By Topic

International Conference on Automatic Control and Artificial Intelligence (ACAI 2012)

3-5 March 2012

Filter Results

Displaying Results 1 - 25 of 549
  • Table of content

    Publication Year: 2012, Page(s):1 - 23
    IEEE is not the copyright holder of this material | PDF file iconPDF (502 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D location of non-cooperative circle target based on monocular vision and laser range finder

    Publication Year: 2012, Page(s):1 - 4
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (307 KB)

    This paper studies on the position and orientation estimation method of non-cooperative circle target based on monocular vision and laser range finder. According to an image with the radius of a circle unknown, the measurement information of laser range finder and the image coordinate of laser spot, we can obtain the location information of non-cooperative circle target. Because the camera does no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A* algorithm used in three-dimensional environment for optimal path planning

    Publication Year: 2012, Page(s):5 - 8
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (216 KB)

    In this paper, we obtain three-dimensional topographic height information by sensors and use gradient threshold method to deal with flatness on ground. Thus, there should be three robot traffic conditions: passable area, access more difficult area and hazard area. Then according to the robot's parameters, appropriate threshold value for traffic conditions will be obtained and then is stored in two... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A BICM-ID based FM IBOC DAB system

    Publication Year: 2012, Page(s):9 - 13
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (114 KB)

    In this paper, the application bit-interleaved coded modulation with iterative decoding (BICM-ID) for FM IBOC DAB systems over Rayleigh fading channel is addressed. As compared with TCM which utilizes symbol interleaved, in addition to implementation advantages, BICM-ID performs well on fading channel for bandwidth-efficient transmission. Here, this dissertation analyzes the key element of BICM-ID... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A binary space based on modified hamming distance for clustering

    Publication Year: 2012, Page(s):14 - 17
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (149 KB)

    Any things can be seen as an entity represented by multiple properties. This paper define a binary space for clustering, in which for each entity, we convert the raw data into the attribute string and transform it into a binary string in accordance with binary tree. The order of each attribute is no importance. At the same time, because the weight of each attribute is different in this space, we u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cluster routing algorithm based on small-world model

    Publication Year: 2012, Page(s):18 - 21
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (172 KB)

    A routing clustering algorithm based on the small world model is presented to overcome the problem of LEACH's unreasonable cluster head selection and the uneven energy consumption. First of all, the method optimizes the topology optimization the wireless sensor network by clustering coefficient feature of small world. Secondly, it chooses cluster heads considering energy and degree of each node in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cluster-tree based data gathering algorithm for wireless sensor networks

    Publication Year: 2012, Page(s):22 - 25
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (122 KB)

    A wireless sensor network (WSN) consists of a lot of tiny sensing devices, which can monitor environment or other events. Because these devices run on battery, energy is an extremely critical resource for them. Thus, energy-efficient method need be carefully designed for data gathering. Most of the existing energy-efficient algorithms always forward packets by clusters or tree. Both the structure ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cognitive decision model for heterogeneous computing systems

    Publication Year: 2012, Page(s):26 - 29
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (76 KB)

    This paper proposes a cognitive decision model for heterogeneous computing systems to rationally take advantage of all computing resources for certain applications. We build a cognitive decision model that can convert the problem of distributing certain applications onto several heterogeneous computing resources into a search of problem space where cognitive techniques can play their roles. Based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A contribution-based incentive mechanism for P2P file sahring systems

    Publication Year: 2012, Page(s):30 - 33
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (124 KB)

    In P2P file sharing systems, behaviours of free riders and malicious peers cause negative impact on the robustness and availability of these systems. However, most existing incentive schemes only consider behaviours of free riders or malicious peers, thus fail to effectively enhance performances of these systems. In this paper, a contribution-based incentive mechanism with considering both behavio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cooperative sampling scheme for field sampling in dense wireless sensor networks

    Publication Year: 2012, Page(s):34 - 37
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (103 KB)

    Field sampling is a significant kind of application of wireless sensor networks (WSNs). In this application, multiple sensor nodes usually cooperate to sample and estimate the physical signal. A sampling scheme which only considers the sampling process of each sensor node is not suitable for the application. Cooperative sampling with multiple sensor nodes can fulfil the application. For a dense WS... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A data fusion approach based on compressed sensing theory for wireless sensor network

    Publication Year: 2012, Page(s):38 - 41
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (127 KB)

    In this paper, a data fusion approach based on compressed sensing theory for energy-efficient data transmission in wireless sensor networks is proposed. This approach can effectively reduce the data transmission cost and improve data precision. The simulation results show the feasibility and effectiveness of the proposed approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A deductible claim process risk model and ruin probability

    Publication Year: 2012, Page(s):42 - 45
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (87 KB)

    This paper studies a deductible claim process risk model. The author puts an emphasis on studying the risk model under the condition that claim number process is Poisson process and loss distribution is exponential distribution. According to the calculation, draw the interesting conclusion that under the two situations whether regard deductible as claim or not, the aggregate claim is the same. Fur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A DVGE service system for risk assessment of dam-break in barrier lake

    Publication Year: 2012, Page(s):46 - 49
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (265 KB)

    This paper employs theories and technologies of the distributed virtual reality and geographic information system (GIS) to construct a DVGE (Distributed Virtual Geographic Environment) system. The proposed DVGE System provides geographically distributed users with a shared virtual space and a collaborative platform in order to implement risk assessment work. Using five-layer service system archite... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic tracking mechanism for mobile targets in cluster-based WSNS

    Publication Year: 2012, Page(s):50 - 53
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (149 KB)

    How to save energy for target tracking in WSNs is an important issue. The basic idea of energy-saving method is using sleep mechanism to make nodes into sleeping until they are awaking to process target sensing scheme. However, if nodes enter sleep state too much, targets may lose easily from the sleeping nodes. It is high consuming the energy to find back these losing targets. Thus, it would noti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast and accurate detection algorithm for circle target

    Publication Year: 2012, Page(s):54 - 56
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (265 KB)

    To meet the requirement of fast and precise recognition and detection for circle target, a novel method is proposed. The specific characteristics of circle edge are fully extracted by using multiple structuring element-based generalized morphological edge detection. Then, a spatial moment-based algorithm is developed to detect the edge of circle target, and the subpixel location of circle centre i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast responsive and compounded control method for initial phase of small satellite attitude tracking

    Publication Year: 2012, Page(s):57 - 61
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (158 KB)

    This paper studies a fast responsive control method to deal with the initial phase control problem of spacecraft-attitude tracking. A “Feedforward Compensation & Error PD & Modified Sliding Mode” compounded control law combining PWPF modulator is proposed to enhance the robustness and the responsive velocity of the MIMO attitude tracking system. The stability of the control l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast segmentation of MRI image based on chan-vese model

    Publication Year: 2012, Page(s):62 - 65
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (508 KB)

    Nowadays, active contour model and level set method have made a great success in the image segmentation, but these methods also have drawbacks: existence of local minima because of non-convexity and the huge amount of calculation. To solve these problems, the paper improved the original Chan-Vese model. Firstly, the nonconvex Chan-Vese model can be reformulated as convex optimization problem based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal definition on ontology integration

    Publication Year: 2012, Page(s):66 - 68
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (123 KB)

    There is currently a great deal of research focused on integrating ontologies created for similar domains through different sources. Generally, the definitions of ontology integration explain the functions of the operation. However, there are less works that expound the formal definitions of ontology integration. This paper formally defines ontology integration based on micro-sub graphs, and then ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A FPGA-based ROHC decompressor design

    Publication Year: 2012, Page(s):69 - 72
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (120 KB)

    The bandwidth of the wireless channel is the most valuable resources in the whole wireless communication system. In order to utilize the limited wireless resources efficiently, the header's overhead introduced by transmission protocols must be reduced by header compression. Robust Header Compression (ROHC) is a compression scheme aims at providing a compression scheme that has high compression eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic and scalable mapping system for ID/locator separation based future internet architectures

    Publication Year: 2012, Page(s):73 - 76
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (174 KB)

    ID/Locator separation is a clean-slate way of addressing the challenges as mobility, routing scalability, scalable multi-homing, traffic engineering faced by current Internet. By now many ID/Locator separation based future Internet architectures have been proposed by the Internet research community. And it is commonly believed that mapping system plays a very important role in ID/Locator separatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A gray image watermarking algorithm based on DCT

    Publication Year: 2012, Page(s):77 - 79
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (247 KB)

    A robust invisible image watermarking algorithm, which embeds a gray image watermarking in the host image, is put forward in this paper. It overcomes the binary watermark's faults, and can embeds higher b it rate in the host image based on blockwise DCT. The gray image watermark is embedded in the host image by altering the chosen DCT medium frequency coefficients, which is easy to be implemented.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid approach for Chinese word similarity computing based on HowNet

    Publication Year: 2012, Page(s):80 - 83
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (134 KB)

    Word similarity has a wide range of applications, such as machine translation, word sense disambiguation [1, 5], text classification, information extraction and so on. HowNet is an online common-sense knowledge system [12]. It's described by a language called KDML (Knowledge Database Markup Language). In this paper, we use the resources provided by HowNet 2002 [11]... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A improved Elman neural network with application to fault diagnosis of pneumatic valve actuator

    Publication Year: 2012, Page(s):84 - 87
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (109 KB)

    Because of the inherent uncertainty, changeable, nonlinear characteristics, faults diagnosis is a very difficult task in the pneumatic actuator system. In addition, slow convergence speed exists in the original Elman network, so, a model, an improved Elman neural network, was presented to achieve fault diagnosis in this paper. The adjustable weights between the context units and output units are e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A kind of new data processing method suited to the GM (1, 1) model

    Publication Year: 2012, Page(s):88 - 91
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (87 KB)

    In this paper, we analyze the data transformation given in the literature [8] and the methods to evaluate its parameter proposed in the literature [9], and point out it can't be suitable to the sequence whose class ratio sequence is unstable and has the increasing or decreasing trend obviously. According to the variation trend of the class ratio sequence of the original sequence, this paper propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge granularity based heuristic algorithm for attribute reduction

    Publication Year: 2012, Page(s):92 - 95
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (80 KB)

    Rough set theory is a new mathematical tool to deal with the imprecise, incomplete and inconsistent data. Attribute reduction is one of important parts in rough set theory. Currently, lots of literatures have proposed many algorithms for attribute reduction based on similarity. But all these algorithms just consider the connection of condition attributes and decision attributes, and the similarity... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.