which is inadequate to predict accurately. So it is necessary to replace old information with new information. An improved grey model is proposed in this paper, which can realize by amending exponent of the GM(1,1) model. Finally, the improved model and general method were respectively applied to predict Jingdezhen's tourism revenues from 2003 to 2010. The result shows that the improved model can improve prediction precision and obtain a much better prediction result.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128761764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6181991
Chen Lei
In this work we presented two dynamic population size improvements for the classical PSO. EP-PSO started with a small number of particles and increased the number of particles dynamically by iteratively duplicating the updated particles. DP-PSO started with a large number of particles then reduced the number by dropping the worst performing half iteratively. Both EP-PSO and DP-PSO reduced the execution time by 60% on average compared to the classical PSO. EP-PSO fared quite badly when convergence rate and convergence ability to the global optimum was considered. On the other hand, DP-PSO performed reasonably well compared to the classical PSO but at a much faster convergence and execution speed.
{"title":"The study on dynamic population size improvements for classical particle swarm optimization","authors":"Chen Lei","doi":"10.1109/ICCSNT.2011.6181991","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6181991","url":null,"abstract":"In this work we presented two dynamic population size improvements for the classical PSO. EP-PSO started with a small number of particles and increased the number of particles dynamically by iteratively duplicating the updated particles. DP-PSO started with a large number of particles then reduced the number by dropping the worst performing half iteratively. Both EP-PSO and DP-PSO reduced the execution time by 60% on average compared to the classical PSO. EP-PSO fared quite badly when convergence rate and convergence ability to the global optimum was considered. On the other hand, DP-PSO performed reasonably well compared to the classical PSO but at a much faster convergence and execution speed.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128603863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6181989
Yancong Yang, Ruidong Peng
The construction of 3D objects and their viewing control are key problem during 3D visualization process. General procedures for developing application software based on MFC and OpenGL were proposed according to object-oriented programming methodology and thus a GLView class was derived from CView class. Spherical coordinates were adopted to characterize the observation point's position and the view direction. The transformation formula of twisting, translating, rotating and scaling were deduced according coordinate transform rule between global world coordinates and local view coordinates. An OOP algorithm was developed to finish these transformations by the response of a mouse or keyboard message, a dialog or a Timer. It was demonstrated by many cases that both the intuitive control and the quantitative control for viewing 3D objects have been provided conveniently.
{"title":"Interactive control for viewing 3D objects based on MFC and OpenGL","authors":"Yancong Yang, Ruidong Peng","doi":"10.1109/ICCSNT.2011.6181989","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6181989","url":null,"abstract":"The construction of 3D objects and their viewing control are key problem during 3D visualization process. General procedures for developing application software based on MFC and OpenGL were proposed according to object-oriented programming methodology and thus a GLView class was derived from CView class. Spherical coordinates were adopted to characterize the observation point's position and the view direction. The transformation formula of twisting, translating, rotating and scaling were deduced according coordinate transform rule between global world coordinates and local view coordinates. An OOP algorithm was developed to finish these transformations by the response of a mouse or keyboard message, a dialog or a Timer. It was demonstrated by many cases that both the intuitive control and the quantitative control for viewing 3D objects have been provided conveniently.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"58 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128972386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182111
Lijun Gao, M. Ma, Y. Shu, Chunfeng Liu
Radio Frequency Identification (RFID) will become one of the most widely used devices in the near future. But the RFID security problem has hindered this technical promotion seriously. The extant RFID security protocols have the serious insufficiency and flaw to resistance trace attack and desynchronizing attack. This article proposed a security protocol that can against the intermittence time section position trace attack and desynchronizing attack, we have used mathematics term method with the Learning Parity with Noise(LPN) to prove the protocol's security.
{"title":"RFID security protocol trace attack and desynchronizing attack deep research","authors":"Lijun Gao, M. Ma, Y. Shu, Chunfeng Liu","doi":"10.1109/ICCSNT.2011.6182111","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182111","url":null,"abstract":"Radio Frequency Identification (RFID) will become one of the most widely used devices in the near future. But the RFID security problem has hindered this technical promotion seriously. The extant RFID security protocols have the serious insufficiency and flaw to resistance trace attack and desynchronizing attack. This article proposed a security protocol that can against the intermittence time section position trace attack and desynchronizing attack, we have used mathematics term method with the Learning Parity with Noise(LPN) to prove the protocol's security.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128982463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Email servers of large-scale enterprises generally demand large storage space. To mitigate the problem, this paper proposes a simple and practicable email compression method, effectively reducing emails storage space on mail servers. In our method, emails are MIME-decoded first; then attachments are chopped and duplicate attachments removed; finally the attachment files and plain-text email files are compressed. Experiments are performed on two operating email servers, the experiments result indicates that our approach can save more than half of the email storage space.
{"title":"A simple and practicable email storage space compression method","authors":"Zhenzhen Chen, Weibin Zheng, Kewang Zhang, Zhekai Zhang","doi":"10.1109/ICCSNT.2011.6182048","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182048","url":null,"abstract":"Email servers of large-scale enterprises generally demand large storage space. To mitigate the problem, this paper proposes a simple and practicable email compression method, effectively reducing emails storage space on mail servers. In our method, emails are MIME-decoded first; then attachments are chopped and duplicate attachments removed; finally the attachment files and plain-text email files are compressed. Experiments are performed on two operating email servers, the experiments result indicates that our approach can save more than half of the email storage space.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128986102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/ICCSNT.2011.6182166
Zhaoyang Qu, Guangfeng Zhang
The existing migration mechanism calls for a shared storage service between the source host and the destination host, which is a necessary condition for dynamic migration. This paper proposes a dynamic incremental migration including external memory based on Xen virtual Machine, by analyzing the principles and limitations of the existing migration mechanisms. This approach makes the migration between physical hosts do not rely on shared storage any more, and widens the scope of migration technology. Performance analysis and experiment results show that the approach is feasible.
{"title":"Design and implementation of dynamic incremental migration based on Xen","authors":"Zhaoyang Qu, Guangfeng Zhang","doi":"10.1109/ICCSNT.2011.6182166","DOIUrl":"https://doi.org/10.1109/ICCSNT.2011.6182166","url":null,"abstract":"The existing migration mechanism calls for a shared storage service between the source host and the destination host, which is a necessary condition for dynamic migration. This paper proposes a dynamic incremental migration including external memory based on Xen virtual Machine, by analyzing the principles and limitations of the existing migration mechanisms. This approach makes the migration between physical hosts do not rely on shared storage any more, and widens the scope of migration technology. Performance analysis and experiment results show that the approach is feasible.","PeriodicalId":303186,"journal":{"name":"Proceedings of 2011 International Conference on Computer Science and Network Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129700534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}