Proceedings of the 2012 National Conference on Information Technology and Computer Science

+ Advanced search
271 articles
Proceedings Article

Least Squares Method Prediction-based Spray and Focus Routing Protocol in Opportunistic Networks

Zhuowei Shen, Ying Tu
Opportunistic Networks develops rapidly in recent years. With the popularity of GPS (Global Positioning System), velocity or position prediction plays an important role in opportunistic network routing. In this paper, a new opportunistic routing protocol named LSMPSF (Least Squares Method Prediction-based...
Proceedings Article

Water-Inrush Prediction of Coalbed Floor Based on the Limit Equilibrium Theory of Rockmass

Shasha Wang, Jiuchuan Wei, Weijie Zhang, Baolai Song
Based on the limit equilibrium theory of rock mass, we analyzed the mechanism of water-inrush of seam floor and deduced the theoretical formulas of ultimate hydraulic pressure of seam floor through obtaining the facing length, the thickness and lithological association of floor rockmass into consideration....
Proceedings Article

Design and Implementation of Value-added Services Platform Valet Operating Subsystem

Ke Zhang, Jiaqi Zhu, Jia Meng
Customer relationship management system is a system through systemic research towards the client. In order to improve the service level for client, establish a long-term, stable relationship between enterprises and clients, and elevates the rate of client?s loyalty, and so as to seek more profits for...
Proceedings Article

Research on the Key Influencing Factors of Use Intention on Coloring Ring Back Tone

Rong Liu, Keyan Gao
Through reviewing previous research papers based on Theory of Reasoned Action and Technology Acceptance Model, combined with the characteristics of mobile value-added Coloring Ring Back Tone business, this study discussed the factors influencing consuming intention of Coloring Ring Back Tone, developed...
Proceedings Article

Personalized Learning System Based on Data Mining for Experimental Platforms

Zufeng Zhong, Hongyan Yang
On the basis of adaptive learning and the results of data mining, a personalized learning system was designed and implemented. The system on this algorithm has implemented the educative conception of teaching students in accordance with their aptitudes. Experimental platform in the traditional learning...
Proceedings Article

A Novel Teaching Solution for Operating Systems

Tunhua Wu, Baogang Bai, Ping Wang
Traditional teaching process of Operating Systems course has many defects, such as divorce between theory and practice, outdated experimental platform, which result in low learning interest and effect on the course. A novel teaching solution for Operating Systems course was proposed in this paper. The...
Proceedings Article

Research on Retailer's Financial and Operation Decisions Based on Strategic Customer

Heng Liu
This paper studies retailer's decision and financial ins-titution's decision based on the strategic customer when retailer accepts financial service from financial institutions. Research shows that financing rate increases with the wholesale price and the average rate of return on investment increasing...
Proceedings Article

A Novel Photographic and Computer Graphic Composites Detection Method

Zhenwei Chen, Yongzhen Ke
With the development of the rendering techniques, the visual difference between photographic images (PG) and computer graphics (CG) is becoming smaller. And the digital image forgery is not limited to the composite between photographic, splicing of computer graphics and photographic is also a problem...
Proceedings Article

Development of Python-based ArcGIS Tools for Spatially Balanced Forest Sampling Design

Mingyang Li, Ting Xu, Qi Zhou
The current forest survey sampling methods are based on classical statistics, can not solve the problems of close spatial autocorrelation and poor adaptability. General randomized tessellation stratified (GRTS), a commonly used algorithm to implement spatial balanced sampling (SBS) has gained popularity...
Proceedings Article

Research on DSP-GPU Heterogeneous Computing System

Xiangzhen Li, Jingying Hu, Weiguo Lv, Guiqiang Wang, Xinrong Cai
In this paper, DSP-GPU heterogeneous computing system is studied and the system architecture is designed. The task scheduling model is analyzed and the discrete particle swarm optimization algorithm is used for the DSP-GPU heterogeneous computing. The communication framework between DSP and GPU is designed...
Proceedings Article

The Research of the Maximum Length n-grams Priority Chinese Word Segmentation Method Based on Corpus Type Frequency Information

Pengyu Lu, Lijun Jin, Bin Jiang
In order to solve the difficulties to extract words in particular domain, we formulate a method of automatic word segmentation in Chinese based on corpus type frequency information. This method can effectively extract n-gram words that are not predefined in a lexicon by setting the maximum length (n)...
Proceedings Article

Analysis and Application of Carrier Aggregation Technology in Wireless Communications

Binglin Li, Hao Zhang, Jiming Yao, Hongbin Yao
Carrier aggregation is a key technology in the LTE-A. Carrier aggregation can be achieved within the same frequency bands continuous carrier aggregate, non-continuous carrier aggregation and different frequency bands within the carrier aggregation. It analyses the two implementations of carrier aggregation:...
Proceedings Article

The Analysis and Solution of a PCP Instance

Jing Dong
In this paper, we present a heuristic rule for solving some specific PCP instances. We also analyze a PCP instance, and prove that this instance has no finite solution using our heuristic rule. Moreover, we find this instance has a unique infinite solution generated by a Fibonacci substitution.
Proceedings Article

Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System

Tian Wang, Hui Xu, Yi Zhu, Jieqing Ai, Wubing Zhou
Through analyzing the indicators of classified protection and risk assessments of information system, a security configuration check specification model of Guangdong Power Grid Corporation is built. Security configuration enumeration library is also designed by reference to SCAP protocol. The architecture,...
Proceedings Article

Attribute Reduction Algorithm Based on Incomplete Decision Table

Yue Du, Jian Wang, Xu Zhang
The paper describes the basic concepts of rough set theory and discernibility matrix and presents an attribute reduction algorithm based on reduced discernibility matrix, which aims at resolving the inadequate of the existing attribute reduction based on incomplete decision table. There only contain...
Proceedings Article

Muti-wheel Bogie Braking System Simulation of Civil Aircraft

Hua-wei Wu, Te-fang Chen, Lin-feng Wang, Wei-ming Huang
In order to meet the development needs of large civil aircraft, this paper takes four-wheel bogie landing gear as example and introduces the muti-wheel braking system control mode and control law. The kinematics of aircraft braking process and the mathematical models of wheels, tyres and runway, hydraulic...
Proceedings Article

Study on the Runoff Characteristics of Ordovician Limestone Groundwater in Jinmen Coalmine

Shasha Wang, Jiuchuan Wei, Zengxue Li, Baolai Song
Based on the data of water pumping test and releasing test, we systematically analyzed the hydrochemical characteristics of the Ordovician Limestone aquifer. We sorted the data, classified the water quality of each samples, drawed piper trilinear nomograph, and delineated hydro-chemical subsections of...
Proceedings Article

A study on applying KFCM algorithm to source code mining

Yonghui Liu, Jingjing Tian, Lei Zhang
This paper provides a algorithm, which is based on that kernelized fuzzy C-means uses on the study of source code mining, to solve the problem that the large number of quantities, multiple attributes and most of them discrete of software engineering. By using this algorithm, we can improve the efficiency...
Proceedings Article

A New Data Compressed Algorithm on Mobile Device under Cloud Service

Tong Zhu, Zhuo Gao
In this paper, we discuss how to use cloud services to provide seed data for data compression algorithm on mobile device. Seed data can remove redundant information from GPS data. Then, through the shift encoding algorithm, we provide a more simple and effective data compression method for real-time...
Proceedings Article

An Algorithm for Spread Arbitrage Process in the CSI-300 Futures Market

Jiayue Xu, Hong Fan
With the development of modern capital markets, the stock index futures have become one of the most active investment instruments in the world. The arbitrage of stock index futures actually plays a very important role in making the price of stock index futures be rational and activating the market. In...
Proceedings Article

Research of Fast Cloth Simulation Based on Mass- Spring Model

Zhenfang Cao, Bing He
In cloth simulation based on the spring-mass model, algorithm dealing with super-elasticity reduces the simulation efficiency to some extent. Based on the correction algorithm of modifying position and velocity, an improved algorithm is proposed which can improve the efficiency effectively. Meanwhile,...
Proceedings Article

Evaluating Mission-Oriented Network Reliability via Simulation Test

Mo Chen, Yuejin Tan, Hongzhong Deng
This paper proposed a simulated test method for evaluating mission-oriented network reliability. We first defined the mission-network model and entity-capability model. Then, to test the mission-oriented network reliability, we employed a three-layer network, including mission-layer, sampling-layer and...
Proceedings Article

Generalized Regression Neural Network Based Quantitative Structure-Property Relationship for the Prediction of Absorption Energy

Hui Li, Yinghua Lu, Ting Gao, Hongzhi Li, Lihong Hu
Generalized Regression Neural Network (GRNN) was used to develop a quantitative structure-property relationship (QSPR) model to improve the calculation accuracy of density functional theory (DFT). The model has been applied to evaluate optical absorption energies of 150 organic molecules based on the...
Proceedings Article

The Impact of Chinese Entrepreneur's Social Networks on the Development of Private Enterprises in China

Jing Bai, Jun-wei Liu
The Entrepreneur's social network in China is the reflection of the deep-seated cultural and social background, which exerts both positive and negative effect on the development of the Chinese private enterprises. However, when the Chinese enterprises are further involved in the economic trend of the...
Proceedings Article

Intelligent Buildings Equipment Management System Interface Information Integration

ZhiYi Xing, Jian Chen, JianXun Zhao
There are more and more intelligent buildings in our life. Building automation system (BAS) is the main content of intelligent building system equipment management. This paper discussed the integration of information and graphical interface of the lighting system, air conditioning system and security...
Proceedings Article

The Empirical Study on Impact of Consumer Experience to Consumer Loyalty of Coffee Chain in Guangzhou

Jing Bai, Jiang Lu
The purpose of this paper is to study on the impact of consumers experience to their loyalty in the city of Guangzhou. Based on the related literature study, it has been built the concept model of causal relationship among experiential medium, experiential value and consumer loyalty. We use the empirical...
Proceedings Article

Design and Implementation of A TV White Space Channel Allocation System

Qi Xu
This paper describes a white space channel allocation method which aims on calculating the quality of the available channels and the possible inference introduced by the new node. The implementation and analysis of the system are also discussed.
Proceedings Article

Research on Small Signal Amplification Circuit of Downhole Instrument

Xin Lai, Chunpu Wang, Liang Ge
In order to acquire the real-time work of underground drill, promote the security and the reliability, it is necessary to effectively measure the drilling engineering parameter of drilling pressure, torque and side pressure etc. It uses the resistance strain sensor as a converter. The microvolt signal...
Proceedings Article

Numerical Modeling Approach of an Air-launched AUV Initially Impacting on Water

Yonghu Wang
Water-entry impact of air-launched AUV (AL-AUV) is considered as a timedepended strongly nonlinear fluid-structure Interaction phenomenon. Numerical modeling technique of AL-AUV on its initial water-entry impact is given by using the Multi-Material ALE-Lagrange coupling algorithm. The key aim is focused...
Proceedings Article

Numerical Simulation Study of Aerodynamic Characteristic on Hypersonic Aircraft

Jiang Chen, Song-ping Wu
In this paper, a three dimension model that is similar to the hypersonic cruise aircraft X-51A has been generated by using a graphics processing technology and an anti-modeling method from the published pictures and related articles about the X-51A. This paper adopts the Harten-Yee's scheme to simulate...
Proceedings Article

Simulation and Analysis of OSPFv2 DR Election Based on GNS

Xiaohua Li, Jian Xu, Juan Nie, Chengkui Guo, Xiangang Zhao
Designated Router (DR) is the key for the quality of an Open Shortest Path First (OSPF) network and it enables a reduction in the number of adjacencies, which in turn reduces the amount of routing protocol traffic and the size of the Link State Database (LSDB). In this paper, we analyze the principle...
Proceedings Article

Dynamic Binary Instrumentation Technology Overview

Kunping Du, Fei Kang, Hui Shu, Li Dai
The Dynamic Binary Analysis technology is a newly emerged technology which can analysis program execution dynamicly. Using this technology, the process of program analysis became more simple and accurate. Foreign researchers had put forward several Dynamic Binary Analysis Platform in recent 10 years....
Proceedings Article

An Optimization Method for Missile Testing Vehicle Based on Genetic Algorithm

Ai-zhen Liu, Li-yun Chen, Xiu-feng Gao, Xi Li
Planning the optimum number of Missile Testing Vehicles is very important to decrease testing cost especially testing time of kinds of missiles. To determine the number of vehicles, the mathematics model was established and an optimization method based on Genetic Algorithm was proposed. And an encoding...
Proceedings Article

Exploring the Spatial Distribution of the Peasant Family Garden Based on the GIS in Xindu District, Chengdu City

Jinjun Zheng, Chao Hong
Due to the increasing of the population and development of industry economy, many Peasant Family Gardens have been flocking to the Sichuan Basin and shows messy distribution pattern on spatial scale. In the present paper, total of 187 Peasant Family Gardens in the Xindu District, Chengdu City, are selected...
Proceedings Article

Traffic Adaptive Geographic Routing for Vehicular Ad Hoc Networks

Xiang-yu Bai, Xin-ming Ye, Yan-jun Huang, Jun Li
Vehicular Ad Hoc Network (VANET) has recently attracted considerable attention. The design of routing protocol for VANET is a challenge given rapid topology changes and frequent network disconnection. Current routing protocols usually use geographic information to forward packets. In this paper, we propose...
Proceedings Article

Modeling Sediment Yields in A Small Gully of the Sichuan Hilly Basin Using Geowepp Model

Jinjun Zheng, Chao Hong
The spatial pattern of soil erosion and deposition on catchment scale are predicted by the GeoWEPP model in a small catchment of the Sichuan Hilly Basin. The estimated sediment delivery per unit area and sediment delivery ratio are 2760 t km2 yr-1 and 0.485, respectively. Compared with the results derived...
Proceedings Article

Digital Implementation Method of Base-band Signal of FSK Quadrature Modulation

Jinyu Bao, Kaiyu Qin, Bo Tang, Honglin Dou
FSK modulation is widely used in communication system. In this paper, based on the basic formula of the communication theory, we concluded a new digital implementation method of base-band signal of 2FSK quadrature modulation formula, and realized in base-band signal simulation software based on VC++,...
Proceedings Article

Research on RSA-based Broadcast Encryption Scheme in Web Multimedia

Xue Liang, Zhongjun Du
With the development of web multimedia technology, broadcast encryption schemes play an important role in multimedia services copyright protection. In this paper, we propose a new broadcast encryption scheme based on RSA, besides, we give out two algorithms?smallest power exponent algorithm and improved...
Proceedings Article

Design and Implementation of 802.1x Authentication Module in Security Switch for Industrial Control System Based on FPGA

Yanan Zou, Dongqin Feng
Aiming at the safety of the industrial control system, an authentication module based on 802.1x with dual authentication model in safety switch is proposed. The authentication mechanism of 802.1x is stated. The dual authentication model, namely the authentication between the safety switch and the server...
Proceedings Article

The Research on Strategies of China's Green Finance Development

Ying Shi, Xiaozhong Geng
Green finance (ecological finance) is an important tendency to develop modern financial industry. The development of green finance has significant role to protect the ecological environment, accelerate economy and develop the financial industry. Green Finance is also the necessary way to balance the...
Proceedings Article

A Novel Design of Wideband Frequency Antenna for WLAN

Rongrong Zhang, Yalin Guan
A novel and simple coplanar waveguide (CPW)-fed monopole antenna with wideband dual-frequency is proposed in this paper. The proposed antenna printed and integrated on a small region of a microwave substrate has a compact size of 22?35mm2. This antenna, fed by CPW and connecting a 50' SMA connector,...
Proceedings Article

Feature Extraction and Recognition of Analog Circuit Fault Signal Based on Wavelet Transform and Partial Singular Values Decomposition

Si-yang Liang, Jian-hong Lv
A new algorithm for the effective characteristics' extraction of analog circuit fault signal is proposed with consideration of its complexity. The proposed method is based on wavelet transform and partial singular values decomposition. Firstly, the analog circuit fault signal is decomposed into different...
Proceedings Article

Tourist Souvenirs of Eco-packaging Structure Optimization Design in Perspective of Lijiang River Culture

Zhihong Liu, Yu-ting Zhang
Article to the opportunity of development of Guilin tourist attractions souvenir packaging, with its profound cultural connotation and artistic taste as the basic point of Lijiang River, from unique structural optimization design of Visual angle to research, make souvenir package design visual branding...
Proceedings Article

Analysis of Information Construction for Business Files of University Teachers

Lianfeng Zhao
as the actual reflection of the teaching and research ability of university teachers, teachers' business file has an important preservation and application value. The paper puts forward corresponding specific measures to implement information management and initially explores the ways to achieve these...
Proceedings Article

Simulation of Optical Imaging Reconnaissance to Ground

Wen-wei Li, Hong Meng, Yong Sun, Guang-yun Li, Ji-rong Xue
Optical imaging reconnaissance plays an important role in the intelligence and reconnaissance process, especially widely used in UAV reconnaissance and direct fire weapons. Combined with related requirements, a simulation model of the optical imaging reconnaissance process is proposed, including the...
Proceedings Article

Effect of User Distribution on the Capacity of Cellular Networks

Xue Tang, Hongwen Yang
User distribution is a critical issue in cellular networks. In most previous works, a uniform user distribution is often assumed within a cell. In this paper, we purpose a non-uniform user distribution model. Both its effects on downlink and uplink capacities of a cellular network are evaluated under...
Retraction

RETRACTION: Introspective, Client-Server Technology

Yanchun Ma, Jixin Pan
In April 2020, Atlantis Press was alerted to fake proceedings articles hosted on our platform. These articles, mostly in computer science and engineering, were generated by the SCIgen computer program and were all published between 2006-2018. Immediately after receiving the alert, Atlantis Press initiated...
Proceedings Article

A Train Algorithm of Multi-Aggregation Process Neural Networks Based on Chaos Genetic Optimization

Yue-Wu Pang, Shao-Hua XU
Aiming at the learning problem of multi-aggregation process neural networks, an optimization train method based on chaos genetic algorithm (CGA) with lowest mean square algorithm (LMS) is proposed in the paper. The learning problem of the network weight functions is converted to the training of basis...
Proceedings Article

A Channel Allocation Algorithm Based on Demand in Cognitive Wireless Mesh Networks

Tingrui Pei, Jing Li, Zhetao Li
We proposed a channel allocation algorithm, which was a modification of graph theory and based on demand to optimize the performance of cognitive wireless Mesh network. The key idea of the algorithm was to design a proportion coefficient of actual flow to demand flow, and then cognitive users with the...
Proceedings Article

Object Tracking Based on Multi-feature Mean-shift Algorithm

Jiafu Jiang, Hui Xiong
Object tracking is one of the key technologies in intelligent video surveillance and how to describe the moving target is a key issue. Traditional color histogram Mean-shift (MS) algorithm only considered object's color statistical information, and didn't contain object's space information, so when the...
Proceedings Article

Location-based Security Authentication Mechanism for Ad hoc Network

Cui Li, Ze Wang
With the growing prevalence of wireless networks, location information plays a critical role in many applications. Especially, in unattended and hostile environment, whether the location of a node lies on a security area became very important. In this paper, we first analyze the security and vulnerability...
Proceedings Article

Scalable Distributed Standard Definition Video Conferencing System: Architecture and Forwarding Model

Suiming Guo, Congxiao Bao, Xing Li
Videoconferencing system is widely and successfully used on the Internet and standard/high definition videoconferencing is a new heated topic in research. However, researches in various videoconferencing systems (e.g. Access Grid, DVTS, VLC, and Ultra Grid) are faced with the problem of scalability....
Proceedings Article

Study on the Framework of the Management Platform for CPA Audit

Xu Liu, Shijian Lin
With the wide application of information technology in management, Audit Informationization has been the inevitable evolution trend of the CPA industry. Based on the features and needs of the CPA industry, we provide the Management Platform for CPA Audit, an ERP system. The Management Platform consists...
Proceedings Article

Analysis and Design of Clinical Information Management System Based on UML of AIDS Syndrome of Traditional Chinese Medical

Songhe Shi, Shengwu Xiong
[Purpose] In order to find out AIDS syndrome discipline of traditional Chinese medicine, and so as to conduct dialectical analysis scientifically to patients, and also lay the foundation for the Chinese medicine diagnosis and treatment of AIDS, and combined with the situation of Henna AIDS Chinese medicine...
Proceedings Article

Social Value Evaluation of Forest Resource Asset of Forest Industry Zone in Heilongjiang Province

Jiang Peng, Liandi Zhou, Hao Li
Along with the establishment of our country's market economy system, forest resources started to be regarded as a kind of asset, and it has been generally accepted after 20 years progress. Recent years, there have been some evaluation methods to evaluate the value of forest resource asset, but has not...
Proceedings Article

Arranging course automatically algorithm based on multi-factor priority

Wei Zhi, Huaping Feng
The problems of course timetabling mainly involve time, curriculum, the number of classrooms and so on. A new algorithm based on multi-factor priority is proposed in this paper. The algorithm use time division, the compute of the priority, the provisional matrix and quick sort to achieve the function...
Proceedings Article

Protect Cloud Computing's Data Using Fully Homomorphic Encryption

Xu-dong Wu, Xin Li
With the fast development and wide application of cloud computing,more and more security accident has been appeared.Though some traditional security measure has been applied, the security problem has become the main abstacle to apply cloud computing technology This paper based on the newly developed...
Proceedings Article

Load Balancing Technology Based On Consistent Hashing For Database Cluster Systems

Zhenguo Xuan
The database cluster is an effective mechanism to improve the throughput of database systems and reduce the response time of the database. Generally, it is used to solve the single-node bottleneck problem of data access in network services. Load balancing technology is the key factor to determine the...
Proceedings Article

Research on the Diffraction Problem of Finite-length Anisotropic Impedance Split

Dun Cao, Liling Zhen, Ming Fu
Optimizing the channel and the radiation direction of the antenna is an important factor to improve the performance and quality of wireless communication systems. When it's rapidly developed in the field of communications, electrically large anisotropic impedance materials are used for the optimization...
Proceedings Article

The Logical Structure of the E-Commerce Platform Design and External Interfaces to Achieve of O To O

Li-jun Wei, Hai-bo Wu, Liao-liang Xiao, Jiang-tao Gong, Xin-xi Chen, Dong-mei Tang
O2O namely Online To Offline, it is a line from online to down, and combine online resources with real economy ,therefore allowing the network to become the real economy to an e-commerce model extends to the virtual world of the "front", different from the B2B - (Business To Business) and B2C (Business...
Proceedings Article

Research and Evaluation on Procurement Techno- Economic Benefits of NC Grinder Technology Projects Based on the AHP

Ping Zhao, Jinwu Fang
With regard to the NC grinder technology procurement project of a machinery ' according to a large number of data this paper makes use of The AHP to establish a mechanical plant AHP model. The third layer (Tender licensors) is taken as the evaluation indicators. Based on the relationship between production...
Proceedings Article

An Algorithm for Detection of Malicious Messages on CAN Buses

Congli Ling, Dongqin Feng
Control systems are encountering increasing security threats; as one of the common systems, CAN control system is very facile to be attacked. Aiming at the improvement of CAN control system security, an algorithm for detection of malicious CAN messages is given, and it has been implemented in the CANoe...
Proceedings Article

Research on the Measurement of Displacement based on Grating Reticle Image

Hai-hua LI, Juan Fan
A new method is present to get movement displacement directly when applying grating reticle to AC servo driving control system to carry on high precise orientation for the micro-objects. Adjusting the optical path until grating reticle image can be gathered clearly by vidicon. After analyzing and processing...
Proceedings Article

A Hybrid Evolution Algorithm with Application Based on Chaos Genetic Algorithm and Particle Swarm Optimization

Yu Fu, Bing Wang, Shao-Hua Xu
Aiming at the complex function extreme value and non-linear system model parameters adjust, a hybrid optimization algorithm based on chaos GA combined with PSO is proposed in the paper. With application of applying experience of PSO, sharing information of GA, and traversing pathway of chaos, the adaptive...
Proceedings Article

Smoke Detection Algorithm Based On Wavelet Transformation and Energy Analysis

Yijun Xu, Ning Han
A novel algorithm to detect the forest fire smoke based on the wavelet transformation and high-frequency energy analysis is proposed. The conventional color-based RGB algorithm has the difficulty to distinguish the smoke from other objects with the same color, such as clouds and fogs, so it leads to...
Proceedings Article

Stream Cipher Method Based on Neural Network

Haiyan Long
A new stream cipher algorithm based on one-way function of neural network is proposed. The nonlinear system comprised of such neural network is used to transform a group of LFSRs for key stream generation. As a result, the complexity of sequences is increased with period expanding. The produced cipher...
Proceedings Article

Research on Intelligent General Acquisition Controller of Rice Seedling-nursery House in Cold Region Based on MSP430F5438

Fangming Tian, Shujuan Yi, Feng Tan, Xiaoliang Wang, Li Yan, Yingnan Liu, Donglai Han
In view of the existence of insufficiency of environmental parameter acquisition control system for the current cold rice seedling house, through researching, develop a sampling control system with low power consumption, high precision, strong versatility, to which MSP430F5438 chip processor with low...
Proceedings Article

A Java Source-code SQL Injection Attack Detection Algorithm Based on Static Analysis

Tian Wang, Lihao Wei, Hong Zou
This paper researches the method of SQL injection attack detection and the principle of static analysis scanning, and presents a Java source-code SQL injection attack detection algorithm. The detection algorithm includes these steps: lexical analysis of source code, parsing of source code, constructing...
Proceedings Article

Impact of Antenna Beampatterns on the Capacity of Multiantenna Channels 

Chao Shao, Li-Shuang Fan, Qian Xiao, Zeng-Tao Mo
This paper provides an overview of the capacity of multi-antenna channel in Shannon theoretic sense, and gives analysis results and the upper bound expressions of Shannon MIMO channel capacity when transmit and receive antennas have the same beam pattern and are aligned, or one has wider beam than (or...
Proceedings Article

Hierarchical Structure Resource Scheduling Model Based on Grid

Na Wang, Bo Wei, Heng-wei Zhang, Jin-dong Wang
Resource matching is the core function of the grid. This paper analyzed the characteristics of the grid, designed a Hierarchical Resource Scheduling Model for data resources in grid and a new resource scheduling algorithm. This model can combine each function units of resource scheduling organically...
Proceedings Article

Research on the Association Rules of Marketing Resources Demand and Supply in Grid Environment

Jianyou Zhang
This paper introduces processes and methods access to the demand for marketing resources, describes the steps for marketing resources planning and the marketing resources demand-supply model in grid environment,finally lists several association rules of marketing resources demand and supply. It provides...
Proceedings Article

A method to implement data extraction using AND optical gate based on SOA-XGM

Ya-lin Guan, Rui-dong Wang, Lei Zhang
A method was proposed to implement data extraction using AND optical gate based on cross gain modulation (XGM) of semiconductor optical amplifier (SOA). The optical data extraction in DPSK/ASK orthogonal modulation system was achieved with the proposed AND gates, in order to prove its feasibility. Through...
Proceedings Article

A Wireless Mouse Design and Implementation Based on J2ME

Yuhe Song, Changying Liu, Tianhao Wang, Xin Zhang, Lingling Zheng
J2ME is a Java technology specification which was advanced by The United States of America SUN company.It was used to develop Java applications which run on small equipments, consumer electronic equipment, Internet mobile equipment, embedded equipment. Hereby, this paper will introduce a J2ME-Based program...
Proceedings Article

Stdudy on Cultivation Strategy of Customer Loyalty Based on Internet Marketing

Cuimin Zhen, Shehui Bian
In internet marketing environment, many businesses have gradually realized that gaining and maintaining customer loyalty is important source of long-term profits. This article firstly elaborates the connotation and importance of customer loyalty in internet marketing environment, then analysis the main...
Proceedings Article

Based on Prospective Dynamic Frequency Scale Power Optimize Method for Multi-Cores Processor's I/O System

Yufeng Guo
Power problem has been one of the most restricting development barriers of processor. I/O system power is an import part of the processor's power. The paper aims at I/O dynamic power of multi-cores processor, and put forwards a prospective dynamic frequency scale with clock gating power optimize method....
Proceedings Article

RAID Storage Systems with Early-warning and Data Migration

Yin Yang, Zhihu Tan, Wei Liang, ChangSheng Xie
This paper proposes a new RAID-based system, we defined as REM: RAID system with Early-warning and data Migration. REM can predict RAID potential fault according to disk health degree and array health. Once the fault has been predicted, it takes data migration to protect the data, which allocates reserved...
Proceedings Article

Weak Electricity Pipeline Management System Development Based on Seam Framework

Kai Yang, Yiming Li
As information technology and accelerating the process of the network, many companies, schools or government agencies are densely covered with a variety of weak lines, of which both China Unicom's mobile telecommunications network cable has a telephone line and broadcast television Some TV lines. Although...
Proceedings Article

Institutional Environment, Ownership Structure and Accounting Earning Quality

Jinri He, Xinran Liu
This paper empirically examines the relationships between the institutional environment, ownership structure and accounting earning qulity based on the data Chinese listed companies in 2007-2009. It finds that the better the insitutional environment in the rigion, the higher the quality of accounting...
Proceedings Article

Morphological Characteristics of Drug-loaded Nanoparticles based on Microscope Images Analysis System

Bohua Feng, Siyuan Mo, Liufen Peng, Huoyan Xu
Microscope images analysis of drug carriers was a widely used method for those nanomaterials. Usually manual measuring and analysis of microscope images were subject to errors, and bad stability of results. Nanoparticles microscope images analysis method was combined with computer image processing technique...
Proceedings Article

A research on error handling model of service fault-tolerant strategy

Yongqing Wang, Yan Chen, Ming Yang
With the rapid development of web services, web services fault-tolerant mechanism has become a new research focus. This paper presents an innovative error handling model of service fault-tolerant strategy. For the goal of enhancing the fault-tolerant performance of web services, we analyze the key technologies...
Proceedings Article

Risk Quantified Evaluation Method and Platform Design for Grade Protection

Tian Wang, Lihao Wei, Hong Zou
Regarding all the issues that Corporation faced during the grade evaluation, e.g.lack of accuracy on risk analysis, over dependence on the capability of the evaluater, etc. We bring out a new evaluation method on grade protection and the distributed platform RQEP. With them we can quantify the risk objectively,...
Proceedings Article

Solving linear PDEs with the aid of two-dimensional Legendre wavelets

Fukang Yin, Junqiang Song
In this paper, we develop a method, which using twodimensional Legendre wavelets, to solve linear PDEs. Based on the properties of shifted Legendre polynomials, we give a brief proof about the general procedure of two-dimensional operational matrices of integration, and then employ aforementioned matrices...
Proceedings Article

Typical cloud computing system design

HaiYan Liu, Zhiyuan An
Cloud computing more widely applied to study the structure of the cloud computing system, and in-depth understanding of cloud computing technology is necessary.Is very meaningful for the development of cloud computing systems.Designed in a typical cloud computing system framework, including the central...
Proceedings Article

Design and Implementation of hidden key loggers under .NET platform

Zhiyuan An, HaiYan Liu
keyboard recording technology has been widely applied to the system monitoring program.This paper describes the design and implementation keyboard loggers based on the the HOOK, under .NET platform. At the same time, in order to reach the hidden effect, record keyboard function module is inserted into...
Proceedings Article

Design and Implementation of Remote Buffer Overflow and implanted Backdoor

Xin Zhang, HaiYan Liu
Network security research focused content is a buffer overflow. It is a technology used by hackers mostly. This paper, based buffer overflow, given the use of the remote overflow implanted backdoor design, and implementation methods. In this paper, introduce the detailed steps to structure Shellcode,...
Proceedings Article

Research of Attack Model Based on Finite Automaton

Zhi-wei Zhang, Yun-Tian YUE
According to the unknown of attack behavior in cyberspace, this paper presents an attack modeling method based on system states aggregation. In the model, the basic principle of the finite automaton is researched and attack entities of cyberspace are classified by attack process, it combines finite automaton...
Proceedings Article

Syntactic Dependency for relation extraction from Biomedical literature

Xiaomei Wei, Jianyong Wang, Yang Li
Relation extraction is important to improve complex natural language processing (NLP) applications. The Bio-Event extraction in GE shared task is important to understand biological processes. Although some progress has made in GE research, there is still much work to do to improve the performance of...
Proceedings Article

Research on Basic Information Collection of Electronic Health Records

Guang Dong, Chunmei Liu
With the use of SOA, ESB and XML technology, this paper designed message-oriented middleware and data exchange adapter based on HL7 v3, XML standard. Through data migration middleware based on XML, it realized storage and derivation of user-defined XML document and completed automatic collection of basic...
Proceedings Article

An Exponential Distribution-based Model for Equipment Remaining Life Prediction

Xiao-Hong Meng, Wei Wang, Yong-Tao Zhou
The article proposed and established an exponential distribution-based model for equipment remaining life prediction. The model is a general decision model for detectable continuous degradation process. The modeling method and application example is introduced. Compared with other models, the model has...
Proceedings Article

Application study on multiple network communication of power engineering

LiMing Zhang, Rui Guo
The application of network communication in the field of engineering monitoring software has been very common, but most of them used a network communication mode. This paper introduces the multiple network communication modes (asynchronous network socket communication, wave communication, named pipe...
Proceedings Article

A study of test oracle for application interface testing of distributed system

Jingyan Cui, Gang Ye, Xianjun Li, Shilong Ma
The application interface testing is an important part of automated software testing of distributed system. It is based on network data which is produced when the distributed system is running. It is used to verify whether the network data is correctly exchanged. In this paper firstly we design test...
Proceedings Article

The actual diagnosis and rational appeal of college network courses

Jixin Pan, Lulu Cheng, Fuping Guo, Liping Liu
Nowadays, people have wrong conclusions and unreasonable concepts about the essential attribute in college network courses. These can be illustrated by the following aspects: such as in the value, the fixed position is not conformity with expectation; in teaching, the current teaching situation is deviated...
Proceedings Article

Method of Software Development Based on Component Technology

Yan Li, Li Jiang
Component-based software development methodology is a software development reuse software solutions in order to avoid duplication of effort, the current software component technology is regarded as one of the key factors of successful reuse. The article describes the main content of the basic concepts...
Proceedings Article

Research on IT Service Management of Local Colleges Based on ITIL

Zhengang LI, Zhigang Zhang
At present, the key of IT work faces to convert construction to service, however, the local colleges have not established complete management in order to fit for these changes. This paper discusses on IT service management mechanism and implement scheme for local colleges after analyzed the problem of...
Proceedings Article

The application of data source authentication protocol to video multicast

Shijie Zhao, Zhirun Liu, Liehuang Zhu, Rufeng An
An efficient packet-injection resistant data source authentication protocol for group communication(EPJRSA) was proposed to authenticate data source. It can recognize which packets are injected by attacker and delete them. But it cannot recover the lost packets. So an advanced protocol based on EPJRSA...
Proceedings Article

The research of multimedia data transmission Basis on the inventory and queuing theory

Jia-jie Shen
Aim to problem how the packet size effect to the multimedia data transmission and how to design the packet size to reach the best efficient of transmission. The research is mainly to use the inventory and queuing theory find the best way to design the send packet size. Though the model is established...
Proceedings Article

Constellation Design of the Beidou satellite navigation system and performance simulation

Xiaomeng Wang, Ruihua Liu
To improve the positioning accuracy and reliability of Beidou ,an analysis of the Beidou satellite navigation system has been performed; combination of technical experience of the foreign global satellite navigation system and the current release of technical information, we have designed Beidou satellite...
Proceedings Article

A Design of Digital Handheld Terminal in Wireless Data Acquisition System

Xingguo Sun, Lei Xu, Shouxian Wen, Xiaohui Li
In order to make data collection more convenient, quick and accurate in working site in the existing wireless data acquisition system, one kind of multi-function handheld terminal is designed which combines the wireless and wired data acquisition. The paper adopts Atmega128 of ATMEL as microcontroller,...
Proceedings Article

Angle-of-Arrival based Constrained Total Least-Squares Location Algorithm

Gangcan Sun, Xuefei Xu, Kai Yang
A source location algorithm based on the angle-ofarrival (AOA) measurements of a signal received at spatially separated sensors is proposed. The algorithm is based on the constrained total least-squares (CTLS) technique and gives an explicit solution. Simulation results demonstrate that the proposed...
Proceedings Article

Assessment of Meteorological Disaster Emergency Management Capability Used Information Entropy Theory

Weiying Li, Shuxia Jiang
In recent years, Meteorological disasters are frequently occurred, which bring tremendous suffering to people's lives and property. Meteorological emergence management capability appraisal is a system engineering which involved many factors, This paper design a multi-index appraisal system, built an...