In conventional CORDIC algorithm, multiplier and a lookup table are needed to achieve calculation of multiple transcendental function, which will lead to hardware circuit complexity and lower operation speed. Aim at overcoming the shortcomings of traditional CORDIC algorithm, a modified CORDIC algorithm is proposed and implemented by FPGA program. The method does not need the module of correction factor and the lookup table, and just needs a simple shift and add-subtract to achieve the calculation of multiple transcendental function. So it can reduce hardware costs and improve operational performance.
{"title":"Modified CORDIC Algorithm and Its Implementation Based on FPGA","authors":"Huan Li, Yan Xin","doi":"10.1109/ICINIS.2010.30","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.30","url":null,"abstract":"In conventional CORDIC algorithm, multiplier and a lookup table are needed to achieve calculation of multiple transcendental function, which will lead to hardware circuit complexity and lower operation speed. Aim at overcoming the shortcomings of traditional CORDIC algorithm, a modified CORDIC algorithm is proposed and implemented by FPGA program. The method does not need the module of correction factor and the lookup table, and just needs a simple shift and add-subtract to achieve the calculation of multiple transcendental function. So it can reduce hardware costs and improve operational performance.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131731868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming to improve the control system performance, the product quality and productivity for a bloom caster, the modified control system was designed and implemented in an Specialty Steel plant. Programmable logic controller (PLC) based Level I automation control system was developed to control level, frequency, flow rate, speed, pressure, etc. in the continuous casting process. Level II supervisory control system was developed which integrated with Level I system to supply more information for operator. The application results show that the control system works well.
{"title":"An Automated Control System for the Continuous Casting of Blooms","authors":"Xiaojie Zhang, Zhenping Ji","doi":"10.1109/ICINIS.2010.18","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.18","url":null,"abstract":"Aiming to improve the control system performance, the product quality and productivity for a bloom caster, the modified control system was designed and implemented in an Specialty Steel plant. Programmable logic controller (PLC) based Level I automation control system was developed to control level, frequency, flow rate, speed, pressure, etc. in the continuous casting process. Level II supervisory control system was developed which integrated with Level I system to supply more information for operator. The application results show that the control system works well.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126028557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the passive power filters design, a new filter design idea is proposed, which includes high impedance at a certain frequency and low impedance at others. Based on the introduction of fractional calculus application research, the passive elements were described with fractional-order differential equations. The mathematical model of fractional order filters was derived and discussed, then simulated in MATALAB. The integer-order filters are only a tight subset of fractional-order filters that are testified by the mathematical model analysis and simulation results. The filter design idea to the fractional-order domain is developed and the better filter performance of the fractional-order passive power filter is validated.
{"title":"The Research of Passive Power Filter Based on Fractional Calculus","authors":"Wan-Neng Yu, W. Zheng","doi":"10.1109/ICINIS.2010.145","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.145","url":null,"abstract":"Aiming at the passive power filters design, a new filter design idea is proposed, which includes high impedance at a certain frequency and low impedance at others. Based on the introduction of fractional calculus application research, the passive elements were described with fractional-order differential equations. The mathematical model of fractional order filters was derived and discussed, then simulated in MATALAB. The integer-order filters are only a tight subset of fractional-order filters that are testified by the mathematical model analysis and simulation results. The filter design idea to the fractional-order domain is developed and the better filter performance of the fractional-order passive power filter is validated.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126071024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Double auction is a complex system for multiple-persons game and its uncertainty. Current research on auctions is mainly based on the probability game theory. In this paper, we propose double auction model based on the fuzzy theory. Define fuzzy sets to represent the auction participants’ bidding wills. Study auction participants’ actions and decisions using Bellman and Zadeh’s concept of confluence of fuzzy decisions instead of the game theoretic Nash equilibrium. Numerical experience shows the potential of the proposed approach for application in practical auctions.
{"title":"Double Auction Modeling Based on Fuzzy Game","authors":"Haixin Huang, Dingwei Wang","doi":"10.1109/ICINIS.2010.177","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.177","url":null,"abstract":"Double auction is a complex system for multiple-persons game and its uncertainty. Current research on auctions is mainly based on the probability game theory. In this paper, we propose double auction model based on the fuzzy theory. Define fuzzy sets to represent the auction participants’ bidding wills. Study auction participants’ actions and decisions using Bellman and Zadeh’s concept of confluence of fuzzy decisions instead of the game theoretic Nash equilibrium. Numerical experience shows the potential of the proposed approach for application in practical auctions.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122861445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The methods of image edge detection based on the differential, wavelet transform and image morphology are introduced in the paper. Differential operator edge detection method is based on the edge of the adjacent regions' boundary that is not continuous with the gray, using derivative to detect the edge, Wavelet transform edge detection is by means of selecting the appropriate wavelet function to make wavelet detail component to truely reflect the image of the local gray mutations point, The basic idea of mathematical morphology is to use some forms of structural elements to measure and extract the corresponding shape of the image to attain the objective of image analysis and recognition.
{"title":"The Research on the Methods of Image Edge Detection","authors":"Xiuli Zhang, W. Liu","doi":"10.1109/ICINIS.2010.70","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.70","url":null,"abstract":"The methods of image edge detection based on the differential, wavelet transform and image morphology are introduced in the paper. Differential operator edge detection method is based on the edge of the adjacent regions' boundary that is not continuous with the gray, using derivative to detect the edge, Wavelet transform edge detection is by means of selecting the appropriate wavelet function to make wavelet detail component to truely reflect the image of the local gray mutations point, The basic idea of mathematical morphology is to use some forms of structural elements to measure and extract the corresponding shape of the image to attain the objective of image analysis and recognition.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131116975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The algorithm of discrete wavelet transform and Arnold transform combined is developed to achieve the integrity authentication of color image contents through embedding fragile watermarking. Firstly, a new watermarking image is generated with the XOR between the original binary watermarking and the image which is processed with Arnold transform. When the watermark is embedded, the original image color is converted first and the brightness component is decomposed into three discrete wavelets. Then, the low-frequency approximation sub-image of third-level is extracted, and its least significant bit is set 0. Finally, the new watermark is embedded into its least significant bit. Through comparing the pixels of original watermarking image with that of the extracted watermarking image, it can be determined whether the watermarking image has been tampered, and the tampered area of the original color image is located. The results of simulation experiment shows that the algorithm has the strong capabilities of detection and location and it also can keep the original image quality well.
{"title":"An Algorithm for Image Authentication Based on Fragile Watermarking","authors":"Yuning Hua, A-na Wang, Bo Wu","doi":"10.1109/ICINIS.2010.116","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.116","url":null,"abstract":"The algorithm of discrete wavelet transform and Arnold transform combined is developed to achieve the integrity authentication of color image contents through embedding fragile watermarking. Firstly, a new watermarking image is generated with the XOR between the original binary watermarking and the image which is processed with Arnold transform. When the watermark is embedded, the original image color is converted first and the brightness component is decomposed into three discrete wavelets. Then, the low-frequency approximation sub-image of third-level is extracted, and its least significant bit is set 0. Finally, the new watermark is embedded into its least significant bit. Through comparing the pixels of original watermarking image with that of the extracted watermarking image, it can be determined whether the watermarking image has been tampered, and the tampered area of the original color image is located. The results of simulation experiment shows that the algorithm has the strong capabilities of detection and location and it also can keep the original image quality well.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133407647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Although widely used in various applications, the current RFID (Radio Frequency Identification) systems lack efficiently enforcement of security and privacy. Furthermore, considering that the bearer of a RFID tag might be changed, the ownership transferring of the tags also becomes an issue. Some schemes have been suggested, but they are lack of participation of people. In this paper, we propose a novel scheme for the low-cost passive RFID tags. In our approach, people are involved in the authentication process. After getting some information from the assistant tag and user's password, the reader uses them to update the key of the common tags to be identified, and this makes the secured ownership transfer come true. In order to reach our goal, pseudonym, mutual authentication mechanism, and lightweight functions are employed. The analysis shows that our scheme not only achieves the secure and private goals, but also supports secured controlled ownership transfer.
{"title":"Secured Ownership Transfer Scheme for Low-Cost RFID Tags","authors":"Tongliang Li, Zhigang Jin, C. Pang","doi":"10.1109/ICINIS.2010.13","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.13","url":null,"abstract":"Although widely used in various applications, the current RFID (Radio Frequency Identification) systems lack efficiently enforcement of security and privacy. Furthermore, considering that the bearer of a RFID tag might be changed, the ownership transferring of the tags also becomes an issue. Some schemes have been suggested, but they are lack of participation of people. In this paper, we propose a novel scheme for the low-cost passive RFID tags. In our approach, people are involved in the authentication process. After getting some information from the assistant tag and user's password, the reader uses them to update the key of the common tags to be identified, and this makes the secured ownership transfer come true. In order to reach our goal, pseudonym, mutual authentication mechanism, and lightweight functions are employed. The analysis shows that our scheme not only achieves the secure and private goals, but also supports secured controlled ownership transfer.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134057393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a new kind of three-stage neural network was developed to identify the sorts of the biological surface. The visible spectrum (from 380nm to 780nm) of the micro areas with some specks on the surface of the apples was measured with the self-made fiber sensor spectrometer. To sort the apples, A kind of BP-ANN with single hidden layer was devised to identify the characteristics on the biological surface automatically. To improve the performance of BP, A three-stage BP-ANN was devised to identify the four sorts of the apples, the fleckless, the bumped, the scared, and the rotten. It was also studied that the performance of the ANN with the different ranges of the output, the influence to the ANN if the noise was added to the input signals. 25,10,10 and 10 samples of four sorts were selected as training samples respectively, and 10,10,10 and 10 respectively were selected as testing samples. It proved that this kind of BP-ANN can achieve 90% accuracy if 10% noise was added.
{"title":"Spectrum Recognition with Three-Stage Neural Network","authors":"Xianjiang Meng, Xianli Meng","doi":"10.1109/ICINIS.2010.161","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.161","url":null,"abstract":"In this paper, a new kind of three-stage neural network was developed to identify the sorts of the biological surface. The visible spectrum (from 380nm to 780nm) of the micro areas with some specks on the surface of the apples was measured with the self-made fiber sensor spectrometer. To sort the apples, A kind of BP-ANN with single hidden layer was devised to identify the characteristics on the biological surface automatically. To improve the performance of BP, A three-stage BP-ANN was devised to identify the four sorts of the apples, the fleckless, the bumped, the scared, and the rotten. It was also studied that the performance of the ANN with the different ranges of the output, the influence to the ANN if the noise was added to the input signals. 25,10,10 and 10 samples of four sorts were selected as training samples respectively, and 10,10,10 and 10 respectively were selected as testing samples. It proved that this kind of BP-ANN can achieve 90% accuracy if 10% noise was added.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130367576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In view of the variety of the changes of burning flame in large-scale boiler, in order to master the status of the furnace flame in real time. In this paper, it introduces the BP neural network absorb the basic method of flame-picture's temperature, to study thoroughly discussed about the BP neural network model, and puts forward an improved BP neural network method, as for the method to calculate three-dimensional temperature field, which has many advantages to the traditional optimization method. Taking the BP neural network using to test the three-dimensional temperature field in the furnace is feasible by the simulation studies and the experimental results.
{"title":"The Research on Method of Detection for Three-Dimensional Temperature of the Furnace Based on BP Neural Network","authors":"Yang Yu, Jinxing Chen","doi":"10.1109/ICINIS.2010.141","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.141","url":null,"abstract":"In view of the variety of the changes of burning flame in large-scale boiler, in order to master the status of the furnace flame in real time. In this paper, it introduces the BP neural network absorb the basic method of flame-picture's temperature, to study thoroughly discussed about the BP neural network model, and puts forward an improved BP neural network method, as for the method to calculate three-dimensional temperature field, which has many advantages to the traditional optimization method. Taking the BP neural network using to test the three-dimensional temperature field in the furnace is feasible by the simulation studies and the experimental results.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115717632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ontology, as a representation of shared conceptualization of specific domain, is a key technology for the Semantic Web. In recent years, many ontologies have been developed and many of these ontologies contain overlapping information. To be able to use multiple ontologies we need a flexible mechanism to integrate ontologies. In this paper we present a framework for ontology integration which combines ontology similarity measures and ontology integration algorithm. After integrating, we perform pruning and checking the consistency of the integrated ontology. Further, we evaluate our approach in terms of ontology quality.
{"title":"A Framework for Ontology Integration and Evaluation","authors":"Yanhui Lv, Chong Xie","doi":"10.1109/ICINIS.2010.153","DOIUrl":"https://doi.org/10.1109/ICINIS.2010.153","url":null,"abstract":"Ontology, as a representation of shared conceptualization of specific domain, is a key technology for the Semantic Web. In recent years, many ontologies have been developed and many of these ontologies contain overlapping information. To be able to use multiple ontologies we need a flexible mechanism to integrate ontologies. In this paper we present a framework for ontology integration which combines ontology similarity measures and ontology integration algorithm. After integrating, we perform pruning and checking the consistency of the integrated ontology. Further, we evaluate our approach in terms of ontology quality.","PeriodicalId":319379,"journal":{"name":"2010 Third International Conference on Intelligent Networks and Intelligent Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114450485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}