Proceedings of the 2016 International Conference on Advanced Materials Science and Environmental Engineering

Session: Communications and Signal Processing

19 articles
Proceedings Article

Design of Low Power Spy Type Wireless GPS Tracking Terminal System

Zhenming Bao, Qi Wang, Qiancheng Zhao, Jieyang Ruan
Low power spy type wireless GPS tracking terminal is a positioning device which can receive space GPS signal by the host tracker, through GPS signal analysis, their own geodetic coordinate can be calculated, then the device will report its positioning information to monitoring center by GPRS wireless...
Proceedings Article

Hyper Chaotic Colpitts Oscillator for Wireless Power Transmission

Haixia Zhu, Wei Wei, Wenbo Liu
A new type of hyper chaotic oscillator is proposed based on the typical Colpitts chaotic oscillators. The chaotic signal is generated as the excitation signal of the wireless transmission system. Two types of Colpitts chaotic oscillation signals are compared from three aspects. We can find that the hyper...
Proceedings Article

Improvement and Application of TF-IDF Algorithm in Text Orientation Analysis

Wei Wang, Yongxin Tang
In this paper, on the basis of traditional TF-IDF algorithm, new and improved method is proposed. By adding the position weight coefficient and weight coefficients of word class, it can calculate the words which rely on high term frequency evenly. Experimental results showed that, the improved algorithm...
Proceedings Article

A New Method of Grain Output Prediction Based on R/S Analysis

Teijun Yang, Na Yang, Chunhua Zhu
The grain production data series present some regularity and nonlinear characteristics in time. To overcome the shortcomings of the linear prediction low precision in traditional grain yield, the application of R/S analysis which based on the nonlinear fractal theory in grain output prediction is studied...
Proceedings Article

Fuzzy Logic Controller for Enhancing RCS's Lab Measurements

Mohamed Galal, Jianyu Wang
Precise and accurate radar cross section (RCS) measurements, especially for tracking small radar cross section targets (e.g. tracks on Fighters), or RCS reduction and radar absorbing materails evaluation for other targets of interest such as aircraft, tanks, or ships, is a must. As a consequence, the...
Proceedings Article

Development of an Encryption Algorithm Based on Nonpositional Polynomial Notations

Rustem Biyashev, Saule Nyssanbayeva, Maksat Kalimoldayev, Miras Magzom
Cryptographic systems, developed on the basis of nonpositional polynomial notations, are called nonconventional or modular. In this paper modelling of the encryption algorithm based on nonpositional polynomial notations is described. The development of the model of block cipher system comprises the construction...
Proceedings Article

Robust Stability of Polytopic-Type Uncertain Singular Stochastic Systems with Time-Varying Delays

Yuanqiang Chen
The problems of robust stability for a class of the polytopic-type uncertain singular stochastic systems with time-varying delays are studied. By using a delay decomposition approach and terms of linear matrix inequalities (LMIs), robust stability criteria ensuring globally stochastically asymptotic...
Proceedings Article

The Development of a Structural Scheme of National Segment in a Protected Cross-Border Space

Rustem Biyashev, Saule Nyssanbayeva, Yenlik Begimbayeva
A structural scheme of national segment in a protected cross-border space is proposed. Information exchange in the integrated system of cross-border space between interacting sides is provided by the creation and use of national segment and an integration gateway. The scheme of interaction of two sides...
Proceedings Article

Research on Evaluation Method of Video Stabilization

Bin Chen, Jianjun Zhao, Yi Wang
In order to accomplish the task of evaluating video stabilization, we divided videos into four classes according to the state of the cameras and moving targets in the monitoring areas. It also analyzed the difficulties of evaluating video stabilization in each condition. As PSNR(peak signal to noise...
Proceedings Article

Performance Analysis of Cognitive Radio Network with Primary User Activeness Consideration

Han Zhang, Shouyi Yang
With the development of the communication industry, the spectrum scarcity problem is appearing. Cognitive radio is a popular wireless communication technology. it can solve this problem efficiently[1].In the conventional model .we assume that the occupancy state of the primary user is constant ,which...
Proceedings Article

Modified Symmetric Block Encryption-Decryption Algorithm Based on Modular Arithmetic

Rustem Biyashev, Saule Nyssanbayeva, Armanbek Haumen, Nursulu Kapalova
This paper addresses to a variation (modification) of a symmetric block encryption-decryption algorithm based on nonpositional polynomial notations (NPNs). The proposed encryption model includes two stages. The first stage is that a plaintext is split into bit blocks of a given length. Each plaintext...
Proceedings Article

A Clustering Routing Algorithm for Heterogeneous Sensor Networks with Multilevel Energies

Huaixiang Zhang, Qingcong Cao, Lu Yin
In clustering algorithm of wireless sensor networks, to solve the problem of excessive energy consumption in the cluster heads with multilevel energies, an improved reactive three level heterogeneous stable election protocol is proposed by combining the reactive routing mechanism and multilevel heterogeneous...
Proceedings Article

Detection of Defect Edge of Aluminum Foils Based on Fuzzy Enhancement and Wavelet Transform

Hui Wang, Huanhuan Li, Yongfa Ling, Hongyan Zhang, Xiangxu Xie
In order to accurately detect the defects on the aluminum surface, including pinholes, yellow discoloration, oil stains, and scratches, an algorithm combining local fuzzy enhancement, wavelet transform modulus maxima (WTMM) and multi-scale product was proposed. First, the defect areas with low contrast,...
Proceedings Article

An Indoor Positioning Algorithm using Bluetooth Low Energy RSSI

Song Chai, Renbo An, Zhengzhong Du
As the Bluetooth technology evolves to its 4.0 version, great applicational opportunities emerge based on the inquiry of Received Signal Strength Index (RSSI). In this paper, a positioning algorithm using Bluetooth Low Energy RSSI is proposed for indoor application. First in our algorithm, RSSI value...
Proceedings Article

Orientation and Development of Surveying, Mapping and Geo-information under the Smart City Construction

Xitao Huang, Huaien Li, Lingling Liu, Yu Zhang, Lijie Feng
Along with Chinese urbanization and informatization has become increasingly mature, the traditional urban management problems and drawbacks exposure increased, the smart city construction as a new model of effective management, which at the same time provides a new opportunity for Surveying, Mapping...
Proceedings Article

A Risk-Based Topology Control Algorithm in Ad Hoc Networks

Hongbiao Li
In order to protect social network security from malicious attacks, we study the propagation of malicious software in wireless networks by taking on the attacker's perspective. Some topology control algorithms are designed for the development of effective attack strategies by a malicious mobile node...
Proceedings Article

Grid Project Cost Control Research Based on Data Mining

Yan Peng, Yang Ding, Yuanmei Yu
As the prevalence of the Internet +and big data, Chinese construction industry, especially, such as grid construction that it is high -investment projects. They are actively reform, strengthen project cost management, to adapt to the new requirements of the times. The paper analyzed and assessed grid...
Proceedings Article

Design of RF Attenuator Based on PIN Diode

Xinfa Miao, Xiuhua Wang
RF attenuator has been widely used in analog and radio circuit. Designed a wideband attenuator using a surface mount device that including four PIN diode. The attenuation can be adjusted by the control voltage. The attenuator has good matching characteristic and linearity in 300kHz~3GHz. The structure...
Proceedings Article

The Application of Elliptic Curve Cryptography in Secure E-mail System

Xia Lin
E-mail is one of the most popular services on Internet, but traditional e-mail system is transmitted in plain text, which brings a lot of security risks. In order to ensure the security of e-mail, this paper analyses the integrity, confidentiality and repudiation of information. It introduces the protocol...