Proceedings of the 2016 International Conference on Communications, Information Management and Network Security

+ Advanced search
90 articles

IPv6 Enabled Smart Home Using Arduino

Mahesh Patil, Sumathy Subramaniam, Rajendra Hegadi
Internet of Things (IoT) is a widely emerging technology making our lives smarter with smart applications. One of its applications is smart home where any device or object at home can be made smart and can be controlled via internet or in a local network. All recent projects in smart home are using IPv4...

A Summary of the Application and Research of the Command and Control Organization Theory in Emergency Communication Support

Yiwei Ji, Xuejun Ren
In recent years, the emergency communication support has been fully developed. With the progress of the times, the problems of the emergency communication support are constantly changing, and new methods are needed to solve the problems. This paper summarizes the current researches on the problems in...

Automation Analytical Model of Familial Malware Based on Communication Features

Yiyang Wang, Shaoming Chen, Chongbin Wu
Up to date, the Internet industry has done a lot of research on malware analysis, which brings in effective malware detection. However, in terms of familial communication feature extraction and detection, a very mature product has yet to be seen. Given this situation, this paper tries to establish an...

Logistics Distribution System Based on Internet of Things

Xiaohan Li, Jialiang He
This product that can provide distribution services and improve the utilization rate of freight resources. Its construction goal is to use high-tech means to achieve intelligent logistics as the core, greatly accelerating the circulation speed of the goods in the logistics process, reducing manual operation...

An Intelligent Service System for Outdoor Cycling

Huiyan Wang, Jialiang He
This product aims to make sure that the rider concentrate on the road. Therefore, we adopted an intelligent hardware+APP+Data platform. Its unique feature is that low-cost and simple electronic equipment which has the same function, not only flexible system design, but also LED lights as a navigation...

Intelligent Charging Query System of Electric Vehicles Based on Internet of Things

Qinshan Han, Jialiang He
The key technologies of Internet of Things includes RFID technology, sensor network and detection technology, intelligent technology, it has been applied in various areas and plays a vital part in normal life. This paper introduces the concept of electric vehicle charging inquiry system, operating mode,...

Design of Low Power and High Linearity Gm-C Low Pass Filters

Xiushan Wu, Yanzhi Wang, Qingying Chen, Xingzhou Jiang, Renyuan Tong, Jianqiang Han, Siguang An
This paper presents two kinds fully differential operational transconductance amplifier (OTA) circuit, one is a flipped voltage follower circuit structure (OTA1), the other is a source follow circuit structure (OTA2). The two OTAs' transconductance can all be accurately set by the control voltage. Two...

Partial Discharge Signal De-noising Method Based on EMD and High Order PDE

Ganggang Zhao, Fujiang Mo, Hui Chen, Peipei Wang, Mengsu Xu
The voltage level of power system is continuously improved. Partial discharge (PD) test is an important means to detect the insulation performance of high voltage electrical equipment. The electromagnetic environment of the test site is complicated. The extracted PD signal is submerged by noise. In order...

Research on Noise FM Jamming Anti Frequency Domain Filtering to GPS M Code Signals

Jinglei Guo, Fangling Zeng, Jiawei Wang
The new generation of GPS signal is added the M code which has a separated spectrum and wider bandwidth, so we use the noise FM jamming to interfere M code. Combined with the receiver frequency domain filtering anti-jamming technology, the effect of the frequency domain filtering of noise FM jamming...

A Feature Similarity-Based Multi-Resolution Method for Image Registration

Zhihui Wang, Yuzhu Xie, Yuejiao Fan, Wenbo Xu, Qila Sa, Jinlin Li
We present a method to automatically register images based on feature similarity and image decomposing by multiple wavelet-transform. We use GHM multi-wavelet to decompose the image, then use mean-shift image segmentation algorithm to extract the image feature. We serve the regional features as matching...

Modeling the Power Consumption of Multiple Typical Applications Based on Linux

Xiaoying Wang, Kunchang Li, Guojing Zhang, Lei Zhang
Since huge power consumption of large data centers has become a crucial problem recently, power models, especially precise models, turn out to be important for service providers to learn about the application status in order to make wise decisions. In this paper, we focus on the power modeling of typical...

Optical Layer Modulation Format Conversion in OFDM-Based Flexible Optical Networks

Hejun Zhu, Liehuang Zhu
In this letter, we proposes and experimentally demonstrates an optical layer modulation format conversion technique from quadrature phase shift keying (QPSK) to 16 quadrature amplitude modulation (QAM) in orthogonal frequency division multiplexing (OFDM)-based flexible optical wavelength division multiplex...

The Broken-Point Continuingly-Transferring Design Based on Satellite Network

Jianmin Mei, Guiqiang Ni, Jinsong Jiang, Yingzi Yan, Qing Liu, Junxian Long
High channel bit error rate, long delay and other characteristics of the satellite network, will cause the file in the process of transmission is easy to interrupt or packet loss. In order to improve the efficiency of file transfer, the server sends data once, while multiple earth station clients receive.,...

Assessment of Rehabilitative Effects of Motion Sensing Game on Mentally Retarded Children

Hanxue Xu, Zhenjun Li, Xiaowei Chen, Jiahao Wu, Yun Xu
This study explored the rehabilitative effects of motion sensing game("rehabilitative training game system V1.0") on training mentally retarded children. 112 children were chosen as participants in the experimental group from 187 mentally retarded children while the other children in the control group....

The Design and Implementation of High Precision and Low Power Wireless Temperature Sensor

Yanping Wang, Hanxi Li, Yuchen Wang, Huan Le
This paper presents a design method of high precision wireless temperature sensor, the sensor consists of 16 high-performance low-power processor MSP430F149, Sub-1G RF transceiver chip SI4432, four-wire positive temperature coefficient temperature sensitive resistor PT100, the high resolution of AD conversion...

Low Density Parity Check Coding in OFDM-PON Systems

Chunlei Zhang, Xiao Xiao, Kai Zhao, Xunfa Yang
To meet the demands of different high bandwidth service, OFDM-PON has been considered as one of the candidates for NG-PON2. In this paper, downstream transmission performance based on LDPC-OFDM coding PON system is studied. The simulation results show that employing the LDPC-OFDM coding in PON system...

Joint PAPR Reduction Scheme in OFDM-PON Systems

Chunlei Zhang, Kai Zhao, Xunfa Yang
To meet the demands of different high bandwidth service, optical orthogonal frequency-division multiple access-based passive optical network (OFDM-PON) has been considered as one of the candidate for NG-PON2. In this paper, a joint peak-to-average power ration (PAPR) reduction scheme in OFDM-PON system...

Body Falling Gesture Recognition Based on SOM and Triaxial Acceleration Information

Hongbo Chen, Qing Gao, Tao Feng, Yu Liu, Xinhua Xiao
In order to improve the performance of fall detection system for the elderly based on triaxial acceleration sensor, and accurately to judge the fall direction of human body, a method was put forward based on self-organizing map neural network (SOM) and the information of triaxial acceleration sensor...

Voice Analysis of the "White Peony Tune" of Linxia Huar Based on Acoustics

Yanbing Ding
The paper collected the speech signal of Linxia Huar "White peony tune" which contain mountain singing, cheerful singing and tearful singing with experimental phonetic analysis method. And complete the signal tagging and parameter extraction. In the course of the study, the fundamental frequency and...

Design and Simulation of Digital down Converter Based on System Generator

Fengling Zuo, Jietao Diao, Zhaolin Sun, Nan Li
In this paper, the general structure of digital IF receiver is analyzed, based on the platform of system generator, the author design the digital controlled oscillator and a decimation filter model in the MATLAB/Simulink.

The Impact Analysis of High Speed Railway on City Accessibility in Henan Province

Kaiguang Zhang, Mingting Ba, Hongling Meng
Accessibility level is an important indicator to measure the perfect degree of traffic network, *-shaped high-speed railway network in Henan province, forming in the next 10 years, will have significant impacts on the accessibility spatial distribution pattern. In the paper, those impact and the evolution...

Agent Based Cucumber Plant Climbing Characteristic Simulation

Jing Xu, Teng Miao, Kai Song, Lin Gao, Ying Cui
This paper presents a method to simulate the plant behavioral characteristics based on Agent. The basic structure of plant Agent is introduced and the perception, behavior decision-making ability, motion ability of the plant Agent are given. Based on the plant Agent, climbing growth characteristics of...

Anomaly Diagnosis Analysis for Running Meter Based on BP Neural Network

Zhengye Wang, Gangjun Gong, Yafeng Wen
Smart meters is important equipment in the electric information acquisition system, it is the terminal equipment on the user side to realize information collection, energy metering and other functions. However, because of maintenance workload greatly, artificial detection can't meet the need. In this...

Construction and Application of the Operational Plan Ontology Model

Fei Long, Xiaozhe Zhao, Xinglin Liu
Aiming at the bottleneck of assistant decision-making system caused by traditional expression method of the operational plan, this paper introduced the ontology technology in the information system field, and analyzed the advantages of the operational plan ontology model. On the basis of the determination...

A Study of Behavior Intention of Runners' Virtual Community - The Case of Marathon's World Website

Hsin-Ke Lu, Peng-Chun Lin, Chi-An Li
According to the World Health Organization (2015) statistics, the population of today's global obesity has already doubled since 1980, the number nearly doubled. World Health Organization also estimates that depression, along with cancer and AIDS, will be the three major diseases in the world. It can...

Discussion on Safety Planning of Information Campus

Wei Li, Jianfeng Xiong
Aiming factors that affect the information technology campus safety, we design and plan the campus security information application, from the host system security, data security, application level security, application classification system permissions and other aspects, in order to achieve information...

A Novel Situation Assessment Model Based on Connection Potential

Yan Wang
Situation assessment is important for the prediction of a complicated problem involving numerous fuzziness and uncertainty factors. A novel assessment model using connection probability and connection potential of set pair was introduced here to predict the transformation tendency and assess the individual...

Verification and Detection of a Wireless-Leakage Hardware Trojan Horse with Covert Channels

Yancang Chen, Ying Zhou, Pei Wei, Sai Sui, Yaxin Zhao, Minlei Zhang, Lunguo Xie
Hardware Trojan horses have become a troublesome challenge for security-sensitive integrated circuits. As one important categorization, the carrier of wireless-leakage hardware Trojan horse is radio wave, bypassed protective isolation equipment, such as traditional firewall. Even if no networking, it...

Security Middleware Framework of Classified Application System

Yizheng Tao, Xinglan Li, Shan Gao, Gongliang Li
For classified applications need to quickly adapt to the business and security policy change, using middleware technology and framework, abstract classified application system security common public features, put forward the classified application business logic and security logic separation of security...

Design and Implementation of a High Performance Network Scanning System for Vxworks Hosts

Minlei Zhang, Yancang Chen, Huan Chen, Yaxin Zhao, Pei Wei, Sai Sui
Host scanning is an important technique for vulnerability mining and penetration testing, which is crucial to analyzing the safety of information system. Through the research into developed scanning systems both at home and abroad, such as Shodan, Zoomeye etc., this essay proposes a design model of a...

Design of Bicman Speed Based on C51 Microcontroller

Yang Zhan
This paper designed and produced adevice based on c51 MCU. This device recorded the number of cycles of a Bicman tire in a certain timethough theHall sensor, and then calculated the mileage and speed of the Bicman by the number of cycles. Finally it could display the mileage and speedwith a digital tube....

The Study of College English Teaching in Internet Plus Era

Wencao Sun
Internet plus has brought new opportunities and has posed challenges to college English teaching. This paper analyzes the influence of Internet on college English, and introduces new modes of college English teaching and learning in Internet plus era.

Smart Tourism via Smart Phone

Pu Liu, Yuan Liu
Smart tourism of Chinese cities try to provide tourists with all services and businesses via smart phones. This article analyzes the relationship between the smart tourism and smart city; explores the architecture of a smart tourism system, the technology application and supporting platform; focuses...

Nakagami-K Composite Channel Model in Urban-Rural Conjunction Areas

Xin Hu, Qing Luo, Weinong Wu, Wenjiang Feng
With the speeding construction process of urbanization in china, the areas with the characteristic of typical urban-rural conjunction gradually increase. Since residential areas, factory areas, farmlands are scattered randomly, varied and complex wireless communication environment is formed. Considering...

Vulnerability Analysis for Complex Networks under the Shortest Path-Attack Strategies

Yaohui Hao, Jihong Han, Qinghua Cheng, Yongjin Hu
We proposed three shortest path-attack strategies and investigated the vulnerability of three complex model networks under these path-attack strategies. The experimental results indicate that the robustness of random network is the weakest, but small-world network is the strongest under the shortest...

Trajectory Prediction Based on the Notion of Time and the Influence of Location of Historical Time Step

Fangxin Liu, Ming He, Yong Liu, Huan Zhou, Qiuli Chen
The development of wireless communication technology, sensor technology and so on, the spatial-temporal data record objects' movement that provide massive information about the activity regularity, due to the close relation between the mobile terminal and human. In this paper, we present a model of predicting...

Three-Dimensional Modeling Technology of Virtual Plant in Digital Landscape

Pu Liu, Yuan Liu, Xiaosheng Xu
Three-dimensional modeling is the foundation of graphic expression and virtual reality of digital landscape. This article explores key technologies, methods and applications of three-dimensional modeling of virtual plant in digital landscape; and classifies into manual modeling technology, program generation...

Three-Dimensional Target Tracking Based on Velocity Pursuit

Shulin Feng, Bo Yin
This paper deals with a method for pursuer to track a moving target in the three-dimensional space. The method is based on the use of the geometrical rules combined with the kinematics equations of the pursuer and the target. The maneuvers of the target are not a priori known to the pursuer. In this...

Doctoral Innovation Ability and Innovation Performance Evaluation Model

Caiyun Sun, Xiaojiang Yang, Jianjun Zhai
"Doctoral Innovation Ability" and "Innovation Performance Evaluation" are two concepts which are closely related but completely different. The research on the nature of the innovation ability and the innovation performance shall be born in mind to establish their evaluation model respectively. The evaluation...

Architecture for Personalized Service System of Logistics Business Information

Qi Zhang, Faheng Wu, Xiaogen Su, Jianxin Deng
Logistics business information plays an important role in data-driven logistics operation and optimization. However, with the increase of the collected logistics business information, the cost and time taken to search interested and right information also increase. To address this problem, this paper...

A Method of Constructing Virtual Network Based on NFV

Xiaomei Tao, Ming Chen, Xiulei Wang, Guomin Zhang, Qiao Yan
Relying too much on dedicated hardware equipment, resulting in poor flexibility and extensibility of existing communications network, while the new technology application cycle is long, seriously affect the communication operators' interest in deploying. In order to solve these problems, the new network...

Research on the Development Technology of Cross Platform Hybrid Mobile Application Based on HTML5

Qiao Yan, Guyu Hu, Guiqiang Ni, Jinsong Jiang, Junxian Long
Because there are many differences in the different operating systems of intelligent equipment, application software adaptation workload will be multiplied. Based on HTML5 cross platform development framework, such as PhoneGap, Sencha Touch, Titanium and AppCan and so on, can easily solve the cross platform...

Modeling the Steady State Throughput of SCPS-TP

Feng Liu, Shilong Liu
Space Communication Protocol Specification(SCPS)- Transport Protocol(SCPS-TP) is proposed for space environment, in which TCP/IP protocols do not work very well. In this paper we develop a simple model to analyze the steady state throughput of TP protocol. The throughput model is achieved with an approximate...

An Optimized Scheme to Resist Primary User Emulation Attacks

Jie Xiao, Yuebin Chen, Chuanxi Xing, Jiangfeng Yang, Zhenling Yang
The problem of cognitive radio (CR) network security has become an important problem in cognitive radio technology. One of the most common attacks is primary user emulation attacks (PUEA), where some malicious users simulate CR users to prevent them from accessing the vacant frequency. Here, a cooperative...

Improved Reputation of Soft Fusion Based on Cooperative Spectrum Sensing Defence SSDF Attacks

Zhenling Yang, Yuebin Chen, Chuanxi Xing, Jiangfeng Yang, Ting Zheng
Aiming at the uncertain factors about behavior of cooperative spectrum sensing technologies, the data fusion center(DFC) receives sensing information from the cognitive user(CU) indiscriminately and make spectrum sensing data falsification(SSDF) attack of a malicious user(MU) using do harm to cooperative...

Research on Incremental Updating

Guiqiang Ni, Yingzi Yan, Jinsong Jiang, Jianmin Mei, Zhilong Chen, Junxian Long
Compression and differential technology make the storage and transmission of files more efficient, and has an important role in the field of storage and synchronization. This paper introduces the development of incremental updating technology and the current major incremental updating algorithm. Dividing...

Research on Teaching Evaluation Model of Public Security Information Management Course

Liang Hu
Public security information management courses teaching quality monitoring system based on network proposed teaching network management state of mind, realizes the analysis of the data in the classroom teaching activities, formed a "evaluation, evaluation of teaching and evaluation" three assessment...

Dynamic Trust Relationship Quantization Model Based on Multiple Attribute Decision

Minsheng Tan, Miao Guo, Ting Xiang, Hui Zhao, Chencheng Wang
Dynamic trust relationship making quantization model based on multiple attribute decision has been researched in this paper. Considering the problem that all information from nodes feedback would be not true or reliable, this paper improves a new rule to calculate the feedback trust and proposes a new...

Mobile Game Design Based on Classic Cartoon

Yingfang Zhang, Siyang Lu, Yinglu Tang
Mobile electronic games with the hand-phone as the carrier have gradually become a necessary product for people's leisure and entertainment in twenty-first Century. They have become a new way to inherit the excellent traditional culture of various countries, so the design and development of the game...

Application of IOT in the Supply Chain of the Fresh Agricultural Products

Liheng Zhang
With the development of IOT and economic progress, consumers demand has great changes for fresh agricultural products. But traditional agricultural supply chain model exist problems. To achieve Information management fresh produce supply chain, To achieve intelligent production cultivate fresh produce,...