Conference
International Conference on Intelligent Computation Technology and Automation
About: International Conference on Intelligent Computation Technology and Automation is an academic conference. The conference publishes majorly in the area(s): Artificial neural network & Algorithm design. Over the lifetime, 3726 publications have been published by the conference receiving 12649 citations.
Papers
More filters
••
12 Jan 2012TL;DR: The concept of IoT, the basic properties and characteristics of IoT were introduced, and the application of IoT was illustrated by its typical use in environment monitoring.
Abstract: Internet of Things (IoT) has been paid more and more attention by the government, academe and industry all over the world because of its great prospect. This article introduced the concept of IoT, the basic properties and characteristics. Then it discussed the key technologies of IoT in detail taking the wire-less sensor network as an example, and the application of IoT was illustrated by its typical use in environment monitoring.
140 citations
••
28 Mar 2011TL;DR: On the basis of introducing the concept of agricultural information management and analyzing the features of Agricultural data, the designing method and architecture of Intelligent Agriculture MIS was discussed in detail and an implementation example of system in agricultural production is given.
Abstract: Agricultural information technology (AIT) has been broadly applied to every aspect of agriculture and has become the most effective means & tools for enhancing agricultural productivity and for making use of full agricultural resources. As an important sub-technology of AIT, the using of technology of Agriculture Information Management directly affects the degree of agricultural informatization and efficiency of agricultural production's decision. In this paper, on the basis of introducing the concept of agricultural information management and analyzing the features of Agricultural data, the designing method and architecture of Intelligent Agriculture MIS was discussed in detail, finally, this paper gives an implementation example of system in agricultural production.
138 citations
••
20 Oct 2008TL;DR: The application of the new generating strategy in PSO can efficiently improve the global searching capability and escape from local minima and could obtain the global optimum solution more probably.
Abstract: This paper presents a new approach via multi-particle swarm optimization (MPSO) to solve the unit commitment (UC) problem. A new strategy which can generate feasible particles and make the search space narrow within the feasible solutions is presented. Some particle swarms are generated by the new strategy, and location optimum solutions are searched in each particle swarm, then a new particle swarm is made up of location optimum solutions, and the global optimum solution is searching in this new particle swarm. The application of the new generating strategy in PSO can efficiently improve the global searching capability and escape from local minima. The simulation results show that the method is more efficient than genetic algorithm, and could obtain the global optimum solution more probably.
132 citations
••
11 May 2010TL;DR: A new prototype system is proposed, in which cloud computing system is combined with Trusted Platform Support Service (TSS) and TSS is based on Trusted platform Module (TPM), in which better effect can be obtained in authentication, role based access and data protection in cloud computing environment.
Abstract: Cloud computing provides people a way to share large mount of distributed resources belonging to different organizations. That is a good way to share many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. In this paper, we analyze some security requirements in cloud computing environment. Since the security problems both in software and hardware, we provided a method to build a trusted computing environment for cloud computing by integrating the trusted computing platform (TCP) into cloud computing system. We propose a new prototype system, in which cloud computing system is combined with Trusted Platform Support Service (TSS) and TSS is based on Trusted Platform Module (TPM). In this design, better effect can be obtained in authentication, role based access and data protection in cloud computing environment.
116 citations
••
11 May 2010TL;DR: Categorizes, compares, and summarizes the data set, algorithm and performance measurement in almost all published technical and review articles in automated accounting fraud detection, finding that model detecting is better than auditor detecting rate without assisting.
Abstract: This survey paper categorizes, compares, and summarizes the data set, algorithm and performance measurement in almost all published technical and review articles in automated accounting fraud detection. Most researches regard fraud companies and non-fraud companies as data subjects, Eigenvalue covers auditor data, company governance data, financial statement data, industries, trading data and other categories. Most data in earlier research were auditor data; Later research establish model by using sharing data and public statement data. Company governance data have been widely used. It is generally believed that ratio data is more effective than accounting data; Seldom research on time Series Data Mining were conducted. The retrieved literature used mining algorithms including statistical test, regression analysis, neural networks, decision tree, Bayesian network, and stack variables etc.. Regression Analysis is widely used on hiding data. Generally the detecting effect and accuracy of NN are superior to regression model. General conclusion is that model detecting is better than auditor detecting rate without assisting. There is a need to introduce other algorithms of no-tag data mining. Owing to the small size of fraud samples, some literature reached conclusion based on training samples and may overestimated the effect of model.
102 citations