This proceedings put together 68 selected articles from the joint conferences of 2014 Congress on Industrial Engineering, Machine Design and Automation (IEMDA2014) and the 2nd Congress on Computer Science and Application (CCSA2014), held in Sanya, China during December 12 – 14, 2014.
The conference program of IEMDA 2014 focused on areas of Industrial Engineering, Machine Design and Automation, while the CCSA 2014 program provided the platform for Computer Science and Applications.
Collected together the latest research results and applications on industrial engineering, machine design, automation, and computer science and other related Engineering topics. All submitted papers to this proceedings were subjected to strict peer-reviewing by 2–4 expert referees, to ensure that all articles selected are of highest standard and are relevance to the conference.
Sample Chapter(s)
An Energy Consumption Assessment Method for WIFI Large-Scale Wireless Sensor Network Based on Dynamic Channel Energy Model (111 KB)
https://doi.org/10.1142/9789814689007_fmatter
The following sections are included:
https://doi.org/10.1142/9789814689007_0001
Energy efficiency is one of the most serious constraints for the deployment of large-scale wireless sensor network (WSN) significantly. However, an excellent strategy to raise energy efficient depends on a precise energy consumption assessment method. In this paper, an energy consumption assessment method based on dynamic channel energy model is proposed. Energy consumption is divided into two parts: static and dynamic. The former includes receiving, idle and clear channel assessment state, whose energy consumption is only related to a stationary working current and duration. Transmission energy consumption refers to dynamic energy consumption, function of which is described as a cubic function. The energy consumption calculation is adjusted to meet the transmission power dynamically and timely. Simulation results show that the dynamic energy consumption during transmission is summed accurately. Compared with the others, such as some simple energy models without dynamic case. It provides to support for the deployment of WIFI large-scale WSN.
https://doi.org/10.1142/9789814689007_0002
Location-based services have already been widely used in many different areas. With the popularization of intelligent terminals, providing mobile internet services on the cloud have enormous commercial prospects. However, the high adhesion degree of mobile terminals to users not only brings facility but also results in the risk of privacy leak. The paper emphasized the necessity and advantages to provide mobile internet services based on cloud computing technology, analyzed the security issues of location privacy to LBS system brought by mobile cloud computing, and proposed the framework and implement method of LBS system under mobile cloud computing environment.
https://doi.org/10.1142/9789814689007_0003
Nowadays, campus network is in the face of the difficulties in the management and control of the core information such as scientific research patents or important software codes, which would easily lead to leakage of the core information, causing incalculable loss to the colleges and universities. This article analyzes the necessity of the hierarchical campus network management, introduces new technologies of the hierarchical network management, proposes a building program of the campus hierarchical network management based on the network topological structure of the Internet and campus network connection, dividing the campus network into two logical subnets, achieving the centralized control of the core electronic information, provides a guideline and reference to solving the contradictions which the campus network is facing with in an effective way.
https://doi.org/10.1142/9789814689007_0004
Nodes localization problem now has became the core of the problems in agricultural wireless sensor network. In this paper, according to the characteristics of agricultural application, an improved algorithm is proposed based on DV-Hop algorithm and some existed improved algorithms. The algorithm joins a new anchor nodes selection strategy in the localization stage and locates nodes by the idea of weighted centroid. The simulation results show that the new algorithm improves the localization accuracy and has lower energy cost and better stability.
https://doi.org/10.1142/9789814689007_0005
The financial system business process and management model is undergoing new changes. The concept of banking direction from the entity bank to the development of online bank. The bank interconnected system provides accurate, real-time and comprehensive information support for the enterprise financial decision, but from the Internet information security risk is a key problem to be solved in the bank interconnected system. This paper describes a solution of two-way Security Bank interconnected system certification, to ensure the safety of bank enterprise interactive data.
https://doi.org/10.1142/9789814689007_0006
Oil & Gas SCADA system is expensive and its structure is complex. It is hard to use for teaching and research experiment. The traditional simulation platform has deficiencies that can not be used for the research group. It is a single layer structure which has no simulated scheduling layer. It can not simulate the real communication. The simulation approach is not conducive to expand and can not achieve large-scale simulation. This paper is abstracted the three-tier structure system model from SCADA system, namely scheduling layer, control layer and device layer station. Meanwhile it is built an experimental platform for the security and defense of oil and gas SCADA system through the use of virtual instruments. Finally, Contradistinction with the before and after data on the SCADA system security defense experiments showed that the design of SCADA system in this paper can be used for experiment of security and defense simulation platform.
https://doi.org/10.1142/9789814689007_0007
Print is one of the most common behavior in daily work, but print security is easily neglected, that leaking classified information and causing great losses. For security problems and hidden dangers existed in the process of printing, print concentrated control solution is put forward based on analysis of the Windows printing principle and virtual print technology. This solution can realize the whole process control when printing, including identity verification, authorization, examining and auditing, and effectively solve the print information leaks in government, army, military project, enterprise and public institution.
https://doi.org/10.1142/9789814689007_0008
The inventory flow information in supply chain would affect inventory management. However, current inventory flow information still presents low visibility. Analytic Hierarchy Process (AHP) is selected in this study for evaluating logistics-related problems and the core problems explored with AHP are regarded as the key items in the research. A monitoring system with real-time and correct inventory and vehicle location is established in this study, in which the system software is designed and developed based on LabVIEW, and the information acquired with Radio Frequency Identification (RFID) and Global Positioning System (GPS) are used for satisfying the demands of users and managers for under-standing the detailed information of objects.
https://doi.org/10.1142/9789814689007_0009
The communication rules model of the controlled network is designed based on its characteristics. The data packets are decoded and analyzed statistically by capturing and analyzing the data packets efficiently. Then the anomalous traffics existing in the network are detected and discovered timely by comparing the analysis results with the communication rules. Finally, the above detection results are shown to the managers in the form of visualization and the efficiency of network management is improved effectively.
https://doi.org/10.1142/9789814689007_0010
This article reflects the LTE physical layer performance by BLER curves of different number of antennas and adopt transmit diversity or spatial multiplexing under the same number of antennas. In addition, the next simulation adopts HARQ based on the above, and has obtained new BLER curves. The result of this simulator serves to evaluate the OFDM-MIMO LTE Link Level performance in different environments and create link level look-up tables to be used as an input for a future LTE system level simulator.
https://doi.org/10.1142/9789814689007_0011
This thesis from the Meta data and Ontology, based on the actual experience of the integrated platform with science and technology that combined with the involved technologies. It puts forward the pyramid model to aid the decisions in integrating with information of science and technology. It offers the analysis and the results that might progress in developing information sharing systems for science and technology.
https://doi.org/10.1142/9789814689007_0012
Frequent items detection is a very useful technique in many applications, such as network monitor, network intrusion detection, worm virus detection, and so on, where data is generally uncertain and could be described using probability. While having been studied intensively in the field of deterministic data, frequent items detection is still novel in the emerging uncertain data field. In this paper, we study the semantic of frequent items detection on uncertain data stream and present a new definition of frequent items over sliding window. Based on the definition, an efficient algorithm is proposed to detect frequent items on uncertain data stream. The algorithm finds the recursion rule in probability computation and greatly improves the efficiency of single data detection, and dynamically detects recent m elements incrementally. Finally, detailed analysis and thorough experimental results demonstrate the efficiency and scalability of our approach.
https://doi.org/10.1142/9789814689007_0013
With the development of cloud computing, cloud data security has become the key issue of cloud computing. According to the characteristic of cloud computing has a massive node, based on the theory of human immunity, apply the idea of human immune into cloud computing, propose a cloud security immune system(CSIS) oriented for anomaly detection, and analyze its characteristics. Analysis showed that CSIS can better solve the problems of data security faced within cloud computing.
https://doi.org/10.1142/9789814689007_0014
Aiming at solar cells of the photovoltaic power station in decorate with remote, quantity, and easy to change and variety of features, this paper introduces a kind of wireless sensor network through real-time monitoring solar cell module, the design of the working state of the solar cells will be sent to the PC, make management through the PC interface can know exactly what the working state of every board, thus greatly simplify the maintenance of photovoltaic power station. First, through the source node acquisition solar cells of the voltage and current information, and the wireless network will carry information to base station node, the base station each node receiving the information source node and through the serial line transmitted PC. The whole monitoring system used the CC2430 as the main hardware platform and software of the ZigBee protocol stack. The experimental results show that the relative error voltage in 0.4 V within the current relative error in 0.04 A less than. The stability of the system is better, and satisfactory to solar cells monitoring stability requirement.
https://doi.org/10.1142/9789814689007_0015
Aiming at the secure communication problems between multi-unmanned aerial vehicles (multi-UAVs) caused by wireless signal strength increasing, a wireless communication model and UAV dynamic model is established in this paper. The UAV communication range is further narrowed by the application of improved artificial fish-swarm algorithm (IAFSA). By taking dynamic parameters as adaptive vision's coefficient and introducing virtual ocean currents into the artificial fish algorithm (AFSA), the drawback of slow convergence speed and more iteration has been made up by the IAFSA. It is proved by the simulation experiments that compared to AFSA, IAFSA has the advantage of fast convergence rate and less iteration when solving the problem of multi-UAVs secure communication. Additionally, the overall communication range has also been narrowed by the IAFSA.
https://doi.org/10.1142/9789814689007_0016
This paper studied major factors affecting optical signal transmission in the optical transmission system. The results show that the optical fiber dispersion and loss are the most important limiting factors. Amplitude variation of optical pulse in the junction between the ordinary optical fiber and the dispersion-compensation fiber is simulated. Results show that the optical pulse shape remains unchanged. The amplitude is enlarged after being amplified by a magnifier but the shape will be recovered automatically.
https://doi.org/10.1142/9789814689007_0017
One of technologies to guarantee that only the legal users can access resources from the remote server is user authentication scheme. Many user authentication schemes are based on the use of smart card to withstand replay attack and password guessing attacks in last decades. Recently, Huang et al. proposed a timestamp-based user authentication with smart card. Their scheme is more secure and efficient than other schemes. However, we find the security of their scheme is also existed. In this article, we will prove their scheme is vulnerable to the password guessing attack. Finally, we will propose an improved scheme to eliminate the security vulnerability. Furthermore, the improved scheme could be used in the multi-server environments.
https://doi.org/10.1142/9789814689007_0018
Recently, Zhuang et al. proposed a password authentication scheme based on geometric hash function without using smart card. Their scheme is simple, secure, and efficient. However, we find the security of their scheme is also existed. In this article, we will prove their scheme is vulnerable to the password guessing attack. We also propose an improved scheme to eliminate the security vulnerability.
https://doi.org/10.1142/9789814689007_0019
In recent years, wind energy expansion is one of the prominent ongoing evolutions of power systems. System operators carry out long-term planning studies for wind power with departed statistic data. This study would benefit from the ability to artificially build wind power curves likening the actual behavior of the farms. The core problem that the paper studies on is how to sample wind power curves via stochastic process. Firstly, the paper build initial wind power curves sampling model, then revise the model considering seasonal and diurnal factors. Secondly, build stochastic differential equation fitting the model, and set up boundary condition in view of distribution function as well as auto correlation function. Thereafter, simplify the form of stochastic differential equation by means of designing algorithm simulating Brownian movement component included in the SDE. Finally, China and Spain data are modeled to prove the model and the solution are available by simulating monthly and yearly power level expectation, standard deviation, as well as monthly and yearly probability density distribution.
https://doi.org/10.1142/9789814689007_0020
To satisfy the geotechnical strength and the serviceability requirements, soil bag as a material or a soil improvement method can be used to construct either temporary or permanent structures, and the bags are filled with granular materials like sand, crushed stone, or recycled concrete. By bagging the sandy soil, it can realize the change of scattered material to block material, the soil-bag stacked shape also influence the ground bearing characteristics. In this paper, with the reference to the bridge structure form and deep soil vertical pressure distribution form, the authors think that the approximate arched stack is most reasonable. To verify the rationality of approximate arched stack, a series of model test are performed under different soil bag stacked cross section. Through these loading tests, it not only can conclude that the bearing capacity is improved by soil bags and also fully prove that the soil bag stacked cross section is an important factor of bearing capacity.
https://doi.org/10.1142/9789814689007_0021
The low-volume and high-variety shoes making enterprise is required by the increasingly fierce market to apply SMED to reduce production setup time and improve the flexibility of the production system. In this paper, production preparation process of injection machine is to be sorted out by the use of visualization tool of lean production - value stream mapping. According to the four sub-processes (material preparation, material change, mold change, machine adjust) in the VSM, auxiliary machinery, automation, standard operating and other methods are applied to reduce exchange-type time by 45%, shorten the production cycle, reduce labor intensity and improve equipment effectiveness with the SMED and Lean thinking.
https://doi.org/10.1142/9789814689007_0022
The main way to present large-scaled thin-walled structure assembly is based on finite element method (FEM) numerical analysis method, but the accuracy and efficiency of finite element method cannot meet the requirements of real-time interactive virtual assembly simulation. In this paper, we proposed thin-walled elastic deformation mechanics model based on plane triangular mesh geometric model, established the basic solving equation for the elastic deformation of thin-walled parts with high-order Laplace deformation method. The established model was experimentally compared with conventional finite element model of shells. Comparison results showed that the proposed thin-walled deformation mechanics model had the higher solution efficiency for the mechanical deformation and allowed the easier integration with existing virtual assembly simulation. Therefore, the proposed model can be used to support the calculations of the deformation and stress of thin-walled structures during interactive assembly simulation.
https://doi.org/10.1142/9789814689007_0023
Utilizing multiscale method, nanoscale sliding contacts problems are investigated in this paper. Several rigid multi-asperity tips are used to slide on an elastic substrate with different textured surfaces. Two elastic surfaces with different textures are considered, and the multi-asperity tips consist of several cylindrical asperities whose radii are different. Average friction forces and average normal forces are compared to show the effects of indentation depth, and the mechanism which results in high friction forces is also discussed. Finally, a better shape, which can help to reduce friction forces between surfaces, is suggested.
https://doi.org/10.1142/9789814689007_0024
In structural non-probabilistic reliability analysis, the uncertain structural parameters are assumed to be the interval parameters. The commonly used probability model will lose accuracy when there is not enough experimental date for the reliability analysis. Conversely, the interval model only requires the upper and lower bound of the uncertain variable, which is more reasonable compared with the probabilistic model. The interval perturbation method is applied in this paper to compute the non-probabilistic reliability index, where the interval expansion problem has been effectively controlled. The precision of computing the reliability index is effectively improved, solving the problem of the non-probabilistic reliability index in a new way. During the iteration, Epsilon method would be use to more rapidly and accurately achieve the result. The numerical results prove that this method is effective and feasible.
https://doi.org/10.1142/9789814689007_0025
In this paper, we investigate the WIP inventory control for electronic manufacturing services, in order to improve the timely delivery rate of electronics manufacturing service companies and enhance competitiveness. First, we establish the WIP inventory control model for the bottleneck process by introducing the theory of constraints. Based on this, we establish the WIP inventory control model for electronic manufacturing services by introducing the classical control theory and use PID algorithm to make the WIP inventory around the bottleneck to be under the effective control. Finally, we built the WIP inventory control model for a case study of the production line of keyboard for a mobile phone and apply Matlab/Simulink to demonstrate this model.
https://doi.org/10.1142/9789814689007_0026
In the engineering-to-order environment, product specifications are exist large differences leading to business loss. In the study, the author attempt to set order screening mechanisms at the order taking stage. The Fuzzy Suitable Index is proposed to assess the feasibility of order. Moreover, the Utility Similarity is adopted to distinguish order levels to eliminate inappropriate orders. After the calculation of costs and delivery, TOPSIS is applied to sort orders according to the corresponding profit allocation ratio. The machine tools are used as an example to illustrate the algorithm.
https://doi.org/10.1142/9789814689007_0027
Presented in this paper is a non-productive tool-path optimization algorithm for 3D printing (layered manufacturing), specifically fused deposition manufacturing (FDM) with zigzag (direction-parallel) productive paths. We use SkeinForge to generate zigzag paths from 3D model, and then a novel unit processor is proposed. The proposed ‘unit’ data processing technique enables us to solve tool path optimization problems as a pseudo-symmetric travelling salesman problem. At last, a modified Genetic Algorithm is used to optimize the path length. The tests with four samples validate this algorithm. Our method features with transferring the complexity from the model to the programming (or the algorithm), thus acquiring a simpler model than before, which enables a finer tool-path planning by explicitly planning the travelling direction inside every zigzag pocket.
https://doi.org/10.1142/9789814689007_0028
The contact dynamic model of edge cam downward mechanism is established and movement of edge cam downward mechanism is simulated with ADAMS, the sine acceleration motion and sine- parabolic - sine motion of push rod motion law of edge cam are contrast to analyze the affection of cam shape to the operation speed and stability of edge cam downward mechanism.
https://doi.org/10.1142/9789814689007_0029
China has not formed an advanced and mature collaborative development model based on information technology in the key industry fields of complex products. Aiming at the problem, a collaborative development frame-work of complex products based on the commercial PLM system is constructed in the paper. Combining with the research of representative projects, such as Boeing B787, Airbus A380 and ARJ21 of Commercial Aircraft Corporation of China, Ltd., the characteristics of complex product development is analyzed, the collaborative development hiberarchy based on systems engineering is explored, and the general function framework which support the whole life cycle and the entire supplier network of complex product development is put forth and realized based on the commercial PLM system. The project practice shows that the framework can effectively perform the integration of cross-regional, multi-heterogeneous systems and the unified management of data.
https://doi.org/10.1142/9789814689007_0030
Based on the theorem of hydrodynamics, the similarity conditions of Lifting Experiment System in Deep-sea Mining are considered first. The system is calculated numerically by the method of mathematic analysis. The relations among every parameter are explored. The conditions and criterions of geometric similarity, kinematic similarity and dynamic similarity for Lifting Experiment System are determined consequently. Results show that the principal similarity criterion is Reynolds (criterion of dynamic similarity). During the experiment, Velocity Change can be adjusted according to the range of Reynolds to achieve kinematic similarity. These results can be applied to setting up the laboratory and concrete experiment as theory foundation in future.
https://doi.org/10.1142/9789814689007_0031
For an air supply system consisting of three active subsystems working in serial and one in cold standby configuration, a directed network is constructed to model the system. A shortest path approach is applied to evaluate the reliability of the system. The reliability result indicates that the cold standby design is sufficient to meet the high requirement of the air supply system reliability.
https://doi.org/10.1142/9789814689007_0032
This paper presents a novel genetic approach to solving the partner selection, and production and distribution planning problem in manufacturing supply chain design. Such a problem often occurs when manufacturing companies establish partnerships to form a virtual organization in order to capture rising market opportunities. Results of solving a set of randomly generated case problems clearly show the excellent performance of the approach.
https://doi.org/10.1142/9789814689007_0033
A lot of experimental results indicate that the effect of alkali/surfactant/polymer (ASP) solution with the same interfacial tension and different alkali concentration on displacement efficiency is different. In view of this phenomenon, ASP solutions with same interfacial viscoelastic modulus and different interfacial tension and with same interfacial tension and different interfacial viscoelastic modulus are used to displace oil in microcosmic model and the effect of interfacial tension on oil displacement efficiency is analyzed. It is indicated that oil/water interfacial dilational viscoelasticity is an important factor for starting-up and migrating residual oil. And the cooperative effect of interfacial tension and interfacial dilational viscoelasticity on emulsifying residual oil is caused in flooding process. When the interfacial tension between oil and ASP solution is lower than 0.1 mN/m and the interfacial dilational modulus is 4 mN/m, the larger displacement efficiency can be obtained in this experiment.
https://doi.org/10.1142/9789814689007_0034
Classical edge extraction is difficult for these images with the interference of non-distribute objects and uneven lighting. A new edge extraction approach combining Canny algorithm and Butterworth high-pass filter is proposed. Butterworth high-pass filter highlights objects and removes the background and some interference information in ore image. After histogram specification enhancing the contrast, Canny algorithm extracts accurate edges in these processed images. The experiments show that the result of new edge extraction method for complex ore images is more excellent than that of single Canny algorithm, it not only retains more closed edge, but also remove the noise and false edge.
https://doi.org/10.1142/9789814689007_0035
User behavior analysis is the hotspot of the internet information technology. Through the analysis of the web log, we can analyze users' operation behavior. However, most of the data of logs are expanding greatly day by day, and the log file size is usually GB level. The traditional single computing node is difficult to process such large amounts of data. So this paper presents a log analysis system based on Hadoop. The system architecture is composed by Flume, HBase and Hive. It will improve the system's computing power and scalability.
https://doi.org/10.1142/9789814689007_0036
Computer science studies computers, as well as the ambient phenomena and laws. Generalized computation theory includes algorithms, computational complexity theory, computability theory, automata theory, and formal language theory. This paper discusses several typical problems in the theory of computation (computability theory and complexity theory). And then it elaborates the relation of computation theory and computer science from different perspectives. It describes Turing machine model and reveals the essential relation of Turing machine model and computational thinking. In addition, it discusses time complexity and space complexity in computer science, presents approximation algorithm, and gives the packing problem examples. Finally, it emphasizes the importance of computation theory in computer science education.
https://doi.org/10.1142/9789814689007_0037
For routine target tracking algorithms are prone to losing the target and tracking error problem in complex environment, this paper presents a improved CamShift tracking algorithm to continuous track the moving target. The improved algorithm is based on the traditional CamShift algorithm which using the single color feature, and combines with the basic feature of target recognition such as the texture and edge feature. Meanwhile, the algorithm also solves the occlusion problem in target tracking through combining Kalman filtering with the least square method. Experiments show that, the improved CamShift algorithm can track moving target more effective and complete compared with the traditional algorithm, and it also improves the efficiency and accuracy of the target tracking.
https://doi.org/10.1142/9789814689007_0038
In this paper, a method is studied to build a reliability test system on WebApp based on TTCN-3 test suite. The model-based method is used to generate test case automatically and use data equivalence partition to choose test data. Markov chain usage model (MCUM) is used to describe the expected usage of system under test (SUT), and the data structure in the data pool is designed to organize test data used in reliability test cases. TTCN-3 reliability test model is developed in order to model the reliability test system. We developed two transform algorithms, the first of which is able to transform SUT model (MCUM and the data pool) into TTCN-3 reliability test model, and the second one can generate TTCN-3 test script from the test model. We also developed a test generation framework, which supports the automatic generation progress. A case system is generated using the test generation framework from given MCUM and the data pool. A case is studied to test a Web-based management information system then calculate the reliability factor.
https://doi.org/10.1142/9789814689007_0039
The mode of compound talents training is to enhance students' practical skills, students learn self-awareness, and enhance students' self-learning ability training model objectives. Reform and Practice paper focuses on compound talents training objectives, describes the basic computer course curriculum, teaching resources, teaching and other aspects of the implementation.
https://doi.org/10.1142/9789814689007_0040
Skin color varies with human heart beat which can be recorded by camera even consumer-level webcam though it's uneasy to be observed by naked eyes because of human physical limitations. This phenomenon is applied to detection of human vital signal like heart and respiration rate recently. However, the video signals will inevitably be contaminated by noise and environmental interference. For subsequent process, denoising is very necessary. In this paper, a denoising method based on wavelet transform is proposed and suitable parameters are selected by research and experiments. The result shows it's effective and helpful to the next procedure.
https://doi.org/10.1142/9789814689007_0041
A novel pattern of Web service composition is proposed based on service clusters. The services with same functions are combined into a service cluster. A digital set called coordinate projection is introduced for the parameter set relationship between a service and its cluster. Parameter matching can be decided by comparison of digital sets and semantic matching reduced drastically. Further, composite service cluster models are built while successful service compositions are gained. An approach based on simplifying disjunctive normal form is proposed to improve the efficiency of optimizing service compositions. Some algorithms of service composition are given based on the service cluster, and the efficiency of the proposed approach is illustrated by experiments with large repositories of different sizes.
https://doi.org/10.1142/9789814689007_0042
In the proposed method, the low-frequency part of the image in Contourlet domain is determined, the results and the watermark information scrambled by affine scaling are input into the CNN, and then the image encrypted is obtained from the CNN. The proposed method is robust and the watermark image can survive to many image attacks like rotation, scaling, noise, JPEG compression, low pass filtering, cropping and image tampering.
https://doi.org/10.1142/9789814689007_0043
In this paper, a new unambiguous tracking technique is proposed for binary offset carrier (BOC) modulated signals. The tracking loop in this technique is based on a synthesized correlation function which has only one positive peak. For different types of BOC signal, the proposed technique employs symmetrical equivalent pulse width modulated symbols of the auxiliary signal. The theoretical false alarm and detection performance formulas are given and simulated. Theoretical and simulation results show that this technique can be a solution to removes the ambiguity completely.
https://doi.org/10.1142/9789814689007_0044
SIFT has the defects of extracting unstable keypoints in complex texture images, this paper proposes an improved SIFT algorithm which based on FAST algorithm and geometric constraints. On the basis of extracting keypoints by SIFT, the improved algorithm adopts FAST to select stable feature points. Furthermore, geometric constraints of orientation difference, scales difference and orientation of matching connection line are used to reduce incorrect matching rates. The experimental result shows that the keypoints extracting by modified SIFT are extremely stable and the average matching time reduces by 10% and incorrect matches rates reduces by 5%.
https://doi.org/10.1142/9789814689007_0045
Compressive Sensing (CS) enables us to take few measurements of a signal than that Shannon-Nyquist sampling requires if it has a spare representation in a certain basis. However if the signal is contaminated with noise and interference, the reconstruction performance may be poor due to the existence of noise and interference. In this paper, using prior statistical character, we construct a linear operator H which can filter out the noise in compressed domain, then use the filtered signal for reconstruction. Simulation results demonstrate this modified method still holds sufficient information on the desirable signal and it can achieve better recovery performance than the method which first reconstructs the signal and then processes the recovered signal with prior information.
https://doi.org/10.1142/9789814689007_0046
Every good in e-commerce websites contains a lot of commodity attributes; even some of them are hidden behind the user's dynamic interaction. Finding them out for further analysis is a challenging topic. How to extract the commodity attributes effectively has been an attracting research topic in this area recently. Previous works cost too much calculation to deal this problem effectively, since they involve complex operations such as semantic analysis to extract hidden attributes. In this article, we analyze the relationship between different URL terms and commodity attributes, discuss with the hierarchical structure of the query results and propose a new Commodity Attributes Extraction algorithm based on Single-Layer method to find hidden attributes denoted by the URL terms. Using these URL terms, we can find out hidden attributes from a new query result page easily by analyzing its URL. Experiment result demonstrates the effectiveness of our algorithm.
https://doi.org/10.1142/9789814689007_0047
China has over 80 million disabled people. Disabled people of different types or ages require variety of rehabilitation service. For the purpose of fine management and to support government service, the database of rehabilitation was built based on the national disabled people's basic database and China's survey on disabled people's rehabilitation need. With this database of rehabilitation, we construct a data analysis and visualization system using S2SH framework in J2EE environment. We implement aids requirement regional analysis, rehabilitation institution distribution analysis and production data analysis in the system and choose Echarts to achieve data visualization.
https://doi.org/10.1142/9789814689007_0048
Compound recipe was the important form in traditional Chinese medicine. A formula is mainly composed of more than two herbs along with application of the single herb. At present, statistics tools were used to optimize the dose or proportion of formula. Here we showed a method based on uniform design and quadratic polynomial regression for the dose and proportion analysis in GeGenQingLian Decoction(GGQLD).The result obtained the different indicators reflected the different principal drug, the different indicators appeared the distinct mechanism of GGQLD in treating the ulcerative colitis(UC).
https://doi.org/10.1142/9789814689007_0049
In order to improve the security performance of image encryption, an image encryption scheme based on the M-subsequence is proposed. We firstly transform the plain image into one-dimensional form by scanning it. Secondly we give the hierarchy marks and divide layers according to the state values of the M sequence of n stage. When the former m bits of the state values are the same with the hierarchy marks, place the later n-m bits of the state values into the layers to generate the M-subsequence. Then we select two M-subsequences randomly to scramble the pixel position and diffuse gray-level value which is one-dimensional. At last, we transform the image from one-dimension to two-dimension to complete the scrambling and diffusion encryption. The experiment results show that this algorithm has a large key space, high scrambling degree and relatively good encryption effect.
https://doi.org/10.1142/9789814689007_0050
Compared the storage methods of GIS data and streaming data, summarized advantages and disadvantages of streaming data, on the basis of inherited the advantages of bi-directional streaming data, proposed a new model of dynamic data manage system for multi-source data, multi-query and multi-level storage, and applied to storage strategies of GIS data.
https://doi.org/10.1142/9789814689007_0051
Chaotic system parameter estimation is a multidimensional parameter optimization problem and the key issue that must be resolved in chaotic system synchronization. This study presents an improved gravitational search algorithm(IGSA) that can be used to solve the parameter estimation problem of chaotic systems. The IGSA uses a mutation operation to avoid the local optimum effectively, and reinitializes the population with poor fitness value. The IGSA is applied to estimate the parameters of the Lorenz system. Estimation results show that the algorithm is effective and robust.
https://doi.org/10.1142/9789814689007_0052
Document cluster has attracted much attention in recent years. Tradition clustering algorithms should be clustered with a known number of clusters in advance, but cannot obtain the number of clusters automatically. In this paper, we analyze the advantage of the Non-negative Matrix Factorization and affinity propagation. Then we propose a document clustering method based on the non-negative factorization and Affinity Propagation using Preference Estimation, which not only can generate the number of the clusters automatically but also have a better performance in document clustering.
https://doi.org/10.1142/9789814689007_0053
Iris recognition is one of high confident biometrics. This paper develops Modified Radial Symmetry Transform (MRST) to evaluate iris image quality in real-time video sequence. The proposed method could estimate pupil position and image quality simultaneously. It improves the efficiency of iris image quality assessment. Experiments show the proposed method achieves a good performance on CASIA4.0 and our Iris Video Database.
https://doi.org/10.1142/9789814689007_0054
A chemical vapor deposition reactor for producing silicon films on a half-inch silicon wafer was designed and developed for achieving a new electronic device production system, the Minimal Manufacturing. In order to achieve the rapid process, the thermal influences of gas, such as infrared light absorption and gas flow rate, were evaluated to be significant and useful. Additionally, the cleaning-free process was possible, when these useful parameters were taken into account.
https://doi.org/10.1142/9789814689007_0055
Research for sail-assisted technologies should be strengthened for promoting the development of sail assisted project. This paper mainly investigates the sail structure design, dynamic performance and the sail driving control strategy for the large ocean-going sail-assisted ship. For the circular thin optimal sail of one 48000 DWT bulk carrier, the aerodynamic characteristics was analyzed and the sail area was selected through combining with the model parameters from the results of the experimental analysis. Then, the torque for each set of sail was roughly calculated. According to the actual requirements of the sail driving control for energy-saving and driving-safety the hydraulic control is feasible. Compared two traditional hydraulic control systems, the improvement scheme of hydraulic control with variable-frequency technology was further proposed which is a more optimal control method for sail driving control of large ocean-going ships.
https://doi.org/10.1142/9789814689007_0056
Wave glider is the first unmanned autonomous marine robot to use only the ocean's endless supply of wave energy for propulsion. Wave glider comprises fin system, tether and float which harvest all of its energy from waves and sun. As a consequence of the lack of design information and data for the wave glider, the main aim of the study is using commercial software Maxsurf to present a method to predict hull stability for the floating part of the wave glider in order to estimate the hydrostatic performance of the hull. In this study we use Wigley parabolic hull and high speed round bilge form (NPL) to be comparatively analyzed in terms of intact stability.
In this paper a method is evaluated by comparing statical stability quality for two hull forms (2m) considered for accuracy of the solution parameters to design the floating hull using Maxsurf under the same conditions. These two nearly identical forms in terms of dimensions showed relatively small differences in terms of intact stability and both are satisfying the selected stability criteria. Comparative results are presented graphically depicting the stability performance of the selected forms over each other. The close agreement shows the importance of Maxsurf applications in estimating the hydrostatics performance and intact stability calculations of some hulls like the floating part of the glider.
https://doi.org/10.1142/9789814689007_0057
An economical wielding robot is designed by reducing the weight of traditional welding robot with topological optimization. In this paper, the mathematical model and kinematics equation of the optimized economical welding are established and analyzed. The results of finite analysis with ANSYS Workbench indicate that the arm and forearm of the robot are the main load-bearing parts, the strength of the optimized model still meet the corresponding national standards.
https://doi.org/10.1142/9789814689007_0058
To obtain better speed control performance of smart car, the mathematical model of smart car is built, a velocity estimation method based on complementary filter is used to reduce the noise from velocity measurement based on photoelectric encoder, a Fuzzy-PID controller to control speed of smart car by using the estimation result as the feedback is designed, and comparisons of control performance with conventional PID controller are made in this paper. The experimental results show that the Fuzzy-PID controller for speed control has better control performance than conventional PID.
https://doi.org/10.1142/9789814689007_0059
Speed estimation of speed sensorless has become major hotspot of modern high performance AC speed regulation; the vector control method is analyzed in deep. Based on voltage model as the basis, the introduction of reference value compensation strategy ensures that the motor can measure rotor speed accurately at low speed. In hardware, the motor control system composed of double DSP control board and two level inverters is designed. In Double DSP control board composed of the TMS320LF2407A and TMS320VC33, high floating point computing power of VC33 solve the problems of programming and calculation precision, the use of hardware features 2407 of its own and combined power system simulation to realize fast communication, sampling function. Finally, the simulation data are analyzed in a case, draw the error parameter curve, and verify the correctness of the velocity measurement method of the speed sensorless vector control.
https://doi.org/10.1142/9789814689007_0060
In recent years, seismic for house is in the spotlight because southwest china is in the fault zone, where earthquakes occur quite frequently. While experiment in a large amount is needed to verify the earthquake-resistance performance of structures. Dynamic characteristics of structures under earthquake can be reflected accurately by vibration platform test. But the cost of large-scale vibration platform is high, so this paper aim to design a new low-cost vibration test platform.
https://doi.org/10.1142/9789814689007_0061
This paper conducts a comprehensive study on conditions of double crank planar pin-jointed five-bar mechanism (DCPPFM) with the requirement of minimum transmission angle, which will be useful to design this kind of linkage. The conditions of DCPPFM derived in this paper include one inequality which satisfies the first condition of Grashof criteria, four sets of inequalities which satisfy the second condition of Grashof criteria, and two inequalities which meet the requirement of minimum transmission angle in a DCPPFM.
https://doi.org/10.1142/9789814689007_0062
Traffic accidents occur frequently resulting from fatigue driving, sleeping or poor mental state. A safe early-warning system to avoid sleeping when driven was designed based on the relationship between the signal of pulse and fatigue and sleeping states. The signal of pulse is measured by the Sensor fixed around the steering wheel and electrocardiogram equipment. This paper mainly applies Wavelet Analysis dealing with the signal. After comparing the measured signal with the signal set in the comparator in advance, the system intelligently gives an alarm on basis of the comparative results. It is a new security system to reduce the traffic accidents and to correct the sitting posture of the driver.
https://doi.org/10.1142/9789814689007_0063
Driving simulators based computer are largely employed in automotive industry, military simulation and academic research fields. In order to train new drivers for a kind of special amphibious vehicle, driving simulator with hydraulic-driven 6-DOF motion system was proposed. This paper shows you the process of the special driving simulator. A modularization structure was developed according to the structure character, maintainability and fixing space requirement which provide a kind of convenient methods to replace failure device and cut down simulator maintenance cycle effectively. A mixed real-time network structure based PCs was developed which was used to change information between computers and simulated cabin device. The special amphibious vehicle dynamics real-time solution model was proposed adopting Commercial-of-The-Shelf (COTS) product Matlab/XPC target and Rapid Control Prototype (RCP) technology. Vega Primer and Creator were used to realize the needed scene. The experiment results shows that the amphibious vehicle driving simulator can provide the near same performance as the actual vehicle and improve the driver's operation skill effectively and shorten the training cycle.
https://doi.org/10.1142/9789814689007_0064
The goal of this paper is to design a static output feedback controller for linear systems with actuator failures. On the basis of considered influence of actuator failures, a sufficient condition of asymptotic stability is presented. A static output feedback controller is designed by linear matrix inequality, guaranteed to remain asymptotic stability when the actuator failures do not occur. Furthermore, when the actuator failures occur, the system is still asymptotic stability by design the new controller. A simulation example is given to illustrate the feasibility and effectiveness of the results.
https://doi.org/10.1142/9789814689007_0065
This paper considers the problem of reliable H2 control for linear systems with sensor faults. For that purpose a dynamic output feedback H2 controller is presented by using linear matrix inequalities (LMIs) approach for linear systems. Furthermore, based on a sensor failure model with continuous gain, the dynamic output feedback H2 reliable controller is given via LMIs, the paper obtains sufficient conditions that ensure the closed-loop system is asymptotically stable and guarantees H2 performance. Simulation results confirm the effectiveness of the proposed design method.
https://doi.org/10.1142/9789814689007_0066
Because of the special structure, it's not feasible to instrument pressure transducer, or torque sensor. The method of using strain gauge to measure the trunnion torque of centrifuge suspended basket is proposed. Therefore, torque measurement system is imperative to be founded. The mapping function of input and output is not absolute linear in practice. A neural network (NN) hybrid modeling approach is proposed and applied to torque measurement system calibration. The simulated studies on the calibration of single output system are conducted respectively by use of the developed hybrid modeling scheme. The NN hybrid modeling approach is utilized to calibrate torque measurement system prototype based on the measured data obtained from calibration tests. The simulated and experimental results show that the NN hybrid modeling approach can improve significantly calibration precision in comparison with traditional calibration methods. In addition, the NN hybrid modeling is superior to NN black box modeling because the former possesses smaller network scale, higher convergence speed, higher calibration precision and better generalization performance.
https://doi.org/10.1142/9789814689007_0067
This paper presents an additional damping control strategy through adjusting the rotor speed of the direct-driven permanent magnet synchronous generator (D-PMSG). The parameters of the controller are optimized by PSO method. The simulations are done in a modified 4 machine 2 zone system, considering both constant and variable wind speeds. The results show that the design of the additional damping control strategy can significantly enhance the system damping and inhibit inter-area low frequency oscillation.
https://doi.org/10.1142/9789814689007_0068
Based on research of the present maintenance of backup power on communication bases, an integrated management system for backup power and PESS (Power & Environment Supervision System) on communication bases is presented with application of advanced management theory and automation control technique. The main features of the system include intelligent maintenance and recovery of lead-acid batteries, PESS integration and new energy grid integration. With the application of this system, the existing problems in base management of telecom carries can be solved, and intelligent controlling of backup power and Power & Environment supply will be achieved, thus contributes to significant savings in telecommunication operating costs.
https://doi.org/10.1142/9789814689007_0069
Measurement and control of fast pulse signal usually is difficult technology works in 200kV high voltage termination. High voltage insulation and momentary jamming signal generated by high voltage discharge are some technology problems need to be solved. Long distance transmission of quick signal between high voltage termination and low voltage console is realized by the application of interconnection between the optical fiber and RS232. Strong interference is restrained by the application of the optical fiber transmission. The measurement and control system by computer for the high voltage termination is used in a 200kV high voltage pulse ion accelerator, which work stably.
https://doi.org/10.1142/9789814689007_bmatter
The following section is included: