Proceedings of the 2014 International Conference on Computer, Communications and Information Technology
Aviation Wiring Networks Fault Modeling and Simulation Based on Reflectometry
Xudong Shi, Chengzong Liu, Yulei Xu, Zhangang Yang
This paper presents a method to model and simulate the aviation branched wiring networks. According to the characteristics of the wiring networks faults, establishing a mathematical model of the branched wiring networks faults based on the reflectometry. Simulation reveals the propagation of high-frequency...
Research on Mobile E-commerce Model Oriented Manufacturing Service
Ping Wu, Feng Xiong, Qianqian Cao
With the arrival of the era of the Internet of Things, as well as the development of intelligent terminals and mobile Internet, manufacturing informationization has new requirements. The emergence of mobile e-commerce fits the requirements well and can enhance the control of manufacturing companies on...
Aviation Equipment Fault Information Fusion Based on Ontology
Yuan Wang, Qing Li, Yong Sun, Jinliang Chen
The designing institution, manufacturer and end-user jointly participate in aircraft maintenance. Maintenance data from multiple sources results in syntax and semantic conflicts, which have restricted integration and sharing of information on aircraft faults. To solve this problem, a solution based on...
Research on Emergency Logistics Support Capacity: Evaluation Model and Grey-AHP Method
Yong Liu, Xiaoning Zhu, Liujiang Kang, Xi Chen, Liyuan Feng
Based on the grey analysis hierarchy process, this paper introduces an evaluation method of emergency logistic support capacity. The comprehensive evaluation model is established according to the analytical hierarchy process which gives each key index a weight. To illustrate the effectiveness of the...
Research and Applications of Cloud Desktop
With the development of information technology, enterprises are increasingly challenged in internal IT equipment management. A huge number of PC devices made enterprises’ daily management of employees’ personal computer a complex task, and enterprises often need to invest lots of manpower and resources...
Production Resource Molding of Grid-based Steel-Auto Industry Chain
Zong-hui Xiong, Feng Xiong, Zhen Li, Tao Yu
This paper divides steel-auto industry chain from core business and value-added into steel unit, trade unit, machining unit, auto unit and general service unit in the light of the industry chain characteristics. Then product resource in the steel-auto industry chain is defined. By means of Grid technology...
Training Backpropagation Neural Network in MapReduce
Binhan Zhou, Wenjun Wang, Xiangfeng Zhang
BP neural network is generally serially trained by one machine. But massive training data makes the process slow, costing too much system resources. For these problems, one effective solution is to use the MapReduce framework to do the distributed training. Some methods have been proposed, but it is...
Augmented l1 Minimization with Weibull Matrix
Tailong Li, Qihao Zhang
The linearized Bregman iteration was successful used to find the sparse signal from the its noise measurements. It was proved that the iteration algorithm converges to the augmented l1 minimization problem . This paper mainly considers the measurement matrix A which is generated by the Weibull random...
The Research and Implementation of Mongolian Extension to Swing and Android UI Components
Zhongwei Zhang, Min Lin
Since the traditional display layout of Mongolian has its particularity and the relatively lagging of Mongolian character set included in the international coding standard, current mainstream development platforms have neither a completed set of UI components support Mongolian features, nor any well-developed...
Research on Passenger Market Competitiveness of China High Speed Railway and Railway Traffic
Shenggang Xu, Xiaoning Zhu, Liujiang Kang, Bing Long, Xiao Liu
High speed railway (HSR) in China will have a rapid growth in the following years. This paper first analyzes the different technological and economic characteristics of HSR, railway, air traffic and highway traffic and finds their unique comparative travelling distances. And then, three representative...
The Variable Wiener Index of Trees with Given Maximum Degree
Zhen Jia, Ning Lin, Hongjie Gao, Zhilin Chen, Zhiyuan Wang, Fuyi Wei
Wiener index proposed by Harold Wiener in 1947 is a very important topological index which is widely applied in chemical research. Gutman et al. extended the Wiener index to variable Wiener index. M. H. Liu et al. obtained the maximum variable Wiener index of trees with given maximum degree . n/2 In...
A Three-Phase Hierarchical Algorithm for Detecting Community Structure
Qiong Hu, Gongshen Liu
Social networks, such as Facebook, Twitter, Renren, Sina Weibo, are rising rapidly in the past dozen years and are taking a more and more important role in our daily life. There’s a common feature for social networks: they can be divided into subgroups, within which the network connections are dense,...
An Efficient Scheduling Algorithm for Cluster in Wireless Sensor Networks MAC Protocol
Yifan Zhao, Liyong Bao, Shaowen Yao
As one of the most important techniques in the 21st century, Wireless Sensor Networks(WSNs) receive a universal attention to the research on its key techniques. A solution is urgently expected to meet the higher-quality service requirements of new applications on the limited bandwidth of wireless networks....
Simulation and Implementation of 2-order Chebyshev Chaotic Sequence Based on FPGA
Tao Wang, Liyong Bao
The spread spectrum communication, as one of the most important techniques in the 21st century, receives a universal attention to the research on its key techniques. To study the performances of the chebyshev chaotic sequence in digital communication, mathematical analysis is made on the autocorrelation...
Privacy Security Issues under Mobile Cloud Computing Mode
Yan Yan, Xiaohong Hao
The paper introduced the basic concept and background of Mobile Cloud Computing, analysed the inevitability and necessity to provide mobile internet services based on cloud computing technology, proposed the service framework for mobile cloud computing, analysed potential security issues and relevant...
The Current Situation and Reconsideration of Information Technology Education Goals in China’s Rural Primary and Middle Schools
Information technology education goals are the core element of Information technology education. the appropriateness of the target determines the aptness of goal-directed function and evaluation function. This article is based on the significant differences of dualistic urban and rural areas in social...
Research on the Technology of Compressing Images in Developing Android Mobile Application
Shaowu Zou, Guibin Su
In the Android mobile applications, transferring pictures is the main reason that users consume their network data flow. Although efficient image compression method is an effective way to solve the problem, the image compression method does not be extensively studied on the Android platform. In order...
An Adaptive Model of Energy Consumption Predictor for Big Data Centers
Xuexia Xu, Gang Lin, Jianzong Wang
It is well-known that with the explosive growth of data, the age of big data has arrived. However, the power consumption of the big data center is huge and will be a major obstacle to its wider extension. How to save the power towards green computing is a potential tendency by utilizing the elastic computing...
A Comprehensive System Design for Website Secure Protection
Xiaoming Zhang, Cuixia Feng, Junlong Xiao
The secure monitoring of website is very important for the website information distribution. A kind of comprehensive system is proposed to assure the website operating reliably. It is based on technologies of watermarking and network measuring. The group 5-bit hiding scheme is designed to embed typical...
The Deployment of Resource Pool Based on Hyper-V Virtualization in Cloud Computing
Shuqian Liu, Pengdong Gao, Kaihui Mu, Yongquan Lu
To build a high-efficient cloud platform for virtual resources, we deployed a virtual resource pool based on Hyper-V Virtualization to meet people’s requirements. In this way, users can get a free VM from the pool in less time compared with creating a new one. A VM usually includes an operating system,...
Live P2P Streaming System with High Playback Continuity
Xianfu Meng, Wei Wu
P2P streaming system effectively fixed the overload and weak scalability shortcomings of C/S structures. It’s working principle is divided into tree multicast and mesh multicast. Compared to tree multicast method, mesh multicast method based on Gossip protocol has the characteristics of high fault tolerance...
Research on the Search Scheme for Rare Items in Unstructured P2P Networks
Xianfu Meng, Hao Wang
Search method is the key technique in unstructured P2P systems. The existing search methods are efficient for locating popular items, but not so for locating rare items. Therefore increasing the search efficiency for rare items would improve the network availability and user experience. In this paper,...
Course Reform for Developing Computational Thinking Ability of Tip-top Talents
Chunming Wu, Yuanrui Zuo, Yun Du, Xianchun Zou
Computational thinking (CT) ability is the basic quality of tip-top talents and an important index for evaluating the educational level of universities. With a deep analysis of content of CT ability, the computer course system is established, which is for developing the students’ CT ability. By combining...
Image De-noising Based on Mixed-domain Algorithm
Ting Yan, Liejun Wang, Jiaxing Wang
Aiming at images contain a large number of gaussian noise, edge blur etc, the paper proposes an improved fuzzy-shrink de-noising algorithm, which is in a mixed-domain. The results show that the algorithm not only have optimal de-noising effect, and also the processed image is closer to the original image...
QoE-Based Resource Allocation Algorithm for Multi-Applications in Downlink LTE Systems
Peiwen Tang, Ping Wang, Ning Wang, Van Nguyen Ngoc
This paper proposes a novel approach of cross layer resource allocation based on Quality of Experience (QoE) for multiple applications in downlink Long Term Evolution (LTE) systems. To maximize the level of system QoE while guaranteeing the fairness for users, we introduce a Particle Swarm Optimization...
Construction of ZCZ Sequence Pair Set with Flexible Parameters Based on Interleaving Technique
Mingyang Li, Weidong Peng, Peng Bai, Qianzhe Wang
Sequences with some desired correlation properties are useful in communication and radar systems for applications in identification, synchronization, ranging and interference mitigation. This paper put forwards a construction of zero correlation zone (ZCZ) sequence sets with flexible ZCZ based on interleaving...
Information Security Awareness: An Application of Psychological Factors – A Study in Malaysia
LeanPing Ong, ChienFatt Chong
Current technology advancement promotes borderless environment among individuals, organisations, global industries or public per se. It is akin to having a home but a physical house that is not visible. Looking at the present cybercrime trends, it cannot be disputed that information security is a key...
Design of a Cloud-based Print Manufacturing Management System
Yongbin Zhang, Yanping Du, Ronghua Liang, Shulin Yang
With the fierce competition and increasing cost of labor, printers face the problem that how to increase their production and efficiency. Information technology is one of the most used ways to achieve that object. Different applications, such as spreadsheet and Enterprise Resource Planning system are...
Adaptive Relief Feature Evaluation and Selection based on Grey Level Co-occurrence Matrix
Han Wang, Zhousheng Ma, Wenbing Fan
In image recognition, how to select informative features from the feature space is a very significant task. Relief algorithm is considered as one of the most successful methods for evaluating the quality of features. In this paper, it firstly provides a valid proof which demonstrates a blind selection...
Plant Three-dimensional Information Detection Based on Single Moving Camera
Dongbo Zhang, Xi Deng, Xiaojing Liu, Bin Zhang
Using non-contact sensing techniques and facilities to gain plant three-dimensional (3D) information can satisfy different kinds of needs in digital and intelligent agricultural production. 3D information could be used for vegetative modeling and monitoring or plant production management and operation....
A Novel Parallel Approach of Cuckoo Search using MapReduce
Xingjian Xu, Zhaohua Ji, Fangfang Yuan, Xiaoqin Liu
Optimization is a very common problem both in theoretical and practical scenes. However, at the same time, it is also been classified as a NP-hard problem in most cases, complex and hardware resource consuming. In order to evaluate the optimal value in a limited time and with a limited computing resource,...
A Novel Approach for Predicting the Probability of Inconsistent Changes to Code Clones Based LDA
Lili Yin, Liping Zhang, Min Hou, Dongsheng Liu
Inconsistent changes to code clones can create faults and, hence, lead to incorrect program behavior. Consequently, these clones increase the change effort when software is maintained. In order to improve software quality and to help programmers pre attention the hidden trouble of clone inconsistent...
SNR-based Adaptive Threshold Decision PN Code Acquisition Algorithm
Yaobo Shang, Ying Guo, Yuanhang Xu, Lifeng Han, Ruilian Tan
This paper proposes an algorithm based on noise power and SNR (signal to noise ratio) for adaptive threshold proposed PN code acquisition problem. First, this algorithm adjusts the threshold based on SNR through setting parameters, then smoothes the threshold waveform by median filters. It reduces error...
Parallel Particle Filter Algorithm and Its FPGA Implementation
Xiaofeng Lu, Shuhui Wang, Zhiying Du, Dongbin Pei, Dingyuan Zheng, Tongchun Zuo
Visual target tracking is the key problem in intelligent video processing. Particle Filter is classic and effective in visual target tracking algorithms, but it needs to analyze a large amount of probability statistic, leading to high algorithm complexity and low calculation efficiency. FPGA provides...
Design of a Simple 3D Surface Measurement System Based on Laser Sensor
Haitao Zhang, Congling Zhou, Zengpu Xu, Yongqiang Wang
Based on the principle of laser triangulation method, a surface measurement system aiming at the surface characteristics of small handicraft is constructed. The system controls rotation motion and vertical motion of laser displacement sensor to scan the object. Depending on the collected information...
A Two Hop Relay Receiving Method using LTE Transmission Technology
Ziqiang Chen, Yunxiao Zu, Weihai Li, Bin Hou
Aiming at the two hop relay’s MIMO(Multiple Input Multiple Output) transmission, this paper studied the two hops relay MIMO receiving model which is applicable to these situations: different data stream on the different antenna in the transmitter, different noise power in the transmit channel and SSD(Soft...
Real Time Multi-tasking Applying to AC800M Controller
Guan Wang, Xing Feng
In this paper I describe the demand and definition of multi-tasking. Introduce the specific methods and key technologies used in AC800M which applies digital multi-tasking controller. Practice has proved that these methods of priority, scheduling mechanis and so on can meet the requirements of real time...
Multimodal Algorithm Based on Particle Filter for Indoor Localization with Smartphones
Rui Tao, Haiyong Luo, Fang Zhao, Yongzhong Li
Location-based service is one of the most important demand in ubiquitous computing scenarios. While build-in sensors on smartphones can be used to provide location information for terminals. This paper presents a particle filter, dead reckoning, WIFI based multimodal algorithm for indoor localization...
Implementation of “Virtual Studio Online” Desktop
Ruoyun Zhou, Chu Qiu, Quan Qi, Bo Wang, Yongquan Lu
This paper describes the implementation of “Virtual Studio Online” (VSO) desktop, a virtual desktop system integrating virtualization with high performance computing. Through the plugin mechanism, the hybrid virtualization framework of VSO desktop solves the problem of mixed virtualized environment management...
A Study of Topologically Society and Culture space on Taiwanese Settlement
Most of the traditional settlement studies are based on text description of the social or cultural perspectives or drawing records of the spatial form of the settlements. It may be difficult to further compare the social and cultural space of a number of settlements, or to discuss the spatial structure...
A Virtual Backbone Construction Algorithm Based on Connected Dominating Set in Wireless Sensor Networks
Tingjun Shi, Xu Shi, Xuming Fang
For the lack of the backbone network in wireless sensor networks,this paper proposes a virtual backbone construction algorithm based on connected dominating set in wireless sensor networks(IPCDS).The algorithm gives priority to more energy and closer nodes in the choice of backbone nodes,which makes...
A Discussion on Automatic Reassembling of Shredded Paper via Similarity Measurement Models
Fanyu Meng, Wen Qian
Reassembling of shredded paper from a collection of randomly mixed fragments is a common application of computer vision technique. It plays an irreplaceable role in several applied disciplines, such as classical forensics, archaeology, and military intelligence. In this paper we address the reassembly...
A Security Protocol in UWB and WiFi Networks
Huayi Wu, Baohua Bai
In this paper, we studied a hybrid wireless network including UWB devices and WiFi devices together and analyze the characteristics of selfish behavior and the methods how to expose it. In order to improve the self-giving cooperation between the nodes in hybrid wireless networks and increase the fairness...
Research on Computer Language Behaviors from the Perspective of Logical Pragmatics
To analyze the computer behavior by the point view of the pragmatic logic, the computer behavior refers to the computer operation of the program execution. Because the computer program is a collection of pragmatic statements, so the computer behavior is a typical pragmatic behavior.
Improved Manifold Learning Algorithm for Data Dimension Reduction Based on KNN
Liming Liang, Falu Weng, Zhaoyang Chen, Zhen Zhong
In this paper, a new multi-manifold learning algorithm based on KNN algorithm is proposed in order to provide manifold learning model automatic parameters selection strategy. Basic ideas for such a algorithm is constructing a weighted norm as the variable of the intrinsic low dimensions expression function,...
Analysis of Software Release Problems Based on Fault Detection and Correction Processes
Haiyan Sun1, Jia He, Bingfeng Xie, Ji Wu
In this paper, the modeling of fault-correction process from the viewpoint of correction time is first discussed. By proposing a new cost model, further analysis on the optimal release time determination is presented, which is also based on the model incorporating both fault detection and correction...
Detecting Hot Topics in Sina Weibo Based on Opinion Leaders
Donghui Li, Yuqing Zhang, Xin Chen, Long Cao, Chuanfeng Zhou
Sina Weibo, as one of the most popular and fast growing social network, has gradually become the field where hot topics appear, propagate, and outbreak. In order to discriminate and find out hot topics in micro-blog information, we conduct a series of studies on Sina Weibo, and one of our key findings...
Design Channel Nonpersistent CSMA MAC Protocol Model for Complex Wireless Systems Based on SoC Methodology
Ibrahim A. Aref, Tarek A. El-Mihoub, Khadiga A. Ben Musa
This paper presents Carrier Sense Multiple Access (CSMA) communication model based on SoC design methodology. Such model can be used to support the modelling of the complex wireless communication systems; therefore the use of such communication model is an important technique in the construction of high...
A Solution for Beam Splitter Attack on BB84 Protocol
Huiyao An, Dunwei Liu, Tao Yu
In the practical Quantum Key Distribution (QKD) systems, the Fused Biconical Taper (FTP) technology beam splitter (BS) has wavelength dependent property. So Eve will get almost all of the secret information without being discovered in the beam splitter attack. This paper proposes a solution to solve...
Detection of Internet Water Army in Social Network
Kun Wang, Yang Xiao, Zhen Xiao
As related works had a few research on Internet Water Army in social network, specifically on the Internet Water Army who trends to lead people’s opinions, obscure the real voices and change public opinions in social network. To better understand what difference lie between Internet Water Army and legitimate...
Fast Multi-Baseline InSAR Phase Ambiguity Resolving Method with Low Computational Complexity
Ming Li, Haiping Wei, Liping Xiao, Zhiyong Suo
A fast multi-baseline Interferometric synthetic aperture radar (InSAR) phase ambiguity resolving method is presented. The ambiguity solution vector of the shortest baseline is first computed and used as a reference, and then the ambiguity solutions of all the other baselines are selected with logical...
System Development for Quality Evaluation of Fish Fillet Using Image Processing
Apinai Rerkratn, Anucha Kaewpoonsuk
This paper presents system development for quality evaluation of fish fillet using image processing. The proposed system consists of conveyer belt, Ultraviolet (UV) lamp, CCD Camera, electronic circuits, interface card and computer. K-means clustering and thresholding techniques are used for quality...
Study on the Application of Information Intelligent Farm
Xing Chen, Linpeng Zhai
In order to improve the production and the management level of modern farm, it is the inevitable way of intelligent farm to realize the scientific decision and management by using the information technology. In this paper, we analyze an intelligent farm of the overall framework, the structure of hardware...
Fuzzy Mathematical Model Based on Venture Investment
The measurement of the investment decision is studied by applying the fuzzy analysis method, through fuzzy number arithmetic and sorting method, gives the fuzzy analysis method of net present value (rate) under the condition of risk investment decision, thus solves the risk investment decision problem...
Option Pricing with the Credit Risk in Incomplete Markets
The paper considers the financial derivatives model with the credit risk. If the market is incomplete, we though the value of corporation value model, the credit risk will be introduced to options pricing. First of all, the general valuation formula in given about the Europe option under the condition...
Evaluating and Designing Smartphone Applications for Nursing Education
The smartphone has become a popular accessory in the pocket of many nursing students nowadays. They are widely accepted new devices much cheaper and more universal than PDAs. The use of smartphone applications would be the good supplement for nursing education. The smartphone provides a quick access...
FTP Upload Based on Multithreaded and Broken Transfer Resume Technology
Yimin Wu, Xin Meng
FTP has been widely used on the Internet, the current application and research mainly focus on the FTP download technology, but upload technology research is rarely involved, especially for single file multithreaded upload technology. Now days, users often need to upload some large files to the server,...
Modeling and Control of a Simulated Flight of a Mini Helicopter Using Matlab/Simulink
Mohamed Yacine Chachou, ZhiWen Liu, ZhiGuo Zhou, Abdelali Benchalal, Chemseddine Zerfaoui
In this paper, we present modeling and control of a simulated flight of a mini helicopter using matlab/simulink. First, we are interested in the analysis of dynamic modeling of helicopters. Indeed, based on the hypotheses established beforehand, we obtain some simplifications of the model for the cases...
An Iterative Multiuser Detection/Decoding for Nonbinary LDPC Coded MC-MFSK Multiple Access Systems
Szu-Lin Su, Her-Chang Tsai
This paper studies an iterative multiuser detection and decoding for nonbinary low density parity check (LDPC) coded multicarrier M-ary frequency shift keying (MC MFSK) multiple access system to increase system spectral efficiency under specific signal-to-noise ratio. At multiuser detection side, soft...
The Connection of Teaching and Computer to Improve the Teaching Quality
Computer is one of tools which have the great impact on human. In fact, it was found everywhere and at all times. It shortens the distance of people and becomes a part of people’s life. It also has same great help to teaching. Computer assisted instruction (CAI) has an importance on modern teaching methods...
A New Blind Fingerprint Alignment Algorithm used in Biometric Encryption
Xinglong Zhang, Quan Feng, Kang He
Fuzzy Vault is an effective method to ensure the security of template information. However, this is done after the alignment of the template and the sample. In this paper, an improved blind fingerprint alignment using maximum curvature points of fingerprint is proposed, which are extracted on the dense...
Density Estimation of Unidirectional Crowds
Liang Zhang, Tao Deng, Yaling Song, Yi Fan
An improved pixel-based method is proposed in this paper aiming at density estimation for unidirectional crowds. It is a common situation that the crowd gathered facing towards the same orientation where hazardous events may be prone to occur due to high density, such as crowds gathered in front of a...
An M2M-Based Bus Information System Design and Implementation
Juanjuan Jin, Baoqiang Jin
With the rapid development of urbanization and mechanization, the contradictions of supply-demand imbalance of urban traffic is increasingly intensifying, particularly the bus supply-demand relationship, which brings about urban problems directly and restricts the socio-economic development. In this...
Integrated Switched Beamformer for 802.11ac application
Jhu-Jyun Jhang, Chung-Ching Lin, Ying-Lou Jiang, Jeng-Rern Yang
This paper present a fully integrated RF front-end beamformer for 802.11ac system. The principle of beam control is to use the array antenna arrangement circuit to control the phased array antenna; the antenna arrangement structure is to compensate for the distance difference caused by such a constructive...
Railway Freight Dispatching Telephone System Based on VoIP in Wireless Networks
Jun Xiao, Feng Liu
Railway freight dispatching telephone system is a kind of railway dispatching telephone systems, providing freight coordinating communication service. It requires high transmission data rate, high interactivity and customizable service in a high mobility environment. VoIP in wireless networks is a promising...
Disc Brake Equeal Analysis of Car
Shukui Han, Rui Guo, Yi Cai, Xubo Tian
This paper carries on automotive force when car is braking, braking force is established. The distribution of braking force is analyzed. This paper presents a method to analysis on brake equeal. A new finite element model of brake system based on surface contact was established. After contrast of the...
Blind Identification of Photorealistic Computer Graphics Based on Fractal Dimensions
Yingda Lv, XuanJing Shen, Guofu Wan, HaiPeng Chen
The perceptual differences between photographic images and CG primarily exist in the colour and the surface texture. In this study a blind identification algorithm was proposed to identify CG, which is based on fractal dimensions. Firstly, change the image’s colour space from RGB to HSV and extract fractal...
An Improved Outdoor Camera Calibration Method Based On EKF
Shaopo Zhu, Dong Hu
An improved outdoor camera calibration method based on Extended Kalman Filter (EKF) is proposed in this paper. GPS coordinate system is introduced to establish world coordinate system in the calibration procedure. According to the characteristics of GPS coordinate converted to plane coordinate and the...
Study of Multi-aircraft Conflict Resolution and Algorithm Optimization Based on Genetic Algorithm
Jingjuan Zhang, Jun Wu, Tianxiao Song
In order to resolve the conflict among multiple aircrafts, a method to get the optimal route quickly and accurately based on genetic algorithm is proposed. By applying genetic algorithm, the conflict is resolved between two aircrafts as well as among multi-planes. An optimization method to accelerate...
Face Spoofing Detection Using Local Graph Structure
Housam Khalifa Bashier, Siong Hoe Lau, Pang Ying Han, Liew Yee Ping, Chiang Mee Li
Face spoofing attack is one of the recent security traits that face recognition systems are proven to be vulnerable to. The spoofing occurs when an attacker bypass the authentication scheme by presenting a copy of the face image for a valid user. Therefore, it’s very easy to perform face recognition...
A survey of Video Watermarking based on Motion Vector
Yan Liu, Ping Zhou
Digital watermarking is the process of embedding information into a digital signal in a way that is difficult to remove. The digital watermarking for video is an effective method to protect the video copyright. This paper introduces the basic classification of video watermarking and the basic concepts...
Research on Returned Logistics and Its Models for Wasted Electrician Product
Qian Zhang, Zhongming Shen
Operational models for waste recycle is established based on the theory of closed loop supply chains and an analysis cast on centralized and decentralized decision making in the process of waste recycle with game theory adopted. The present situation and existing problems are subsequently discussed before...
The Non-Line-of-Sight Channel Modelling and Analysis for Airport Surface
Fengxun Gong, Yemeng Che, Yanqiu Ma
A channel model has been established by analyzing the characteristics of the non-line-of-sight (NLOS) environment in a domestic airport surface and referencing mobile communication and air channel research. Through deducing the analytical formula of Doppler spectrum that incident angle in Gaussian distribution,...
Investigation of 3D Modelling and Virtual Reality Systems in Malaysian Automotive Industry
Maryam Mousavi, Faieza Abdul Aziz, Napsiah Ismail
Automotive industry uses virtual reality (VR) and three-dimensional (3D) modelling at different stages like many other industries in the world. To choose the right technology for the right purpose, it is crucial to identify the existing technology used, their benefits as well as barriers. Six automotive...
Application of Geological Modeling Technology in 110 Block of Changchunling Oilfield
Yidan Liu, Jun Xie, Ningning Meng, Weihua Li
The 110 is an ascertained but undeveloped block in Changchunling area. It is affluent in geological reserves, and has greatly development potentiality. This paper use the software of Petrel to establish three-dimensional fine modeling which include structural models, porosity models and permeability...
A Novel Super-resolution Approach Based on Supervised Canonical Correlation Analysis
Suna Xia, Gangmin Zheng, Yuanyuan Ma, Xiaohu Ma
In this paper, we use supervised canonical correlation analysis (SCCA) method to extract features which maximize the correlation between HR and LR face images. Then Relationship Learning (RL) is used to construct the mapping relationship between the face coherent features. SCCA method comprehensively...
Equipment for Diluting Air Pollution
Alex Nemes, Helga Kovács, Arpad B. Palotas
The quality of air we breathe determines our general health and comfort. Even though this fact is well known, people get used to the effects of the urbanized lifestyle with all its toxic implications. Air pollution includes all contaminants found in the atmosphere, which comes from – amongst others –...
Design and Fabricate a Continuous Pork Roaster using Infrared Heating
Teerapot Wessapan, Theerapong Borirak
Roasted pork is a favorite dish in many different cultures, and countries. At present, the roasting process is highly polluting, emitting high carbon dioxide loads to atmosphere, particulate pollution that can pollute the surrounding environment. An electric roaster is just as suitable for roasting the...
Standardization of Cluster Members Processes
Cechura Tomas, Broum Tomas, Miller Antonin, Kleinova Jana, Simon Michal
The aim of the paper is to create a methodology to support decision making for dealing with processes within a cluster. First the article focuses on a list of potentially suitable processes for a coordinated cluster approach, then the relevant process parameters are defined. The main part is to determine...
Simvastatin Partially Prevents Bone Loss in Tail-suspended Rat:Bone Mineral Density and Histomorphometry Analysis
Faming Tian, Xinhao Fan, Lei Xing, Zhiwei Lv
Background: Skeletal unloading induces osteopenia in the loaded bones. Simvastatin, as one of the HMG-CoA reductase inhibitors for lowering lipids, has been demonstrated its potential benefit in bone formation, while no study reported whether simvastatin could prevent the bone loss in unloaded bone....
Structure of SMART Logistics Company System
SMART logistics company system - of SMART LCS, based on the philosophy of advanced process control, allows for comprehensive coordination company processes and flows. The main structure of the of SMART PLS attributes is to create a comprehensive, multi-level, enterprise logistics system, with some degree...
The Application of Image Processing Techniques in Analysis of Cigarette Packets Surface Defects
Yongdong Qu, Banggui He, Geye Liu
In the work of the GDX2 packaging units, commonly appear the defects of BOPP heat-sealing face of the hard small box such as relaxation, wrinkles, bubbles etc. So analyzing the heat sealing defects and has become the primary task to improve the GDX2 packaging units quality. This article based on the...
Reinforcing and Toughening Effect of Plant Fine Roots on the Soil
YunYan Zhou, Kun Xu, JianPing Chen, XiaoMei Wang
In the prevention of soil erosion, vegetation is an economical and environmentally friendly control methods, the most basic indicators of the plant protection design is solid soil function of plant roots. From the perspective of composite the fine rooted soil as a kind of special composite materials,...
A Probabilistic Fatigue Model for Quasi-Brittle Materials
Rena C. Yu, Luis Saucedo, Gonzalo Ruiz
We aim to develop a new fatigue model valid for quasi-brittle materials like concrete, which properties have considerably larger standard deviation than metals. Having this in mind, we fit the measured strength data with a three-parameter Weibull cumulative distribution function and in turn take it as...
A Robust Multi-objective Desirability-based Simulated Annealing for Optimization of Sustainable Supply Chain Network Strategic Design
Kannan Govindan, Ahmad Jafarian
In this article, we investigate the optimization of sustainable supply chain network (SCN) strategic design problem. The proposed SCN is composed of four echelons including plants, distribution centers, cross-docks and retailers. The problem has been mathematically formulated as a multi-objective optimization...
Comparative Free Radical Scavenging Activity of Seed Coat Extracts from Caesalpinia Pulcherrima and Delonix Regia
Wancheng Sittikijyothin, Wasana Sasein, Patcharaporn Rumpai, Duangrudee Cherdwongcharoensuk
Caesalpinia pulcherrima and Delonix regia are generally grown in Thailand and used in traditional medicine having medicinal therapeutic effects. The antioxidant ability of seed extract has been presented by few investigators whereas no data has been reported the different antioxidant activity between...
The Application of RFID in Warehouse Management
The paper emphasizes how to set up and operate the RFID in the warehouse work of storage, shelves, transfer, tray adjustment, sorting, delivery and inventory process, particularly introduces the information interaction and seamless docking between the RFID background application system and warehouse...
Statistical Analysis on the Publishing Indices of Books,Newspapers and Magazines in China
Xiaofeng Zhu, Xidan Yang, Shuyang Zhang
First the authors through understand the opportunities and challenges which the publishing industry faced in the development in China, determine printed sheets of the books, newspapers and magazines is one of the important Indices. Then use statistical analysis method of hierarchy analysis and regression...
Social Computing Empowered Cloud Service on Quantitative Investment
Li Zhang, Peng Chen, Jun'e Liu, Qian Li
The quantitative investment achieves investment philosophy with the help from mathematical model, implements a trading strategy with program. The rapid development of the securities industry has changed the quality of the investor. Investment approach with a combination of means of information technology...
The Research on Planning the Containers’ Concentration and Untwining for Container Storage Station of Port Enterprise
Ting He, Xiaohong Dong, Hanchuan Xu
Aiming at improving the service production efficiency and service level of port enterprises effectively, a planning and optimization model with the characteristics of multi-objective and discrete value domain is developed for the containers’ concentration and untwining between container storage station...
Simulation Study on the Flow Field of Muffler Array in Air-cooling Platform Based on Porous Media Model
Peng Xie, Bin Zhang, XiaoKuan Lee, ZhongXu Kang
Porous medium theory is introduced to simplify the muffler array installed in air- cooling platform in this paper. According to the definition of porous medium, the discussion and analysis on geometric structure and flow field characteristics of muffler array show that, the using of porous medium equivalent...
Design of Double-Precision Floating-Point Division and Square Root Based on SRT Algorithm
Jiyang Chen, Yuanxi Peng, Yuanwu Lei, Ziye Deng
In the process of scientific computing, digital signals processing, communication and image processing, division and square root are the widely used basic operation. This article designs a unit of floating-point division and square root based on SRT4 algorithm. It reduces the iterative division and square...
Performance Analysis of Directional Cooperative Communication System
For specific military use of the environment, this paper study the performance change of the system used directional antennas and exploratory study the power optimization based on the symbol error rate(SER) under amplify-and-forward protocol (AF). Firstly, cooperative communication system model based...
Remote Management and Maintenance System Based on LPC2292 for the Vehicles
In this thesis we proposed a solution of the remote management and monitoring system for the vehicles, accounting the actual demands of the CAPF. This system is based on the advanced technology of domestic and foreign vehicle monitoring systems. The fault collection terminal is an embedded system based...
Study on the Strategy of Acceleration Factor in Particle Swarm Optimization Algorithm
Zhe Li, Peng Bai, R.-L. Tan, Y.-B. Shang, J.-J. Wang
Concerning the problem of Particle swarm optimization for solving complex multimodal function could easily fall into premature convergence, this paper proposed an algorithm of dynamically changing acceleration factor particle swarm optimization (CAPSO). According to the motion characteristics of the...
The Resource Allocation Algorithm of LTE Systems Based on Proportional Fair Particle Swarm
Yunxiao Zu, Jing Gao, Jingbo Guo, Lin Shao
Resource scheduling technology is an important part of radio resource management. The resource allocation for real-time traffic in LTE systems is studied in this paper. The system model is established based on margin adaptive criterion. The proportional fair criterion is added to the particle swarm algorithm,...
Design and Implementation of Automatic Marking System for Programming Questions Based on Script Technique
Yali Liu, Wenyan Chai, Xiurong Li, Xiaoxing Chu
After analyzing current status of automatic marking methods for programming questions, a novel script-based approach was proposed for designing marking rule. This paper studied the design and implementation of an automatic marking system. The system marks console programs written in a plurality of programming...
A Method for Satisfaction Degree Decision Making with Preference Information on Criteria Weight Obtaining by Consistency Degree of Security Chip Design
Tao Chen, Xingguo Luo, Wei Li, Jiaxiang Gu, Ninglong Zhu
In order to solve the problem of traditional security chip architecture design totally depending on the subjective experience decision, as while as overcoming the compatibility of multi-attribute decision completely ignored the degree of subjective experience, a method for satisfaction degree decision...
Research and Application of Communication between Siemens TDC and PLC based on DP
Xiao-huai Ren, Fei Zhang, Jing Li
PLC always need to share in-out data each other on production control process. DP Net is widely applied at the advantage of simple structure, high and stable transmission speed. This article take the testing warm rolling mill for an example, introduce the PROFIBUS-DP communication between SIMATIC TDC...
Sumo Robot Research
In recent years, with of robot technology progress and robot science activities, robot technology obtained fast development. Now robot technology has been widely applied to measure, monitor, industrial control, diagnosis, scientific experiments each domain. The system USES the Atmega128 single-chip Atmel...