In this paper, cross-weighted centroid (CWC) is constructed to extract affine invariant features. Every point in an image is assigned with a cross-weight based on the distribution of the image. CWC, derived from these weighted points, is affine invariance. Based on the original centroid and CWC of the image, a series of centroids of some affine regions can be obtained by iterating affine region cutting, i.e., ARC. Several affine invariant triangles are constructed. Consequently, affine invariant features can be derived by the area of these triangles. Experiment results show the efficiency of the proposed method.
{"title":"Cross-Weighted Centroid with Application to the Extraction of Affine Invariants","authors":"Xiangjun Zhao, Jianwei Yang, Rushi Lan, Wensheng Chen","doi":"10.1109/ICIC.2011.46","DOIUrl":"https://doi.org/10.1109/ICIC.2011.46","url":null,"abstract":"In this paper, cross-weighted centroid (CWC) is constructed to extract affine invariant features. Every point in an image is assigned with a cross-weight based on the distribution of the image. CWC, derived from these weighted points, is affine invariance. Based on the original centroid and CWC of the image, a series of centroids of some affine regions can be obtained by iterating affine region cutting, i.e., ARC. Several affine invariant triangles are constructed. Consequently, affine invariant features can be derived by the area of these triangles. Experiment results show the efficiency of the proposed method.","PeriodicalId":6397,"journal":{"name":"2011 Fourth International Conference on Information and Computing","volume":"189 1","pages":"126-129"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79493130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to investigate the flow characteristic in a novel circular jet mixer (CJM), the three-dimensional flow field of CJM with different nozzles spacing are investigated using CFD. The effects of different distances of nozzles are evaluated by the turbulent flow index, such as velocity and the self-similarity of the axial velocity, through the jet plane. Results show that larger nozzle spacing needs a longer jet length to complete the combination of the three jet flow, compared to the lower distance of nozzles. A linear equation is obtained to describe the attenuation of the axial velocity on different nozzles spacing. The self-similarity of the velocity at nozzles spacing is H0/Dj=5 present a similarity to the free turbulent jet. The conditions of multi-nozzle turbulent flow also give help to investigate the mixing effects in the CJM.
{"title":"A Numerical Investigation of Effects of Different Nozzle Spacing on Turbulent Flow in a Novel Circular Jet Mixer","authors":"Yanfang Yu, Xiao-Ren Liu, Huibo Meng, Jian-hua Wu","doi":"10.1109/ICIC.2011.27","DOIUrl":"https://doi.org/10.1109/ICIC.2011.27","url":null,"abstract":"In order to investigate the flow characteristic in a novel circular jet mixer (CJM), the three-dimensional flow field of CJM with different nozzles spacing are investigated using CFD. The effects of different distances of nozzles are evaluated by the turbulent flow index, such as velocity and the self-similarity of the axial velocity, through the jet plane. Results show that larger nozzle spacing needs a longer jet length to complete the combination of the three jet flow, compared to the lower distance of nozzles. A linear equation is obtained to describe the attenuation of the axial velocity on different nozzles spacing. The self-similarity of the velocity at nozzles spacing is H0/Dj=5 present a similarity to the free turbulent jet. The conditions of multi-nozzle turbulent flow also give help to investigate the mixing effects in the CJM.","PeriodicalId":6397,"journal":{"name":"2011 Fourth International Conference on Information and Computing","volume":"9 1","pages":"318-321"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80093349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The classification accuracy of mangrove is always low due to the similarity of spectra between mangrove and water-vegetation mixed pixels. Greenness and wetness were extracted by K-T transformation based on Landsat5/TM imagery. The greenness and wetness can significantly improve the separability between mangrove and water-vegetation mixed pixels by comparison with NDVI, TM3/TM5,TM5/TM4, which always were employed by other researchers. The Kappa coefficient, commission error of mangrove class were 0.90, 7.9%, respectively, by using decision tree method.
{"title":"Identification of Mangrove Using Decision Tree Method","authors":"Xuehui Zhang","doi":"10.1109/ICIC.2011.70","DOIUrl":"https://doi.org/10.1109/ICIC.2011.70","url":null,"abstract":"The classification accuracy of mangrove is always low due to the similarity of spectra between mangrove and water-vegetation mixed pixels. Greenness and wetness were extracted by K-T transformation based on Landsat5/TM imagery. The greenness and wetness can significantly improve the separability between mangrove and water-vegetation mixed pixels by comparison with NDVI, TM3/TM5,TM5/TM4, which always were employed by other researchers. The Kappa coefficient, commission error of mangrove class were 0.90, 7.9%, respectively, by using decision tree method.","PeriodicalId":6397,"journal":{"name":"2011 Fourth International Conference on Information and Computing","volume":"89 1","pages":"130-132"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80358057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ANSYS to be as a finite element analysis software has powerful features in thermal analysis and structural analysis. Based on ANSYS thermal analysis function, this paper selects SOLID90 unit, for thermal analysis on the heat-exchange pipe of heat exchanger to obtain the temperature distribution, and the temperature calculated will be treated as temperature load, in order to solve the thermal stress by the elasticity method and to get the axial stress distribution of the heat-exchange pipe. According to temperature distribution and stress distribution, this paper puts forward reasonable and economical measures to make the heat-exchange pipe.
{"title":"Thermal Analysis and Stress Analysis of the Heat-Exchange Pipe Based on ANSYS","authors":"Fenhua Li, Jian Xing, Yuan Liu","doi":"10.1109/ICIC.2011.137","DOIUrl":"https://doi.org/10.1109/ICIC.2011.137","url":null,"abstract":"ANSYS to be as a finite element analysis software has powerful features in thermal analysis and structural analysis. Based on ANSYS thermal analysis function, this paper selects SOLID90 unit, for thermal analysis on the heat-exchange pipe of heat exchanger to obtain the temperature distribution, and the temperature calculated will be treated as temperature load, in order to solve the thermal stress by the elasticity method and to get the axial stress distribution of the heat-exchange pipe. According to temperature distribution and stress distribution, this paper puts forward reasonable and economical measures to make the heat-exchange pipe.","PeriodicalId":6397,"journal":{"name":"2011 Fourth International Conference on Information and Computing","volume":"152 1","pages":"283-285"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78602068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A predator-prey system with mutual interference concerning Integrated Pest Management (IPM) is considered. The locally stable prey-eradication periodic solution is obtained when the impulsive period is less than some critical value by using Floquet theorem and small amplitude perturbation skills. Otherwise, the system is permanent. Numerical examples show that the system considered has more complicated dynamics behaviors, such as: (1) high-order periodic oscillation, (2) period-doubling bifurcation, (3) symmetry-breaking bifurcation, (4) attractor crisis, etc. Finally, some conclusions are given.
{"title":"A Predator-Prey System with Mutual Interference Concerning IPM","authors":"Shun-yi Li, Xiangui Xue","doi":"10.1109/ICIC.2011.28","DOIUrl":"https://doi.org/10.1109/ICIC.2011.28","url":null,"abstract":"A predator-prey system with mutual interference concerning Integrated Pest Management (IPM) is considered. The locally stable prey-eradication periodic solution is obtained when the impulsive period is less than some critical value by using Floquet theorem and small amplitude perturbation skills. Otherwise, the system is permanent. Numerical examples show that the system considered has more complicated dynamics behaviors, such as: (1) high-order periodic oscillation, (2) period-doubling bifurcation, (3) symmetry-breaking bifurcation, (4) attractor crisis, etc. Finally, some conclusions are given.","PeriodicalId":6397,"journal":{"name":"2011 Fourth International Conference on Information and Computing","volume":"113 1","pages":"412-415"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80033201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The phenomena of refracted flow exist in sudden expansion flow. Under condition of symmetric boundary, flow refracts randomly. Computing sudden expansion flow, the random function can be used to generate a random number. It can determine direction of iterating. The numerical simulation can correspond with results of experiment in this way.
{"title":"Applying Random Function to Simulate Randomness of Refracted Flow","authors":"S. Zhu, Z. Li","doi":"10.1109/ICIC.2011.42","DOIUrl":"https://doi.org/10.1109/ICIC.2011.42","url":null,"abstract":"The phenomena of refracted flow exist in sudden expansion flow. Under condition of symmetric boundary, flow refracts randomly. Computing sudden expansion flow, the random function can be used to generate a random number. It can determine direction of iterating. The numerical simulation can correspond with results of experiment in this way.","PeriodicalId":6397,"journal":{"name":"2011 Fourth International Conference on Information and Computing","volume":"47 1","pages":"172-173"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80499455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Indefinite kernel machine regression algorithm (IKMRA), in which only constrains the minimum total regression error, but each sample point regression error is ignored. Thus the accuracy and the generalization performance of the IKMRA can not be satisfied. In order to improve the precision and the generalization performance of the IKMRA, we proposed that each sample regression error be constrained besides the total regression error. We introduced the norm-r loss function and the slack variables in order to constrain each sample regression error, derived the iterative formula of corresponding gradient decent method and devised the corresponding algorithm. Experimental results show that our improved indefinite kernel machine regression algorithm (IIKMRA) is effective and feasible.
{"title":"An Improved Indefinite Kernel Machine Regression Algorithm with Norm-r Loss Function","authors":"Jingchao Zhou, Dan Wang","doi":"10.1109/ICIC.2011.36","DOIUrl":"https://doi.org/10.1109/ICIC.2011.36","url":null,"abstract":"Indefinite kernel machine regression algorithm (IKMRA), in which only constrains the minimum total regression error, but each sample point regression error is ignored. Thus the accuracy and the generalization performance of the IKMRA can not be satisfied. In order to improve the precision and the generalization performance of the IKMRA, we proposed that each sample regression error be constrained besides the total regression error. We introduced the norm-r loss function and the slack variables in order to constrain each sample regression error, derived the iterative formula of corresponding gradient decent method and devised the corresponding algorithm. Experimental results show that our improved indefinite kernel machine regression algorithm (IIKMRA) is effective and feasible.","PeriodicalId":6397,"journal":{"name":"2011 Fourth International Conference on Information and Computing","volume":"32 1","pages":"142-145"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78050468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Beam-forming algorithm is the key and theoretical basis of smart antenna. The constant modulus algorithm(CMA) needs no reference signals and has high efficiency on signal transmission channel, While, FPGA can process multiple parallel signals quickly, and DSP is a signal processing method with properties of fast calculation, flexible addressing mode and powerful communication mechansim. As a result, the CMA can be easily realized by combining the FPGA and DSP. According to this, a FPGA+DSP beam-forming system was designed based on CMA. Simulink results gave both the error variations of desired signals and gain changes of desired singals and interruptive signals in the iteration steps. In addition, the desired antenna orientation figures was also presented. At the same time, it was analyzed as well that the convergence speed and all the performance parameters of the proposed algorithm, and the results showed that the proposed method is feasible.
{"title":"Study of Smart Antenna Beamformer Based on Constant Modulus Algorithm","authors":"Duan Li, Yunjian Wang","doi":"10.1109/ICIC.2011.115","DOIUrl":"https://doi.org/10.1109/ICIC.2011.115","url":null,"abstract":"Beam-forming algorithm is the key and theoretical basis of smart antenna. The constant modulus algorithm(CMA) needs no reference signals and has high efficiency on signal transmission channel, While, FPGA can process multiple parallel signals quickly, and DSP is a signal processing method with properties of fast calculation, flexible addressing mode and powerful communication mechansim. As a result, the CMA can be easily realized by combining the FPGA and DSP. According to this, a FPGA+DSP beam-forming system was designed based on CMA. Simulink results gave both the error variations of desired signals and gain changes of desired singals and interruptive signals in the iteration steps. In addition, the desired antenna orientation figures was also presented. At the same time, it was analyzed as well that the convergence speed and all the performance parameters of the proposed algorithm, and the results showed that the proposed method is feasible.","PeriodicalId":6397,"journal":{"name":"2011 Fourth International Conference on Information and Computing","volume":"29 1","pages":"178-180"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83130390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Affected by many factors, The Chinese car industry is difficult to conduct a thorough analysis in the traditional ways. With the simple giant system entropy analysis, this paper will conclude the development of the Chinese car industry by analyzing its market efficiency and the market share using the DEA and the data of main car manufactures.
{"title":"Research on the Analysis of the Prospect of Chinese Car Industry by Simple Giant System Entropy","authors":"Qu Binghua, Yu Jianguo, Huang Yinglai","doi":"10.1109/ICIC.2011.102","DOIUrl":"https://doi.org/10.1109/ICIC.2011.102","url":null,"abstract":"Affected by many factors, The Chinese car industry is difficult to conduct a thorough analysis in the traditional ways. With the simple giant system entropy analysis, this paper will conclude the development of the Chinese car industry by analyzing its market efficiency and the market share using the DEA and the data of main car manufactures.","PeriodicalId":6397,"journal":{"name":"2011 Fourth International Conference on Information and Computing","volume":"30 1","pages":"533-536"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85186325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Terminal-sensitive projectile is one kind of sensing instrument initiation cluster ammunition. According to the performance characteristics of terminal-sensitive projectile, the target vulnerability of mechanized gun was analyzed in this paper. On that basis, the damage efficiency model of terminal-sensitive projectile in the incoming target area firing at the typical target was founded. Using the Monte-Carlo method, the hit probability and the damage probability under the condition of different operational distance were simulated and analyzed. The simulation results show that, with the increasing of the operational range, the damage efficiency of terminal-sensitive projectile was enhanced accordingly, but when the distance exceeds a certain range, it drops appreciably. The results can provide some helpful references for the overall design, and the system engineering method should be adapted to the index distribution, that will save the development period and budget.
{"title":"Study on Damage Assessment of Terminal-Sensitive Projectile Firing at Armored Targets","authors":"R. Guo, Rongzhong Liu, Jun Zhang, Gang Li","doi":"10.1109/ICIC.2011.116","DOIUrl":"https://doi.org/10.1109/ICIC.2011.116","url":null,"abstract":"Terminal-sensitive projectile is one kind of sensing instrument initiation cluster ammunition. According to the performance characteristics of terminal-sensitive projectile, the target vulnerability of mechanized gun was analyzed in this paper. On that basis, the damage efficiency model of terminal-sensitive projectile in the incoming target area firing at the typical target was founded. Using the Monte-Carlo method, the hit probability and the damage probability under the condition of different operational distance were simulated and analyzed. The simulation results show that, with the increasing of the operational range, the damage efficiency of terminal-sensitive projectile was enhanced accordingly, but when the distance exceeds a certain range, it drops appreciably. The results can provide some helpful references for the overall design, and the system engineering method should be adapted to the index distribution, that will save the development period and budget.","PeriodicalId":6397,"journal":{"name":"2011 Fourth International Conference on Information and Computing","volume":"12 1","pages":"302-305"},"PeriodicalIF":0.0,"publicationDate":"2011-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91319001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}