Proceedings of the 2015 International Conference on Automation, Mechanical Control and Computational Engineering

+ Advanced search
421 articles

Collision Based Adaptive Time Synchronization Verification Method for Ocean Sensor Networks

Ying Guo, Haiwei Cui
Time synchronization is a critical issue for ocean sensor networks, existing time synchronization algorithms focus on the calculation of clock skew and offset, the studies on time synchronization verification is limited. We propose a collision based adaptive time synchronization verification method for...

Research on Continuous Path Guidance Method Based on the City Point of Interest

Danping Wang, Kunyuan Hu, Xiaowei Han
For existing path algorithms cannot achieve more continuous search, we propose the ASSA algorithms to let the travellers access to multiple points of interest in a trip. The ASSA algorithm has optimized the network structure, greatly reducing the amount of data access, and through temporal reasoning...

Research on Development and Model of Intelligent Transportation Systems

Danping Wang, Kunyuan Hu, Xiaowei Han
With the rapid development of economy and society, Intelligent Transport Systems also known as the road traffic information communication system, based on systems engineering, electronics, communications, information, and other high-tech, and have penetrated into the new transportation system of aviation,...

The Study on the Piano Sound Control and the Computer Simulation

Qihe Zhang
The art is the heart of desire, the pursuit of truth, kindness and beauty, and the love of life. With the gradual improvement of the material life, people, especially in the field of mental pursuit of beauty are becoming higher. As the king of musical instruments piano was first popular and accepted,...

Study on Solution of Non-homogeneous Linear Equation based on Ordinary Differential Equation Driving

Jing Zhang
This paper introduces two orders Runge-Kutta ordinary differential solution drive in the process of solving the non-homogeneous, and uses MATLAB software to program the algorithm. This paper uses ordinary differential solution method of M function to solve non-homogeneous equation. Through the calculation...

Data Signal Detection of RUP View Online Interchange Based on Micro Message Platform

Binghui Liang
In recent years, due to good user experience, open public platform and innovative communication forms, WeChat quickly goes into the people's work and life, much favored by college students. This paper introduces WeChat public platform into the process of ideological and political education, and establishes...

Distribution Curve of Three-dimensional Space of Using Frequency Based on the Interface of Java3D and MySQL Database

Mei Xu
The difference of national minority has not been in-depth comparative study by circles in the oral English grammar, in which the differences of indicator markers are more prominent. In order to research on the problem of using minority mandarin indication mark, this paper designs the use frequency of...

Research on the University Network Information Security Risk Management Model Based on the Fuzzy Sets

Cai-qiao Huo, Li-zhuang Meng, Kai Chen
Due to the evolution and widespread about the Internet, organizations are easier to attack on the information technology systems. These are caused by data loss and change and those insecurity impact resistant services and business’ running. Then, we use a way that is the management of the information...

Study of the Best Checkpoint Interval in the Distributed Simulation System Based on Virtualization Technology

Yu Ge, Yunfei Yang, Chengwen Zhu, Miao Song, Xiaoyan Cai, Yan Zheng
In order to keep the system’s transfer, every once in a while, it was needed to grab a snapshot for the VM of all the nodes which were in the process of the distributed simulation system. It is very important to set the reasonable checkpoint interval for optimizing the system’s average utilization rate....

Optimization design of effective management model of large construction project

Xiao-li Liu
in the management process of large construction projects, the related factors and the influenced parameters are various. A mathematical model of construction project management is complex, it is difficult to form effective project management measures. In the traditional architectural engineering project...

Simulation and analysis of Hotel optimal guest stream evacuation model in the tourist season

Bo Wen
During calculation process of hotel guest stream evacuation in the tourist season, the genetic algorithm is used to constantly generate optimal method, based on the theory of "survival of the fittest" to operate unlimited reproduction for the better method, which makes the algorithm premature convergence,...

Risk Management Theory Application in national information security risk control—Analysis of the relationship between classified protection and risk management

Maning Bi, Yuan Jing
The risk management theory has been applied in information technology area for many years. And it has been regarded as an effective information security solution and approach. With the full expansion of information classified security protection implementation, persons are puzzled by the relationship...

Application of J48 Decision Tree Classifier in Emotion Recognition Based on Chaos Characteristics

Chun yan Nie, Ju Wang, Fang He, Reika Sato
Physiological signals are external manifestations of emotions. Mood swings can be expressed by the change of physiological signals. Because these performances are not controlled by the individual subjective consciousness, the conclusions are more objective and true. The method based on the statistical...

Discussion on reaction mechanism of enoxacine-terbium complex

Weiwei Bian
In the buffer solution of pH=5.80, bilirubin can remarkably reduce the fluorescence intensity of the enoxacine - terbium (Tb3+) complex at =545nm and the reduced fluorescence intensity of Tb3+ ion is in proportion to the concentration of bilirubin. The influential factors were investigated. The reducement...

Semi-blind Channel Estimation for MIMO-OFDM Systems Based on Received Signal Reconstruction

Weijia Cui, You Zhou
Blind channel estimation for MIMO-OFDM systems was discussed, and a subspace based blind channel estimation algorithm by re-constructing the received signal and its simplified one were proposed. The algorithm changed the channel matrix of the transfer function into a block Toeplitz high matrix exploiting...

Research on Collision Detection Algorithm of Tankin Virtual Battlefield

Aobing Guo, Qinzhao Wang, Xiaolong Li
In order to solve the contradiction between real-time and accuracy of collision detection in virtual battlefield, we divided the terrain into three types according to its average curvatureand different matching algorithms were used in different types of terrain. In virtual battlefield, collision detection...

Study on the method of test and control system for low speed wind tunnel

Yueming Yang, Kai Luo, Xingrong Bao, Yuankai Li
The wind tunnel test control is the key to the wind tunnel tests. This article Studied 0.75m × 0.75m With backflow wind tunnel measurement and control technology, through the transformation of the wind tunnel motor to improve the stability and uniformity of the airflow and reduce turbulence degree; through...

Numerical Investigation of Hypersonic Slip Flow

Kai Luo, Yueming Yang, Hua Liu, Xuewei Xin, Xuewei Liu
Rarefied gas effects have to be considered when doing the research and design of hypersonic flight vehicle in near space, in which accurate prediction of flow field and surface properties such as pressure, shear stress and heat flux are needed. Research on the mechanism of hypersonic slip flow must consist...

The Population Predicting Based on the Curve Fitting Least Square Method

Lili He, Zhao Jin
In various scientific experiments, experimenter always get some discrete data, to estimate the function with the original rules from these data, interpolation is a method for dealing with this kind of problem.But when the discrete data is too much,it can be caused serious distortion which is called Runge...

Theoretical and Experimental Study of the Air Flapper Valve Used for the Pulse Combustor

Zhiren Yin, Lijun Yang
The basic process of air flapper valve was analyzed and the mass flow rate model of air flapper valve was established. The loss of flow through the air valve was considered. The opening process of the flapper was modeled with a non-viscous model, and the closing process was modeled with a viscous one....

Study on Trust Model of Internetware System

Tao He, Yong Wei, Huazhong Li, Lina Fang, Shouxiang Xu, Defen Zhang, Junqiang Liu
We take the overall architecture of internetware on-line evolution model as basic, and study on trust metric model of the software in internetware system. In view of the not accurate results from the rough and existing trust metric model granularity, this paper proposed a multi service and hierarchical...

Construction of evaluation system based on Collaborative Innovation Perspective on the function national of high-tech zones

Wei Wang, Shan Xiong, Yong Zhang
Dynamic reasonable and objective evaluation for the development status of high-tech zone will grasp the development trend of high-tech zone accurately and have a very positive effect on promoting adjustment policies. Through the use of AHP, building a high-tech zone evaluation system from the perspective...

Construction of Evaluation Index System of supply logistics collaboration based on Supply-Hub

Jun Zou
At present, theoretical studies on collaboration evaluation of supply logistics based on Supply-Chain were very few, while almost no researches were on its index system. The paper took supply logistics system based on Supply-Hub as research object, built up a framework of performance evaluation system,...

Research on data mining methods of potential risk for large cloud computing network

Chen Wang
During the study process of mining methods for data of potential risk in large cloud computing network, when mining data of risk with traditional methods, principal element features and context features of data have significant fluctuations, which results in inaccurate data mining results. For this,...

Design of Analysis Platform Used for Studying Soft Error Characteristic of 3D SRAM

Peng Li, MinXuan Zhang, ZhenYu Zhao, Quan Deng
This paper designs a novel 3D SRAM soft error analysis platform. It is used for studying the soft error characteristic of 3D SRAM stacked by multi dies and guiding the radiation hardened design for 3D SRAM. This platform integrates simulation tools including Geant4, TCAD and Nanosim, data recording and...

A Semantic Approach towards Multi-Agent Choreography in Clinical Decision Support

Haifeng Chen, Liang Xiao, Jingbai Tian
A distributed environment, medical decision-making process is becoming increasingly complex, and it usually needs more medical roles to complete the diagnosis and treatment of one complex disease. However, these medical roles typically distribute in different work environments, so the organization and...

Real-time study of remote highway snow warning technology

Huaqi Zhao, Changyong Xiang, Guojing Li, Bin Wang, Shijie Zhang, Dazhi Wen
Snowfall directly affects the traffic safety and a lot of accidents happened every year because of the snowfall. If the traffic department can timely detect the thickness of the snow on the highway and clear the snow in time, the rate of traffic accident will reduce and won’t make much trouble for people....

Effects of Soft Information Quantization Precision on LDPC Performance for NAND Flash Application

Changlai Song, Haozhi Ma, Liyang Pan
(17664, 16512) LDPC code is simulated under AWGN channel. The simulation is led on FPGA platform, with Layered Normalized BP-Based decoding algorithm. The shifting of measurement point is under consideration, where the soft information for decoding is inaccurate. LDPC performance under different situations...

Computer vision feature recognition method based on Improved Wavelet arithmetic

Lili Liu
in the process of studying on computer vision feature recognition method, with the current algorithm for feature recognition, the amount of calculation is large, and noise is strong, recognition rate is low. For this, a computer vision feature recognition method based on Improved Wavelet arithmetic is...

Study on design method for anti-collision in large scale network control software

HuanLiang Li
the anti-collision problem of large network control software is studied. With the increase of the control task amount of large network control software, the randomness for network control is enhanced, the traditional anti-collision design algorithm is hard to establish the accurate anti-collision model...

Simulation on the Effective Detection Model for Network Differentiation Intrusion

Chun Liu
The problem of network differentiation intrusion is researched. Network intrusion has the characteristics of complex changes such as concealed, randomness, difference and abruptness. Traditional method cannot describe the change rules, leading to low correct rate of detection. For this, a detection method...

Living Voodoo Priest Huoshan Dendrobium Stem Cultivation Technology Research

Guiqi Le, Ningfang Liu, Jiachun Zuo
Greenhouse cultivated huoshan dendrobium stem, compared with wild huoshan dendrobium stem, has obvious difference whether towards its appearance and internal quality. Exploring experiment results on somaclone, planting seedlings, living voodoo priest engraftment technology, and outdoor cultivation huoshan...

Research on the Dispersant Effectiveness with the Action of Waves

Qiaomin Wang, Bing Sun, Zhiyu Yan, Mi Wend, Hui Liu, Ying Yu
Oil spill dispersant, as a kind of effective measures to deal with oil spill, has been widely used, but the effectiveness still needs more investigations. In this paper, what factors influenced the dispersant effectiveness was studied in the tank with the action of waves of different time intervals,...

Design and Research on Examination Performance Assessment System for College Student Course

Shuwen Chen
In the process of designing college student course examination performance assessment system, with the current algorithm to design examination performance assessment system, only based on the theoretical view to assess the quality of qualitative course examination scores, results in the passive situation...

Structure Analysis of Transmitter Coil in Electromagnetic Launch Interceptors

Liangming Zhu, Yanjie Cao, Weibo Li
This paper introduces the composition and working principle of, electromagnetic emission interceptors, establishes the three-dimensional model of transmitter coil, analyzes magnetic - structure coupling of the transmitter coil, gives the transmitter coil magnetic field and stress field distribution and...

A Label Extended Semi-supervised Learning Method for Drug-target Interaction Prediction

Jie Zhao, Zhi Cao
Computational methods for predicting the new drug-target interactions are more efficient that those experimental methods. Many machine learning based methods have been proposed but most of them suffer from false negative problem. In this paper we extend the original label matrix and adopt weighted lose...

Study on the Impact of Big Data on Radio and Television Ratings

Jianping Chai, Xingyi Pan, Fulian Yin, Juanfang Chai
For problems, such as the low accuracy and easily polluted data of the traditional sampling ratings index calculation method, we conduct research on the ratings of big data. Firstly, we argue the effect of the amount of data on the accuracy of the ratings, and do experiments using real data. By sampling...

The Method of Multi-attribute Target Recognition Based On Laser Detection

Jian-biao Chen, Hua-yan Sun, Yong-hui Zheng
Ideal result of target recognition can’t be obtained just with single attribute. In order to improve the performance of target recognition and reflect the physical attributes of the target, some attributes are extracted from the high range resolution profile of the unknown target to form an multi-attribute...

A Fusion Method of Rocket Launchers’ Testing Information Based on the Improved D-S Evidence Theory

Yi-bin Zhao, Zheng-yu Zhao, Xiao-chen Xing, Guo-feng Xu
In order to make more effective decision level analysis on the testing information of rocket launchers, this paper analyzes the existing disadvantages of evidence theory, draws into the concept of weight coefficient integrated with existing improved method, proposes new improvement of the combination...

A Precise Model of TSV Parasitic Capacitance Considering Temperature for 3D IC

Quan Deng, Min-Xuan Zhang, Zhen-Yu Zhao, Peng Li
As the technology of three dimension integrated circuit (3D IC) develop quickly, through silicon via (TSV) plays a basic and important role. In consideration of real working environment, factors as temperature and working voltage are studied by TCAD simulator. And the contribution of physical sizes and...

A Feature Extraction Method for Hardware Trojans Detection

Zhixun Zhao, Lin Ni, Shaoqing Li, Yubo Shi
Recently Hardware Trojan has been widely studied for its threat to IC security. The method based on power side-channel information is an effective one in various Hardware Trojan detection methods proposed at present. However, there is a problem that Hardware Trojan power is difficult to be distinguished...

Scene understanding based on Multi-Scale Pooling of deep learning features

DongYang Li, Yue Zhou
Deep convolutional neural networks (CNNs) have recently shown impressive performance as generic representation for recognition. However, the feature extracted f¬rom global CNNs lack geometric invariance, which limits their robustness for classification and detection of highly variable objects .To improve...

Simulation analysis of peak period income estimation model in tourism scenic of minority Areas

DongYan Sun
in the process of peak period income estimation in the tourism scenic of minority areas, the estimation results obtained by traditional estimation methods are affected by the mutability of tourist amount, existing local optimal problem, causing bigger error. Therefore, this paper proposes a method of...

Study on the method of fast mining for intelligence data in a library database

Yu Jie
The fast mining method for intelligence data in library database occupies an important position in the field of data processing. With traditional algorithm to dig intelligence, when encounter the interference of characteristic similarity, fuzzy rules are utilized to establish mining association rules,...

SVM and wavelet analysis method for hydraulic pump fault of rock drilling

Jian-hua Liu, Wen-bin Ma
In order to looking for the fault of rock drilling hydraulic pump, the data of pressure and flow can be collected, from which wavelet analysis was used to find characters of the fault. So a new rock drilling pump fault diagnostic model by SVM was based on the energy value of the data deal with wavelet...

The Design of Facial expression recognition system based on the LabVIEW and MATLAB mixed programming

Ju Wang, C. Hong Mei, Chunyan Nie
It has a very important role that emotion to coordinate the relationship between people in the numerous and complicated social life. Expression is the most important characteristics of emotion, it is indispensable means of information communication and emotional communication in interpersonal communication....

SOC Estimation Based Combined Model For Vehicle Batteries

Dongyuan Gu, Xiaojie Fu, Dongyong Yang, Jin Lu
Batteries play an essential role in electric vehicles, In order to achieve an optimum operation of systems with batteries it is necessary to estimate accurate of the state of charge (SOC). In this paper a combined model for SOC estimation in Vehicle Batteries, based on extended Kalman filter (EKF) is...

Analysis of College Students Adopting Mobile E-commerce

Yuling Liu
This paper is based on the the technology acceptance model (TAM), with reference to the theory of reasoned action (TRA) and theory of planned behavior(TPB). Subjective norm is added as intermediary variable, and the independent variables include perceived risk, perceived cost, external influence, social...

Research on channel estimation algorithm based on compressive sensing

Juan Chang, Yuhe Shi, Hongyan Zhao
For OFDM underwater acoustic communication system, OMP and CoSaMP channel estimation algorithm based on the sparsity of underwater acoustic channel are studied and comparised. Both of those algorithms have high estimation accuracy. However, the CoSaMP algorithm has the global optimality of channel reconstruction,...

Research on Cellphone Appearance Image Models Based on BP

Yan Zhou, Yizhou Yun, Ping Yang
Kansei engineering provides a new idea for perceptual quantitative analysis. This paper targets in quantitative description the relationship between cellphone appearance design and consumer subjective felling, eventually builds a mathematical model through BP neural network. This research start with...