Proceedings of the 2017 International Seminar on Artificial Intelligence, Networking and Information Technology (ANIT 2017)

+ Advanced search
51 articles
Yongchao Tao, Wencheng Xiang, Xianghu Wu
This paper focus on the designation and implementation of the AT91 simulator .which is part of the virtual verification module of the validation tools. First of all we study and analysis of the basic structure of AT91 microcontrollers. We study the bus system, address mapping, and boot model; and the...
Bei He, Fuli Yang, Ke Zheng, Xuedan Tao, Wang Yao
With the big data and smart grid more and more valued, the power big data will become an inevitable trend. The power big data has a complex structure and various kinds, with the characteristics of dispersion, diversity and complexity. The traditional data processing method can not meet the requirements...
Hui Zhao
Peach is a rose flower of peach or peach. The current medicine through the extraction process to prove that the peach contains peach polysaccharide, peach polyphenols, peach total flavonoids, vitamins, amino acids and trace elements compounds. Peach blossom contains compounds that can dilate blood vessels,...
Ce Zhang, Dianhui Chu, Jianan Jiang, Weigong Lv, Yiran Zhao
In recent years, domestic engineering education has yielded substantial results. Although droves of well-educated engineering talents are constantly emerging, the asset who has the top innovative engineering practice ability and engineering leading ability is still grossly inadequate. The obstacles that...
Shundao Xie, Yaogan Liang, Rongjun Chen, Mushui Zhang, Hongzhou Tan
In this paper, a fast pin assignment optimization method is proposed for improving signal integrity performance of VLSI package. This performance is evaluated by two cost function. Some other methods based on heuristic algorithm can find a good solution for pin assignment problem. Since the solution...
Shuzhen Zou, Chaojun Wei, Biaohong Tao, Ming Zhu
Taking the scenic area of Nanchang Wanshou Tower as the example, this study applies rain flood management into the landscape design of the targeted lake wetland park and carries out a comprehensive analysis about the combination condition of rainwater collection management and different types of landscape...
Yannan Wang
As a social application, social App has a wide user base and has a large market in smartphone application. Therefore, the research on social App design is very important. There are some problems with the design of many social apps, which affect the user experience. A good social App design should be...
Wenjia Gong, Yongchao Tao, Wencheng Xiang, Xianghu Wu
In this paper, we present improved methods of credit scheduling algorithm of Xen. By using gray-box knowledge reasoning technology, we are able to identify the IO task in the internal workload of each virtual machine. By using this information of the internal workload, we proposed a Boosting mechanism...
Zehu Jin, Mo Jin
The "One Belt and One Road"(OBOR) region occupies a central position in the global energy supply and is the main source of China's energy imports. OBORenergy cooperation has great potential. There are many areas of cooperation that can be focused on. But the potential for cooperation are not fully released,...
Wenfa Zhu, Huizhen Ma, Haomin Liu, Wenbing Yang
Under the action of temperature, the change of temperature gradient exists in the vertical direction of the track slab in its structure. The temperature gradient will arouse the bending deformation between the track slab and the mortar cushion, which will result in the separation of the track slab layer...
ChaoJun Wei, Shuzhen Zou, Biaohong Tao, Weizhan Wang
Taking Jiangxi Science and Normal University as an example, this article applies rain flood management into campus landscape design, utilizes the runoff coefficient method to calculate the amount of collectable rainwater in campus, further puts forward economical and practical rainwater collection and...
D. Luo, Y. Liu, C. Wang, X. Tan
In this paper, we study the observability inequality on a kind of linear parabolic equation.To show the observability estimate, we first derive the inequalities about the norms of the solution and its gradient, then reduce a lemma of inequality from a corollary directly[1]. At last, combing these inequalities...
A.S. XIE, D.X. LIU
The modern intelligent optimization/search algorithms were broadly classified, and some brief analysis and comment were made. Then we revealed some optimization rules implied in the benchmarking philosophy, which provided good inspirations for designing of modern intelligent optimization/search algorithms.
Yun You, Lin Li
Fault tree analysis (FTA) is a widely used method in the system safety analysis. In this approach, the logical relationship between accidents may occur and their various reasons is expressed in an arborescence, which is called fault tree analysis. By qualitative and quantitative analysis of the fault...
Jeeweon Jung, Heesoo Heo, Ilho Yang, Sunghyun Yoon, Hyejin Shim, Hajin Yu
In this paper, we propose a d-vector based speaker verification system in which raw-audio-CNN is used as a d-vector extractor instead of a conventional multi-layer perceptron. Because raw-audio-CNN takes raw wave signals as input, traditional acoustic feature extracting methods such as mel-frequency...
Shi Li, Kai Yan, Jinsheng Li
Through the spot investigation and research, and watching the CBA basketball referees' on-the-spot cutting, this topic using literature method, observation method, system analysis method, mathematical statistics method and logical analysis method, combined with the self-designed "basketball referees'...
Jingmei Yang
In recent years, many cities in our country have been surrounded by garbage, and the output of domestic garbage has soared. As a result, the associated disposal capacity fails to meet requirements and the environmental pollution is serious. Under this background, this article is based on the principle...