Proceedings of the AASRI Winter International Conference on Engineering and Technology (AASRI-WIET 2013)
Session: Simulation, Modeling and Visualization
25 articles
Proceedings Article
The Research on Evaluation of Areal Sweep Efficiency in Low Permeability Reservoir with Streamline Numerical Simulation Method
Renyi Cao, Yanbin Zhou, Qi Xiong
Since nature fracture develops in the low permeability reservoir, the anisotropy has a great impact on areal sweep efficiency of water flooding, however most of the current methods don't consider and describe the influence of anisotropy. This paper introduces the frontal water equisaturation interface,...
Proceedings Article
Simulation and Analysis of 75mm Gas-liquid Cyclone Flow Field
Liang Ma, Pen Qian, Jingping Wu, Zhaoyuan Bai, Qiang Yang
The inside flow field of a gas–liquid cyclone separator with a diameter of 75 mm was simulated with the computational fluid dynamics (CFD). Results showed that a variation of inlet flow rate significantly changes the inside flow field structure and affects separation efficiency. The axial velocity of...
Proceedings Article
Decision Tree Analysis of Job Stress and Satisfaction of Foreign Construction Laborers in Korea
Yoonseok Shin
With the aging of the existing construction workforce and the reluctance of young manpower to enter the construction field due to it being one of the so-called “3D” (Dirty, Dangerous and Difficult) industries, the number of foreign laborers employed in Korean construction industry has been on the rise....
Proceedings Article
Simulation of Microbial Depolymerization Processes of Polyethylene Glycol based on Degradation Rate after Cultivation for Two and Four Days
Masaji Watanabe, Fusako Kawai
Microbial depolymerization processes of polyethylene glycol are analyzed by numerical simulation. The weight distribution after cultivation of microorganisms for two and four days was used to solve an inverse problem for the molecular factor of the degradation rate. Numerical results are compared with...
Proceedings Article
Numerical Study of Gas-liquid Micro-cyclone Separator Flow Field
Peng Qian, Liang Ma, Yi Liu, Yanhong Zhang
Based on Reynolds stress model (RSM), the three-dimensional flow field of a gas–liquid micro-cyclone separator with a diameter of 75 mm have been simulated with the computational fluid dynamics (CFD). The distribution of gas tangential velocity of the inside flow field and its effects on the movement...
Proceedings Article
Security in PKI/PMI-Based Workflow Security Model
Zhiqi Xu, Chaohui Jiang
In consideration of simple workflow security model, there are some defects such as simple authentication, inflexible authorization and absent of audit, etc. However, based on the intensive research of security needs of WfMS, and by involving PKI/PMI technology, an enhanced workflow security model can...
Proceedings Article
Research on Comprehensive Evaluation of Enterprise's Technological Innovation Talent Team by Using Analytic Network Process (ANP) and Grey Related Analysis
Ying Wang, Yan Liu
The source of innovation is the technological talent .This paper established the indicator system of evaluation of enterprise's technological innovation talent team . It used ANP to determine the weight of indicators and grey related analysis to determine the rank ordering of enterprises. It provides...
Proceedings Article
Multiple Objects Detection Based on Background Subtraction and Gaussian Pyramid
Liang Jiang, Yong-zhao Zhan
For the multi-object detection problems with complex background, a method which combines background subtraction with Guassian pyramid on objects detection is presented. The method detects the whole object with taking samples from the objects with Guassian pyramid, building background models, extracting...
Proceedings Article
Online Optimization of Industrial FCC Unit Based on PSO Algorithm and RBF Neural Network
Yi Deng, Qingyin Jiang, Zhikai Cao
The Particle Swarm Optimization (PSO) and the Genetic Algorithm (GA) are two of the most powerful methods to solve the unconstrained and constrained global optimization problems. In this paper, these two methods are briefly introduced firstly, and then the online rolling optimization of industrial FCC...
Proceedings Article
Tri-plane Representation and Analysis in Transform Coding
Feifei Zhou, Rui Yang, Bo Li
Representation and coding of transform coefficients is a key factor in image compression. In this work, we introduce a coefficient representation model, called tri-plane. The proposed method is able to bring more kinds of symbols and significance states, which deeply develops the correlations among transform...
Proceedings Article
Research and Implements of Learning Process Model Oriented Workflow
Linglin Li, Jinpeng Tang
In order to integrate e-learning into the existing work flow management system, we proposed a learning process model oriented workflow. This model is based on WfMC (Workflow Management Coalition) Xml Process Description Language-XPDL standard, combining IMS Learning design specification. The model can...
Proceedings Article
Research of Pseudo Random Noise Code and New Code Construction
Ruizhu He, Junxia Cui
The pseudo-random code is an important part of the satellite navigation and positioning signals, its performance directly affects the accuracy of positioning system. Especially, in navigation and communication integrated system, the system's anti-jamming, anti-multipath fading, anti-intercepted, anti-multiple...
Proceedings Article
A Simple and Efficient Collision Detection Algorithm and its Implementation
Yanpeng Sun
Border collision is an important function in the game, but the existing methods, like bounding box, octree, etc. are complex and they require extensive scene statistics for support. However, XNA-based 3D racing game achieved a simple and effective collision detection algorithm, which could properly resolve...
Proceedings Article
An Improvement on C-V Model
Minggang Jing, Jitao Wu, Xiaotao Wang
C-V model has the advantage of being able to detect boundaries of objects that are not defined by gradient. However, when detecting these types of edges, the C-V model only considers the average value of each region without local information. As a result, its segmentation result may exist errors, when...
Proceedings Article
Vehicle Detection in Video Based on the Framework of Kernel Density Estimation
Dan Yang, Yantao Chen, Richen Liu
This paper introduced a method of background subtraction model for detecting vehicles in video, the model was based on the framework of the kernel density estimation. To compute the adjacent frame subtraction on the spatio-temporal by the median filter, when the median value is 0, keep the background...
Proceedings Article
Real-time Multi-channel Vision Processing Based on DSP&FPGA
Yu-Bin Zhou, Yu-Ning Yang
In order to realize digital image sequence processing for multi-channel vision in real-time simultaneously, a hardware system with FPGA&DSP is designed. In the system, two ZBT SRAM chips are used as the input and output cache for high data transferring. A FPGA chip is responsible for the core logic controlling...
Proceedings Article
A New Early Termination Strategy for QC-LDPC Codes Based on the Layered Message Passing Decoding
Zhejun Zhang, Guanghui He, Jun Ma
Low-density parity-check (LDPC) codes are one of the most popular linear block codes have ever been used in the communication system. The standard two-phase message passing decoding (TPMPD) algorithm and the layered message-passing decoding (LMPD) algorithm are widely used in LDPC decoder. However, the...
Proceedings Article
Application of BP Neural Networks to Weigh-in-Motion of Vehicles
Zhifeng Zhou
BP neural networks are employed to estimate the static axle weight of moving vehicles. On the basis of analyzing the characteristics of dynamic tire force, the influence of dynamic tire force is briefly introduced on the weighing accuracy. The three-layer BP neural networks are designed to process the...
Proceedings Article
Study of Network Traffic Analysis Model
Xiaoling Tan, Zefu Tan, Weijian Fang
Network traffic analysis model is the base of traffic predication and network evaluation. The model is improving when the knowledge about the traffic features being abundant. According to the different features, the paper introduced the typical models in modern network application, and studied on their...
Proceedings Article
Study on Wireless Sensor Network Localization Technology Based on DV-Hop Algorithm
Yong Yang, Xinliang Zhang, Xiucai Guo
DV-Hop algorithm is one of the important range-free localization algorithms. According to the localization principle of the DV-Hop algorithm and the defect of wireless sensor networks, this paper proposes three improvements including the estimation of average single hop distance, generalizing average...
Proceedings Article
The Application of Improved Self-adaptive Genetic Algorithm in the Distribution Network Reconfiguration
Siwei Wei, Ruoxi Wang
This paper proposes a kind of encoding method with the loop switch number as gene and the number of branches of the systematic loop as the length of the chromosome, greatly shortening the length of the chromosome. And this paper also takes a kind of effective means in genetic operation, which is eliminating...
Proceedings Article
The Game Research of the Public Crisis Prevention
Miangui Cheng
The disposal of public crisis prevention problem was researched, and we established the game model between local government and inspection department. From the point of profit maximization, the operation efficiency of local government and inspection department was analyzed. Through the results, got from...
Proceedings Article
State Estimation of the Underwater Moving Target Based on Multi-Sensor Information Fusion
Zheng Tang, Chao Sun, Zong-wei Liu, Di Meng
The Kalman filter has been widely used in state estimation of moving targets. Furthermore, the well-known conventional Kalman filter requires an accurate system model and exact prior information. However, the nonlinearity, dynamic and randomicity in the underwater environment result in uncertainty and...
Proceedings Article
Formal Analysis of the Kerberos Authentication Protocol with PVS
Guodong Sun, Shenghui Su
Formal methods are one of the most important technologies to analyze and design authentication protocols. Kerberos protocol is a famous identity authentication protocol and it is widely used in the network. Although some fruitful formal verifications of the Kerberos protocol have been implemented, there...
Proceedings Article
A Telephone Speech Corpus of China’s Minority languages for Automatic Language Identification
Xiuhua Zeng, Jian Yang, Libo Zuo, Yonghua Xu
Research in language identification require corpus of multi-languages speech data to capture the distinguishable information within and across languages. In the past few decades, many statistical approaches to language identification have been developed based on two common and public-domain corpora which...