By Topic

Intelligent Computation Technology and Automation, 2009. ICICTA '09. Second International Conference on

Date 10-11 Oct. 2009

Go

Filter Results

Displaying Results 1 - 25 of 186
  • [Front cover - Vol 4]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (886 KB)
    Freely Available from IEEE
  • [Title Page i - Volume 4]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 4]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 4]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents - Volume 4

    Publication Year: 2009, Page(s):v - xvii
    Request permission for commercial reuse | PDF file iconPDF (180 KB)
    Freely Available from IEEE
  • Preface - Volume 4

    Publication Year: 2009, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (86 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee - Volume 4

    Publication Year: 2009, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Program Committee - Volume 4

    Publication Year: 2009, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Research on Collaborative Design Based on Web Services and Agent Technology

    Publication Year: 2009, Page(s):3 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (649 KB) | HTML iconHTML

    Collaborative design is an engineering process that involves decision-making through iterative communication and coordination among product designers throughout the lifecycle of product. In order to increasing openness and flexibility, a collaborative design system framework based on Web services and Agent technology is proposed. Web services are the foundation of system, and Agent technology is a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Multi-agent Decision-Making Model of Wind-Solar Complementary Power Generation System

    Publication Year: 2009, Page(s):7 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (699 KB) | HTML iconHTML

    with the development of computer and network, new control methods appear in industrial control system. And more intelligent and roboticized agent technology also appears after artificial intelligence (AI). Agent technology is farther development of AI. Wind and solar energy complementary power generation is a novel and promising power system, but because of randomicity and complexity of the climat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supply and Demand Conflict in Supply Chain Based on Principal-Agent Theory

    Publication Year: 2009, Page(s):11 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3680 KB) | HTML iconHTML

    Because of inconformity of the information and dissymmetry of the benefits, there exists supply and demand conflict among members in supply chain. Adopting principal-agent theory as the tool, we study a 3- layer supply chain model and analyze the supply and demand conflict in the supply chain. By respectively research the supply and demand conflict of the manufactory-dealer link and the supplier-m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Research Based on Multi-Agent for the Pattern of the Intelligent Manufacture

    Publication Year: 2009, Page(s):15 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (697 KB) | HTML iconHTML

    Through the research for the intelligent manufacture systems, this article proposed the model of intelligence manufacture systems which are based on the multi-Agent, and according to the systems characteristic, the networks realizing and the systems construction process, gave the the specifical methods for realizing the intellectualization of an enterprise information systems. Through the simulati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Reward-Based Negotiation Model on Agent's Honesty and Capability

    Publication Year: 2009, Page(s):18 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (667 KB) | HTML iconHTML

    The likelihood of reaching agreement was increased and quality of an agreement was promoted by exchanging arguments which influence each others' states, and trust mechanism was introduced into the process of negotiation by combining the agent's honesty and agent's capability. This paper proposed a new reward-based negotiation's model by introducing the concept and algorithm of agent's honesty and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Programmable Multi-Format Video Decoder

    Publication Year: 2009, Page(s):25 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB) | HTML iconHTML

    In this paper, we propose a VLSI design of programmable multi-format video decoder (PMD) to support video codec standards such as MPEG-2, MPEG-4,H.264, and VC-1. It is a hardware and software hybrid system by moving large portion of the complicated data paths, control logics, and computations into processors as software. More flexibility and expandability of the design is achieved by increasing so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Serial and Parallel Scheduling Algorithm for Mobile P2P Streaming Media System

    Publication Year: 2009, Page(s):29 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (695 KB) | HTML iconHTML

    According to a mobile P2P (Peer to Peer) streaming media system, a serial scheduling and parallel scheduling algorithm were proposed for multi-video-sources. If Qos (quality of service) monitored by the receiving-peer is degraded, the serial scheduling algorithm triggered the video source change event and synchronized the multi-video-sources by the time model of the streaming sequence. If the mult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced FEC Algorithm of Video Transmission Control over the Internet

    Publication Year: 2009, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1524 KB) | HTML iconHTML

    The video applications have their own characteristics, and some real time applications need high QoS. But the Internet is very complex and sometime the supplies can not be provided. Recently, many researches have been found that much traffic is self-similar over several time scales. The bandwidth of network is tempi present. We use Kalman filter to filter the sending rate and to predict the rate w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Effective Real-Time Error Concealment Scheme for Video Codec

    Publication Year: 2009, Page(s):37 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (686 KB) | HTML iconHTML

    A novel error-concealment scheme based on self-adaptive RPS (reference picture selection) and digital watermarking has been proposed to improve the recovery ability of corrupted video. During encoding procedure, RP (reference picture) is carefully selected according to the context of every intra blocks along with EC (error concealment) features extracted. Simultaneously, every macroblock is alloca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study of DV-Hop Localization Algorithm in Random Sensor Networks

    Publication Year: 2009, Page(s):41 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB) | HTML iconHTML

    Node localization is an important problem for location-dependent applications of wireless sensor networks. Aiming at the positioning problem of wireless sensor networks node location, an improved DV-Hop localization algorithm is proposed in this paper. The proposed method firstly recalculates the hop-size and sends different correction along different directions instead of computing a single corre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Communication Optimization Strategy Based on Cascade PLC MODBUS in Fire Water System of Hydropower Station

    Publication Year: 2009, Page(s):45 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (591 KB) | HTML iconHTML

    As to the bad real-time problem of traditional communication scheme that is one master station and more slave stations' MODBUS communication in fire water system of hydropower station, in this paper, a connection scheme of a cascade PLC communication was proposed to solve the defects of decreasing transmission speed because of long distance in communication. The communication software of PLC was a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis and Improvement of a Remote User Authentication Scheme

    Publication Year: 2009, Page(s):49 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (650 KB) | HTML iconHTML

    Smart card based remote user authentication is receiving more and more attention than ever with the popularization of computer network. Recently, Yoon et al. proposed a remote user authentication scheme using smart cards based on Hwang et al.'s. Its security depends on the one-way hash function. They claim that the scheme provides mutual authentication between the user and the remote system and ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DDCFS: A Distributed Dynamic Computer Forensic System Based on Network

    Publication Year: 2009, Page(s):53 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (765 KB) | HTML iconHTML

    With the increasing development of information technology, the computer crime problem is getting even serious. However traditional computer forensic that employs the static investigation after security events has inherent limitations. The authenticity, effectiveness and timeliness of the evidence are difficult to meet real needs. In order to solve the existing problems which static forensics techn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of Channel Estimation and Equalization of Indoor Positioning System Based on UWB

    Publication Year: 2009, Page(s):57 - 61
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (734 KB) | HTML iconHTML

    Precise indoor positioning is becoming increasingly important in commercial, military and public service applications for tracking people and asset. Ultra wide band (UWB) can provide high accuracy position with strong anti-jamming and low power consumption. It is very suitable for indoor positioning application. This paper will put emphasis on indoor positioning system based on UWB. Analysis and i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of the Ground Source Heat Pump Remote Monitoring System

    Publication Year: 2009, Page(s):62 - 65
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1178 KB) | HTML iconHTML

    In this paper, the composition of the remote monitoring system, ground source heat pump process flow, remote monitoring data and the comprehensive economic indicators are designed and analyzed with focusing on the mathematical model of economic indicators and data processing method. Through the Web Access configuration software, it realizes the real-time monitoring of heating/refrigeration (winter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Wireless Sensor Networks Node in Coalmine

    Publication Year: 2009, Page(s):66 - 69
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (647 KB) | HTML iconHTML

    Combined with the temperature and gas monitoring demand, a new technology which is called wireless sensor network is used to solve the problems exiting in most cable transmission systems. Base on designing of wireless sensor networks low-power hardware platform using CC2430 and transplanting TinyOS wireless sensor nodes, the design of components are completed by analyzing the system applications p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.