Proceedings of the 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016)

Session: Session 4: Computer Sciences and Technology

125 articles
Proceedings Article

Analysis on the Impact Factors of Information Distortion in Accounting Computerization (paper withdrawn)

Huihui Liu
This paper takes listed companies as objects of study, building recognition the model of accounting information distortion in listed companies and putting forward selective methods of sample indexes of accounting information distortion recognition research; and on the basis of factor analysis, this paper...
Proceedings Article

The Application of Rich Media Technology in Digital Learning Terminal

Yafen Wu, Chunhua Liao, Bin Nie, Qin Yang
At present, digital learning terminal has larger impact on people's lives and students learning, and is likely to become more mature in a short period of time in the future. New digital terminal is built on the basis of reading. It is a dedicated terminal which is interactive, relevance, openness and...
Proceedings Article

The Analysis of Music Therapy in Children with Autism Treatment based on Computer Technology

Yan Liu, Li-li Wan, Ya-fen Wu
Music therapy based on computer technology has now become a popular way of psychological disease treatment. The treatment's main medium is music signal. Send music signals through computer, and then pass it to psychological consultant to make him get some energy to change his state of body and mind....
Proceedings Article

HPCT:A Novel Scheme for Protecting Source-Location Privacy in WSN

Guanghui Chang, Laijun Li, Guangxia Xu
In wireless sensor networks (WSNs), although there are many existed schemes for the local eavesdropper. However, a global eavesdropper who is well-equipped, highly motivated and has the ability to compromise node can make those method invalid, so that those existing techniques can't be against such attacks....
Proceedings Article

A Self-adaptive Bat Algorithm for Camera Calibration

Xiaozhi Liu, Didi Qi
To obtain more accurate results of optimization calibration, an improved self-adaptive bat algorithm of camera calibration was proposed. Firstly, step parameters were set adaptively so that the objective function could avoid local minima. Secondly, the improved bat algorithms used in non-linear camera...
Proceedings Article

An Identity Authentication Scheme Based on Node Behaviors for Wireless Sensor Networks

Guanghui Chang, Shaofei Liang, Guangxia Xu
Identity authentication is a crucial security issue in wireless sensor networks, because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attacks. We propose a new identity authentication scheme based on the behaviors of node in...
Proceedings Article

Comprehensive Evaluation Model on the Value of Investment in Colleges and Universities

Yutian Liu, Siyi Wu, Chao Han
The paper conducted a comprehensive scoring and ranking on the public welfare investment value of all the universities and colleges in America through establishing the comprehensive evaluation model. Firstly, those universities and colleges with insufficient information disclosure were removed from the...
Proceedings Article

Perceptron-based AOW Clustering Algorithms

Huozhu Wang, Jianguo Yu
Clustering Algorithms has been widely used in Ad hoc network with its ability to construct network quickly, conveniently and flexibly and without the need of default network infrastructure. In this paper, Firstly, some shortcomings of the typical algorithm AOW (adaptive on-demand weighted algorithm)...
Proceedings Article

Fuzzy Comprehensive Evaluation of Search Engine Model for Online

Xiaohui Li, Jianqiao Yu, Yifeng Dou
With the rapid development of Internet, the search engine becomes an important tool for searching information gradually. In order to choose an appropriate and reliable search engine, a research on search engine evaluation has been a hot topic. In this paper, we adopt a fuzzy comprehensive evaluation...
Proceedings Article

The multilayer sentiment analysis model based on Random forest

Wei Liu, Jie Zhang
With the rapid development of the Internet, artificial intelligence has gain widespread concern. Under the background, as one closely related discipline sentiment analysis's relevant research work have also been expanded. First, the paper analy existing text sentiment analysis method, compare the effect...
Proceedings Article

The gait and face image processing

Hongli Liu, LiYing Ye
Dealt with the deficiency of single creature feature classification, classification methods of gait and facial side integrating at the feature layers are brought forth to improve the identify classification rate with long distance. This paper respectively has feature extraction and dimension reduction...
Proceedings Article

Optical flows Clustering Used for Counting Pedestrians

Ping Pan, Yujiang Fu, Fangming Liu
Traditionally ,pedestrian counting is a manual process. It requires a lot of manpower and material resources, and also generates the possible human error. Therefore, the reality in many cases are in urgent need of automatic pedestrian counting. The most widely deployed methods utilize laser sensors and...
Proceedings Article

Design and Research of HMI Based on the Qt for CNC System

Ruirui Sun, Guanghe Cheng, Xiang Sun
Development of NC system HMI requirements, construction and development of the numerical control system human-machine interface system based on the AM3352. WinCE system, introduced in Qt language design and development method of embedded numerical control system human-machine interface. Design of human-machine...
Proceedings Article

Genetic Algorithm Based on Analytic Hierarchy Process PID Parameter Tuning of UAV Control System

Miao-lei He, Jilin He, Xiaole Ao
The control problems of quad-rotor flight such as under-actuated control, strong coupling were analyzed. With a simplified dynamic model of quad-rotor based on Newton - Euler equation, a double-loop PID controller which consists of the inner attitude control and out position control. According to the...
Proceedings Article

Handwritten Digits Recognition Technology Based on SAE-SVM Classifier

Xiaoting Du
For the purpose of this article, there is a huge amount of work in feature extraction, selection and other aspects using traditional supervised machine learning methods, and features for different applications often required different scenarios which need to manually design, but with the final result...
Proceedings Article

Research on Electrical and Electronic Laboratory Management System of Application-oriented University

Lirong Shen
The traditional management methods of electrical and electronic laboratory have not satisfied the development of application-oriented university. To educate student comprehensive quality and creation ability, improve the quality of experiment teaching and increase the working efficiency for lab managers,...
Proceedings Article

Application of hydraulic model in optimal operation of water supply pumping station

Hao Fu, Jianjun Wang, Weining Yuan, Chunsheng Zhang, Hang Li, Yang Feng, Ming Zhao, Tong Wang, PanPan Huang
Through the J City water supply network hydraulic model, QF pumping station optimization scheduling scheme is designed by genetic algorithm. And analyzing the working days and weekends in different working conditions. After the implementation of the optimal scheduling scheme, the power consumption of...
Proceedings Article

Study on distribution blocking system in a northern city of China by using a hydraulic model

Yang Feng, Feng Chen, WeiNing Yuan, Hao Fu, Hang Li, Chunsheng Zhang, Tong Wang, Ming Zhao, Dong Yang
WNW7.0, software for water distribution analysis and design, is used to establish the hydraulic model of water distribution system in a northern city of China, and to analysis the changes of pressure and water quality in the water distribution system after applying single DBS and double DBS. The results...
Proceedings Article

Design and Implementation of Simulation Maintenance Training System for Aircraft Engine Electrical System

Zheng Wang, XingDong Zhu, Jiali Fan, Jianhua Song
Since the theory of aircraft engine electrical system was more complicated and difficult to master for maintenance support personnel, a novel scheme of simulation system design for maintenance training was proposed. The mechanical frame of the system was based on the original aircraft engine and electrical...
Proceedings Article

Research on the path selection of mobile sink in dynamic sensor networks

Jie Du, Kai Sang
put forward an agreement of safety range query that possesses privacy and completeness protection aiming at low-energy and high-privacy protection required by range query in two-level wireless sensor networks: SPQ(Secure probabilistic range query). SPQ consists of technologies like data encryption, prefix...
Proceedings Article

Thyroid Cancer Gene Detection Algorithm Based on Feature Selection ELM

Jining Wang, HaoYang Mi, Yubo Wu, Xingtong Li, Chaohui Lin
At present, the detection and diagnosis of thyroid cancer has always been depend on the puncture cytology of thyroid gland. However, this method (the puncture cytology of thyroid gland) demands high accuracy of the instrument and costs may stay at a relative high level. Under this circumstance, aiming...
Proceedings Article

Image recognition algorithm undecimated wavelet transform coupling moment

Hongli Liu, LiYing Ye
In order to solve the problem that robustness in copying and pasting forgery detection algorithm is poor and detection accuracy is insufficient, this paper puts forward to image forgery detection algorithm of coupling Zernike Moment (Zernike) by Undecimated Wavelet Transform (UWT). Firstly, it uses Undecimated...
Proceedings Article

Research On The Evaluation For Employees' Safety Quality Of Electric Power Enterprises Based On AHP

Yi-Ming Zhao
By studying the concepts of safety quality and the safety condition of electric power enterprise, an evaluation index system for employees' safety quality of electric power enterprises is established, which includes 4 first-level indexes, 11 second-level indexes, and 47 third-level indexes. Then, the...
Proceedings Article

Research on Evaluation of Power Enterprise Safety Management Capability Based on Gray AHP

Yi-Ming Zhao
The feature of electric enterprise safety management capability evaluation system was analyzed according to the new study of the safety management theory and the system theory. An evaluation index system of electric enterprise safety management capability was built up based on the study of the hierarchy...
Proceedings Article

M-ary Double-layer Optical Camera Communication For Intelligent Transport System

XiangDong Li, Luokun Liu
An M-ary double-layer optical camera communication (OCC) system for intelligent transport system (ITS) is proposed. According to the importance of information, the message is split into different priorities. The low-priority data is transmitted with high data rate at the upper layer in high multiplexing...
Proceedings Article

Designing AM PDU and Analyzing Protocol for GEO Satellite LTE

XiaoLing Xu, Weijia Cui, Yankui Zhang
Considering the urgency of integrated development between the satellite and ground, the integration of terrestrial LTE technology and satellite becomes a research hotspot. The transmission delay for GEO satellite communication is long, the SN length of existing AM PDU can't meet the requirements of satellite...
Proceedings Article

TV Guided Missile Target Image Processing Improvement

Jingfeng He, Ming Ji, Ruliang Xiao
In using the TV-guided missiles to attack targets process, the target image segmentation process directly affects the attack effect. So, choose a suitable image segmentation methods to ensure high quality target image processing speed, real-time, is particularly important. This paper introduces a method...
Proceedings Article

Research On Sun Shadow Positioning Genetic Algorithm Based On BP Neural Network

Ying Xu
In this paper, the model of the solar shadow end plane coordinates and the measurement of the latitude and longitude, and the measuring time are established. The solution of the video shooting location and date is given by the change of the length of the shadow in the video. And the application of genetic...
Proceedings Article

Locating a Vehicle Return Center via Artificial Fish Swarm Algorithm

Qiang Li, Hongfei Jia, Hongliang Li, Yu Lin
Transportation facility or automotive service enterprise location is an interesting and important issue. To improve transportation efficient, lots of researchers have addressed traditional facility location allocation (FLA) problem, e.g., the FLA problem with the minimum transportation cost or the maximum...
Proceedings Article

Bagging-Based Logistic Regression With Spark: A Medical Data Mining Method

Jian Pan, Yiang Hua, Xingtian Liu, Zhiqiang Chen, Zhaofeng Yan
Medical data in various organizational forms is voluminous and heterogeneous, it is significant to utilize efficient data mining techniques to explore the development rules of diverse diseases. However, many single-node data analysis tools lack enough memory and computing power, therefore, distributed...
Proceedings Article

A Method Based on Statistical Characteristics for Image Denoising

Lihua Sun, Enliang ZHAO
The median filter will cause fuzzy problems on edge details of the image when it is used to remove noise of an image. In this paper we discuss an improved median filtering method. Firstly according to the arithmetic mean we preliminarily detect signal points and suspicious noise points in the image,...
Proceedings Article

Research on User-based Normalization Collaborative Filtering Recommendation Algorithm

Jie Dong, Jin Li, Gui Li, Liming Du
Under the circumstance of the big data, because of the low efficiency and low performance of analysis and calculation in stand-alone mode, the traditional recommendation algorithm is limited greatly, recommended time and recommended precision is difficult to guarantee. This thesis makes a improvement...
Proceedings Article

Analysis of PID Control Effect for Nonlinear Systems with Related High Order Bounded Unknown Functions

Yafei Li, Dingxiong Zhang, YiDong Wang, Hong Wang, Junwei Lei
According to the nonlinear function of relative power function order, the uncertainty function is classified as one order relatively bounded and two order relative bounded and higher relative bounded situation. Then in view of the above three categories of uncertain nonlinear system, PID control law...
Proceedings Article

A New Descriptor Kalman Filter

Yan Xu, Guosheng Zhang
Based on Kalman filtering theory in the time domain and Jordan decomposition theory for matrixes, descriptor systems can be changed into normal systems. Then an optimal descriptor Kalman filter is given. Compared with the previous results, it avoids the calculation of ARMA innovation model and white...
Proceedings Article

Difference between Numerical Derivative and Physical Derivative Realization and Its Affection to Stability Analysis

Haibo Liu, Jinhuang Wu, Dingxiong Zhang, Hong Wang, Junwei Lei
A kind derivative algorithm is discussed and the difference of numerical derivative and physical derivative is analyzed. What is more important is that the first step error problem is proposed and its bad affection to the system stability is shown by using a first order system as an example. Also the...
Proceedings Article

Integral Control and Dead Zoom Phenomenon Analysis for System with Unknown Bounded Function

Wenguang Zhang, LingLing Wang, Tian Lan
A kind of uncertain nonlinear system with unknown bounded function is analyzed. And a kind of common integral control is used to cope with the unknown function by taking example of a first order system. And by using of Laypunov stability theorem, we find that the system is stable but the unknown parameter...
Proceedings Article

Adaptive Threshold Gesture Segmentation Algorithm Based on Skin Color

Chengyuan Liu, Jingqiu Wang, Ting Zhang, Dongsheng Ding
In gesture recognition systems, segmenting gestures from complex background is the hardest and the most critical part. Gesture segmentation is the prerequisite of following image processing, and the result of segmentation has a direct influence on the result of gesture recognition. This paper proposed...
Proceedings Article

Infrared imaging simulation through anisotropic atmosphere turbulence

Dongjie Tan
Atmosphere turbulence often degrades image quality in long range infrared imaging system due to intensity fluctuations, distortion, and blur effects. In this work, long range infrared imaging through anisotropic turbulence is simulated, which combines the theoretical turbulence effects models of optical...
Proceedings Article

Design and Implementation of Interference-Aware Channel Assignment Algorithm

XiaoLiang Feng
This paper aims at maximizing system throughput by making use of multiple radios and multiple channels. This paper designs and implements a centralized channel assignment algorithm (IACA algorithm) in our Wireless Mesh Network test bed. This paper finds that IACA can improve system throughput by 5 to...
Proceedings Article

Application Research of Data Mining Technology for Financial Prediction

Wei Su
Financial prediction is an important research direction of financial data mining. In addition to general common characteristics, nonlinear, non-stationaryand dynamic, financial time series is also of some other characteristics, such as high noise, non-normal, rush thick tail, etc. As a result, the financial...
Proceedings Article

Design Research of the Insurance Business Management System Facing Mobile Terminals

Wei Su
Insurance plays a very important means of economic compensation in the path of economic development and construction in our country. In the aspect of the comprehensive development of society it has played a positive effect. At the same time, the insurance industry itself also made great development....
Proceedings Article

Internet environment under the Asset Securitization Financing Model

Yufei Xin, ZhongLin Sheng, Kang Liu
Asset securitization is the last decade of the largest and fastest growing international financial sector financial instruments and means of financing in infrastructure construction using asset securitization financing of this new model has the reach advantage of other modes, to solve China's infrastructure...
Proceedings Article

Cooperative Sensing Decision Rules over Imperfect Reporting Channels

Nian Xia, Chu-Sing Yang
Cognitive Radio (CR) is proposed to solve the spectrum scarcity problem caused by the explosive growth of wireless devices and the fixed spectrum allocation policy. Spectrum Sensing is a fundamental method in CR. Cooperative Spectrum Sensing (CSS) can effectively improve detection accuracy. Numerous...
Proceedings Article

An improved Stud Genetic Algorithm using the Opposition-based Strategy

Hongwei Xu
This paper proposed an improved Stud Genetic Algorithm using the Opposition-based strategy (SGAO) to improve the performance of the traditional SGA and accelerate its convergence speed. In SGAO, we use opposition-based approach to initialize the population and to perform mutation with the aim to improve...
Proceedings Article

Experiment Design of Information Security Classified Protection based on the Procedure oriented Cultivation

Jian Jiao, Xingfen Wang, Xin Chen, Qiyuan Liu
For the actual situation that it is generally lack of classified protection experiments in the experimental teaching of colleges and universities, analyzing the relevance between each knowledge points and basic knowledge in classified protection, and proposed an experiment construction of classified...
Proceedings Article

Building Trusted Routing with Subjective Logic in Wireless Sensor Networks

Hongwei Zhou, Jinhui Yuan
Since sensor nodes are usually deployed in a hostile environment, it is easy to be physically captured by an adversary. Thus, an adversary is capable of disturbing the entire network. To overcome it, we propose a trusted routing algorithm using subjective logic. In our solution, every node checks the...
Proceedings Article

Research on NLOS Channel Based on IEEE 802.15.3c Standard

Xiaolin Liang, Hao Zhang, Tingting Lv
The major problem of indoor localization is the presence of non-line-of-sight (NLOS) channels. In order to perform NLOS identification, a novel NLOS identification technique is proposed which is based on the multiply of the standard deviation, max-slope and max-gradient of the block using energy detector...
Proceedings Article

The Simulation and Analysis of Quantum Illumination Radar Based on Labview

Huifang Li, Minghui Zhang, Kaibin Wang
In this paper, the concept and principle of quantum radar are introduced in detail. First The Quantum radar mode using entangled photons is discussed, and the simulation scheme of quantum illumination is designed. Then, the principle of each module is analyzed, and simulation programs are finished with...
Proceedings Article

Analysis of the Impact of Interaction Design in Digital Media on User Experience

Jing Zhang
With the rapid development of information technology characterized computer and network, digital media products have become the main stream of the times, interaction technology gets ubiquitous in people's life. How to create better user experience in the use of digital media products is a hot issue....
Proceedings Article

Study on the Integration Application of Digitization of National Traditional Sports Culture Heritage and Cultural Tourism under Information Era

Huizhen Wan
In the development of the Chinese five thousand years of history, we created a rich and varied cultural heritage of traditional sports, these sports are the essence of our national cultural heritage of traditional culture and it has a unique sporting and cultural characteristics. This study adopted literature,...
Proceedings Article

Research on Applications of Big Data in Mobile Communication

Shaohong Wu, Ran Bi
With the rapid development of the mobile internet and the computer ability, the era of big data has come. This paper firstly describes the concept of big data, and then introduces the key technologies of big data in mobile communication network. Then, this paper gives the specific applications of big...
Proceedings Article

Design of customer marketing big data processing system based on data mining clustering technology

Jingzhe Wang
Data mining technology brings together databases, artificial intelligence, machine learning, statistics, visualization, parallel computing in different fields, to build their own methodology. Use database technology for front-end data processing, application of machine learning methods to extract useful...
Proceedings Article

Neural networks applicated in computer network security evaluation and reliability analysis

Jinping Zhao
Computer network in the information age is undoubtedly an important bearing basis, it has become an important guarantee for the healthy functioning of all walks of life, in this context of computer network security has been the concern of the community. Computer networks in the development process its...
Proceedings Article

Optimization of LDA text microblogging recommendation algorithm based learning to rank

Yuxiang Xu
With the recent rise of web3.0 hot, personalized recommendation social networks become an important aspect of research. Social networks on behalf of the domestic microblogging abnormal hot, more and more domestic and foreign research applied over microblogging. Because the characteristics of micro-Bo...
Proceedings Article

Study on Corporate Financial Data Analysis System Based on Data Mining

Pengwu Wang
With the development of economy and technology, data mining which is based on databases and business intelligence has been developed and widely applied to all fields, financial field included. It can explore hidden, useful information to help decision makers to search for the relationship among data...
Proceedings Article

Study on Fuzzy Mathematics and Its Applications

Yang Li
Fuzzy Mathematics produced in 1960s, its formation and development do not want to give up mathematical accuracy, rigor, but to make the objective existence of some of the ambiguity of things and phenomena able to use mathematical methods to study and deal with. The so-called "fuzzy" means things are...
Proceedings Article

The Design of Enterprise Financial Management Mode Based on the ERP

Yong Kang
In recent years, in china, more and more enterprises begin to use the ERP system in the financial management. ERP makes the informationization level of financial management rise to a new height, and the wide application of ERP system brings unprecedented opportunity to enterprise's modern management....
Proceedings Article

A Study on Growth Process Model of Enterprise Information System in the Era of Big Data--Statistical Information System of Freight Train Formation

Senling Chen, Wenli Zhang, Xiaofei Li, Jian Jin
This paper focused on the railway transportation industry in the era of big data, and researched on the Statistical Information System of Freight Train Formation, collected its business data in 311train operation depots of 18 railway bureau as total sample and 35 statistical targets as dependent variables,...
Proceedings Article

Study on Composition and Development of the Database Management System

Fenfen Wu
The database is long-term storage in the computer, organized, shared data collection. Database to store large amounts of information in an effective and quick access to play an important role, it is the core and foundation of large information systems. Database management system is to establish, use...
Proceedings Article

Nature Communication System based on Wechat public account Shandong University of Science and Technology

Haoxiang Shi, Menghan Li
Users can add a Wechat public account by scanning QR code, then input text and voice information on chatting interface, searching for pertinent sentences in Database table through connecting with the MySQL database and return pertinent text answer to user's chatting interface.
Proceedings Article

Study on the Security and Trust Issues of E-commerce

Xiaosen Wen
Tremendous impact e-commerce development to human society makes a series of research in related fields to become a global hot spots. In recent years, the development of e-commerce has gradually slowed down, which is one of the main security problems that hinder its development. It can be predicted to...
Proceedings Article

Research into electric power communications network overhaul management system

Zhirong Liang, Dawang Cheng
To adopt electric power communications network overhaul management system for electric power communications network management can increase the regularity of communication overhaul and the operation reliability of communication network. Based on that, this paper studies the electric power communications...
Proceedings Article

Design and Implementation of Information System of 3D City of Geotechnical Engineering

Qiong Luo
To meet the demand for the geotechnical information system management, this paper has put forward a plan to develop the management information system by using GIS and commercial database management technology. It has also described and analyzed the development of the function modules of the system and...
Proceedings Article

3 d - LookStailorX system application in the clothing pattern design

Fengqin Chen
Clothing pattern design is the most key link in garment production process, and is the most important part of the costume design, is a clothing design and technology of the connection of the bridge. With such as clothing CAD technology widespread application of digital technology, the clothing pattern...
Proceedings Article

Emotional design and clothing CAD software development and integration

Wenhui Xia
With the development of the apparel industry and the renewal of the computer technology, computer aided design CAD is gradually widely used in the field of fashion design. In today's high working pressure, under the background of the fast pace of life, it is widely hoped to get warm living space. Therefore,...
Proceedings Article

An Image Enhancement Algorithm Based on Second Generation Wavelet Integer Transform

Yi Zhang, Haifeng Wang
Traditional histogram enhancement algorithm to enhance image has the defect of over-bright image, amplified noise, and missing image details. In view of these defects, this paper proposes an image enhancement algorithm based on second generation wavelet integer transform. At first, use the second generation...
Proceedings Article

Design and Implementation of NationaI Traditional Sports events Management Information System

Zhengxia Qiao
Chinese traditional sports culture as an important part of the world sports culture has its own unique value and significance. But with the development of the global information technology, Chinese traditional culture has been invaded step by step by modern western sports culture. Under the global information...
Proceedings Article

The Design and Application of Digital Tourism Service System

Gang Zhao
In this paper, travel services rely on a travel service network platform, the system is divided into two parts. Foreground is based on personalized recommendation and divided into hotels, travel blog module, Special, theme planning, business travel, interactive community. The background is mainly to...
Proceedings Article

The Design and Application of Injuries Network Consultation System

Ke Pan, Qiaozhen Yan
The paper aims to study a design and practice of sports injuries network consultation. According to sports injuries study and theory, combine Internet technology and module theory designed sports injuries network consultation system. This paper makes explanation on design ideas, technology crucial module...
Proceedings Article

Research on Network Security and Identity Authentication

Jin Meng, Jing Zhao, Ming-shun Xing, Tie Ma, Hai-yan Zhao
With the rapid development of computer networks and the popularity of network applications, network security has been people's increasing attention. Network security is an important issue under Network environment, and authentication technology plays a very important role for network application security....
Proceedings Article

Research on Security Issues and Protection Strategy of Computer Network

Min Zhu, Yong-jian Luo, Jun-qiang Yang, Ming-shun Xing, Jing Zhao
Development and improving and bringing very great impact to network of the network technology of the computer, the security question of the network has become one of the focuses of the social safety question of information. In this paper, through the analysis of computer network information security...
Proceedings Article

Research on Security Issues Based on CAN LAN

Yu-yang Du, Hai-yan Zhao, Jing Zhao, Hui Li, Huai-jun Zhou
With the rapid expansion of the rapid development of computer network technology and network coverage, network security issues are increasingly complex and outstanding looks up. In this paper, we have the analysis of the CAN security situation, put forward the principle of network security policy-making...
Proceedings Article

Research on Security Management of Computer Network System

Jun-sheng Ma, Tie Ma, Hui Li, Xiao-ting Li, Jun-qiang Yang
With the rapid development of network science and technology, people are dependent on the network and usage greatly improved, but the network to bring convenience, but it also brings a lot of network security issues, it has become a constraint computer network construction greatest limiting factor. This...
Proceedings Article

Research on Wireless Network Security Technology

Weng-jing Yang, Zhi-yuan Li, Huai-jun Zhou, Ran Li, Hai-yan Zhao
With the popularization and application of wireless networks, people are dependent on wireless networks is increasing, at the same time the security of wireless networks has become the focus of attention. In this paper, a wireless network security methods and technology were more in-depth study, since...
Proceedings Article

The New Algorithm of the Item-based on MapReduce

Wei Zhao
Traditional collaborative filtering algorithm based on item and K-means clustering algorithm are studied, the parallel algorithm of collaborative filtering Item-based on MapReduce is proposed by using MapReduce programming model. The algorithm is mainly divided into two steps, one step is K-Means algorithm...
Proceedings Article

Disturbance Error Correction Algorithm for UAV Flight Control Based on Adaptive Backstepping Integral

Xing-Hua Lu, Shi-wei Zhan, Wen-quan Yu, Chen-wei Huang
The gas dynamic features of Unmanned Aerial Vehicle (UAV) cause flight attitude control error in aerodynamic disturbances, it need for stability flight control design of UAV, to improve the UAV flight stability property. Under the condition of large disturbance, the uncertainty of parameters of flight...
Proceedings Article

Software Phase Locked Loop for Single Phase Grid Tied Systems

Jian Qin, Jing Li
The phase angle utility is a critical piece of information for operation of power devices feeding power into the grid like PV inverter.A Phase Locked Loop (PLL) is a closed loop system in which an internal oscillator is controlled to keep the time/phase of an external periodical signal using a feedback...
Proceedings Article

The Recognition Algorithm of VSAT Network Based on Burst Synchronization

Hairui Pan, Yourong Lu, Qian Cai, Gang Xu
For the problem about identification of VSAT network, a VSAT network identification technology using the priori information of VSAT network is proposed based on synchronization among different carriers' bursts. The validation via practical data shows that the method is applicable to the VSAT network...
Proceedings Article

Hybrid Intelligent Algorithm Solving Uncertainty Job-Shop Scheduling Problem

Yang-Jun Hu, Cun-li Song
Researched the uncertain Job-Shop Scheduling, on the basis of the original triangular fuzzy number to describe fuzzy processing time, structured the fuzzy Job-Shop Scheduling model. Algorithm using the concept of "big valley" topology represent solution space, using strong swap mutations in early immune...
Proceedings Article

The Analytical Decision Model of Cleaning Space Debris

Jing Ding
In order to solve the problem B of the 2016 Mathematical Contest in Modeling(MCM) , I study the decision problem of cleaning up the space debris. To determine whether a viable commercial opportunity exits, I establish models as follows:First, I study the present situation of debris and the methods of...
Proceedings Article

Mitigate Water Scarcity with Intervention

QuanHui Che
Water scarcity has emerged as a top-tier global issue for both environment and development. However, how to mitigate water scarcity is a real problem. We choose Shandong Province in China with heavily overloaded water as our research object., we propose an intervention plan concerning social consciousness,...
Proceedings Article

Analysis of Undergraduates' Network Status Based on Data Mining

Yuan Qian, Quan Shi
The construction of digital campus gives undergraduates a more convenient way to access the Internet and there have been stored massive network data. In this paper, use clustering algorithm and log file analysis to analyze these data to understand undergraduates' network status and the relationship between...
Proceedings Article

An Image Fusion Algorithm Based on Local Laplasse Filter

Shuai Jiang, Xiongfei Li, Xiaoli Zhang
To deal with the problem of smooth image progressing on the edge, presents a multi scale image fusion algorithm (SLP). The algorithm is based on the local Laplasse filter. First of all, using the local Laplasse filter, the images are decomposed into detail layers and smooth layers. Secondly, the detail...
Proceedings Article

Multiscale Relative Transition Entropy Analysis of Electroencephalogram

Ying Wang, Fengzhen Hou, Jiafei Dai, Jin Li, Jun Wang
Recently, quantifying the complexity of the physiological time series has become more and more concerned. As one of the most complex physiological signals, electroencephalogram (EEG) including a large number of physiological and pathological information attracts widespread interest. However, many traditional...
Proceedings Article

Analysis of alpha rhythm epileptic Electroencephalogram based on Inner composition alignment

Yiyi He, Danqin Xing, Jiaqin Wang, Jia-Fei Dai, Jun Wang, Feng-Zhen Hou
The EEG signal is an important tool for the diagnosis and prediction of epilepsy due to EEG containing a large number of physiological and pathological information. Based on alpha rhythm multi-channel EEG (electroencephalogram), this paper applied inner composition alignment (IOTA) algorithm to construct...
Proceedings Article

Coupling analysis of epileptic EEG signals based on the multiscale mutual model entropy

Ning Ji, Jia-Fei Dai, Jun Wang, Feng-Zhen Hou
The Multiscale Mutual Model Entropy algorithm is presented to quantify the coupling degree between two EEG time series collected at the same time on different scales. We extracted the characteristics of EEG signals from the healthy and epileptics based on the algorithm. The results show that the entropy...
Proceedings Article

Sleep EEG analysis Based on the Multiscale Jenson-Shannon Divergence

Zhengxia Zhang, Jia-Fei Dai, Jun Wang, Feng-Zhen Hou
Sleep EEG signals analysis is a hotspot of research recently, this paper, by using nonlinear dynamics theory knowledge, JSD algorithm and multi-scale JSD algorithm is proposed for some individual conscious period and NREM sleep stage I analyzed the research of EEG signals, and the use of SPSS statistical...
Proceedings Article

Beta wave of sleep electroencephalogram analysis based on sign series entropy

Min Zhao, Yuting Li, Lu Yang, Jia-Fei Dai, Jun Wang, Feng-Zhen Hou
Sleep and wake EEG have some differences. After studying their brain waves and calculating the sign series entropy, we use the T test for the detection of sleep and wake EEG data to figure out whether they are different. After beta waves being filtered out by the filter, we calculate the entropy of the...
Proceedings Article

Classification of Handwriting Number Based on PCANet Network with Data Augmentation

Tianmei Guo, Jiwen Dong, Lei Wang
In this paper we proposed an algorithm for classification of handwriting number which use depth of the structure of the simple convolution neural network-- PCANet Network with data augmentation. PCANet Network with data augmentation consists of four parts, one is data augmentation, two is the basic PCA...
Proceedings Article

Weight Calculation and Index Ranking Study of MADM Based on AHP Optimized by Topsis

Ran Chen, Guangyao Lian, Shuai Shao, Huijie Li, Xingru Li
A analytic hierarchy process optimized by topsis was presented aiming at the disadvantages that there are inconsistency and too much subjectivity in the existing multiple attribute decision making(MADM) methods when dealing with the weight calculation and index ranking problems. This method utilizes...
Proceedings Article

Evaluation approach of water source based on Analytic Hierarchy Process

Xin Tian, Zhengwei Shui, Chiyuan Ren
From the geographic view, rivers or lakes in America often run through several states or even across the half country which makes it difficult to categorize by their natural locations, let alone to allocate them. In an economist's perception, economy in states can have huge discrepancy which directly...
Proceedings Article

Modeling and Evaluating of User Access in Content Delivery Network

Long Zhan, Leijie Sha, Rui Wang, Yang Liu
Content Delivery Network (CDN) is a new kind of Internet content service system, which is built based on IP network and can provide the content distribution and service to satisfy the requirement of content access and application efficiency, the requirement of quality and contents order. The basic idea...
Proceedings Article

Research and implementation of image feature point matching method based on OpenCV

Rong Liu, Danmei Peng, Yang Liu
This paper described the distance metric of the Euclidean distance of SIFT operator and Hamming distance of BRISK operator represented based on OpenCV to extract and descript feature points on the two relatively low altitude remote sensing images , and then chose BruteForceMatch (violent match) and FlannBasedMatch...
Proceedings Article

Intrusion detection system evaluation model based on model checking

Pengtao Xu, Weijun Zhu
At present,with the increase of network bandwidth and network data volume, pattern matching to detect intrusion detection systems have many problems to solve. Then, the method based on the model checking method was proposed, and applied to the intrusion detection system[1][2][3][4].However, the Intrusion...
Proceedings Article

Research and Analysis on Intelligent Household Model based on ZigBee and Data Security Enhancement Technique

Wen Zhun Huang, Yao Yao Hui, Chao Zhang
In this paper, we conduct research on the intelligent household model based on the ZigBee and data security enhancement technique. ZigBee protocol is a kind of close, low power consumption, low cost, easy networking, high capacity, high safety standard of wireless communication technology and it is very...
Proceedings Article

Research and Development of the Android Framework Smart Watches from the Data Security Point of View

Xin Xin Xie, Wen Zhun Huang
In this paper, we conduct research on the Android framework smart watches from the data security point of view. With the speeding development of smart watches, Android smart watches the operating system is more and more attention by people and use, data security has become the user's concern problem,...
Proceedings Article

Hybrid Log-based Fault Tolerant scheme for Mobile Computing System

Yongning Zhai, Zhenpeng Xu, Weini Zeng
Many new characteristics are introduced in the mobile computing system, such as mobility, disconnections, finite power source, vulnerable to physical damage, lack of stable storage. Since the related log-based rollback recovery fault tolerant schemes may still lead to dramatic performance loss in failure-free...
Proceedings Article

Different methods for handling the corner reflections of absorbing boundary condition in the numerical simulation of seismic waves

Xing Li
In numerical simulation of wave equation, in a limited area to establish artificial boundary absorbing boundary conditions, the angular point on the calculation area of the processing is also cannot ignore a problem. According to CE, MTF, PML three different boundary conditions, using different angular...
Proceedings Article

A Brief Survey of Specification Inference in Static Program Analysis

Chuansen Chai, Xuexiong Yan, Qingxian Wang, Shukai Liu, Yajing Sun, Shuai Yi
Nowadays, many applications are too big to keep their own security. Static analysis is a technique which can be used for ensure the safety of large programs. However, frequent calls to libraries and frameworks bring a lot of difficulties to the analysis. Researchers propose the specification inference...
Proceedings Article

A Linux rootkit improvement based on inline hook

Jun Gu, Ming Xian, Tian Chen, RuiXiang Du
Rootkit and its detection technology promoted mutually. This paper proposes a kernel rootkit level division method based on function call relationship. The deeper rootkit's level is, the more difficult its detection becomes. We put forward and implement a rootkit method based on inline hook. It pushes...
Proceedings Article

Research on Extreme Learning Algorithm and Its Application to Atmospheric Nonlinear Systems

Qunbo Huang, Bainian Liu, Weimin Zhang, Jingzhe Sun, Mengbin Zhu, Shiwei Lin, Weifeng Wang
Extreme learning machine (ELM) algorithm, which becomes more and more popular in the area of artificial intelligence for the past few years, is faster than the traditional machine learning algorithms, especially than the single hidden layer feed-forward neural networks (SLFNs). However, ELM is merely...
Proceedings Article

Solving large-scale assignment problems by Kuhn-Munkres algorithm

Hong Cui, Jingjing Zhang, Chunfeng Cui, Qinyu Chen
Kuhn-Munkres algorithm is one of the most popular polynomial time algorithms for solving classical assignment problem. The assignment problem is to find an assignment of the jobs to the workers that has minimum cost, given a cost matrix X 2 Rm n, where the element in the i-th row and j-th column represents...
Proceedings Article

A Tracking-Resistant Pseudonym Scheme for Location Privacy in VANETs

LingLing Wang, LiJun Sun, Min Shao
Pseudonym changing is the state-of-the-art approach for resist tracking attack of vehicles in vehicular ad-hoc networks (VANETs). However, most of the proposed pseudonym changing schemes cannot guarantee to resist the tracking attack, namely, provide the unlinkability of vehicles, meanwhile they prefer...
Proceedings Article

DTACU: a global DVFS algorithm based on piece energy model

Longfei Li, Zhanzhuang He, Juli Zhang, Xupei Zhang
Considering the exclusive policy and poor energy benefits for multicore processor by Ondemand algorithm, a global DVFS (Dynamic Voltage and Frequency Scaling) algorithm DTACU based on piece energy model is proposed. In order to translate multicore problems to single core problems, an equivalent energy...
Proceedings Article

Research of the model of the agricultural products service supply chain based on intent platform

Yan Cui, Zi Xiang Zhang
Through the increasing development of Internet technology, computer walks in every families, the traditional consumption concept and patterns also changed, based on the consumption patterns of the network platform is gradually accepted and recognized. Therefore, the corresponding logistics concept also...
Proceedings Article

Evaluating Individual Subjective Well-being via Social Media

YaZhou Wang
Subjective well-being (SWB) is now attracting more and more attention from policy makers. Traditional way of measuring SWB by self-reporting based on questionnaire has the limitation of small sample size and low survey frequency. With the rapid spread and use of social media, the online posts of users...
Proceedings Article

An Optimal Decision-Making Method for Cyberspace Countermeasure Based on Game Theory

Tian Chen, Ming Xian, Jun Gu, Huimei Wang, RuiXiang Du
The traditional Decision-Making methods leverage the awareness from one side of operators and evaluate the state of environment and devices statically. However, as the correlations of cyberspace's actions become more and more complex and the cyberspace confrontation is always changing, it cannot meet...
Proceedings Article

CoSe: Collaborative Simulation Environment for Heterogeneous Models

Huilong Chen, Yiping Yao, Laibin Yan, Feng Zhu, Jin Li
Modeling and simulation of complex systems in nature and society usually involves multidisciplinary studies. In many simulation systems, it is necessary to develop models using different modeling languages and tools. As a result, it will be a big challenge in the modeling of the whole system and collaborative...
Proceedings Article

Method for Military Conceptual Modeling Based on Template Description

Yang Zou, Yiping Yao, Wenjie Tang, Zhongwei Lin
Military conceptual model can help achieve the consistent understanding between experts and developers and strengthen the normalization of military simulation modeling and reusability of simulation model. To solve the problems (loss of modeling elements, non-standard description and so on) appeared in...
Proceedings Article

A Real-time Tracking and Warning System for Civil Aircraft Flight Based on Fusion of the Multi-source data Information approach

Haibo Ma, Yiping Yao
The crash occurred frequently recent years, civil aviation aircraft safety issues become the focus of attention, and real-time tracking and monitoring of flight trajectory has become an urgent problem to be solved. At present, Aircraft Communication Addressing and Reporting System (ACARS) is the only...
Proceedings Article

Symmetric image normalization for mouse brain magnetic resonance microscopy

Zhenrong Fu, Lan Lin, Cong Jin
Various genetic mouse models have been used to understand aspects of the biology of the neurodegenerative disease. A rapid growth of data collection from the mouse brain has put image registration, a key prerequisite step for brain image analysis in great focus. SyN (symmetric image normalization method)...
Proceedings Article

Network Traffic Prediction Based on Feed-forward Neural Network with PLS Pruning Algorithm

Zhenxing Li, Qinghai Meng
To improve the prediction accuracy and reduce the computational complexity of network traffic prediction based on feed-forward neural network (FNN), the partial least squares (PLS) pruning algorithm was proposed to optimize the network topology structure. The data of network traffic has the characteristics...
Proceedings Article

ITIL Incident Management Process Reengineering in Industry 4.0 Environments

Jiqing Cao, Shuhai Zhang
The new technologies such as virtual resources and RFID in Industry 4.0 make traditional ITIL Incident Management Process can not adapt to the new environment anymore. Based Agile and Lean thinking of DevOps, this paper improved and designed on the traditional ITIL Incident Management Processes, proposed...
Proceedings Article

Space Debris Removal Scheme Simulation

Yiming Li, Shuaikang Lv
This paper develops a discrete time-dependent model to design space debris removal scheme based on risk, cost, incomes and time. Especially, a collision model was established to consider the collision between debris. The economically attractive scheme was chosen according to the model simulation at last.
Proceedings Article

Identity-based multi-condition proxy re-encryption

Pingshu Wang
In a proxy re-encryption system, a semi-trusted proxy can convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob without seeing the underlying plaintext. However, a fine-grained delegation is demanded in some scenarios. For this, Weng et al. introduce the notion...
Proceedings Article

Combination of ISOM and K-SVD based on Dictionary Incremental Learning for Image Signal Processing

Guixin Sun
In this paper, a dictionary incremental learning method combination of ISOM(Incremental Self-Organizing Maps) and K-SVD is proposed. This method significantly improves the efficiency of K-SVD method for large sample based on the incremental learning ability of ISOM network. The experiment of image super...
Proceedings Article

Investment strategy of colleges based on BP neural network and optimization program

Dong Chen, Hongwei Pan, Yuxia Dai, Lihong Wang
In this paper, a model to determine optimal investment strategy for foundation is introduced. Firstly, we preprocess the college data and classify, filter and fill the missing data with clustering analysis and regression method. Secondly, based on Back Propagation (BP) Neural Networks, a model of ROI...
Proceedings Article

Application of Improved BP Neural Network Based on Genetic Algorithm in Fault Diagnosis of Equipment

Xin Ren
Aiming at the problems of traditional BP neural network in fault diagnosis of equipment, the genetic algorithm is introduced to optimize the network, and the fault diagnosis model of equipment is established. The modeling ideas and considerations are introduced in detail, and the simulation calculation...
Proceedings Article

On the Impact of Multimedia Information Input on English Listening Decoding Based on Cognitive Load Theory

Zongyan Tan
Based on cognitive load theory, this paper aims to study how multimedia information input, a combination of audio information, pictures and graphs, in contrast with pure audio information input, has influenced English listening decoding, and then put forward some practical training strategies, such as...
Proceedings Article

Modified Amplitude Spectral Estimator for Single-Channel Speech Enhancement

Zhenhui Zhai, Shifeng Ou, Ying Gao
The widely used amplitude spectral subtraction for speech enhancement suffers from the unreasonable assumption that the phase spectra of clean speech and noise signal must being uniform. To avoid this problem, Zhu has presented an extensive analysis of amplitude spectral subtraction, and proposed a quantitative...
Proceedings Article

QoS routing mechanism for MANET to support real-time service

Guangshuai Ding, Weimin Lei, Zhengxu Hu, ZheYang Zhang
The development and widespread use of real-time constrained multi-media application in MANET has resulted in the need to optimize or update current routing mechanisms. This paper proposed a QoS routing mechanism for multi-media transmission under real-time constraint in MANET, named ad-hoc on-demand...
Proceedings Article

Research on Algorithm of Dependability Oriented Anomaly Detection of Virtual Machines under Cloud

Hongli Li
In this paper, a large-scale cloud platform Virtual machine anomaly detection key technologies. For cloud environments systematic study of the feature extraction technique is proposed based on principal component analysis (PCA) for feature extraction algorithm. The algorithm selects the most efficient...
Proceedings Article

Research on Quantitative and Semi-Quantitative Training Simulation of Network Countermeasure

Jianjun Shen, Nan Qu, Kai Li
Network countermeasure is an important kind of combat operations in information condition, so how to implement network countermeasure simulation in simulative training applications is a crucial problem to be resolved. Therefore, the paper first proposed the architecture of network countermeasure simulation,...
Proceedings Article

Nonnegative Sparse and KNN graph for semi-supervised learning

Yunbin Zhang, Chunmei Zhang, Qianqi Zhou
For the graph-based semi-supervised learning, the performance of a classifier is very sensitive to the structure of the graph. So constructing a good graph to represent data, a proper structure for the graph is quite critical. This paper proposes a novel model to construct the graph structure for semi-supervised...
Proceedings Article

Research and Design of Trusted Computing Platform

Yun-ting Zhou, Mao-lin Deng, Yu-hai Chong, Feng-zhu Ji, Xiao-gang He, Qi-jie Tang
With the development of trusted computing, trusted computing model and trusted computing platforms are constantly changing, and becoming more and more perfect. In terms of the hardware platform, the trusted computing technology has been gradually matured. Many companies and businesses solve security...