Pub Date : 2011-11-18DOI: 10.1109/ICSSEM.2011.6081324
S. Hou, Lexi Li, Renheng Bo, Wei Wang, Tao Wang
In this paper, a RQA-based approach is developed for feature generation from raw vibration data recorded from a rotating machine with five different conditions. The created features are then used as the inputs to a classifier for the identification of six bearing conditions. Experimental results demonstrate the ability of RQA to discover automatically the different bearing conditions using features expressed in the form of recurrence quantification measures. Furthermore, using RQA extracted features and traditional features with artificial neural networks (ANN) and support vector machines (SVM) have been obtained. This RQA-based approach is used for bearing fault classification for the first time and exhibits superior performance over other traditional methods.
{"title":"Feature generation using recurrence quantification analysis with application to fault classification","authors":"S. Hou, Lexi Li, Renheng Bo, Wei Wang, Tao Wang","doi":"10.1109/ICSSEM.2011.6081324","DOIUrl":"https://doi.org/10.1109/ICSSEM.2011.6081324","url":null,"abstract":"In this paper, a RQA-based approach is developed for feature generation from raw vibration data recorded from a rotating machine with five different conditions. The created features are then used as the inputs to a classifier for the identification of six bearing conditions. Experimental results demonstrate the ability of RQA to discover automatically the different bearing conditions using features expressed in the form of recurrence quantification measures. Furthermore, using RQA extracted features and traditional features with artificial neural networks (ANN) and support vector machines (SVM) have been obtained. This RQA-based approach is used for bearing fault classification for the first time and exhibits superior performance over other traditional methods.","PeriodicalId":406311,"journal":{"name":"2011 International Conference on System science, Engineering design and Manufacturing informatization","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116125080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-18DOI: 10.1109/ICSSEM.2011.6081180
D. Thorleuchter, Dirk Van den Poel
Working with existing multi-level-security (MLS) models reduces the usability especially when users try to transfer information to persons with different security categories. A main reason for the problems occurring with the information exchanging is that the existing MLS models assign a specific security level to documents. The assigned security level equals the highest security level of the textual content within the document. Based on the commonly used Bell LaPadula model, an extended model with an increased granularity is introduced. It is shown that users can access to parts of documents with higher security levels without causing a security compromise. This enables information exchange and it leads to an increased usability of the MLS model.
{"title":"High granular multi-level-security model for improved usability","authors":"D. Thorleuchter, Dirk Van den Poel","doi":"10.1109/ICSSEM.2011.6081180","DOIUrl":"https://doi.org/10.1109/ICSSEM.2011.6081180","url":null,"abstract":"Working with existing multi-level-security (MLS) models reduces the usability especially when users try to transfer information to persons with different security categories. A main reason for the problems occurring with the information exchanging is that the existing MLS models assign a specific security level to documents. The assigned security level equals the highest security level of the textual content within the document. Based on the commonly used Bell LaPadula model, an extended model with an increased granularity is introduced. It is shown that users can access to parts of documents with higher security levels without causing a security compromise. This enables information exchange and it leads to an increased usability of the MLS model.","PeriodicalId":406311,"journal":{"name":"2011 International Conference on System science, Engineering design and Manufacturing informatization","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116172687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-18DOI: 10.1109/ICSSEM.2011.6081173
Tian Sen-ping, Z. Bo, Tian Huiping
Based on the vector plots analysis, considering the space angles between the amendment of the actual input of the previous control and the amendment of general P-type algorithm control, iterative learning control law changes dynamically to deal with different control problems. The algorithm adjusts along the direction with faster convergence, improving the speed and the tracking performance of control. Simulations illustrate the effectiveness and superiority of the new algorithms.
{"title":"A class of nonlinear ILC algorithms based on vector plots analysis","authors":"Tian Sen-ping, Z. Bo, Tian Huiping","doi":"10.1109/ICSSEM.2011.6081173","DOIUrl":"https://doi.org/10.1109/ICSSEM.2011.6081173","url":null,"abstract":"Based on the vector plots analysis, considering the space angles between the amendment of the actual input of the previous control and the amendment of general P-type algorithm control, iterative learning control law changes dynamically to deal with different control problems. The algorithm adjusts along the direction with faster convergence, improving the speed and the tracking performance of control. Simulations illustrate the effectiveness and superiority of the new algorithms.","PeriodicalId":406311,"journal":{"name":"2011 International Conference on System science, Engineering design and Manufacturing informatization","volume":"565 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116289238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-18DOI: 10.1109/ICSSEM.2011.6081249
Qingping Wu, Shen Kai
This paper introduces a kind of work principle and structure of medical ward call system based on power line carrier technology, also introduces a direct sequence spread spectrum half-duplex asynchronous modem PL2102 carrier chip, calls of hospital ward to nursing station can be achieved by using the power line carrier circuit consisted of it. This call system uses master-slave structure, the host is placed in the ward nurse duty room, extensions are installed in all wards, power line carrier technology is used between the host and the extensions, and the power line is as a transmission channel, to achieve two-way data transmission between the host and extensions. Actual use shows that when the communication distance between the host and extensions bed calls is less than 1000m, it communicates stably and reliably, almost there is no false alarm.
{"title":"Design of medical ward call system based on power line carrier technology","authors":"Qingping Wu, Shen Kai","doi":"10.1109/ICSSEM.2011.6081249","DOIUrl":"https://doi.org/10.1109/ICSSEM.2011.6081249","url":null,"abstract":"This paper introduces a kind of work principle and structure of medical ward call system based on power line carrier technology, also introduces a direct sequence spread spectrum half-duplex asynchronous modem PL2102 carrier chip, calls of hospital ward to nursing station can be achieved by using the power line carrier circuit consisted of it. This call system uses master-slave structure, the host is placed in the ward nurse duty room, extensions are installed in all wards, power line carrier technology is used between the host and the extensions, and the power line is as a transmission channel, to achieve two-way data transmission between the host and extensions. Actual use shows that when the communication distance between the host and extensions bed calls is less than 1000m, it communicates stably and reliably, almost there is no false alarm.","PeriodicalId":406311,"journal":{"name":"2011 International Conference on System science, Engineering design and Manufacturing informatization","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114665216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-18DOI: 10.1109/ICSSEM.2011.6081292
Xuhua Zhang, Q. Wen
With the complexity of the network environment, there are many problems with using network devices, the policies of network devices are vitally important to control the transmission of the network information. It is necessary for network environment optimization and network security improvement to detect the policy anomaly of the network devices. We put forward a policy anomaly detection algorithm based on the rule of MapReduce in order to meet the requirement of real-time and large quantity of data. In order to get the high efficiency of the policy, we construct a policy tree, build a pleasant operation environment provided by Hadoop and use distribute computing to calculate the tree.
{"title":"A policy anomaly detecting algorithm based on mapreduce","authors":"Xuhua Zhang, Q. Wen","doi":"10.1109/ICSSEM.2011.6081292","DOIUrl":"https://doi.org/10.1109/ICSSEM.2011.6081292","url":null,"abstract":"With the complexity of the network environment, there are many problems with using network devices, the policies of network devices are vitally important to control the transmission of the network information. It is necessary for network environment optimization and network security improvement to detect the policy anomaly of the network devices. We put forward a policy anomaly detection algorithm based on the rule of MapReduce in order to meet the requirement of real-time and large quantity of data. In order to get the high efficiency of the policy, we construct a policy tree, build a pleasant operation environment provided by Hadoop and use distribute computing to calculate the tree.","PeriodicalId":406311,"journal":{"name":"2011 International Conference on System science, Engineering design and Manufacturing informatization","volume":"36 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125376179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-18DOI: 10.1109/ICSSEM.2011.6081161
Yang Baojun, Wang Zongmin, Li Ruiting
Hydraulic structures were located in the wild environment, and the size and type of structure in each project are different. In addition, what designers need is efficient reinforcing steel bar CAD system, and how to solve this problem is the key of the success in hydraulic CAD system development. This refers to external taxonomy, and classifies the hydro-structures in detail, and acquires the system's efficiency utility at the cost of code repetition. In the paper, the authors propose the CAD system solutions about steel bar drawing of hydraulic structures, and realize the CAD system on invert siphon and sluice structure. In the end, the paper describes the inverted siphon structure as example to explain the system program architecture and implementation process. In the system, all of inverted siphon pipes, only box, and steel bar types have been classified by their type, and wrapped in many common classes, which is convenient for developing the system, also for the reusability and portability of the codes. The system realizes automated design for inverted siphon pipe, involving load input, internal force calculation, reinforcement calculation and steel-bar drawing plotting. It gives a method for CAD system development on hydraulic engineering.
{"title":"The scheme and achievement on CAD system for hydro-structure","authors":"Yang Baojun, Wang Zongmin, Li Ruiting","doi":"10.1109/ICSSEM.2011.6081161","DOIUrl":"https://doi.org/10.1109/ICSSEM.2011.6081161","url":null,"abstract":"Hydraulic structures were located in the wild environment, and the size and type of structure in each project are different. In addition, what designers need is efficient reinforcing steel bar CAD system, and how to solve this problem is the key of the success in hydraulic CAD system development. This refers to external taxonomy, and classifies the hydro-structures in detail, and acquires the system's efficiency utility at the cost of code repetition. In the paper, the authors propose the CAD system solutions about steel bar drawing of hydraulic structures, and realize the CAD system on invert siphon and sluice structure. In the end, the paper describes the inverted siphon structure as example to explain the system program architecture and implementation process. In the system, all of inverted siphon pipes, only box, and steel bar types have been classified by their type, and wrapped in many common classes, which is convenient for developing the system, also for the reusability and portability of the codes. The system realizes automated design for inverted siphon pipe, involving load input, internal force calculation, reinforcement calculation and steel-bar drawing plotting. It gives a method for CAD system development on hydraulic engineering.","PeriodicalId":406311,"journal":{"name":"2011 International Conference on System science, Engineering design and Manufacturing informatization","volume":"387 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122787607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-18DOI: 10.1109/ICSSEM.2011.6081326
Guilian Liu, Lijun Wang
In systems with two maximum azeotropes, different volatility orders can be obtained according to different isovolatility line. In this paper, the volatility orders of systems with two maximum azeotropes are identified according to the rigorous simulation of Aspen Plus, and are compared with that identified according to the isovolatility lines. The results show that, there are two distillation regions in systems with two maximum azeotropes and two isovolatility lines, the volatility order in them can be identified according to the isovolatility line lying in them. Based on this, the rule for identifying the volatility order is proposed. And, it is applied to two different cases, and the results shows that this rule is accurate, simple and can be applied convienently.
{"title":"Study on the volatility order of systems with two maximum azeotropes","authors":"Guilian Liu, Lijun Wang","doi":"10.1109/ICSSEM.2011.6081326","DOIUrl":"https://doi.org/10.1109/ICSSEM.2011.6081326","url":null,"abstract":"In systems with two maximum azeotropes, different volatility orders can be obtained according to different isovolatility line. In this paper, the volatility orders of systems with two maximum azeotropes are identified according to the rigorous simulation of Aspen Plus, and are compared with that identified according to the isovolatility lines. The results show that, there are two distillation regions in systems with two maximum azeotropes and two isovolatility lines, the volatility order in them can be identified according to the isovolatility line lying in them. Based on this, the rule for identifying the volatility order is proposed. And, it is applied to two different cases, and the results shows that this rule is accurate, simple and can be applied convienently.","PeriodicalId":406311,"journal":{"name":"2011 International Conference on System science, Engineering design and Manufacturing informatization","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131496611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-18DOI: 10.1109/ICSSEM.2011.6081211
Wu Su-zhen, Liu Yu-xi
Modern CNC technology is the foundation of modern manufacturing technology, CNC is the necessary technology means to improve the product quality and productivity. CNC technological transformation is an effective way to restore machining ability, it is an important means to improve manufacturing technology for its low cost, short cycle and ensured the original specifications. At present, it is still empty field for CNC technology research on Peach camshaft grinding, it is necessary to study based on the theory and implementation. This article takes mathematical model into grinding curve, and designs implementation structure and methods for NC program.
{"title":"Research on the CNC system of camshaft grinding","authors":"Wu Su-zhen, Liu Yu-xi","doi":"10.1109/ICSSEM.2011.6081211","DOIUrl":"https://doi.org/10.1109/ICSSEM.2011.6081211","url":null,"abstract":"Modern CNC technology is the foundation of modern manufacturing technology, CNC is the necessary technology means to improve the product quality and productivity. CNC technological transformation is an effective way to restore machining ability, it is an important means to improve manufacturing technology for its low cost, short cycle and ensured the original specifications. At present, it is still empty field for CNC technology research on Peach camshaft grinding, it is necessary to study based on the theory and implementation. This article takes mathematical model into grinding curve, and designs implementation structure and methods for NC program.","PeriodicalId":406311,"journal":{"name":"2011 International Conference on System science, Engineering design and Manufacturing informatization","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124634458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-18DOI: 10.1109/ICSSEM.2011.6081175
Shuguo Wang, H. Yao
In this paper, the synchronization of time-varying complex network with is investigated, we consider synchronization in time-varying coupling networks, in which the weights of links are time varying. The weight configuration matrix is not assumed to be symmetric, irreducible or dissipative. Based on the Lyapunov stability theory, some sufficient conditions for the synchronization are derived by constructing an effective control scheme. To validate the proposed method, and numerical simulation examples are provided to verify the correctness and effectiveness of the proposed scheme.
{"title":"Pinning synchronization of complex networks with time-varying topological structures and linearly delayed coupling","authors":"Shuguo Wang, H. Yao","doi":"10.1109/ICSSEM.2011.6081175","DOIUrl":"https://doi.org/10.1109/ICSSEM.2011.6081175","url":null,"abstract":"In this paper, the synchronization of time-varying complex network with is investigated, we consider synchronization in time-varying coupling networks, in which the weights of links are time varying. The weight configuration matrix is not assumed to be symmetric, irreducible or dissipative. Based on the Lyapunov stability theory, some sufficient conditions for the synchronization are derived by constructing an effective control scheme. To validate the proposed method, and numerical simulation examples are provided to verify the correctness and effectiveness of the proposed scheme.","PeriodicalId":406311,"journal":{"name":"2011 International Conference on System science, Engineering design and Manufacturing informatization","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116564994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-11-18DOI: 10.1109/ICSSEM.2011.6081227
Z. Jianfeng, Zhang Li, Chang Qing
Based on daily closing price of Shanghai-Shenzhen 300 Index from 16st April 2008 to 16st April 2011, the paper constructs the GARCH model in order to study whether the Chinese stock markets show some significant change in the volatility after the introduction of stock index futures trading. The empirical analysis shows that the new information weakens the effect of the volatility of stock market, and the effect of old information on the market increases after the introduction of stock index futures. The conclusion is that the launch of stock index futures decreases the volatility of spot market.
{"title":"The effect of stock index futures to stock market volatility","authors":"Z. Jianfeng, Zhang Li, Chang Qing","doi":"10.1109/ICSSEM.2011.6081227","DOIUrl":"https://doi.org/10.1109/ICSSEM.2011.6081227","url":null,"abstract":"Based on daily closing price of Shanghai-Shenzhen 300 Index from 16st April 2008 to 16st April 2011, the paper constructs the GARCH model in order to study whether the Chinese stock markets show some significant change in the volatility after the introduction of stock index futures trading. The empirical analysis shows that the new information weakens the effect of the volatility of stock market, and the effect of old information on the market increases after the introduction of stock index futures. The conclusion is that the launch of stock index futures decreases the volatility of spot market.","PeriodicalId":406311,"journal":{"name":"2011 International Conference on System science, Engineering design and Manufacturing informatization","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120818514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}