By Topic

System Science, Engineering Design and Manufacturing Informatization (ICSEM), 2012 3rd International Conference on

Date 20-21 Oct. 2012

Go

Filter Results

Displaying Results 1 - 25 of 92
  • [Title and copyright page]

    Publication Year: 2012 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (30 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012 , Page(s): I - VIII
    Save to Project icon | Request Permissions | PDF file iconPDF (80 KB)  
    Freely Available from IEEE
  • Preface and committees

    Publication Year: 2012 , Page(s): IX - XII
    Save to Project icon | Request Permissions | PDF file iconPDF (40 KB)  
    Freely Available from IEEE
  • Author index

    Publication Year: 2012 , Page(s): 351 - 353
    Save to Project icon | Request Permissions | PDF file iconPDF (40 KB)  
    Freely Available from IEEE
  • A new communication mechanism for multi-core systems in industrial design

    Publication Year: 2012 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (146 KB) |  | HTML iconHTML  

    In industrial design, multi-core systems are receiving more and more attention for their special characteristics as low power consumption, reliability and extensibility. Multi-core processors are usually designed in shared memory architecture and tasks on different cores run concurrently. The communication between tasks must be performed consistently, which means the access to shared communication buffer (or resource) should be atomic. Many mechanisms have been proposed for this purpose, e.g. wait-free and lock-based. However, different mechanisms show different performance on system schedulability and memory overhead. So, it would be a good choice to combine these mechanisms together, i.e. to protect different resources with different mechanisms. This is a variation of bin-packing problem, which is NP-complete. We propose a heuristic algorithm to select the communication mechanisms with minimum memory requirements executing within the time constraints. The experiment demonstrates that the heuristic provides close to optimal solutions and the proposed algorithm can significantly reduce the memory consumption of wait-free method, guaranteeing that all tasks complete before their deadlines. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ontology framework for evolution of plain text

    Publication Year: 2012 , Page(s): 5 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (117 KB) |  | HTML iconHTML  

    Data evolution is the process of semantics change for data product, in which data product has intrinsic semantics as well as extension semantics. This paper presents an ontology framework for evolution of plain text. The semantics of plain text is modeled as DATAGENOME ontology, including CONNOTATION ontology for expressing the intrinsic semantics and CONTEXT ontology for representing the extension semantics. CONNOTATION ontology is constructed according to the chapter structure of plain text. CHAPTER, SECTION, PARAGRAPH and SENTENCE class are used to describe a chapter, section, paragraph and sentence of plain text separately. CONNOTATION ontology may accompany with many CONTEXT ontologies. CONTEXT ontology consists of eight interconnected dimensions including what, when, where, who, how, which, why and awarings, is the description of virtual environment that lead to the existence of connotation. Instances of the CONNOTATION ontology can be viewed as a tree according to the relationship among them, so do the instances of COTEXT ontology. Mapping between connotation ontology tree and context tree show the correlation of intrinsic semantics and extension semantics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preparation and characterization of c-BN films by RF sputtering

    Publication Year: 2012 , Page(s): 9 - 12
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (419 KB) |  | HTML iconHTML  

    Boron nitride films for SAW devices were deposited on Si (100) wafers by RF magnetron sputtering. To prioritize the main influencing factors of the c-BN content, an orthogonal experiment was designed. The c-BN and h-BN phases in films are tested by Fourier transform infrared (FTIR); The surface morphologies of films are characterized by atomic force microscopy (AFM). Result of the FTIR indicates that the sequence of influential significance can be arranged as follows: Substrate temperature>; Ratio of N2: Ar>; Sputtering power>; Substrate negative bias. High content of c-BN thin film was prepared with substrate temperature of 575°C, N2: Ar ratio of 8:8, sputtering power of 300W and substrate negative bias of -100V. The AFM result indicated that the surface morphology of films are smooth with lower roughness. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a network receiver for 20MHz to 3GHz ultra-short wave spectrum monitoring

    Publication Year: 2012 , Page(s): 13 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (105 KB) |  | HTML iconHTML  

    A network receiver for ultra-short wave spectrum monitoring is designed for testing and data collection of the electromagnetic environment for the purpose of mastering all kinds of wireless business and communication system, especially the broadband wireless access, the Internet of Things and other new business with frequency of background noise and frequency of use. The receiver employs a program of super-heterodyne double-converted; the frequency range monitored by the receiver is from 20MHz to 3GHz. The receiver using digital signal processing technology, can achieve signal demodulation of a variety of working methods, digital IF filter of a variety of bandwidth. It uses the computer network control, and uses computer monitor to display the receiver working parameters and the spectrum of the received signal, the antenna-side input level size etc. It also provides a good interactive interface. The practical use shows that the receiver has high receiver sensitivity and anti-jamming performance. It can adapt to the monitoring needs with wide dynamic range. It can provide the technical basis of frequency domination, frequency planning and frequency coordination for radio management departments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jacobi elliptic function-like solutions for generalized stochastic KdV equation

    Publication Year: 2012 , Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (116 KB) |  | HTML iconHTML  

    By extended mapping method and Hermite transformation, we study the generalized stochastic KdV equation, and obtain some families of stochastic exact solutions, which include Jacobi elliptic function-like, combined Jacobi elliptic function-like, soliton-like, kink-bell soliton-like and triangular function-like solutions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-label classification algorithm based on Partial Least Squares regression

    Publication Year: 2012 , Page(s): 21 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (90 KB) |  | HTML iconHTML  

    In multi-label learning, an instance may be associated with a set of labels, and Multi-Label Classification (MLC) algorithm aims at outputting a label set for each unseen instance. In this paper, a MLC algorithm named ML-PLS is proposed, which is based on Partial Least Squares (PLS) regression. In detail, as PLS can handle the relations between the matrices of independent variables and dependent variables through a multivariate linear model, when PLS is directly used for MLC, the matrix of dependent variables is set to include the information of the label memberships and the labels of dependent variables can then be predicted through the multivariate linear model. Experiments on real-world multi-label data sets show that ML-PLS is significantly competitive to other MLC algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the electric scissor aerial work platform steering system optimization

    Publication Year: 2012 , Page(s): 25 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (177 KB) |  | HTML iconHTML  

    The steering system is an important part of pure electric scissors aerial work platform, the original steering system comprises of steering switch, power unit, flow priority valve and other main components. Flow controls through the flow priority valve, it's not only the high cost but also inefficient. After optimization of the steering system, the steering system turns to close-loop. The steering with automatic reset, steering position can be precisely controlled and other functions, it is more flexible through the narrow area, low-cost and high-efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A learning-based iterated local search algorithm for the asymmetrical prize collecting vehicle routing problem

    Publication Year: 2012 , Page(s): 29 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (103 KB) |  | HTML iconHTML  

    This paper proposes a learning-based iterated local search algorithm for the asymmetrical prize collecting vehicle routing problem, which is a new variant of VRP where the objective is a linear combination of three objects: minimization of total distance, minimization of vehicles used, and maximization of customers served. Some benchmark problem instances are taken as the experiment data and the computational results show that our approach can yield about 4.05% average duality gap compared to the lower bound. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of wireless detection module of device temperature in coal mine

    Publication Year: 2012 , Page(s): 33 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (128 KB) |  | HTML iconHTML  

    A wireless detection module of device temperature in coal mine based on the microcomputer MSP430 and the transceiver nRF905 was designed, the hardware structure of a node in wireless sensor networks, signal transmission and the processes of frequency-hopping spread spectrum(FHSS) were given. This module uses nRF905 to realize FHSS mechanism, delivers the device temperature from nodes to sink nodes and then to surface monitoring computer, while operation status of mining equipment can be safely monitored. The module has a good anti-jamming capability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Game-theoretic models of improvement to water supply security in China

    Publication Year: 2012 , Page(s): 37 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (85 KB) |  | HTML iconHTML  

    It is urgent to upgrade urban water supply systems to improve water supply security in developing countries. This paper conducts models for analyzing the conflicts between local government and a water company based on game theory. Penalties and subsidies are considered as policy variables to promote water companies upgrading equipments. Then the model is enriched by adding policy variable, reputational damage to local government. The contribution of this study is optimizing the design of water policies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A review of stakeholder analysis

    Publication Year: 2012 , Page(s): 40 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (63 KB) |  | HTML iconHTML  

    Stakeholder approaches had been applied to the management of organizations with a view to the improvement of all areas of performance, including economic, safety, future policies etc. This paper reviews the origins of stakeholder theory and uses of stakeholder analysis, discusses some of the challenges and limitations of existing methods for stakeholder analysis, provides suggestions on application of stakeholder analysis approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firepower allocation model based on graph theory

    Publication Year: 2012 , Page(s): 44 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (89 KB) |  | HTML iconHTML  

    According to the actual situation of the artillery targets, considering the effect of target shooting and ammunition consumpti, we establish the graph theory model of artillery fire distribution, and the firstly apply the matching algorithm in graph theory to solve the model, which can be guaranteed under the premise of the completion of shooting tasks, effective way to avoid the waste of troops and ammunition, and provide a scientific, rational, a more accurate basis of decision making for precision strike enemy targets. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research on the method of fuzzy information processing

    Publication Year: 2012 , Page(s): 47 - 50
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (104 KB) |  | HTML iconHTML  

    In Reliability analysis, in addition to stochastic uncertain information, fuzzy uncertain information also exists. Therefore, the traditional reliability put forward a comprehensive method for reliability calculation of random uncertainty information and fuzzy uncertainty information. It obtained reliability distribution curve which is based on stress-strength interference model, also obtained reliability calculation model which could handle both the probability density function and the membership function. This paper explored the inner relation between this model and the classical reliability model. The result shows that: This model is used for processing stochastic uncertain information and fuzzy uncertain information in the case of coexistence of randomness and fuzziness. The result has high accuracy, and can dynamically reflect the calculation mechanism of reliability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the control ability of financial staff in enterprise group

    Publication Year: 2012 , Page(s): 51 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (102 KB) |  | HTML iconHTML  

    Enterprise group is a new form of organization, but the particularity and complicacy of its structure and management bring much more and bigger problems. The group control of financial staff can't be ignored in the collective development of enterprise group. The article use the Analytic Hierarchy Process (AHP) to find weight calculation of the financial staff's control ability. Based on the factors, we test all types of financial personnel in parent-subsidiary companies by 16PF scale evaluation, and try training for financial staff in order to improve the financial control ability of Enterprise group. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Searching strategy driven by situation awareness in game simulation system

    Publication Year: 2012 , Page(s): 56 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (142 KB) |  | HTML iconHTML  

    Game simulation system is built to train players' game ability throughout exercising simulated historic game cases time and time again. From the point of view of human cognition, situation awareness, strategy searching and selecting are two important parts of game procedure, which work in a complementary way in game process. How to represent game situation awareness and search suitable strategy based on current game situation awareness are two crucial issues in game simulation system. This paper proposes a strategy searching and selecting method based on the formalization expression of game and game situation awareness we introduced. The algorithm detail of strategy searching and selecting is introduced in the paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image corner location algorithm based on sub-blocking with dynamic threshold and lifting wavelet transform

    Publication Year: 2012 , Page(s): 60 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (480 KB) |  | HTML iconHTML  

    An image corner location algorithm based on lifting wavelet and sub-blocking with dynamic two-thresholds is presented. According to the gray similarity around pixels and the properties of the corner in an image, the lifting wavelet transform theory is used to obtain the high-frequency region of the image. The high-frequency image is plotted regions and dynamic two-threshold algorithm is used to locate corners precisely in every region. The results of the experiment show that the corners are precisely located by the proposed algorithm and the algorithm runs much faster. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing financial distress of listed companies using neural network

    Publication Year: 2012 , Page(s): 64 - 67
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (87 KB) |  | HTML iconHTML  

    Corporation financial distress has been an important issue for study in the financial fields. This paper uses traditional BP neural network model and proposes PNN model to predicate financial distress. The sample consists of 276 companies listed on the Shanghai Stock Exchange and Shenzhen Stock Exchange over the period 2001-2010. Factor analysis is used to lower correlation and reduce dimensionality. The results demonstrate that the PNN model has higher explanatory power in predicating financial distress than BPN model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive target tracking for 6-degrees underactuated vehicle

    Publication Year: 2012 , Page(s): 68 - 71
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (113 KB) |  | HTML iconHTML  

    This paper deals with a control strategy for underactuated underwater vehicle moving in 6-degrees of freedom whose target is the tracking of a space trajectory. The control algorithms proposed build upon Lyapunov's method and backstepping technique, which force the vehicle follow any smooth time-varying bounded trajectory, despite of the uncertainty in the damping coefficient and absence of the force of sway and heavy. The error of tracking and parameter estimation are ultimately confined to a ball that can be made arbitrarily small. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on a critical value-based aggregated poisson process

    Publication Year: 2012 , Page(s): 72 - 75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (141 KB) |  | HTML iconHTML  

    In this paper, a critical value-based aggregated Poisson process is introduced based on a Poisson process whose intensity is the constant λ. Some results are presented for the new stochastic process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Based on the grey relation analysis of low producing oil well production application

    Publication Year: 2012 , Page(s): 76 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (79 KB) |  | HTML iconHTML  

    In the oil price soaring, low pow's tap the latent become the focus of attention. According to the low pow mining data, and by employing grey correlation analysis and the maximum entropy technology method to pumping well swabbing parameters as the main data source, and to select a set of suitable for oil well mining production parameters, realize the optimization of oil well production plan for oil well production managers put forward suggestions, to achieve the purpose of saving energy, increasing production. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of negative flow control characteristics for axial piston pump based on hydraulic and mechanical co-simulation

    Publication Year: 2012 , Page(s): 79 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (184 KB) |  | HTML iconHTML  

    The research object of this paper is negative control system in axial piston pump, which widely used in excavator. The control system changes the delivery of the pump by the complicated mechanism to realize the adjustment of the pump flow rate. This paper takes advantages of the AMESim and ADAMS to build the system hydraulic model and mechanical model separately, and lets them exchange data to complete the system simulation. Based on the simulation, we research the effect of pilot spring and control valve under lap on the control system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.