scispace - formally typeset
Search or ask a question
Conference

International Conference on Intelligent Computation Technology and Automation 

About: International Conference on Intelligent Computation Technology and Automation is an academic conference. The conference publishes majorly in the area(s): Artificial neural network & Algorithm design. Over the lifetime, 3726 publications have been published by the conference receiving 12649 citations.

Papers published on a yearly basis

Papers
More filters
Proceedings ArticleDOI
12 Jan 2012
TL;DR: The concept of IoT, the basic properties and characteristics of IoT were introduced, and the application of IoT was illustrated by its typical use in environment monitoring.
Abstract: Internet of Things (IoT) has been paid more and more attention by the government, academe and industry all over the world because of its great prospect. This article introduced the concept of IoT, the basic properties and characteristics. Then it discussed the key technologies of IoT in detail taking the wire-less sensor network as an example, and the application of IoT was illustrated by its typical use in environment monitoring.

140 citations

Proceedings ArticleDOI
Duan Yan-e1
28 Mar 2011
TL;DR: On the basis of introducing the concept of agricultural information management and analyzing the features of Agricultural data, the designing method and architecture of Intelligent Agriculture MIS was discussed in detail and an implementation example of system in agricultural production is given.
Abstract: Agricultural information technology (AIT) has been broadly applied to every aspect of agriculture and has become the most effective means & tools for enhancing agricultural productivity and for making use of full agricultural resources. As an important sub-technology of AIT, the using of technology of Agriculture Information Management directly affects the degree of agricultural informatization and efficiency of agricultural production's decision. In this paper, on the basis of introducing the concept of agricultural information management and analyzing the features of Agricultural data, the designing method and architecture of Intelligent Agriculture MIS was discussed in detail, finally, this paper gives an implementation example of system in agricultural production.

138 citations

Proceedings ArticleDOI
20 Oct 2008
TL;DR: The application of the new generating strategy in PSO can efficiently improve the global searching capability and escape from local minima and could obtain the global optimum solution more probably.
Abstract: This paper presents a new approach via multi-particle swarm optimization (MPSO) to solve the unit commitment (UC) problem. A new strategy which can generate feasible particles and make the search space narrow within the feasible solutions is presented. Some particle swarms are generated by the new strategy, and location optimum solutions are searched in each particle swarm, then a new particle swarm is made up of location optimum solutions, and the global optimum solution is searching in this new particle swarm. The application of the new generating strategy in PSO can efficiently improve the global searching capability and escape from local minima. The simulation results show that the method is more efficient than genetic algorithm, and could obtain the global optimum solution more probably.

132 citations

Proceedings ArticleDOI
11 May 2010
TL;DR: A new prototype system is proposed, in which cloud computing system is combined with Trusted Platform Support Service (TSS) and TSS is based on Trusted platform Module (TPM), in which better effect can be obtained in authentication, role based access and data protection in cloud computing environment.
Abstract: Cloud computing provides people a way to share large mount of distributed resources belonging to different organizations. That is a good way to share many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. In this paper, we analyze some security requirements in cloud computing environment. Since the security problems both in software and hardware, we provided a method to build a trusted computing environment for cloud computing by integrating the trusted computing platform (TCP) into cloud computing system. We propose a new prototype system, in which cloud computing system is combined with Trusted Platform Support Service (TSS) and TSS is based on Trusted Platform Module (TPM). In this design, better effect can be obtained in authentication, role based access and data protection in cloud computing environment.

116 citations

Proceedings ArticleDOI
11 May 2010
TL;DR: Categorizes, compares, and summarizes the data set, algorithm and performance measurement in almost all published technical and review articles in automated accounting fraud detection, finding that model detecting is better than auditor detecting rate without assisting.
Abstract: This survey paper categorizes, compares, and summarizes the data set, algorithm and performance measurement in almost all published technical and review articles in automated accounting fraud detection. Most researches regard fraud companies and non-fraud companies as data subjects, Eigenvalue covers auditor data, company governance data, financial statement data, industries, trading data and other categories. Most data in earlier research were auditor data; Later research establish model by using sharing data and public statement data. Company governance data have been widely used. It is generally believed that ratio data is more effective than accounting data; Seldom research on time Series Data Mining were conducted. The retrieved literature used mining algorithms including statistical test, regression analysis, neural networks, decision tree, Bayesian network, and stack variables etc.. Regression Analysis is widely used on hiding data. Generally the detecting effect and accuracy of NN are superior to regression model. General conclusion is that model detecting is better than auditor detecting rate without assisting. There is a need to introduce other algorithms of no-tag data mining. Owing to the small size of fraud samples, some literature reached conclusion based on training samples and may overestimated the effect of model.

102 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
2020126
201970
201831
201796
2015256
2014217