Proceedings of the 2016 2nd International Conference on Artificial Intelligence and Industrial Engineering (AIIE 2016)

Session: Software Process and Intelligent Information Systems

20 articles
Proceedings Article

Recognition of Stratum Lithology of Seismic Facies Based on Deep Belief Network

Guohe Li, Yang Zheng, Ying Li, Weijiang Wu, Yunfeng Hong, Xiaoming Zhou
The Deep Belief Network (DBN) is one of the major algorithms of deep learning. It simulates human brain to extract the features efficiently, so that the model has much strong learning ability. Because it is difficult to extract features from a variety of seismic data effectively, multiple sampling points...
Proceedings Article

Detecting System of Collecting and Exhaustion of Chemical Gas in Tank Car

Qing Li, Ligang Luo, Yeqing Sun, Xinhua Xia, Ge Shi, Muda Jin, Renyuan Tong, Zhipeng Zhao
In order to improve the progress of the tank car test , ensure inspector's personnel safety and save resources as well as reduce atmospheric pollution; This paper using a kind of explosion-proof valve which can be controlled by single-chip microcomputer to exhaust and collect the chemical gas in tank...
Proceedings Article

Agent-based Eight Wheel-legged Hybrid Wheelchair Control System

Dongxing Cao, Shanshan Liu, Chao Wang, Minfei Li
Eight wheel-legged hybrid wheelvhair robot motion is the process of multi-agent system collaborating work, in which each module can be viewed as an agent, such as frontal leg mechanism, latter leg mechanism, and seat position and orientation mechanism. Agent has the ability of sensing the environment,...
Proceedings Article

The Design and Realization of University E-voting System

Haibo Zhang, Shuyuan Shang, Wenfeng Zhai, Chunyan Zhang, Ying Zhang
There are many different ways to vote in university daily management process such as title appraisal, research assessment, post evaluation and so on. Due to the variety of voting methods, inconvenience of traditional paper ballots by statistic method and targeting of electronic voting system result in...
Proceedings Article

Design and Implementation of an Intelligent Enter-prise Email Filter Based on Service Plugins

Jing Zhang, Jianmin Yao, Ling Zhang, Qihua Zhang
An enterprise email filtering system is introduced integrating present business systems with service plugins, which connects the email and related business parts as office automation, cloud storage etc.. The user can fulfill his business-related process in the business system with personalized rules....
Proceedings Article

Water Saving Irrigation Monitoring Network Localization Algorithm Based on RSSI Ranging

Bo Chang, Xinrong Zhang, Baoguo Xv
In order to know the soil moisture status of farmland irrigation area, improve the quality of production, for the actual demand of water-saving irrigation monitoring node localization, a weighted centroid localization algorithm of water-saving irrigation monitoring network is proposed based on RSSI ranging....
Proceedings Article

Research on Meat Product Traceability System Based on Two Dimensional Code

Yanbai Wang, Lu Tan
Meat products safety related to the national economy and the people's livelihood, the relationship between the national health. Meat products in the breeding, slaughter, storage and sales process of real-time monitoring and the establishment of meat products safety traceability system is the main means...
Proceedings Article

Research and System Design of Traceability System for Food Safety

Yanbai Wang, Lu Tan
Now the food industry has become more and more customers as the center, so the need for faster response time to deal with food safety incidents. The current food labeling system does not guarantee that the food is authentic, high quality and safety. Good traceability system helps to reduce the production...
Proceedings Article

Online Monitoring of Three Dimensional Ledge Profile of Aluminum Electrolytic Cell

Zhengguang Xu, Liling Song, Mingsheng Ju, Yu Xue
A ledge of certain thickness will be formed on the side wall of the cell during aluminum electrolysis process, its formation has a very important role for the normal production of aluminum electrolysis. First a three-dimensional unsteady heat transfer model with phase transformation is established by...
Proceedings Article

Research of Ontology based Battlefield Scenario Generation Systems

Dongsu Jeong, Dohyun Kim, Yoonho Seo
In battlefield, it is very difficult to consider all conditions such as various battlefield environments & factors. Thus, Friendly forces should satisfy battle tactics, weapon systems and other multiple conditions by responding immediately to battlefield situations. Therefore, in order to suggest the...
Proceedings Article

An Automatic Anti-Attack Scheme for MySQL Database

Qiao Sun, Lanmei Fu, Weihao Qiu, Jiasong Sun
Because of the high-speed, multi-user and multi-thread characteristics of MySQL database, it becomes one of the most popular open-source database. With the rapid development of network technology, SQL attacks against MySQL is also growing, and its security had been paid more and more attention. Due to...
Proceedings Article

Creation of Uyghur Off-Line Handwritten Signature Database

Ahat Yimin, Zulpiya Gheni, Mahpirat, Yunus Aysa, Kurban Ubul
Until now, there has not been any major international effort that aims at comparing different signature verification methods systematically. However, most of the disclosed handwritten signature database is based on Latin, Chinese, Arabic and other languages. So creation of Uyghur off-line signature database...
Proceedings Article

Improving Fault Localization through Fault Propagation Analysis

Zhimin Fang, Danni Li, Shifei Chen, Rong Chen
Lots of studies have been done to pinpoint program faults almost to the exact line where different types of abnormal behaviors occur. Among them there is the promising testing-based fault localization (TBFL) technique, the aim of which is to locate the faults in the program automatically when the program...
Proceedings Article

The Technique to Design Sharing Maintenance Resources among Maintenance Modules

Bo Zhang, Ying Xu, Fusheng Liu, Shouhua Chen, Ying Shen
To promote modularized maintenance force building, the reasons to share resources among maintenance modules and the standards to design share resources are analyzed, based on the kinds of classification result of maintenance modules. The technique and process to design sharing resources are researched,...
Proceedings Article

Research on the Continuous Use Intention of Government Portals Based on Grounded Theory

Zhiwei Tang, Jing Tan, Zepeng Gong, Xiao Han, Seth kwame sakyi Arthur
Since the first investigation of government websites in our country in 2015, problems such as low utilization rate and poor content construction have appeared. To solve the realistic problems and make up on the previous studies, this paper, based on grounded theory, discusses the factors influencing...
Proceedings Article

Trusted Software Behavior Monitoring Model Based on Agent

Caimao Li, Shaofan Chen, Hanwei Wu, Jing Chen
This paper studies trusted model for software behavior monitoring Based on agent. First, it put forward a trust monitoring software behavior framework, then analyzed the dynamic proxy monitoring mechanism, built a dynamic proxy monitoring model based on AOP. Finally, this paper analyzed the monitoring...
Proceedings Article

An Improved Scheme of Privacy Preserving Based on Lagrange Interpolation in Cloud Storage

Yu Jin, Yadan Wang
The increasing maturity of cloud computing has led many companies to store critical information in the cloud. The privacy preserving in the cloud storage still remains major concern because the management of the data might not be fully trustworthy. Privacy preserving brings in concern for data confidentiality....
Proceedings Article

Improved Collision Cryptanalysis of Authenticated Cipher MORUS

Tairong Shi, Jie Guan, Junzhi Li, Pei Zhang
MORUS is an authenticated stream cipher designed by Wu et al. and submitted for the third-round of the CAESAR competition. The collision properties of MORUS-640-128 are studied. We propose the necessary conditions for an internal state collision after two-step update, i.e., the Hamming weight of the...
Proceedings Article

Secure QR Code Scheme Based on Visual Cryptography

Xiaohe Cao, Liuping Feng, Peng Cao, Jianhua Hu
With the wide application of QR code, the security problem of QR code is serious, such as information leakage and data tampering. In order to solve the QR information security problem, this paper proposed a secure QR code schema based on visual cryptography. The QR code is divided into two share images...
Proceedings Article

Standard Grey Potential and Its Application in Grey Target Decision

Aiqing Ruan, Xiaoyong Yin, Qiu Chen, Yinao Wang
Grey target decision-making is one of important problems of decision-making theory. It is critical to express uncertain information effectively and depose them in reasonable and simple way. Firstly this paper makes a brief overview of the existing method for Grey target decision. Then the conception...