This paper proposes a scheme of bistatic SAR with three channels for ground moving targets detection. According to the characteristic of bistatic SAR, FrFT technique was chosen to focus the moving target and improve the signal to clutter ratio, while we suppress clutter and estimate the parameters of moving target with clutter suppression interferometer techniques. From the spatial geometry model and echo signal model of the system, the method of moving target parameters estimation was carried out. Computer simulation results validate ground moving targets detection can then be obtained by jointly processing algorithm.
{"title":"A New Method of Moving Targets Detection and Imaging for Bistatic SAR","authors":"Meng Qi, Zhulin Zong","doi":"10.1109/ISCID.2014.123","DOIUrl":"https://doi.org/10.1109/ISCID.2014.123","url":null,"abstract":"This paper proposes a scheme of bistatic SAR with three channels for ground moving targets detection. According to the characteristic of bistatic SAR, FrFT technique was chosen to focus the moving target and improve the signal to clutter ratio, while we suppress clutter and estimate the parameters of moving target with clutter suppression interferometer techniques. From the spatial geometry model and echo signal model of the system, the method of moving target parameters estimation was carried out. Computer simulation results validate ground moving targets detection can then be obtained by jointly processing algorithm.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131020102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The crucial problem of multisensor remote sensing image registration is how to establish the reliable correspondences between the features extracted from two images. The feature similarity based methods fail when similar local regions exist, and the spatial relationship methods fail to match small portion of pair wise correspondences out of the total number of features. In this paper, we proposed shape context as feature similarity and overlap error as spatial relationship to construct an objective function for the feature matching problem, and deterministic annealing (DA) is used to solve the optimization problem. Feature matching experiments with real remote sensing images demonstrate the superiority of our algorithm over the 5 classic feature matching algorithms, and registration results outperform the popular image registration algorithms.
{"title":"Robust Feature Based Multisensor Remote Sensing Image Registration Algorithm","authors":"Yan Guo, Jinwei Wang, Weizhi Zhong, Yanfeng Gu","doi":"10.1109/ISCID.2014.105","DOIUrl":"https://doi.org/10.1109/ISCID.2014.105","url":null,"abstract":"The crucial problem of multisensor remote sensing image registration is how to establish the reliable correspondences between the features extracted from two images. The feature similarity based methods fail when similar local regions exist, and the spatial relationship methods fail to match small portion of pair wise correspondences out of the total number of features. In this paper, we proposed shape context as feature similarity and overlap error as spatial relationship to construct an objective function for the feature matching problem, and deterministic annealing (DA) is used to solve the optimization problem. Feature matching experiments with real remote sensing images demonstrate the superiority of our algorithm over the 5 classic feature matching algorithms, and registration results outperform the popular image registration algorithms.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126591052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Natural gas, which is treated as an alternative to the depleting supplies of oil, is widely used for fuel and electricity production. The use of natural gas in the world depends upon the thousands miles of natural gas pipeline networks that have been set up in few decades. The safe operation of these complex systems is of significant importance due to the intrinsic characteristics of hydrocarbons such as: toxicity, flammability and explosion velocity. In this work, a real-time leakage monitoring model of the long distance natural gas pipeline is proposed. And a leakage detection and localization mechanisms based on the above model were studied. In order to test the performance of the provided method, a networked data acquisition and analysis system was built. Through application to a practical system, it is verified that the proposed system is effective in gas leakage detection.
{"title":"Leakage Detection of Natural Gas Pipeline Based on an Embedded System","authors":"Baoying Zhu, Fenxi Yao, S. Chai","doi":"10.1109/ISCID.2014.196","DOIUrl":"https://doi.org/10.1109/ISCID.2014.196","url":null,"abstract":"Natural gas, which is treated as an alternative to the depleting supplies of oil, is widely used for fuel and electricity production. The use of natural gas in the world depends upon the thousands miles of natural gas pipeline networks that have been set up in few decades. The safe operation of these complex systems is of significant importance due to the intrinsic characteristics of hydrocarbons such as: toxicity, flammability and explosion velocity. In this work, a real-time leakage monitoring model of the long distance natural gas pipeline is proposed. And a leakage detection and localization mechanisms based on the above model were studied. In order to test the performance of the provided method, a networked data acquisition and analysis system was built. Through application to a practical system, it is verified that the proposed system is effective in gas leakage detection.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127060374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To meet the actual demand of maritime container transportation and management, an information integration model and sharing mechanism based on RFID middleware is proposed by analyzing maritime multivariate data heterogeneity. The model consists of maritime supply chain RFID middleware model, RFID middleware integrated model, XML data exchange interface and XML-based information exchange. XML is defined as the basis for data integration and information exchange data solution. The paper deals particularly with the marine enterprise information exchange based on XML and achieve a significant performance improvement over state-of-the-art information exchange model.
{"title":"Maritime Information Integration Based on RFID Middleware","authors":"Haiting Zhao, Ying-jie Liang","doi":"10.1109/ISCID.2014.120","DOIUrl":"https://doi.org/10.1109/ISCID.2014.120","url":null,"abstract":"To meet the actual demand of maritime container transportation and management, an information integration model and sharing mechanism based on RFID middleware is proposed by analyzing maritime multivariate data heterogeneity. The model consists of maritime supply chain RFID middleware model, RFID middleware integrated model, XML data exchange interface and XML-based information exchange. XML is defined as the basis for data integration and information exchange data solution. The paper deals particularly with the marine enterprise information exchange based on XML and achieve a significant performance improvement over state-of-the-art information exchange model.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"5 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126150732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the problem of low accuracy in intrusion detection system, this paper established a genetic support vector machine (SVM) model according to the features of genetic algorithm and support vector machine algorithm. The model firstly optimizes the support vector parameters according to genetic algorithm, then we build the intrusion detection model with support vector machine optimized and use the model to detect. The experiments choose the proper parameters (c, s) through discussing the influence of support vector machines parameters to the detection accuracy. The results show that putting genetic support vector machine model into intrusion detection improved detection accuracy.
{"title":"Optimization Algorithm Based on Genetic Support Vector Machine Model","authors":"Lanying Li, Shaobin Ma, Yun Zhang","doi":"10.1109/ISCID.2014.99","DOIUrl":"https://doi.org/10.1109/ISCID.2014.99","url":null,"abstract":"Aiming at the problem of low accuracy in intrusion detection system, this paper established a genetic support vector machine (SVM) model according to the features of genetic algorithm and support vector machine algorithm. The model firstly optimizes the support vector parameters according to genetic algorithm, then we build the intrusion detection model with support vector machine optimized and use the model to detect. The experiments choose the proper parameters (c, s) through discussing the influence of support vector machines parameters to the detection accuracy. The results show that putting genetic support vector machine model into intrusion detection improved detection accuracy.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"72 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126134597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In cloud manufacturing environment, many manufacturing enterprises will produce massive data of a variety of forms. We do research of optimization parallel frequent pattern mining algorithm based on Mahout in this paper. We first analyze the implement and defects of PFP-Growth in Mahout. Then we propose two optimization strategies. One is parallel sequence optimization, and another is optimization the storage of counting information. Datasets from real manufacturing and Webdocs show the effectiveness of the strategy in time and space of the optimization.
{"title":"The Optimization of Parallel Frequent Pattern Growth Algorithm Based on Mahout in Cloud Manufacturing Environment","authors":"Jie Wang, Yu Zeng","doi":"10.1109/ISCID.2014.258","DOIUrl":"https://doi.org/10.1109/ISCID.2014.258","url":null,"abstract":"In cloud manufacturing environment, many manufacturing enterprises will produce massive data of a variety of forms. We do research of optimization parallel frequent pattern mining algorithm based on Mahout in this paper. We first analyze the implement and defects of PFP-Growth in Mahout. Then we propose two optimization strategies. One is parallel sequence optimization, and another is optimization the storage of counting information. Datasets from real manufacturing and Webdocs show the effectiveness of the strategy in time and space of the optimization.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127301251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new Communication protocol design in the Data Link Layer of the industry Ethernet ring network is presented in this paper. The HDL files used in the design are packaged into IP Core. The simulation shows that the MAC protocol design for the Industry Ethernet Ring Network can send and receive not only the special frames of the Industry Ethernet ring network but the frames of the traditional Ethernet as well. Besides meeting the needs of real-time and high-speed transmission, the Communication protocol design is compatible with the traditional Ethernet.
{"title":"A Communication Protocol Design for an Industry Ethernet Ring Network","authors":"Yu-Hui Zhang, Di Li, Q. Chu, Yong-Bo Zhang, Zhiwei Feng, Jie‐xian Huang, Hong-Bo Xu","doi":"10.1109/ISCID.2014.164","DOIUrl":"https://doi.org/10.1109/ISCID.2014.164","url":null,"abstract":"A new Communication protocol design in the Data Link Layer of the industry Ethernet ring network is presented in this paper. The HDL files used in the design are packaged into IP Core. The simulation shows that the MAC protocol design for the Industry Ethernet Ring Network can send and receive not only the special frames of the Industry Ethernet ring network but the frames of the traditional Ethernet as well. Besides meeting the needs of real-time and high-speed transmission, the Communication protocol design is compatible with the traditional Ethernet.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126946419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
By following Ma et al's inspiring work (or termed, Ma equivalence), this paper proposes and investigates an acceleration-level minimization scheme for motion planning of redundant robot manipulators. Such a scheme depicted in the pseudo inverse-type formulation can achieve the purpose of the minimum kinetic energy (MKE) redundancy resolution originally at the joint-velocity level, and is thus termed the acceleration-level MKE scheme. In other words, the equivalence (i.e., Mathematical equivalence, or generalized Ma equivalence) of MKE redundancy resolution at different levels is presented and discussed in this paper. Simulation results based on PUMA560 robot manipulator further substantiate the equivalence between the proposed acceleration-level MKE scheme and its original one (at the joint-velocity level).
{"title":"Acceleration-Level Minimum Kinetic Energy (MKE) Scheme Derived via Ma Equivalence for Motion Planning of Redundant Robot Manipulators","authors":"Dongsheng Guo, Keke Zhai, Zhengli Xiao, Hongzhou Tan, Yunong Zhang","doi":"10.1109/ISCID.2014.65","DOIUrl":"https://doi.org/10.1109/ISCID.2014.65","url":null,"abstract":"By following Ma et al's inspiring work (or termed, Ma equivalence), this paper proposes and investigates an acceleration-level minimization scheme for motion planning of redundant robot manipulators. Such a scheme depicted in the pseudo inverse-type formulation can achieve the purpose of the minimum kinetic energy (MKE) redundancy resolution originally at the joint-velocity level, and is thus termed the acceleration-level MKE scheme. In other words, the equivalence (i.e., Mathematical equivalence, or generalized Ma equivalence) of MKE redundancy resolution at different levels is presented and discussed in this paper. Simulation results based on PUMA560 robot manipulator further substantiate the equivalence between the proposed acceleration-level MKE scheme and its original one (at the joint-velocity level).","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127452236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Serial number is an important component to paper money. It is an important identifier to every piece of paper money. This paper presents an effective method on segmentation and recognition of RMB serial number. This methodology can be classified as three stages: preprocessing stage, Serial number segmentation stage and serial number recognition stage. The original serial number image is greylized and normalized in preprocessing stage. Each character in the serial number is segmented by region growth algorithm in segmentation stage and every segmented character is recognized by using neural networks in character recognition stage. Experimental result shows the method discussed in this paper is fast and accurate.
{"title":"A Segmentation and Recognition Method of RMB Series Number Based on Laplacian Transformation and BP Neural Networks","authors":"Feng Yang, Lingjian Chen","doi":"10.1109/ISCID.2014.16","DOIUrl":"https://doi.org/10.1109/ISCID.2014.16","url":null,"abstract":"Serial number is an important component to paper money. It is an important identifier to every piece of paper money. This paper presents an effective method on segmentation and recognition of RMB serial number. This methodology can be classified as three stages: preprocessing stage, Serial number segmentation stage and serial number recognition stage. The original serial number image is greylized and normalized in preprocessing stage. Each character in the serial number is segmented by region growth algorithm in segmentation stage and every segmented character is recognized by using neural networks in character recognition stage. Experimental result shows the method discussed in this paper is fast and accurate.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122898244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The implementation requirements are multiplex in equipment requirement demonstration, which leads to the flexible flows of equipment requirement demonstration. And the flexible flows have to achieve the corresponding contents. So the method designing the flexible flows of equipment requirement demonstration is proposed. Firstly, according to the characteristic of equipment requirement demonstration, the task breakdown structure and the activity meta-model of equipment requirement demonstration are designed. And the flow type and the method constructing the flows are proposed. And then the flows of equipment requirement demonstration can be built. Secondly, aiming at the design requirement of the flexible flows, the flows of equipment requirement demonstration are differentiated into skeleton flow, operation flow and procedure flow. And the methods selecting and designing flexible activities are studied. The proposed methods in this paper are helpful to design flexible flows of equipment requirement demonstration.
{"title":"Flexible Flow Design Method for Equipment Requirement Demonstration","authors":"Yanping Fan, Q. Guo","doi":"10.1109/ISCID.2014.267","DOIUrl":"https://doi.org/10.1109/ISCID.2014.267","url":null,"abstract":"The implementation requirements are multiplex in equipment requirement demonstration, which leads to the flexible flows of equipment requirement demonstration. And the flexible flows have to achieve the corresponding contents. So the method designing the flexible flows of equipment requirement demonstration is proposed. Firstly, according to the characteristic of equipment requirement demonstration, the task breakdown structure and the activity meta-model of equipment requirement demonstration are designed. And the flow type and the method constructing the flows are proposed. And then the flows of equipment requirement demonstration can be built. Secondly, aiming at the design requirement of the flexible flows, the flows of equipment requirement demonstration are differentiated into skeleton flow, operation flow and procedure flow. And the methods selecting and designing flexible activities are studied. The proposed methods in this paper are helpful to design flexible flows of equipment requirement demonstration.","PeriodicalId":385391,"journal":{"name":"2014 Seventh International Symposium on Computational Intelligence and Design","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128782445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}