Proceedings of the 2012 National Conference on Information Technology and Computer Science
Application of Ant Colony Algorithm in Fingerprint Identification System Based on Internet of Things
The Internet of things is a network which connected to objects through the Internet, internet was treated as the foundation and the core ,by which the most date transmission is wireless information and intelligent processing information, in this situation for one thing ,the social efficiency can greatly...
Research on Lash-up Maintenance Technology of Engineering Equipment
Ming Zhang, Zhongfeng Shi, Chunyu Dou, Tao Fan
Abstract The theory frame of lash-up maintenance technology of engineering equipment is brought forward from the point of view of lash-up maintenance theory, which include fault diagnosis and survey technology, damnification evaluation theory, damnification repair technology, lash-up maintenance effect...
The Research of Future-Market-like Supervision of the Exchange of Cultural Products and Artworks
Chunxu Liu, Wenzheng Shang
As an innovation of the trade of Cultural products, the Exchange of Cultural Products and Artworks makes the market of cultural products more prosperous, but there are also some problems. Through analysing the characters of the Exchange of Cultural Products and Artworks and the trade model of the cultural...
Applicability Evaluation to Capital Asset Pricing Model
The Capital Asset Pricing Model (CAPM), proposed by Professor William. F. Sharpe, a Nobel Prize winner in economics, is considered to be the backbone of pricing theory in modern financial market. The model is simple and practical, and mainly adopted in researches on the relationship between the expected...
The Innovative Study of Jilin Province's Urban Integration Development
Tieyu Liang, Chunjing Ma
As a big agricultural province, Jilin Province has a large agricultural population and agricultural land. In the process of urban integration, it is of great significance to solve the problems of migrant workers as well as land for promoting the healthy development of urban integration in Jilin Province...
The research of Online Transaction Risk in Service Provider to Consumer
Yao Yao, Liang Feng, Kailin Xu
Today, as the external environment of the internet tends to mature, the consuming service based on the family life will be the main part of the E-Commerce in China. It affects the development of the industry, and also changes and affects users spending habits. This article investigates the transaction...
Innovation of Emergency Management Estab-lishment of New Mode for Holographic Com-mand and Collaborative Work
Holographic command and collaborate work are the breakthrough to traditional emergency management mode. Holographic command, as a kind of all weather, three dimensional and information-shared network interactive command platform, consists of sound, image, data and is featured with comprehensive, information-shared,...
The Market Competition, Law Enforcement, and Banking System's Efficiency in China
Yu Xia, Xianliang Tian
In economic literature, the benefit of competition is well recognized, for example, it could reduce monopoly rents and cost inefficiencies, and finally improve the welfare of the economy. In the case of banking system, the market competition in banking sector could improve efficiency of the banking system...
Mutual Authentication Scheme for Muliti-server Environment Without Using Smart Cards
Jiayu Wang, Fangping Deng
To authenticate a remote user over an insecure channel, which widely deployed in e-commerce, e-government, information security, business management and many more, we propose a scheme without using smartcards. Due to the elliptic curve discrete logarithm problem, the proposed scheme is safe and efficient....
Research on Data Acquisition and Signal Processing of Fault Diagnosis System for Electromechanical Equipment
Yan Qin, Ming Gu
Data acquisition and signal processing is the basis of condition monitoring and fault diagnosis system for electromechanical equipment.The paper analysis the general technology of data acquisition and signal processing used in fault diagnosis system,A portable equipment of motor fault diagnosis is designed...
Spatial Structural Characteristics of Chinese Railway Passenger Network Based on Complex Network Theory
Xuejing Gu, Dewei Li, Lu Qin
The railway network provides transport services for clients, it is very important for railway managers to analyzing the spatial structure of the network. This article analyzes the spatial structure of Chinese railway network with indicators of degree distribution, the clustering coefficient, the average...
Comparative Study on Knowledge Transfer Among Different Networks: a Social Capital Perspective
This paper examines how social capital dimensions of networks affect the transfer of knowledge between network members. There are different characteristics of social capital among three network types: MNCs, strategic alliances and industrial clusters. Based on comparing dimension of social capital among...
Banking Efficiency, Law Enforcement and Chinese Provincial Economic Growth
Yu Xia, Xianliang Tian
The body of literature about institutes efficiency is mainly fallen into the field of microeconomics, even though in theory, the efficiency could be related to economic growth. This paper tries to fill this gap by examining empirically the relationship between banking sectors efficiency and provincial...
Empirical Analysis of the Relationship between Or-ganizational Culture and Organizational Performance
Zhipeng Zhang, Xiancheng Zhu
This article uses empirical research to analyze four types of organizational culture on organizational performance, the results show that: adhocracy culture and market culture have a positive impact on financial performance and market performance, clan culture and hierarchy culture have a negative impact...
On the Impact Factors for Mining Enterprise Choos-ing Investment Position Abroad
Maoping Zhou, Mingzhen Xu
Mining enterprise investment is characteristic of long period, big size and fixed area. Resource, polity, law, economy environment and social culture of the host country should be taken into account when choosing place for offshore fund.
Analyze on GEO Satellites Output Power Variation
Jun Zheng, Hong Chen
Solar arrays are the main source of energy used at present onboard satellites. Their energy resources largely determines the time of active life of on-orbit satellites. This paper sets up the output power variation model of solar arrays from the telemetry of three-axis stabilized GEO satellites made...
Data Acquisition and Processing of Electronic Compass for Mobile Robot Autonomous Navigation
Jingwei Qin, Yimu Guo, Miaolei Zhou
Electronic compass is a kind of absolute sensor that can measure the azimuth by use of the earth's magnetic field. Electronic compass is widely applied in mobile robot autonomous navigation. An electronic compass applied to a certain kind of out-door mobile robot is introduced in this paper. Data format...
The Application of Grey Fuzzy Comprehensive Evaluation Method in Distribution Center Planning Scheme Optimization
Jingjing Jiang, Xiaoyu Wang, Tingbin Chen, Xiangwei Mu
At present, the planning of distribution center is a very important step before the construction. Therefore, how to choose the optimal plan in the process of the planning of distribution center has already become an important research topic in logistical system. In this paper, Grey Fuzzy Comprehensive...
WBS-based Risk Identification for the Whole Process of Real Estate Project and Countermeasures
The real estate industry is high-risk typically. Real estate project itself has the characteristics of large investment, long cycle, complicated construction technology and susceptible to environmental interference etc. Therefore it is a critical process to identify types and causes of risks, strengthen...
The Study of Development Pattern of Micro-Blog Combined with E-commerce
In this paper, the author discussed the development pattern of Micro-blog combined with E-commerce. The feasibility of combination between both was analyzed. This paper pointed out e-commerce providing innovative profit model and development power to Micro-blog, and E-commerce enterprises can apply the...
Bayesian Methods with Application in Risk Analysis
Dongyang Ding, Xiyang Liu
In risk analysis, Bayesian methods are more adaptability and flexibility than traditional methods when be used to construct decision framework, estimate risk distribution and parameterize model, but has shortcomings at the same time. Robust methods make up some limitations of Bayesian methods, the analysis...
Credit Risk Transfer and Financial Stability: A Survey
Lili Zhou, Qing Chen
The relationship between credit risk transfer and financial stability were reviewed from two perspectives of the individual banks and financial system in this paper, in which focusing on the instruments of credit risk transfer and the incentive to monitor loan, as well as the differences of measurement...
Analysis for the Free E-Commerce Pattern
Anbao Wang, Haoran Xing
Nowadays, when free trial has become a powerful marketing measure, it is possible that we may experience a free lunch. This paper analyzes the free economic pattern, free economic pattern has made an attempt in early 20th century, and free has gradually impelled a consumption revolution. It is the direction...
Design and Integration in E-Commerce Website Based on Framework Technology
Anbao Wang, Jie Xu
With the rapid development of network technology, the Web applications are used more widely, and the higher requirements on the Web system has been pursued by many people. The web applications should become more simple and convenient; also it requires some new internal adjustments in the Enterprise....
Management System of Teaching Resource Based on SSH Framework
According to the brief introduction of the three frameworks----Spring, Struts and Hibernate, the paper constructs a teaching resource management system by using SSH framework based on J2EE. Such a system architecture reduces the coupling system code and improves system maintainability and extensibility.
Research on Measurement of Mass, Centroid and Eccentricity of Large-scall Axisymmetric Body
Gang Lu, Aijun Zhang, Changming Wang
Pointed at low-precision of measurement of mass and centroid of large-scall axisymmetric body, measurement method is researched. After comparing, three-point method is adopted to design this system, and error is analyzed and compensated. According to experiments, measurement system has high-precision,...
Research on the Knowledge Management Based on GIS
Knowledge management is to collect, organize, process and transmit the information and provide effective means to make use of the information fully. The development and application of GIS and internet technology will import the bran-new concept for the knowledge management, promote the knowledge management...
The Main Method of Digital Mine Map
mining map digitizing of various types of coal mining map digitizing processing new technology, is to establish a modern mine enterprise's essential condition and basic construction. Around the mine map digitization concept, put forward five kinds of digital mine map method and its application conditions,...
A Brief Analysis on Building and Enhancing the Property Management Enterprises Core Competitive Power
Building and enhancing core competitive power is the necessary way for property management enterprise to achieve sustainable development. In this paper, author understand and grasp deeply about the concepts and features of property management enterprise's core competitiveness, think that the way building...
Pricing Benchmark of Empirical Research for Commercial Real Estate Development Project
Rent of shops is inversely proportional to the distance from the central business district, and is proportional to the quality of the shop itself. This article take a shopping mall project case which is developed by the estate company in Xing Ping District, Xian Yang City as the example, described the...
Design and Implementation of Graphical User Interface of Digital STB
Rong Fang, Meng-shu Hou
regards the development of a digital Set-Top-Box(STB) as the background, through an understanding of developing environment of graphical user interface 'GUI', To have a general design of STB GUI system'and To realize the STB GUI, and give a realized example of building an GUI under this system.
Target Characteristic Fusion Recognition Based on D-Sevidence Theory
Xinjun Tai, Jianrong Lu, Dongsheng Zhang
D-S evidence theory is an important target fusion recognition in the characteristic fusion level. With a strong theoretical basis, this method can deal with not only the uncertainty caused by random but also the ambiguity caused by uncertainty. In this article, after the RCS (radar cross section) and...
An Extended Algorithm based on PlayFair Cipher
Yanhong Shang, Lilei Lu
This article proposed an improved solution to Playfair cipher algorithm. The algorithm extended former encrypting form from digram to integrated three letters. In this article the authors presented the improved encryption algorithm and finished its program in C programming language. At the end of the...
Analysis of Software Capability Maturity Model'CMM'
CMM software process management and control systems approach, which provides software process improvement guidelines for software process assessment provides a basis. In this paper, the CMM concept and the overall framework in detail, the last of the CMM the problems outlined.
Consideration on Strengthening the Career Planning Education of College Students in China
In the present situation of growing employment pressure for Chinese college students, to strengthen the career planning education has a great significance on enhancing the employment competition ability of college students. Based on analyzing the practical significance of career planning, this paper...
CRM Pricing Research of China's Inter-bank
Guiyun You, Siying Han, Zheng Liu
Credit risk mitigation (CRM) is an effective mean for bank's credit risk transformation. Buying CRM can reduce bank's capital requirement, and meet Basel regulatory agreement effectively. China's implementation of CRM will help improve the credit risk-sharing mechanisms, solve the "paradox of credibility"...
Using PCA to Evaluate Computer Network Security
Yunlong Zhang, Yong Hua
The principal components analysis (PCA) is a multivariate statistical tool which brings the multi-dimensional factor into the identical system to carry on the qualitative and quantitative research. The theory is relatively complete. This paper applies the PCA method into the synthesis evaluation of network...
Application of ID3 Algorithm in Information Asset Identification
Yong Hua, Yunlong Zhang
In the issue of information security risk evaluation, the asset, the threat and the vulnerability are the three most important elements. Information asset identification is a primary link of information security risk evaluation process. In this paper, the decision tree algorithm was applied into the...
Problems and Countermeasures of The Migrant Workers Becoming A Member of The City
Migrant workers becoming a member of the city is a typical three rural issue, it is related to China's social transformation and changes in social structure as well as the construction of socialist modernization with Chinese characteristics
Curriculum Development and Practice Research of the Course The Project of Object Oriented Programming
Wenrong Jiang, Min Liu, Jihong Yan
Teaching is an essential part to determine personnel training, teaching quality and teaching level of the university. Curriculum development is an important part of teaching infrastructure. For features and status of The Project of Object Oriented Programming and experience of curriculum development,...
Analysis of coal production automation system
The coal industrial transformation degree of relationship to the national level of development of productive forces, the automated construction of the coal industry is becoming a trend, the use of automated innovative technologies, energy-efficient equipment, computer-aided technology enables the construction...
Study on Evaluation of Logistics Enterprise Informationization Performance Based on the Theory of Fuzzy AHP
Li-bo Zhang, Xiao-bo Wang
This paper constructed an evaluation model for the logistics enterprise informationization of their own, based on the study of status and evaluation of logistics enterprise informationization performance. Comprehensively evaluated the model by AHP and Fuzzy and then proved the model's availability with...
Optimal Decision of M/M/C(m) Queuing System
Xiaomin Zhao, Junjun Gao, Yihua Wei
To study the M/M/C(n) queuing system in which a sever can service multiple customers at the same time, the stability equations is constructed, by which the stability probability is solved, and then some system operation indexes are obtained. Furthermore, based on those operation indexes, the number of...
The Framework of Remote Sensing Image Map Service on Hadoop
Junfeng Kang, Zhenhong Du, Xiaosheng Liu
Through completely discussing the data storage strategy on Hadoop, and analyzing the characteristics of remote sensing image map service , we designed a framework of remote sensing image map service on hadoop.
Design of Purchase-Sales-Inventory Business Software Based on Excel
Purchase-sales-inventory software is a common tool of small business enterprise information and can be designed by using Excel. This paper focuses on the idea of fool business software design with Excel sequence, record pointer and ActiveX control, and introduces the skills in invoking development tool,...
Utilizing Service Science to Construct Green Printing Industry
Hejie Chen, Xiaozhang Huang
The Green printing has the followed three characteristics: the lower environment impact, the less pollution, saving resources and energy of the printing. Many printing produces are deserted in china every year. With the development of IT technology and communication technology, digital printing appeared....
Evaluation Research of Telecommunications Industry Knowledge Transfer Based on the Analytic Hierarchy Process
Gongyi Zhang, Zhuoyi Wang, Lihong Sun
To develop appropriate knowledge transfer strategy for China's telecommunications industry, the paper evaluates the status of the telecommunications industry knowledge transfer and establishes evaluation index system. Based on the AHP, the paper summarizes and analyzes the Telecommunications Industry...
A New Method of Self-Adapted Learning Mechanism Based on Neural Network
This paper describes a new method to neural network model based self-adapted learning mechanism for deriving a complex system. This Learning scheme is organized based on a multi-agent-based self-adapted learning method as well as a multi-agent-based self-adapted method, while an Neural Network Decision...
Using Sensor Network to implement Mental Factor Analysis and Evaluation
Wen yan Wang
Effective and rapid mental disorder evaluation under emergency is the basis to carry out Mental Disorder Intervention (MDI). In this paper, based on existing research, a index system to evaluate the state of Mental disorder is established and the index system is simplified by the model integrated factor...
Using Network Concept Method and Data Mining Techniques to Implement Self-realization and Happiness Factor analysis
Wen yan Wang
This paper is achieved by means of the method of Information content Inclusion Relation-IIR and Data mining techniques. We present what an IIR is, and how IIR can be identified from both a concept and a database, and then reasoning about them. Data mining techniques and tools are developed for finding...
A Novel Algorithm for Predicting '-barrel outer Membrane Proteins using ACO-based Hyper-parameter Selection for LS-SVMs
Guangming Xian, Biqing-Zeng Xian
An ACO-based hyper-parameter selection for least squares support vector machines (LS-SVMs) was trained to predict the topology of transmembrane ' strands proteins. It should be stressed that it is very important to do a careful model selection of the tuning parameters for LS-SVM. In this paper, a novel...
An Effective SALS Image Denoising Method based on 2-D Discrete Wavelet Decomposition
Guang-ming Xian, Bi-qing Zeng
This paper describes an effective small angle light scattering (SALS) image denoising method based on 2-D discrete wavelet decomposition. The phenomenon of small angle light scattering has been applied to giving information about transparent structures on morphology. The potential of using SALS to probe...
A Research of USB Device Redirection Mechanism over IP network in Desktop Cloud System
Yi-min Zhou, Hui-hui Guo
As most existing device sharing technologies are only abstract operations sharable, such as read and write, virtual desktop users can't share the device-specific characteristics of USB devices attached to cloud terminal. In this paper, we propose USB device redirection as a peripheral bus extension over...
The Research of Web Information Retrieval based on Temporal Information
Zhe Wang, Chenggang Xu
Temporal information is an essential attribute of the web pages, such as the publish time and the content time in the web pages. However, the major search engine hasn't more view on the temporal information of web pages,and ignored the relationship between the keywords and time phrases.In this paper,...
The Role of Software Architecture and Trusted Computing in Software Design Guiding Principles and Quality Assessment Standard
Mingguang Dioa, Tao Xue, SenZhong Zou
In software engineering, software design guiding principles and quality evaluation standard is not only an important theoretical problem but also a very practical problem. Against to some inappropriate dissertation in the popular textbooks, we put forward that the rationality of software architecture...
Study on Internet of Things application for Highspeed Train Maintenance, Repair and Operation (MRO)
the design of EMU IoT-system, which is oriented to the MRO of high-speed trains, was studied with implementations of sensing technologies like RFID, sensors, etc; with regarding to the future requirements of safety, orderly, efficient and high-quality in EMU maintenance service of China. In operation:...
Existence, Uniqueness for Stochastic forest Evolution
Yinlu Gu, Qimin Zhang, Zhenzhen Song
This paper introduces random perturbations into the established system of stochastic forest evolution, and studies the system of stochastic forest evolution in Hilbert space, at the same time, using Kolmogorov's inequality and Burkholder-Davis- Gundy's inequality, analyzes the existence uniqueness of...
A Sequential Circuits Test Set Generation Method Based on Ant Colony Particle Swarmalgorithm
Xin Fu, Shuai Fu
There exists a lot of trigger unit in Timing circuit, and this leads to high computational complexity in its initialization and test set generation for deterministic method. This paper presents a timing circuit initialization and test set generation method. In the proposed method, a particle swarm algorithm...
Random Time Slot Assignment for enhancing wireless security in Multi-User SISO Systems
Guang Jin, Tiantong Zhang
Considering a multi-user SISO system, a random time slot assignment scheme is proposed for enhancing wireless security. For each time slot, single antenna transmitter selects a user randomly. Signals of the intended user are pre-processed before transmitting using known wireless channel state information,...
Research on the Construction of an Internet-based Database for Spoken English Testing and Teaching
The paper concerned starts with the literature review on spoken English teaching in the College English program, in particular weaknesses in college spoken English teaching, in the light of College English Teaching Requirements. It continues with discussions from scholars over spoken English teaching...
Integrated Marketing Strategy in New-media Era
Shao-Zhen Yang, Xiu-Yan Feng
With increasing popularity 3G and WIFI, smart phone users are more and more, Mobile Internet has achieved rapid development in China. The entire network media has entered a new-media age. This provides businesses with more opportunities to improve their marketing and profitability. The integrated marketing...
A SLNR-Based Precoding Scheme for Multi-Stream Multicasting Systems
Guang Jin, Bing Cao
The problem of wireless security for the downlink of multi-stream multicasting MIMO systems overheard by multiple multi-antenna eavesdroppers is investigated. We assume that the transmitter has perfect knowledge about the channel to desired users and the eavesdroppers. An efficient secure precoding scheme...
Construction of WSN Based on Polynomial Node Capture Attack and Defense Methods
Hong Gan, Dan Pan
Wireless sensor network ( WSN ) in the presence of node capture attack, put forward a kind of node capture attack detection method of defense, the method based on polynomial in two variables will be node key information and node deployment time and identification for binding, when negotiating session...
Construct a based on Mealy!The Meaning of the Machine Process Validation Method
Hong Gan, Dan Pan
semantic validation is bound semantics and semantic programming language software development problem. To solve this problem, in this paper introduces a kind of semantic Web services based on semantic programming language SPL and its knowledge base business domain ontology ( BDO ) foundation, proposed...
A New Kind of File Uploading of LIMS Based on VB.NET
ZhuoMa CaiRang, Chenghui Yang
At developing of website always come across some problem of file uploading .There are very complication to use some scripts dealing with this problem. In this paper we introduced a way of uploading file which edited with VB.NET. We emphasized to discuss the theory of uploading file which edited by VB....
A Research of the Development of VME Bus in VxWorks
Yi-min Zhou, Jun Wang
Based on the principle of the VME bus and combined with lithography machine control system, This paper briefly introduced the development of VME bus under VxWorks operating system, including the bus address space allocation and interrupt setting method. VG5, VME bus master board, is GE Fanuc's high-performance...
An Event-driven Cooperation model of Information Appliances in the Intelligent Home
In the current system of the intelligent home, it control information appliances with the sole mode, can not realize the cooperation between of them, its intelligence can not get sufficient play. Based on the principle that the cooperation of information appliances are often event-driven, in this paper,...
Plant Simulation Research Based on GLSence
Yun-Kai Huang, Fang-Cheng Liu
Firstly, some present methods of plant simulation are briefly discussed. Then tree simulation program developing processes are put forward which take Delphi7 as the software developing tool and are combined with module database of GLSence. An example is given to explain the way that GLSence module database's...
Multi-rope Hoist Steel Rope Tension On-line Monitoring System
Jian Liu, Yuan-xiang Liu
A multi-rope hoist steel rope tension on-line monitoring system is introduced in this paper, which consists of hydraulic sensors, data acquisition and sending devices, wireless communication devices and IPC. This system monitors the tension of multi-rope hoist steel ropes, in order to get the actual...
The Application of Digital Technology in Ceramic Cultural Relics Restoration
Yanni Wang, He Zhang
Digital technology has a significant advantage in the application of cultural relics protection and restoration. Based on the theoretical foundation, the thesis analyzed the utilization of modern digital simulation technology, and explored the improvement of ancient ceramics cultural relics restoration....
Application of Optimized Combination Method to Financial Risk Forecasting for Listed Companies
Shuang Zhang, Qing-he Hu
In a market economy, the competition among enterprises is becoming fiercer. Examples of declaring bankruptcy have become common. Financial risk is predictable, so it is of great practical significance for listed enterprises and the stakeholders to establish an effective financial risk forecasting model....
Research on the Prediction Model of Total Agricultural Output Value based on Wavelet Neural Network
Jin-yue Liu, Bao-ling Zhu
This paper proposes a prediction model of total agricultural output value based on the wavelet neural network, and presents the model structure of network and learning algorithm to train network using the gradient-descent algorithm with the momentum, and then conducts a prediction for our country's total...
Boosting MBR based kNN Search over Multimedia Data by Approximate Pruning Metric
Shuguo Yang, Chunxia Li
MBR (Minimum Bounding Rectangle) has been widely used to represent multimedia data objects in R*-Tree family indexing techniques. In this paper, in order to improve the performance of kNN searching over multimedia data, we propose an approach to reduce the computation cost of MINMAXDIST by using its...
Acoustic Analysis of Standard Arabic Plosives
Yasheng Jin, Li Ma
This paper has used the research theory and method of experimental phonetics and Speechlab software (Peking university) and Matlab voice analysis platform to analyze and describe the standard Arabic plosives though the atlases such as wave pattern'broadband sonogram'amplitude curve and logarithm spectrum...
A Mobile Table for the Communication in IPv4/v6 Mixed Networks
Zheng Xiang, Zhengming Ma
IETF has specified Mobile IPv4 and Mobile IPv6 in RFC3344 and RFC3775 respectively, but not yet discussed Mobile IPv4/v6 in any published RFC. This paper proposes a scheme to solve one of Mobile IPv4/v6 problems which Home Agent (HA) is located in IPv4 network, Correspondent Node (CN) is located in IPv6...
Using Skin Color and HAD-AdaBoost Algorithm for Face Detection in Color Images
Li-Jie Xue, Zheng-Ming Li
Owing to the interference of the complex background in color image, high false positive rate is a problem in face detection based on AdaBoost algorithm. In addition, the training process of AdaBoost is very time consuming. To address these problems, this paper proposes a two-stage face detection method...
Attendance Technology on Campus Research and Application
Li Jiang, Yan Li
The phenomenon of cutting a class is increasingly more serious in university, leading to a lot of universities begin to strengthen the daily management for students. The students of class attendance is the most common method. This paper introduces some management can be used in the technology in classroom...
The Research On Building a Price Model for Urban Commercial Land Evaluation
Bing Bu, Thanakrit Gu
This essay concludes, on the basis of the theory of the increase in land value and the supply-demand curve of China's market, the incorporation of the new concept of benefit equilibrium baseline. Through comparison of earlier real estate market and land prices, analysis of urban commercial land prices...
A Study on Platform Construction of Automobile Industrial Innovation
The fulfillments of automobile industrial innovation practices confirm that automobile industrial innovation platform plays more and more important roles. This paper studies connotation, structure and construction of automobile industrial innovation platform. An automobile industrial innovation platform...
A General System Design and Implementation of SQL Injection Precaution
Xin Fang, Wei Fang
SQL injection attack is very easy to implement intrusion detection, Attacker through the webpage address into the entrance, constructs a SQL statement, illegal access to the web resources. This paper introduces the SQL is injected into the formation reasons, SQL injection methods, to prevent SQL injection...
Theoretical Investigation on the Resonance Effect in the Acoustics
Chuan-mei Du, Ming-xu Zhang, Ying Xu, Xiu-quan Ni, Heng-linag Zhou
In this paper, the resonance interaction at the acoustic vibration caused by the inharmonic vibration is discussed. Based on the perturbation theory, the influences of the resonance interaction between the two and three vibrant levels on the level energy, wave-function, and the spectral line intensity...
A Data Mining Method on Software System Layer
Yonghui Liu, Yanhui Wang, Yinan Hu
This paper puts forward a data mining method on software system layer which is based on researches on clustering data mining. At first, this method gathers all kinds of software data. Then it extracts characters from them to mark softwares on Halstead software science. Thirdly, it classifies the softwares...
A Proposal for Automatic Diabetes Food Information Display with Mobile Phone
Jing-sheng Hu, Kun Peng, Mei-kui Zhang, Ya-bin Li, Chen Jiang
Dietary treatment is the basic therapy for diabetes, but how to do the right food intake is the biggest discouraging problem. We present a proposal for mobile phone diabetes food information display which can help determine the food composition and calories automatically from the clinical point of view...
A Distributed Network Fault Diagnosis Platform based on Web Services
Bo LI, Guo-min Zhang, Xiang-lin Wei, Ming Chen, Bing Li
Large-scale network services bring great challenges to fault diagnosis, which include the unpredictability of the fault, the difficulty of collecting the fault information, high cost and technical complexity of diagnosis system deployment. To address these challenges, a web services-based distributed...
A Study On Data Mining Algorithm Gragh-based
Qiuyu Tang, Yifan Tang
In computer science, graph is one of the most complex data structures. But graph can be used in research and in bussiness because of its intuitive expression. It is a focus in data mining how to derive the interesting subgraph patterns from a great number of graphs. This article introduces a data mining...
Research on Generalization of Patch in Water System of Land Use
In this paper we discussed the problems about water elements generalization in Cartographic Generalization, It includes some methods about the selection and simplification in the water elements generalization, extracting the axis-line of river, and the generalization of land use patch. At last, we design...
Design and Realization of Nature Language Processing in The Application of Computer-assisted Teaching
Xianming Meng, Feng Kong
with the development of computer technology, computer-assisted teaching has become an important aspect in modern education application. More and more educational software plays a major role on helping people learn the language. In this paper, we combine natural language process technology to multimedia...
Modeling for Nonlinear Series Prediction based on the Support Vector Machine Theory
In order to improve the prediction accuracy, applies the Support Vector Machine (SVM) theory to the prediction of the Nonlinear Series. Based on the analysis of the basic theory for the prediction, adopts the Cross Validation method to choose the best parameters and then establishes the prediction model....
Research on Pupil Center Location Based on Improved Hough Transform and Edge Gradient Algorithm
Dewu Chen, Junnan Bai, Zhiyi Qu
According to the poor efficiency of the traditional Hough transform algorithm to detect the pupil center, this paper proposed an edge gradient algorithm, which combines with improved Hough transform algorithm to detect the pupil center. At the beginning, a modified Hough transform algorithm was used...
Design and Implementation of the Defense Contract Management System based on B/S structure
Tianming Huang, Chao Xie
The defense contract management manual work involving multiple departments and multiple content, low efficiency and error-prone. Based on the characteristics of the defense contract management business, design and development of a defense contract management system. The system was developed based on...
Planning and Designing of Letters and Calls Management System Based on E-government
Zhenhua Xie, Chunlin Deng, Kai Zou, Bo Zhou
Based on analysis of Chang-Zhu-Tan area online letters and calls problems, by letters and calls management system as the research object, with electronic government network and service concept to provide support, to enhance the government and the public communication level, strengthen supervisory, and...
Research on Security Issues of RFID Technology in IOT
Hong-ying Jin, Min Tian
With the global development of IOT, people are more worried about their personal information security issues. Through the analysis of security problems, this paper introduces symmetric grouping algorithm DES to encrypt the data between tags and readers based on Hash-Lock protocol,. In order to reduce...
Method of Key Rating Ascertainment for Space Software based on Fuzzy Synthetic Evaluation and Quantitative Fault Tree Analysis
Yang Li, Kefei Song
Software key rating ascertainment is very important in development of space software. It can guide manager develop the congruent software using the optimal benefit-cost ratio in management. It can also provide the direction in software measurement, and help designer improve system reliability finally....
The Algorithm for Unstructured Road to Abstract Road Surface based on Color Feature
Xintian Cheng, Zhenmin Tang
Visual navigation of mobile robots is an important issue in the field of computer vision research. For the characteristics of unstructured roads, in this paper, we use color feature and space information to solve this problem. First, compress color space of color image containing unstructured road to...
Modified PFA with the Azimuth Resampling in Post Fourier Transformed Data Domain
Lu Liang, Pan Li
The polar format algorithm (PFA) is the most popular way for spotlight synthetic aperture radar (SAR) image formation and is still attractive nowadays. Conventionally, the algorithm is carried out sequentially as a range resampling, an azimuth resampling, a Fourier transform (FT) in azimuth, and an FT...
Characteristic Parameter Estimation of Internal Waves Based on Pitch Arc Fitting and HHT
Jie Chen, Jifeng Yang, Biao Chen, Suqin Xu
In this paper the wave direction and the wave length of the internal wave will be extracted with a novel method, which will combine the merit of artificial allocation and the Hilber Huang Transform. The Internal wave in SAR image is firstly drew with three points along the front of the internal wave,...
Characterizing Petri Nets with the Temporal Logic CTL
Zhifeng Liu, Zhihu Xing
Model checking is a powerful technique for verifying systems and detecting errors at early stages of the design process. When model checking is used to check properties of Petri net, the specification has to be expressed in temporal logics. In this paper we will focus on how to characterize some important...
Research on the Supporting Degree of Multilayer Correlative Rules and Its Minimal Thresholds
Xiaolan Cao, Jian Peng, Jiahong Peng
Supporting degree and its minimal threshold have important impacts on the designment of quick and effective algorithm of multilayer correlative rules. This paper introduces interzone supporting degree for computing supporting degree of item sets of intersectional layer rationally which avoids unmeaningful...
Study on Design of Fault Injection System Based on Testability Verification
Zhiyu Li, Kaoli Huang, Guangyao Lian
Based on testability verification, the paper studies on designing of fault injection system and it is used on designing stage of some auto-driving instrument. The previous design only adapted the designer's request, and ignored testability verification, and it was a large problem to equipment. This paper...
Ordovician Limestone Aquifer Seepage Field Simulation Based on Modflow
Jiuchuan Wei, Huiyong Yin, Shasha Wang, Daolei Xie
According to the data of draining test, we simulated the Ordovician limestone aquifer seepage field by MODFLOW module of GMS (Groundwater Modeling System). After numerical simulation model building, we successfully simulated the seepage field formed by draining test and dynamic changes in the water level...