Proceedings of the International Conference on Communication and Electronic Information Engineering (CEIE 2016)

Session: Applied Computing & Information Technology

40 articles
Proceedings Article

Perfection of the Programming Design for Medical College Internship Files with the Utilization of Android Mobile Phone Client

Xiaomeng Liu, Changguo Xu, Ju Wang, Xiaolin Hu, Seng Li
This paper describes the design of the medical intern students' file program, which utilizes the universal application of Android mobile clients to solve the hard problems from the collection of the students' files after they enter the internship places, mainly including the three aspects: the program...
Proceedings Article

Data Mining Techniques For Customer Relationship Management

Feng Guo
Data mining has made customer relationship management (CRM) a new area where firms can gain a competitive advantage, and it plays a key role in the firms' management decision. In this paper, we first analyze the value and application fields of data mining techniques for CRM, and further explore how data...
Proceedings Article

Decision Analysis of the Weather Log By Hadoop

Hao Wu
The data mining ability on Hadoop is much more rapider than that of traditional method, and coding is much simpler. It is mainly to quickly analyze the weather log using the parallel processing on Hadoop. The system realizes the analysis and processing of the weather log, utilizing the Hadoop core technology...
Proceedings Article

Defense Mechanisms for Internal Dos Attack in a Cloud

Nina Shu, Huaixi Wang, Tingting Li, Chen Wang, Fang Fang
In CSA report entitled "The Notorious Nine: Cloud Computing Top Threats in 2013", DoS attack is ranked fifth. In the practical cloud computing environment, DoS attack is always the most effective and destructive threat, bringing a great impact on the cloud. We focus on VMware vSphere which is one of...
Proceedings Article

Falling-Action Analysis Algorithm Based on Convolutional Neural Network

Wei Liu, Jie Guo, Zheng Huang, Weidong Qiu
This paper proposes a deep learning method - convolutional neural network to analyze human falling-action in video surveillance, so that we can recognize the falling-action of human body accurately in the shortest time. Firstly, vibe algorithm is used to extract the foreground and some methods of image...
Proceedings Article

A Fast Prediction Algorithm for Sina Weibo Users with Time Correlation Cognition

Xixu He, Leiting Chen, Min Zhang
Social network is the most important way of information exchange and communication at present, which is a key step to study users' behavior in social network. Current methods for users 'behavior classification are more diverse, but it is difficult to assess the impact of specific events in different...
Proceedings Article

Research for Motion Prediction System of Multi-Axis Motion Controller

He Yin, Quangang Wen, Zhigang Hao
In this paper, the problems of multi-axis motion controller were analyzed, and then a predictive control method of controlling stepper motor speed for execute G code file was proposed, the principle of the method being analyzed and deduced. The method was emulated in Matlab, being analyzed and compared...
Proceedings Article

The Integrated Safety Supervision and Emergency Platform of Urban Rail Transit Construction

Ming Zhang
The paper proposes a framework for safety monitoring and emergency platform by means of analyzing the demand for sharing information on control and management as well as the measures taken in safety guarantee system from the perspective of importance of safety in constructing urban rail transit. It analyzes...
Proceedings Article

New Decision Making Models of Processes Synchronization in Distributed Systems

D. L. la Red Mart¡nez, J. C. Acosta, S. M. Gerzel, A. R. Rambo
In the groups of processes of distributed systems, it is necessary to make decisions based on agreements; these processes may operate in distributed teams; processes may require the use of shared resources in the form of mutual exclusion. The following question arises: what kind of decision models will...
Proceedings Article

Chaotic Sequences Generated by Chaotic Quantification under Finite Precision

Jian Zhang, Yinxia Zhu, Hongpeng Zhu, Jian Cheng
Finite precision is the first problem to be solved when chaos is applied to practical communication systems. In this paper, the influence of calculation precision on the properties of chaotic sequences is studied, and some valuable results are given. And a new method of chaotic quantification aiming...
Proceedings Article

The Numerical Solution of an Inverse Two-Phase Stefan Problem

Tingting Li, He Yin, Quangang Wen
In this paper, the author studies an inverse two-phase Stefan problem obtained from a one-dimensional model of ice melting. This problem can be reduced to solve two hot-conduction equations. One is posed, so we can use the difference approximation method to solve it. The other is ill-posed. We first...
Proceedings Article

To Establish File System in Industrial Storage Management

Huizhong Liu
Aiming at the Nand flash which is widely used in industrial storage management, the embedded file system named "jkffs" is established. In "jkffs", a direct addressing algorithm is described; tnode-tree, variable-tnodelength are used to address most kinds of nand flash; the method of chunk group is mentioned...
Proceedings Article

Hole Repair Algorithm in Hybrid Sensor Networks

Jian Liu, Bohao Qu, Hongyan Xu, Xiaowei Hu, Zhiqi Zhao, Yong Feng
In Wireless sensor network, node error, energy depletion and other factors will lead to the appearance of hole which will cause network failure. In order to make the network more efficient, repair method based on the hybrid network model is proposed, namely activating a number of non-active nodes and...
Proceedings Article

A Class of Trees Having Strongly Super Total Graceful Labellings

Xiyang Zhao, Junqian Shao, Bing Yao, Xiaomin Wang
Total graceful labelling is a new graph labelling of graph theory. We define strongly the total graceful labelling and determine the existence of a class of trees having perfect matchings and strongly total graceful labellings. Our methods can be easily transferred into efficient algorithms.
Proceedings Article

Parameter Identification of Underwater Glider Based on Particle Swarm Optimization

Liming Wang
An accurate model for an underwater glider is important for the design of a high-performance underwater glider control system. The performance of such control systems is influenced by the parameter variation of underwater glider under real operation conditions. In this paper, the mass parameters of an...
Proceedings Article

Applying Of F2 (0.004) Forecasting the Number of Tourists in Sanya

Xuebin Huang, Hongxu Wang, Zhen Chen, Xi Zhang
The prediction formula of F2 (0.004) relies on inverse fuzzy numbers, the difference of historical data and the differential-difference of the historical data. F2 (0.004) is a fuzzy time-series forecasting model. This paper reports the application of F2 (0.004) on forecasting research about the historical...
Proceedings Article

A Reversible Data Hiding Scheme Using Image Interpolation

Xiangguang Xiong
Reversible data hiding scheme can completely recover the original cover image after the embedded secret data have been correctly extracted, which has become a hot topic of data hiding. However, the embedding capacities of these existing reversible data hiding schemes are usually rather limited. In this...
Proceedings Article

A Novel Solving Ambiguity Algorithm for Uniform Circular Phase Interferometer

Kaiqiang Ren, Zhengbo Sun
The direction finding accuracy of phase interferometer is severely impaired in the presence of phase ambiguity. In this paper, a novel solving ambiguity algorithm is proposed to solve this problem, which is suitable for uniform circular array with arbitrary number of sensors without the need of unambiguous...
Proceedings Article

Robust Speaker Recognition Algorithm

Wenchao Hao, Yi Chen, Lei Wang, Chunguang Li, Yueqin Feng, Qingyun Wang
The accuracy of speaker recognition algorithm would be decreased greatly due to the noise issues. According to noisy environment, a new robust speaker recognition algorithm is proposed in this paper. After Mel-frequency Cepstral Coefficient (MFCC) feature extraction, the features are calibrated with...
Proceedings Article

The Construction of International Corporate Social Responsibility Database of Developing Countries

U. N. Zhantore, Xiaohu Zh.
Corporate Social Responsibility materials and information documents are the results of researched and developed technologies. CSR database is a protecting system of investors and international enterprises' rights for their technologies in a government of developing countries. The developing countries...
Proceedings Article

A Novel Initialization Method for Symmetric Nonnegative Matrix Factorization

Jianqiang Wu, Haoxia Huang
Symmetric nonnegative matrix factorization(SNMF) has widely employed in many areas of applications. Authors proposed a novel Lanczos tridiagonalization-based initialization method for SNMF, which can be combined with existing SNMF algorithms and achieve higher efficiency. Experiments show that the SNMF...
Proceedings Article

An Improved SIFT Algorithm Based on Canny Operator and Hillbert - Huang Transform

Dengshan Huang, Xiaonan Wang, Qi Qin
Latent attribute prediction problem in social network provides a set of conditions for the construction of text classification models. The general framework of current latent attribute prediction problems is mapping the text in social network to vector space, along with a classification model to classify...
Proceedings Article

Estimation of Highway Section Traffic Flow Based on Toll Data

Junfeng Zhang, Yunpeng Wang, Haiyang Yu
With the rapid development of high-speed signal processing devices, the algorithm with large amounts of data can be implemented in real-time. This paper proposes a kind of signal processing system based on five pieces of multi-core DSP. Firstly, the interface circuit and program between FPGA and DSP,...
Proceedings Article

Consensus Problem of Markov Jump Multi-Agent Systems with Time-Varying Delay under Sampled-Data

Shili Shao, He Zhang, Changqing Liu
A lot of uncertain information is usually involved in the process of software system maintenance, and such information is difficult to perform quantitative analysis normally. In order to effectively solve the problem, this paper puts forward a measurement model of the software maintainability based on...
Proceedings Article

Reversible Data Hiding Based on Histogram Modification Using S-Type And Hilbert Curve Scanning

Ruisong Ye, Jin Chen, Xing Zhang
Standard bat algorithm is easy to fall into local optimum to handle complex functions with high- dimension. This paper proposes a hybrid chaotic mutation bat algorithm handling local convergence. The chaotic variables and mutation operator are introduced to bat algorithm to enhance its global search...
Proceedings Article

The Construction of Repository for Livestock Breeding Based on Mobile

Xiaobin Qiu, Hongqian Chen, Jun Qiao, Nan Zhou
For compressed sensing technology used in the field of information hiding, the traditional algorithm is to measure the entire carrier ( large redundancy - the entire carrier of the measured value) to hide. The calculation time is long and the stego image imperceptibility can be further improved. In this...
Proceedings Article

Porcupine Recognition Algorithm Based on Gaussian Mixture Background Modeling

Shouhua Yu, Liyi Xian, Wei Yang, Tao Zou, Lingfeng Yuan, Zhenguo Zhu, Qingsong Yang
Porcupine identification is a key part of porcupine intelligent monitoring system. This paper proposes a porcupine recognition algorithm based on Gaussian Mixture background modeling. The algorithm completes identification and feature extraction of the porcupine based on the calculation and withdrawal...
Proceedings Article

Age Prediction in Social Networks Based on Word Embedding and Tensor Learning

Ziyi Lin, Yan Wang
Latent attribute prediction problem in social network provides a set of conditions for the construction of text classification models. The general framework of current latent attribute prediction problems is mapping the text in social network to vector space, along with a classification model to classify...
Proceedings Article

A Kind of Millimeter Wave Signal Processing System Based on The Multi-DSP Architecture

Kaibo Cui, Xi Chen, Naichang Yuan
With the rapid development of high-speed signal processing devices, the algorithm with large amounts of data can be implemented in real-time. This paper proposes a kind of signal processing system based on five pieces of multi-core DSP. Firstly, the interface circuit and program between FPGA and DSP,...
Proceedings Article

Measurement Model of The Software Maintainability Based on Comentropy

Jia Wang, Yinchun Gao, Yijie Liao, Rong Jiang
A lot of uncertain information is usually involved in the process of software system maintenance, and such information is difficult to perform quantitative analysis normally. In order to effectively solve the problem, this paper puts forward a measurement model of the software maintainability based on...
Proceedings Article

A Novel Hybrid Bat Algorithm Based on Tent Map and Mutation Operator

Kairong Zhang, Xueqin Tang, Yaohui Zhang, Jian Gu
Standard bat algorithm is easy to fall into local optimum to handle complex functions with high- dimension. This paper proposes a hybrid chaotic mutation bat algorithm handling local convergence. The chaotic variables and mutation operator are introduced to bat algorithm to enhance its global search...
Proceedings Article

CS Technology Information Hiding Algorithm Based on Capacity Of Image Block

Pengyi Tian, Dinggen Xu
For compressed sensing technology used in the field of information hiding, the traditional algorithm is to measure the entire carrier ( large redundancy - the entire carrier of the measured value) to hide. The calculation time is long and the stego image imperceptibility can be further improved. In this...
Proceedings Article

A Special Class of Constacyclic Codes over a Non-Chain Ring

Liqin Qian, Minjia Shi, Lin Sok, Jingshui Ping, Solé Patrick
Let R= Fp [u,v]/, where u2=1, v3=v and p are odd primes. In this paper, we study (1-2v2)-constacyclic codes over R. Firstly, a new Gray map from Rn to (Fp+uFp)2n is given. Then we investigate some properties of (1-2v2)-constacyclic codes over R. Finally, we present an example of (1-2v2)-constacyclic...
Proceedings Article

The Creative Application of Computer Technology in Chinese Traditional Music Culture

Lanlan Lyu
Emotion is the soul of music. The main goal of music is to convey human affection. Using computer to analyze music emotion is very important. Furthermore, it is helpful in music understanding, music retrieval and some other interesting music related application. Guqin, as the symbol of Chinese music,...
Proceedings Article

Cryptanalysis and Countermeasures on Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Meiping Liu, Rui Jiang, Huafeng Kong
As an on-demand of computational resource, cloud computing appears to be part of a larger upward trend. Data owners can store outsourced data in the cloud and enjoy the high quality service. However, it brings new challenges, including the potential risks of the integrity of data, confidentiality of...
Proceedings Article

A Fast Method to Prevent Traffic Blockage by Signal Control Based on Reinforcement Learning

Mengjia Shen
In this paper, we present an efficient and fast way to prevent traffic blockage by controlling traffic signal. A new model is adopted to out program which is fused and developed by probabilistic model and cellular automatic model (CA model). Based on this model, we used wavelet neural network (WNN) for...
Proceedings Article

Research of Hybrid Database Middleware Architecture

Huiru Zhang, Xiaopeng Ji, Yongquan Yang
With the rapid development of techniques, more and more enterprise applications need to integrate the different information from diverse database sources. In order to resolve the problem of data sharing and collaboration among heterogeneous databases in the enterprise network, we propose hybrid database...
Proceedings Article

A Pragmatic Approach of Data Imputation Using Fuzzy-Based Swarm for Heart Disease Classification

Mohd Najib Mohd Salleh, Nurul Ashikin Samat, Kashif Hussain, Abdul Mutalib Leman
In this study, we investigate the classification problem of heart disease with incomplete datasets. Our pragmatic approach is to exploit the potential of complete data for selecting relevant features in incomplete datasets. We define our approach by implementing fuzzy-based particle swarm optimization...
Proceedings Article

Design and Realization of A Data Recorder

Jing Zhao
USB interface technology is more and more popular. It is applied into hardware design profiting from its advantages. It has high speed and convenience. This article introduces the design and implementation methods of a kind of airborne data recorder. It emphasizes the application of USB interface technology...
Proceedings Article

Design and Test of An EMCCD CCD201 Sensor Driving Circuit

Qiang Wu, Zhaohui Feng, Xuwen Li
In order to improve the imaging quality in extremely low illumination situation, a driving circuit of high resolution and sensitivity camera was developed to use back illumination. Frame transfer electron multiplying gains (EMCCD) with 1024ž1024 pixels named CCD201 from UK E2V technologies. The circuit...