Proceedings of the 2016 2nd International Conference on Artificial Intelligence and Industrial Engineering (AIIE 2016)
Session: Software Process and Intelligent Information Systems
20 articles
Proceedings Article
Recognition of Stratum Lithology of Seismic Facies Based on Deep Belief Network
Guohe Li, Yang Zheng, Ying Li, Weijiang Wu, Yunfeng Hong, Xiaoming Zhou
The Deep Belief Network (DBN) is one of the major algorithms of deep learning. It simulates human brain to extract the features efficiently, so that the model has much strong learning ability. Because it is difficult to extract features from a variety of seismic data effectively, multiple sampling points...
Proceedings Article
Detecting System of Collecting and Exhaustion of Chemical Gas in Tank Car
Qing Li, Ligang Luo, Yeqing Sun, Xinhua Xia, Ge Shi, Muda Jin, Renyuan Tong, Zhipeng Zhao
In order to improve the progress of the tank car test , ensure inspector's personnel safety and save resources as well as reduce atmospheric pollution; This paper using a kind of explosion-proof valve which can be controlled by single-chip microcomputer to exhaust and collect the chemical gas in tank...
Proceedings Article
Agent-based Eight Wheel-legged Hybrid Wheelchair Control System
Dongxing Cao, Shanshan Liu, Chao Wang, Minfei Li
Eight wheel-legged hybrid wheelvhair robot motion is the process of multi-agent system collaborating work, in which each module can be viewed as an agent, such as frontal leg mechanism, latter leg mechanism, and seat position and orientation mechanism. Agent has the ability of sensing the environment,...
Proceedings Article
The Design and Realization of University E-voting System
Haibo Zhang, Shuyuan Shang, Wenfeng Zhai, Chunyan Zhang, Ying Zhang
There are many different ways to vote in university daily management process such as title appraisal, research assessment, post evaluation and so on. Due to the variety of voting methods, inconvenience of traditional paper ballots by statistic method and targeting of electronic voting system result in...
Proceedings Article
Design and Implementation of an Intelligent Enter-prise Email Filter Based on Service Plugins
Jing Zhang, Jianmin Yao, Ling Zhang, Qihua Zhang
An enterprise email filtering system is introduced integrating present business systems with service plugins, which connects the email and related business parts as office automation, cloud storage etc.. The user can fulfill his business-related process in the business system with personalized rules....
Proceedings Article
Water Saving Irrigation Monitoring Network Localization Algorithm Based on RSSI Ranging
Bo Chang, Xinrong Zhang, Baoguo Xv
In order to know the soil moisture status of farmland irrigation area, improve the quality of production, for the actual demand of water-saving irrigation monitoring node localization, a weighted centroid localization algorithm of water-saving irrigation monitoring network is proposed based on RSSI ranging....
Proceedings Article
Research on Meat Product Traceability System Based on Two Dimensional Code
Yanbai Wang, Lu Tan
Meat products safety related to the national economy and the people's livelihood, the relationship between the national health. Meat products in the breeding, slaughter, storage and sales process of real-time monitoring and the establishment of meat products safety traceability system is the main means...
Proceedings Article
Research and System Design of Traceability System for Food Safety
Yanbai Wang, Lu Tan
Now the food industry has become more and more customers as the center, so the need for faster response time to deal with food safety incidents. The current food labeling system does not guarantee that the food is authentic, high quality and safety. Good traceability system helps to reduce the production...
Proceedings Article
Online Monitoring of Three Dimensional Ledge Profile of Aluminum Electrolytic Cell
Zhengguang Xu, Liling Song, Mingsheng Ju, Yu Xue
A ledge of certain thickness will be formed on the side wall of the cell during aluminum electrolysis process, its formation has a very important role for the normal production of aluminum electrolysis. First a three-dimensional unsteady heat transfer model with phase transformation is established by...
Proceedings Article
Research of Ontology based Battlefield Scenario Generation Systems
Dongsu Jeong, Dohyun Kim, Yoonho Seo
In battlefield, it is very difficult to consider all conditions such as various battlefield environments & factors. Thus, Friendly forces should satisfy battle tactics, weapon systems and other multiple conditions by responding immediately to battlefield situations. Therefore, in order to suggest the...
Proceedings Article
An Automatic Anti-Attack Scheme for MySQL Database
Qiao Sun, Lanmei Fu, Weihao Qiu, Jiasong Sun
Because of the high-speed, multi-user and multi-thread characteristics of MySQL database, it becomes one of the most popular open-source database. With the rapid development of network technology, SQL attacks against MySQL is also growing, and its security had been paid more and more attention. Due to...
Proceedings Article
Creation of Uyghur Off-Line Handwritten Signature Database
Ahat Yimin, Zulpiya Gheni, Mahpirat, Yunus Aysa, Kurban Ubul
Until now, there has not been any major international effort that aims at comparing different signature verification methods systematically. However, most of the disclosed handwritten signature database is based on Latin, Chinese, Arabic and other languages. So creation of Uyghur off-line signature database...
Proceedings Article
Improving Fault Localization through Fault Propagation Analysis
Zhimin Fang, Danni Li, Shifei Chen, Rong Chen
Lots of studies have been done to pinpoint program faults almost to the exact line where different types of abnormal behaviors occur. Among them there is the promising testing-based fault localization (TBFL) technique, the aim of which is to locate the faults in the program automatically when the program...
Proceedings Article
The Technique to Design Sharing Maintenance Resources among Maintenance Modules
Bo Zhang, Ying Xu, Fusheng Liu, Shouhua Chen, Ying Shen
To promote modularized maintenance force building, the reasons to share resources among maintenance modules and the standards to design share resources are analyzed, based on the kinds of classification result of maintenance modules. The technique and process to design sharing resources are researched,...
Proceedings Article
Research on the Continuous Use Intention of Government Portals Based on Grounded Theory
Zhiwei Tang, Jing Tan, Zepeng Gong, Xiao Han, Seth kwame sakyi Arthur
Since the first investigation of government websites in our country in 2015, problems such as low utilization rate and poor content construction have appeared. To solve the realistic problems and make up on the previous studies, this paper, based on grounded theory, discusses the factors influencing...
Proceedings Article
Trusted Software Behavior Monitoring Model Based on Agent
Caimao Li, Shaofan Chen, Hanwei Wu, Jing Chen
This paper studies trusted model for software behavior monitoring Based on agent. First, it put forward a trust monitoring software behavior framework, then analyzed the dynamic proxy monitoring mechanism, built a dynamic proxy monitoring model based on AOP. Finally, this paper analyzed the monitoring...
Proceedings Article
An Improved Scheme of Privacy Preserving Based on Lagrange Interpolation in Cloud Storage
Yu Jin, Yadan Wang
The increasing maturity of cloud computing has led many companies to store critical information in the cloud. The privacy preserving in the cloud storage still remains major concern because the management of the data might not be fully trustworthy. Privacy preserving brings in concern for data confidentiality....
Proceedings Article
Improved Collision Cryptanalysis of Authenticated Cipher MORUS
Tairong Shi, Jie Guan, Junzhi Li, Pei Zhang
MORUS is an authenticated stream cipher designed by Wu et al. and submitted for the third-round of the CAESAR competition. The collision properties of MORUS-640-128 are studied. We propose the necessary conditions for an internal state collision after two-step update, i.e., the Hamming weight of the...
Proceedings Article
Secure QR Code Scheme Based on Visual Cryptography
Xiaohe Cao, Liuping Feng, Peng Cao, Jianhua Hu
With the wide application of QR code, the security problem of QR code is serious, such as information leakage and data tampering. In order to solve the QR information security problem, this paper proposed a secure QR code schema based on visual cryptography. The QR code is divided into two share images...
Proceedings Article
Standard Grey Potential and Its Application in Grey Target Decision
Aiqing Ruan, Xiaoyong Yin, Qiu Chen, Yinao Wang
Grey target decision-making is one of important problems of decision-making theory. It is critical to express uncertain information effectively and depose them in reasonable and simple way. Firstly this paper makes a brief overview of the existing method for Grey target decision. Then the conception...