Proceedings of the International Conference on Computer Information Systems and Industrial Applications

+ Advanced search
272 articles

Research on Balance Measurement System Based on Embedded OMAP and Filtering Technology

Y. Jiao, G. F Chen, Y. J Wang
At present, Micro controller and peripheral devices concatenated balance measurement system, which is in low integration level and large measurement error, and have a lot of obstacles to implement intelligent milling on the high speed occasions. Firstly, this paper discussed the way to implement intelligence...

A Queueing Analysis for Job Assignment on Two-Type Heterogeneous Supercomputer System

C.H Wang, Y.T Chen, C.C Hwang
This paper introduces a queueing analysis of a two-tier service supercomputer system, where one type of processors offers service with a finite waiting buffer and the other offers unlimited waiting buffer. From the managerial viewpoint of system, a two-tier queueing model is developed to investigate...

Proving Authentication Property of Modified Needham-Schroeder Protocol with Logic of Events

M.H Xiao, C.Y Deng, C.L Ma, K. Zhu, D.L Cheng
Security protocols are the foundation of modern secure networked systems. Proving security properties of cryptographic protocols is a challenge problem. Model checking has proven useful for finding certain classes of errors in network security protocols, but it is based on bounded model or constraint...

Analysis and Research of Several Problems of Bad Short Message Filtering System

W.F Du, G.X Chen
The spread of bad message seriously affects the social ethos and disrupt the normal life order of people. It has considerable practical value to research and develop the filtering technology of bad short message. Two problems in text classification are studied in this paper, which can be used in the...

Research on Big Data Technology-Based Agricultural Information System

N.F Xie, X.F Zhang, W. Sun, X.N Hao
With the advent of the era of cloud, big data technologies have attracted more and more attention. In the agricultural domain scientists have encountered restrictions and obstacles in the data-extensive analysis domain such as meteorological data processing, bio-genome analysis, food security analysis,...

An Evaluation of Third-Party Mobile Payment Usage Intention in China

X.M Lv, C.C Su, Z.Y Huang, T.K Gu
This paper analyses the current situation of Chinese mobile payment industry, and then discusses the win-win benefit mode that take third-party mobile payment companies as main body. Now, two kinds of payment processes––the web page payment and the APP payment is summarized, meanwhile, the paper explores...

An Improved Designated Verifier Signature Schemes Using Bilinear Paring

Q.Z Yue, H. Shen, J.H Chen
In a designated verifier signature scheme, only the designated person can verify the validity of the signature. Due to such attribute, it could be used in many fields such as financial payment system, e-voting, and e-taxation. Recently, Lee et al. proposed an identity based signature scheme to overcome...

Research on Secure Communication Mechanism of Traffic Recorder

L. Li, Y.F Zhu, R.N Xie, F.H Li
Through the research of the demand for secure communication between traffic recorder and data management platform, a three layer automobile remote diagnostics communication model which contains data aware, network access and application service is proposed, through special access gateway to add device...

The Application of Rough Sets Theory in Video Information Processing and Analysis

X.W Li, Y.X Kang
Recent advances in technology have increased the availability of video information data, creating a strong requirement for high efficient systems to manage and process those larger materials. How to making efficient use of video information requires that data to be accessed in an intelligent and user-friendly...

Vector Median Filters Based on Noise Detection for Color Images

J. Wang
A novel filtering method is proposed in this paper in order to improve sharpness and detail reserve ability of color image filter. Start with analyzing the correlation between neighboring pixels and the correlation between each image channel, the image is then processed with a preprocessing procedure....

Research on Information Models and Modelling Methods of the New Generation of OSS for Data Management

Y. Lin, Y.B Wang, H. Zhang, J.H Yang
In order to build the information model of the new generation of Operation Support System (OSS), we firstly point out that OSS is currently entering the era of big data management, and the Telco Operators are now facing big challenges. We then summarize the difficulties to build the OSS unified information...

A Polar Coding Scheme for Secure Data Transmission Based on 1D Chaotic-Map

T.H.M Soliman, F.F Yang, S. Ejaz
Combining both reliability and security in one block is very important in modern digital communications, each with a variety of sub-disciplines. In this paper, a new polar codes scheme for secure data transmission based on one dimensional chaotic map with a pre-shared secret initial condition is proposed....

Mining Blocks' Association Rules for Disk Data Perfecting

L.Y Zhu, G.Q Xiao, J.W Liao
As the processor-I/O gap continues widening, the modern I/O-bound applications such as Online Transaction Processing (OLTP) often suffer from great latency of disk access. In this paper, we argue that the block association rule can be recognized as common semantic information embedded in disk I/O traces...

A New Approach for Target Detection Performance Enhancement Under Clutter Effect

A. Almslmany, Q.S Cao, C.Y Wang
This paper discusses a new approach for target detection performance improvement in monostatic pulsed radar in presence of clutter based on Time Varying Gain Amplifier (TVGA). This new approach is used to compensate for power loss due to range in the received echo, which increases the input dynamic range...

Short-Term Photovoltaic Output Forecasting with Weakly Related Meteorological Data

C.H Lin, Y. Xiao, J.G Chen, X.K Wen, C. Du
Photovoltaic (PV) output is influenced by many meteorological factors. The significant degree of meteorological data influences the accuracy of forecasting result. This paper proposed a short-term PV output forecasting method while the weather data and PV output data were weak correlated. By analyzing...

A Framework for Product Lifecycle Knowledge Service

Z.Y Wu, L. Li, H.L Mao, Z.F Huang, H.Y Mao
As the rapid development of modern economy and information technology, the development trends of modern enterprises increasingly clear. Knowledge-based enterprise has become an inevitable choice to expand the use of its resources. In order to respond to the industrial trend towards knowledge service,...

Research on Evaluation Model of The Urban Economy Based on Rough Set and Neural Network

L. Yan, L.P Zhang
For the shortage of the traditional evaluation methods of the urban economy, A new evaluation model proposed, establishing an index system of evaluation and decision table on city economy, and extracting important properties of input data from Rough Set and neural network, and evaluation indexes reduced...

Realization of FPGA-Based Video Image Fusion Technology

C.P Duan, W. Liu, Y.H Chen, Q.S Xie, B. Yi, Y. Fang, X.D Song
In order to achieve multiple video images fusion processing, domestic and foreign technology commonly used DSP to achieve image fusion algorithm, limited to serial instruction execution speed, it was difficult to meet the requirements of modern high-speed digital signal processing. An digital image fusion...

Comparison of Solution of A Class of Second Order Difference Equation

Y.Z Qin
Difference equations is a kind of powerful tool to investigate the rule of natural phenomena, such as, physical problems arising in a wide variety of applications. In this paper, we discuss the nodes of the solutions of a class of second order difference equation.

Empirical Study on Reversible Lane in Beijing

X. Wang, Y.L Wang, M.C Zhang
Setting the reversible lane can make full use of the existing road resources and effectively relieve urban roads tidal traffic problems during peak hours. Analysis of characteristics of tidal traffic phenomena and causes. Elaborating the related concepts of reversible lane traffic organization and application...

Improved DPA Attack Method on AES Encryption

S. Lan
Side-channel attack,which is a new technology in the field of cryptography, focus on the power-leak produced by password equipment,such as energyy, time, radiation.DPA (differential power analysis)attack as a method of sidechannel attack, its main method is comparing the peak of curve to determine the...

Analysis of Signal Integrity on High Speed Signal Processing System of Vehicle-Mounted Video

X. Wang, J.S Tang
The integrity of vehicle mounted video signal refers to all problems caused by the interconnects which transmitted by high rate. However the work frequency of the vehicle electronics becomes higher and the edge of the signal becomes increasingly steep, a larger number of interconnects can not be used...

A Review of a Text Classification Technique: K-Nearest Neighbor

R.S Zhou, Z.J Wang
In order to get effective information timely and accurately in masses of text, text classification techniques get extensive attention from many aspects. A lot of algorithms were proposed for text classification which made it easy to classify texts, such as Naïve Bayes, Rocchio, Decision Tree, Artificial...

Analysis of the NETSCIENCE Social Network

X.B Li, V. Podpecan, N. Lavrac
This paper presents a basic analysis of the Net Science database together with a description of the techniques for social network analysis. The database was provided by M. Newman in May 2006 and contains a network of scientists who together co-authored the network theory and experiment. The analysis...

Shape-Controlled Synthesis of CeO2 Nanotube Using P123 Triblock Copolymer and Its Application in Catalytic Ozonation

X.H Qiu, Q.Q Bi, X.J Li, Z.S Xiong
CeO2 nanotube with improved catalytic properties has been synthesized by a simple precipitation method using P123 triblock copolymer as surfactant. The prepared samples were characterized by X-ray diffraction, Scanning electron microscopy and BET surface area analysis. The activity of the material in...

Category Scores for Selecting the Most Desirable Options in a Learning Setting

S. Encheva
Learners’ preferences play significant role in effectiveness of a study process. Individual preferences and group preferences however may differ considerably. While data is collected from single users, general settings are usually made to serve groups of people. An approach for incorporating individual...

An Approach for Multifaceted Mobile Nodes Sending Information to Manage the Network

C.J Miao, H.C Zhou, H.K Zhang, W. Su
In traditional host-based mobility management such as MIPv6, mobility node manages the mobility by BU/BA (Binding Update/Binding Acknowledgement). With the development of the mobile network, network-based mobility management such as PMIPv6 is proposed which has been proved more superiority that the host-based...

The Risk Assessment Model of Small and Medium-Sized Enterprises of Science and Technology Based On Boosting

X.F Lei, Z. Wang, Y.T Li
Break the financing-difficulties has always been the key to the development of small and medium-sized enterprises of science and technology(SMES), so the construction of a targeted credit evaluation model is of great significance to provide data support of financing. The paper proposed a credit evaluation...

Study of Breast Tissues Dielectric Properties in UWB Range for Microwave Breast Cancer Imaging

M.H Bah, J.S Hong, D.A Jamro
In this manuscript, we study about dielectric properties of major tissues in the breast within the UWB allocated frequency band. Some tissues mimicking phantoms have been designed and measured using slub-line tool system. The results obtained show good representation for both normal and malignant breast...

Research on Dynamic Pricing and Ordering Policy of Fresh Agriculture Product Considering Consumers’ Perceived Quality

K. Nie, D.F Xie, W. Li
In this article, we first formulated the demand function of price and quality. Then we analyzed the order quantity and the pricing decision under the single price markdown condition and the multiple price markdown condition respectively. We find that under the single price markdown condition and the...

Finite-Time Synchronization of Chaos Gyros via Terminal Sliding Mode Control

R.P Xu, C.C Gao, M.M Gao
The problem of finite-time synchronization between two chaotic gyros with uncertain and disturbances is investigated. On the basis of a double power reaching law, a nonsingular terminal sliding mode control algorithm was proposed to restrain chattering and improve convergence speed of terminal mode control....

IDFT: An Intermediate Node Based Deterministic Fault Tolerant Routing in 2D Mesh

C.X Yang, X.T Ding, X.W Ren, P.J Ren
In order to alleviate the problem raised in Gomez's method[1], where messages with different source-destination pairs have great probability choosing the overlapped paths therefore, new transmission bottleneck might be generated nearby, we present an intermediate node based deterministic fault-tolerant...

Providing Support for Today’s Decision Making Processes

S. Encheva
Current decision making processes often involve uncertain information obtained from a number of sources. In addition the available data might be incomplete and/or collected at different time periods, i.e. its significance might require adjustments. In many cases experiments cannot be repeated and conclusions...

Network Assembled Structures from a Series of Macromolecular Surfactants

X.M Zhong, W.M Yao, J.Y Chen, Y.H Lai, X.S Lin, L.J Kong, X. Wu
Network assembled structures from a series of macromolecular surfactants were prepared on glass surfaces. When the content of the hydrophobic side-chains was increased from 10 to 90 mol%, the solutions exhibited a lower surface tension. In addition, these solutions ultimately formed thinner and more...

The Constructions of DNA Codes from Linear Self-Dual Codes over Z4

B. Feng, S.S Bai, B.Y Chen, X.N Zhou
It is possible to construct DNA codes from classical linear codes. However, it is difficult to determine the GC weight enumerator. In this paper, we use the -linear self-dual codes to construct DNA codes. have some good properties, so DNA codes can be easily constructed. Moreover, GC weight enumerator...

A Composite Control Strategy for an Air-Breathing Hypersonic Vehicle with Wing-Rudder Deflection

Y.H Fan, P.P Yan, Y.F Yu, X. Li
The scramjet performance of air-breathing hypersonic vehicle is highly correlated with flight height, Mach and angle of attack (AOA). The violent disturbance of the AOA can cause the engine power off. Consequently, the maneuverability of hypersonic vehicle is strictly limited in the cruising period....

The Study of Real-Time Industrial Ethernet Power link Medium Redundancy

J.J Wang, M.Q Duan, Z.F Liu
This paper analyses the medium redundancy technology in the Industrial Ethernet POWERLINK network. Ethernet data before heading to Media Access Controller, in order to achieve the medium redundancy, we design a Link Selector functional block, it can put three physical networks of the best quality network...

Research on Obstacle Avoidance of Fire-Fighting Robot Based On Fuzzy Control

Y.C Lei, X.J Zhu, C.R Tai
Fire-fighting robot can instead of humans in the event of a fire extinguishing task. An obstacle avoidance strategy based on fuzzy control is presented in this paper. The method doesn't have to determine the motion model of fire-fighting robot accurately. Robot can detect obstacles by using infrared...

Research of an Improved RFID Authentication Protocol

W.J Yu, Z.Y Tu, Y.W Zhang
As a new automatic diagnosis technology, RFID is gradually widely used. But the characteristics of the RFID system and the limitations of RFID equipment have brought many security problems. For these problems, this paper discusses and explains system composition and security problems of RFID, analyzes...

A Lightweight Encoding Mechanism for Encrypted User Notification on Mobile Device in Power Grid System

T. Zhang, Y.C Jin, Z.X Sun
As a large amount of users are now using the short message service (SMS) for communication, the demand for security is growing much stronger than ever before. User notification encrypted with traditional encrypt mechanism can be transported via SMS only if the encrypted message is encoded into text form....

New Evaluation Model on Web Site Credibility

Y.Y Ma, F. Chen, Z.X Sun
In view of the existing web site credibility evaluation models failing to comprehensively consider the multiple attributes of trust,after learning the D - S evidence theory and fuzzy theory,a new web site credibility evaluation model is put forward in which the trust value is divided into historical...

Research on Intelligent Energy Efficiency Management System Based on CBR/MAS

K.Y Xu, D.W Zhou, Y.Q Chen, W.B Lu
Energy efficiency management system (EEMS) provides effective energy saving measures and high quality energy conservation services; it will achieve the goal of energy conservation through system integration, concordance and optimization to the existing energy, which is particularly important in today's...

Design and Implementation of the Fuze Circuit Board Tester

Y. Zhang, B. Qiao, L.G Chen
The system’s objectives and tasks were clear by analyzing the system requirements. The front-end system was based on DSP (digital signal processor) and FPGA (field programmable gate array). It designed system communication protocolto control the testing process data switching. The PC software realized...

Pervasive Marketing Intelligence

T Guarda, M. F Santos, F. M Pinto
In the absence of sufficient and useful literature in the area of Marketing Intelligence Systems (MKTi), this study seeks to propose and infers aMKTi conceptual framework, through consensus, of a group of information systems (IS) and Marketing system experts. This research assumes that expert opinion...

The Binding Operation for Mobile IPv6

R.X Li, D.F Wang
Mobile IPv6 is nearly associated with binding update, binding acknowledgement and binding request. With binding update, the mobile nodes get in touch with the home agent or communication fellow. In this paper, the binding operation of IPv6 mobile nodeswas studied; the packet which supports mobile features...

Research of Guangdong and Macao Tourism Cooperation Condition based on DEFCA

J.H Xiao, S.Y Luo, Y. Yue
With combination of Guangdong and Macao tourism cooperation reality, the evaluation system of tourism coop-eration conditions between the 21 prefecture-level cities of Guangdong province and Macao will be established. In allusion to the insufficiency that it is difficult for fuzzy comprehensive evaluation...

Study on the Simulation of Hot Event’s Propagation Based on Ant Colony Algorithm in Social Networks

D.C Qu, H. Xie, H.X Lian, J. Bai, S.L Guo
Given that there is not much research on the propagation mechanism of hot event in the social networks environment at the macro level at present, this paper proposes an optimizing model of propagation to maximize the influence of hot event in networks in a short time. Combining the three characteristics...

Simulation of PLCC Routing Algorithm using OPNET Modeler

J.C Chen, R.Q Yan, Y.N Zhang, Y.H Zhao
Today, the power line carrier communication (PLCC) technology has become a research focus in the field of communication. It is important to study on the PLCC routing algorithms, since the power line carrier channel has the characteristics of high time-variation, high noise and high attenuation. The PLCC...

Enhanced Indoor Navigation Using Fusion of IMU and RGB-D Camera

W.N Chai, C. Chen, E. Edwan
Accurate indoor navigation, especially precise attitude estimation is a challenge topic. Unlike the rate gyroscope in an IMU, the camera based visual-gyro does not suffer from drift errors. In order to overcome the drawbacks of the standalone systems, an INS/visual-gyro integration using direction cosine...

Explore on Illuminance Control of Daylight Perceptive Lighting by Fuzzy Logic

Y.M Gao, X. Guo, Y.D Lin, F. Cao, G.Y Cao, J.J Yu, N.Y Zou, H.Y Zhang
Basic concept of daylight perceptive lighting is that intensity of lamps are adjusted opposite to the trend of sun light intensity, so that constant illuminance on work surface is kept. The classic and compact arrangement of daylight perceptive lighting system were discussed, the compact was recommended...