By Topic

System Science, Engineering Design and Manufacturing Informatization (ICSEM), 2012 3rd International Conference on

Date 20-21 Oct. 2012

Go

Filter Results

Displaying Results 1 - 25 of 92
  • [Title and copyright page]

    Publication Year: 2012 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (30 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012 , Page(s): I - VIII
    Save to Project icon | Request Permissions | PDF file iconPDF (80 KB)  
    Freely Available from IEEE
  • Preface and committees

    Publication Year: 2012 , Page(s): IX - XII
    Save to Project icon | Request Permissions | PDF file iconPDF (40 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2012 , Page(s): 351 - 353
    Save to Project icon | Request Permissions | PDF file iconPDF (40 KB)  
    Freely Available from IEEE
  • A new communication mechanism for multi-core systems in industrial design

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (146 KB) |  | HTML iconHTML  

    In industrial design, multi-core systems are receiving more and more attention for their special characteristics as low power consumption, reliability and extensibility. Multi-core processors are usually designed in shared memory architecture and tasks on different cores run concurrently. The communication between tasks must be performed consistently, which means the access to shared communication... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ontology framework for evolution of plain text

    Publication Year: 2012 , Page(s): 5 - 8
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (117 KB) |  | HTML iconHTML  

    Data evolution is the process of semantics change for data product, in which data product has intrinsic semantics as well as extension semantics. This paper presents an ontology framework for evolution of plain text. The semantics of plain text is modeled as DATAGENOME ontology, including CONNOTATION ontology for expressing the intrinsic semantics and CONTEXT ontology for representing the extensio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preparation and characterization of c-BN films by RF sputtering

    Publication Year: 2012 , Page(s): 9 - 12
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (419 KB) |  | HTML iconHTML  

    Boron nitride films for SAW devices were deposited on Si (100) wafers by RF magnetron sputtering. To prioritize the main influencing factors of the c-BN content, an orthogonal experiment was designed. The c-BN and h-BN phases in films are tested by Fourier transform infrared (FTIR); The surface morphologies of films are characterized by atomic force microscopy (AFM). Result of the FTIR indicates t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a network receiver for 20MHz to 3GHz ultra-short wave spectrum monitoring

    Publication Year: 2012 , Page(s): 13 - 16
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (105 KB) |  | HTML iconHTML  

    A network receiver for ultra-short wave spectrum monitoring is designed for testing and data collection of the electromagnetic environment for the purpose of mastering all kinds of wireless business and communication system, especially the broadband wireless access, the Internet of Things and other new business with frequency of background noise and frequency of use. The receiver employs a program... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jacobi elliptic function-like solutions for generalized stochastic KdV equation

    Publication Year: 2012 , Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (116 KB) |  | HTML iconHTML  

    By extended mapping method and Hermite transformation, we study the generalized stochastic KdV equation, and obtain some families of stochastic exact solutions, which include Jacobi elliptic function-like, combined Jacobi elliptic function-like, soliton-like, kink-bell soliton-like and triangular function-like solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-label classification algorithm based on Partial Least Squares regression

    Publication Year: 2012 , Page(s): 21 - 24
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (90 KB) |  | HTML iconHTML  

    In multi-label learning, an instance may be associated with a set of labels, and Multi-Label Classification (MLC) algorithm aims at outputting a label set for each unseen instance. In this paper, a MLC algorithm named ML-PLS is proposed, which is based on Partial Least Squares (PLS) regression. In detail, as PLS can handle the relations between the matrices of independent variables and dependent v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the electric scissor aerial work platform steering system optimization

    Publication Year: 2012 , Page(s): 25 - 28
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (177 KB) |  | HTML iconHTML  

    The steering system is an important part of pure electric scissors aerial work platform, the original steering system comprises of steering switch, power unit, flow priority valve and other main components. Flow controls through the flow priority valve, it's not only the high cost but also inefficient. After optimization of the steering system, the steering system turns to close-loop. The steering... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A learning-based iterated local search algorithm for the asymmetrical prize collecting vehicle routing problem

    Publication Year: 2012 , Page(s): 29 - 32
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (103 KB) |  | HTML iconHTML  

    This paper proposes a learning-based iterated local search algorithm for the asymmetrical prize collecting vehicle routing problem, which is a new variant of VRP where the objective is a linear combination of three objects: minimization of total distance, minimization of vehicles used, and maximization of customers served. Some benchmark problem instances are taken as the experiment data and the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of wireless detection module of device temperature in coal mine

    Publication Year: 2012 , Page(s): 33 - 36
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (128 KB) |  | HTML iconHTML  

    A wireless detection module of device temperature in coal mine based on the microcomputer MSP430 and the transceiver nRF905 was designed, the hardware structure of a node in wireless sensor networks, signal transmission and the processes of frequency-hopping spread spectrum(FHSS) were given. This module uses nRF905 to realize FHSS mechanism, delivers the device temperature from nodes to sink nodes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Game-theoretic models of improvement to water supply security in China

    Publication Year: 2012 , Page(s): 37 - 39
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (85 KB) |  | HTML iconHTML  

    It is urgent to upgrade urban water supply systems to improve water supply security in developing countries. This paper conducts models for analyzing the conflicts between local government and a water company based on game theory. Penalties and subsidies are considered as policy variables to promote water companies upgrading equipments. Then the model is enriched by adding policy variable, reputat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A review of stakeholder analysis

    Publication Year: 2012 , Page(s): 40 - 43
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (63 KB) |  | HTML iconHTML  

    Stakeholder approaches had been applied to the management of organizations with a view to the improvement of all areas of performance, including economic, safety, future policies etc. This paper reviews the origins of stakeholder theory and uses of stakeholder analysis, discusses some of the challenges and limitations of existing methods for stakeholder analysis, provides suggestions on applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firepower allocation model based on graph theory

    Publication Year: 2012 , Page(s): 44 - 46
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (89 KB) |  | HTML iconHTML  

    According to the actual situation of the artillery targets, considering the effect of target shooting and ammunition consumpti, we establish the graph theory model of artillery fire distribution, and the firstly apply the matching algorithm in graph theory to solve the model, which can be guaranteed under the premise of the completion of shooting tasks, effective way to avoid the waste of troops a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research on the method of fuzzy information processing

    Publication Year: 2012 , Page(s): 47 - 50
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (104 KB) |  | HTML iconHTML  

    In Reliability analysis, in addition to stochastic uncertain information, fuzzy uncertain information also exists. Therefore, the traditional reliability put forward a comprehensive method for reliability calculation of random uncertainty information and fuzzy uncertainty information. It obtained reliability distribution curve which is based on stress-strength interference model, also obtained rel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the control ability of financial staff in enterprise group

    Publication Year: 2012 , Page(s): 51 - 55
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (102 KB) |  | HTML iconHTML  

    Enterprise group is a new form of organization, but the particularity and complicacy of its structure and management bring much more and bigger problems. The group control of financial staff can't be ignored in the collective development of enterprise group. The article use the Analytic Hierarchy Process (AHP) to find weight calculation of the financial staff's control ability. Based on the factor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Searching strategy driven by situation awareness in game simulation system

    Publication Year: 2012 , Page(s): 56 - 59
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (142 KB) |  | HTML iconHTML  

    Game simulation system is built to train players' game ability throughout exercising simulated historic game cases time and time again. From the point of view of human cognition, situation awareness, strategy searching and selecting are two important parts of game procedure, which work in a complementary way in game process. How to represent game situation awareness and search suitable strategy ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image corner location algorithm based on sub-blocking with dynamic threshold and lifting wavelet transform

    Publication Year: 2012 , Page(s): 60 - 63
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (480 KB) |  | HTML iconHTML  

    An image corner location algorithm based on lifting wavelet and sub-blocking with dynamic two-thresholds is presented. According to the gray similarity around pixels and the properties of the corner in an image, the lifting wavelet transform theory is used to obtain the high-frequency region of the image. The high-frequency image is plotted regions and dynamic two-threshold algorithm is used to lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing financial distress of listed companies using neural network

    Publication Year: 2012 , Page(s): 64 - 67
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (87 KB) |  | HTML iconHTML  

    Corporation financial distress has been an important issue for study in the financial fields. This paper uses traditional BP neural network model and proposes PNN model to predicate financial distress. The sample consists of 276 companies listed on the Shanghai Stock Exchange and Shenzhen Stock Exchange over the period 2001-2010. Factor analysis is used to lower correlation and reduce dimensionali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive target tracking for 6-degrees underactuated vehicle

    Publication Year: 2012 , Page(s): 68 - 71
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (113 KB) |  | HTML iconHTML  

    This paper deals with a control strategy for underactuated underwater vehicle moving in 6-degrees of freedom whose target is the tracking of a space trajectory. The control algorithms proposed build upon Lyapunov's method and backstepping technique, which force the vehicle follow any smooth time-varying bounded trajectory, despite of the uncertainty in the damping coefficient and absence of the fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on a critical value-based aggregated poisson process

    Publication Year: 2012 , Page(s): 72 - 75
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (141 KB) |  | HTML iconHTML  

    In this paper, a critical value-based aggregated Poisson process is introduced based on a Poisson process whose intensity is the constant λ. Some results are presented for the new stochastic process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Based on the grey relation analysis of low producing oil well production application

    Publication Year: 2012 , Page(s): 76 - 78
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (79 KB) |  | HTML iconHTML  

    In the oil price soaring, low pow's tap the latent become the focus of attention. According to the low pow mining data, and by employing grey correlation analysis and the maximum entropy technology method to pumping well swabbing parameters as the main data source, and to select a set of suitable for oil well mining production parameters, realize the optimization of oil well production plan for oi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of negative flow control characteristics for axial piston pump based on hydraulic and mechanical co-simulation

    Publication Year: 2012 , Page(s): 79 - 83
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (184 KB) |  | HTML iconHTML  

    The research object of this paper is negative control system in axial piston pump, which widely used in excavator. The control system changes the delivery of the pump by the complicated mechanism to realize the adjustment of the pump flow rate. This paper takes advantages of the AMESim and ADAMS to build the system hydraulic model and mechanical model separately, and lets them exchange data to com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.