Proceedings of the 2012 National Conference on Information Technology and Computer Science

Session: S1: Aggregation functions

46 articles
Proceedings Article

A Novel Algorithm for Predicting '-barrel outer Membrane Proteins using ACO-based Hyper-parameter Selection for LS-SVMs

Guangming Xian, Biqing-Zeng Xian
An ACO-based hyper-parameter selection for least squares support vector machines (LS-SVMs) was trained to predict the topology of transmembrane ' strands proteins. It should be stressed that it is very important to do a careful model selection of the tuning parameters for LS-SVM. In this paper, a novel...
Proceedings Article

The Research of Web Information Retrieval based on Temporal Information

Zhe Wang, Chenggang Xu
Temporal information is an essential attribute of the web pages, such as the publish time and the content time in the web pages. However, the major search engine hasn't more view on the temporal information of web pages,and ignored the relationship between the keywords and time phrases.In this paper,...
Proceedings Article

Study on Internet of Things application for Highspeed Train Maintenance, Repair and Operation (MRO)

Weijiao Zhang
the design of EMU IoT-system, which is oriented to the MRO of high-speed trains, was studied with implementations of sensing technologies like RFID, sensors, etc; with regarding to the future requirements of safety, orderly, efficient and high-quality in EMU maintenance service of China. In operation:...
Proceedings Article

Research on the Construction of an Internet-based Database for Spoken English Testing and Teaching

Tiezhu Jin
The paper concerned starts with the literature review on spoken English teaching in the College English program, in particular weaknesses in college spoken English teaching, in the light of College English Teaching Requirements. It continues with discussions from scholars over spoken English teaching...
Proceedings Article

A SLNR-Based Precoding Scheme for Multi-Stream Multicasting Systems

Guang Jin, Bing Cao
The problem of wireless security for the downlink of multi-stream multicasting MIMO systems overheard by multiple multi-antenna eavesdroppers is investigated. We assume that the transmitter has perfect knowledge about the channel to desired users and the eavesdroppers. An efficient secure precoding scheme...
Proceedings Article

Construction of WSN Based on Polynomial Node Capture Attack and Defense Methods

Hong Gan, Dan Pan
Wireless sensor network ( WSN ) in the presence of node capture attack, put forward a kind of node capture attack detection method of defense, the method based on polynomial in two variables will be node key information and node deployment time and identification for binding, when negotiating session...
Proceedings Article

An Event-driven Cooperation model of Information Appliances in the Intelligent Home

Hua Peng
In the current system of the intelligent home, it control information appliances with the sole mode, can not realize the cooperation between of them, its intelligence can not get sufficient play. Based on the principle that the cooperation of information appliances are often event-driven, in this paper,...
Proceedings Article

The Application of Digital Technology in Ceramic Cultural Relics Restoration

Yanni Wang, He Zhang
Digital technology has a significant advantage in the application of cultural relics protection and restoration. Based on the theoretical foundation, the thesis analyzed the utilization of modern digital simulation technology, and explored the improvement of ancient ceramics cultural relics restoration....
Proceedings Article

Boosting MBR based kNN Search over Multimedia Data by Approximate Pruning Metric

Shuguo Yang, Chunxia Li
MBR (Minimum Bounding Rectangle) has been widely used to represent multimedia data objects in R*-Tree family indexing techniques. In this paper, in order to improve the performance of kNN searching over multimedia data, we propose an approach to reduce the computation cost of MINMAXDIST by using its...
Proceedings Article

A Mobile Table for the Communication in IPv4/v6 Mixed Networks

Zheng Xiang, Zhengming Ma
IETF has specified Mobile IPv4 and Mobile IPv6 in RFC3344 and RFC3775 respectively, but not yet discussed Mobile IPv4/v6 in any published RFC. This paper proposes a scheme to solve one of Mobile IPv4/v6 problems which Home Agent (HA) is located in IPv4 network, Correspondent Node (CN) is located in IPv6...
Proceedings Article

Attendance Technology on Campus Research and Application

Li Jiang, Yan Li
The phenomenon of cutting a class is increasingly more serious in university, leading to a lot of universities begin to strengthen the daily management for students. The students of class attendance is the most common method. This paper introduces some management can be used in the technology in classroom...
Proceedings Article

A Proposal for Automatic Diabetes Food Information Display with Mobile Phone

Jing-sheng Hu, Kun Peng, Mei-kui Zhang, Ya-bin Li, Chen Jiang
Dietary treatment is the basic therapy for diabetes, but how to do the right food intake is the biggest discouraging problem. We present a proposal for mobile phone diabetes food information display which can help determine the food composition and calories automatically from the clinical point of view...
Proceedings Article

Research on Pupil Center Location Based on Improved Hough Transform and Edge Gradient Algorithm

Dewu Chen, Junnan Bai, Zhiyi Qu
According to the poor efficiency of the traditional Hough transform algorithm to detect the pupil center, this paper proposed an edge gradient algorithm, which combines with improved Hough transform algorithm to detect the pupil center. At the beginning, a modified Hough transform algorithm was used...
Proceedings Article

Research on Security Issues of RFID Technology in IOT

Hong-ying Jin, Min Tian
With the global development of IOT, people are more worried about their personal information security issues. Through the analysis of security problems, this paper introduces symmetric grouping algorithm DES to encrypt the data between tags and readers based on Hash-Lock protocol,. In order to reduce...
Proceedings Article

Characteristic Parameter Estimation of Internal Waves Based on Pitch Arc Fitting and HHT

Jie Chen, Jifeng Yang, Biao Chen, Suqin Xu
In this paper the wave direction and the wave length of the internal wave will be extracted with a novel method, which will combine the merit of artificial allocation and the Hilber Huang Transform. The Internal wave in SAR image is firstly drew with three points along the front of the internal wave,...
Proceedings Article

Research on the Supporting Degree of Multilayer Correlative Rules and Its Minimal Thresholds

Xiaolan Cao, Jian Peng, Jiahong Peng
Supporting degree and its minimal threshold have important impacts on the designment of quick and effective algorithm of multilayer correlative rules. This paper introduces interzone supporting degree for computing supporting degree of item sets of intersectional layer rationally which avoids unmeaningful...
Proceedings Article

Water-Inrush Prediction of Coalbed Floor Based on the Limit Equilibrium Theory of Rockmass

Shasha Wang, Jiuchuan Wei, Weijie Zhang, Baolai Song
Based on the limit equilibrium theory of rock mass, we analyzed the mechanism of water-inrush of seam floor and deduced the theoretical formulas of ultimate hydraulic pressure of seam floor through obtaining the facing length, the thickness and lithological association of floor rockmass into consideration....
Proceedings Article

Research on the Key Influencing Factors of Use Intention on Coloring Ring Back Tone

Rong Liu, Keyan Gao
Through reviewing previous research papers based on Theory of Reasoned Action and Technology Acceptance Model, combined with the characteristics of mobile value-added Coloring Ring Back Tone business, this study discussed the factors influencing consuming intention of Coloring Ring Back Tone, developed...
Proceedings Article

Personalized Learning System Based on Data Mining for Experimental Platforms

Zufeng Zhong, Hongyan Yang
On the basis of adaptive learning and the results of data mining, a personalized learning system was designed and implemented. The system on this algorithm has implemented the educative conception of teaching students in accordance with their aptitudes. Experimental platform in the traditional learning...
Proceedings Article

The Research of the Maximum Length n-grams Priority Chinese Word Segmentation Method Based on Corpus Type Frequency Information

Pengyu Lu, Lijun Jin, Bin Jiang
In order to solve the difficulties to extract words in particular domain, we formulate a method of automatic word segmentation in Chinese based on corpus type frequency information. This method can effectively extract n-gram words that are not predefined in a lexicon by setting the maximum length (n)...
Proceedings Article

Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System

Tian Wang, Hui Xu, Yi Zhu, Jieqing Ai, Wubing Zhou
Through analyzing the indicators of classified protection and risk assessments of information system, a security configuration check specification model of Guangdong Power Grid Corporation is built. Security configuration enumeration library is also designed by reference to SCAP protocol. The architecture,...
Proceedings Article

Intelligent Buildings Equipment Management System Interface Information Integration

ZhiYi Xing, Jian Chen, JianXun Zhao
There are more and more intelligent buildings in our life. Building automation system (BAS) is the main content of intelligent building system equipment management. This paper discussed the integration of information and graphical interface of the lighting system, air conditioning system and security...
Proceedings Article

Design and Implementation of A TV White Space Channel Allocation System

Qi Xu
This paper describes a white space channel allocation method which aims on calculating the quality of the available channels and the possible inference introduced by the new node. The implementation and analysis of the system are also discussed.
Proceedings Article

Research on Small Signal Amplification Circuit of Downhole Instrument

Xin Lai, Chunpu Wang, Liang Ge
In order to acquire the real-time work of underground drill, promote the security and the reliability, it is necessary to effectively measure the drilling engineering parameter of drilling pressure, torque and side pressure etc. It uses the resistance strain sensor as a converter. The microvolt signal...
Proceedings Article

Simulation and Analysis of OSPFv2 DR Election Based on GNS

Xiaohua Li, Jian Xu, Juan Nie, Chengkui Guo, Xiangang Zhao
Designated Router (DR) is the key for the quality of an Open Shortest Path First (OSPF) network and it enables a reduction in the number of adjacencies, which in turn reduces the amount of routing protocol traffic and the size of the Link State Database (LSDB). In this paper, we analyze the principle...
Proceedings Article

Exploring the Spatial Distribution of the Peasant Family Garden Based on the GIS in Xindu District, Chengdu City

Jinjun Zheng, Chao Hong
Due to the increasing of the population and development of industry economy, many Peasant Family Gardens have been flocking to the Sichuan Basin and shows messy distribution pattern on spatial scale. In the present paper, total of 187 Peasant Family Gardens in the Xindu District, Chengdu City, are selected...
Proceedings Article

Modeling Sediment Yields in A Small Gully of the Sichuan Hilly Basin Using Geowepp Model

Jinjun Zheng, Chao Hong
The spatial pattern of soil erosion and deposition on catchment scale are predicted by the GeoWEPP model in a small catchment of the Sichuan Hilly Basin. The estimated sediment delivery per unit area and sediment delivery ratio are 2760 t km2 yr-1 and 0.485, respectively. Compared with the results derived...
Proceedings Article

Digital Implementation Method of Base-band Signal of FSK Quadrature Modulation

Jinyu Bao, Kaiyu Qin, Bo Tang, Honglin Dou
FSK modulation is widely used in communication system. In this paper, based on the basic formula of the communication theory, we concluded a new digital implementation method of base-band signal of 2FSK quadrature modulation formula, and realized in base-band signal simulation software based on VC++,...
Proceedings Article

Research on RSA-based Broadcast Encryption Scheme in Web Multimedia

Xue Liang, Zhongjun Du
With the development of web multimedia technology, broadcast encryption schemes play an important role in multimedia services copyright protection. In this paper, we propose a new broadcast encryption scheme based on RSA, besides, we give out two algorithms?smallest power exponent algorithm and improved...
Proceedings Article

Analysis of Information Construction for Business Files of University Teachers

Lianfeng Zhao
as the actual reflection of the teaching and research ability of university teachers, teachers' business file has an important preservation and application value. The paper puts forward corresponding specific measures to implement information management and initially explores the ways to achieve these...
Proceedings Article

Object Tracking Based on Multi-feature Mean-shift Algorithm

Jiafu Jiang, Hui Xiong
Object tracking is one of the key technologies in intelligent video surveillance and how to describe the moving target is a key issue. Traditional color histogram Mean-shift (MS) algorithm only considered object's color statistical information, and didn't contain object's space information, so when the...
Proceedings Article

Analysis and Design of Clinical Information Management System Based on UML of AIDS Syndrome of Traditional Chinese Medical

Songhe Shi, Shengwu Xiong
[Purpose] In order to find out AIDS syndrome discipline of traditional Chinese medicine, and so as to conduct dialectical analysis scientifically to patients, and also lay the foundation for the Chinese medicine diagnosis and treatment of AIDS, and combined with the situation of Henna AIDS Chinese medicine...
Proceedings Article

An Algorithm for Detection of Malicious Messages on CAN Buses

Congli Ling, Dongqin Feng
Control systems are encountering increasing security threats; as one of the common systems, CAN control system is very facile to be attacked. Aiming at the improvement of CAN control system security, an algorithm for detection of malicious CAN messages is given, and it has been implemented in the CANoe...
Proceedings Article

Impact of Antenna Beampatterns on the Capacity of Multiantenna Channels 

Chao Shao, Li-Shuang Fan, Qian Xiao, Zeng-Tao Mo
This paper provides an overview of the capacity of multi-antenna channel in Shannon theoretic sense, and gives analysis results and the upper bound expressions of Shannon MIMO channel capacity when transmit and receive antennas have the same beam pattern and are aligned, or one has wider beam than (or...
Proceedings Article

Research on Basic Information Collection of Electronic Health Records

Guang Dong, Chunmei Liu
With the use of SOA, ESB and XML technology, this paper designed message-oriented middleware and data exchange adapter based on HL7 v3, XML standard. Through data migration middleware based on XML, it realized storage and derivation of user-defined XML document and completed automatic collection of basic...
Proceedings Article

Assessment of Meteorological Disaster Emergency Management Capability Used Information Entropy Theory

Weiying Li, Shuxia Jiang
In recent years, Meteorological disasters are frequently occurred, which bring tremendous suffering to people's lives and property. Meteorological emergence management capability appraisal is a system engineering which involved many factors, This paper design a multi-index appraisal system, built an...
Proceedings Article

Study on the Fault Diagnosis for Scroll Compressor Based on Information Entropy

Tao Liu, Zai xin Wu, Yong wei Wang
In order to make a quantitative description for the running status of the scroll compressor, a fault diagnosis method combined with the theory of entropy and grey incidence degrees in information theory is set up. Based on singular spectrum entropy in time domain, power spectrum entropy in frequency...
Proceedings Article

Communication Signal Source Development in Contactless IC Card

Xinyu Liu, Mingquan Lin
Contactless IC card is a new technology in IC field. It is the combination of radio frequency identification and IC. Especially, in bank system, magnetic stripe cards will give place to IC smart card in the near future. Therefore, an increasing number of contactless IC cards will be required to test...
Proceedings Article

A Cooperative Spectrum Sensing Information Transmission Scheme Based on Cyclic Delay Diversity

Yanru Liu, Dechao Hu, Xiaohui Li
To improve the reliability of spectrum sensing, a cooperative spectrum sensing information transmission scheme is discussed in this paper. Pre-coding and cyclic delay diversity (CDD) techniques are fully considered and properly combined to obtain diversity gains. Simulation results show that the proposed...
Proceedings Article

A Detection Method of Network Intrusion Based on SVM and Ant Colony Algorithm

Jianfeng Pu, Lizhi Xiao, Yanzhi Li, Xingwen Dong
This paper researches the intrusion detection problem of the network defense, pointing at the problem of low fitting defects in the traditional detection algorithm of high precision and low forecasting accuracy under the situation of small sample training, and puts forward the algorithm of Support Vector...
Proceedings Article

Medical Equipment Manufacturing Enterprise Informatization Management System Review

Yingge Lou, Shuo Yang
This paper is based on the analysis of the unified standards, the main construction contents, the model and steps that an informatization system should take during its construction and implementation, which medical equipment manufacturing enterprises face in the process of informatization. In this paper,...
Proceedings Article

Application Study of Information Visualization in Digital Library

Zhijiang Liao, Min Gao, Feng Yan
Information visualization in digital library can solve some problems faced during its development. In formation visualization consists of four parts: determine the object, visualization mapping, space structure and graphics rendering. This article introduces application of information visualization in...
Proceedings Article

Recognition of Cyclostationary Signals Smoothed

Gaohui Liu, Zhiping Zhang, Yuan Yang
In the identification process of modulated signal based cyclic spectrum, it is chief to be synchronized for the received signal. The article focuses on the reception signal which is not synchronized. When uniform distribution variable delay exists, it will not have cyclostationary, namely it is converted...
Proceedings Article

Empirical Study of High-tech Industry Cluster in Shaanxi Province

Wenyuan Wang, Jin Yang
The development of the high-tech industry, is an important foundation for the country to enhance industrial competitiveness, and is also one of the important manifestation of a country's composite national power. In order to research mechanisms, which promoted high-tech industrial cluster, this paper...
Proceedings Article

Research on the Anonymity Method Based-on kanonymity for Electronic Commerce

Gaizhen Yi, Zhenglong Xie
According to the model of K-anonymity, the attributes of information tables in Electronic Commerce have been divided into three parts: identifier, Quasi Identifier, sensitive information. To conceal privacy information for consumer, the paper adopted a recode method to protect the name and cell-phone...
Proceedings Article

On the Combination Between Information Technology and t Sports Industry

Lan-hui Wu
In the network information technology as the role of the media, sports fitness and entertainment industry in social demand will be greater, have a more broad market prospects, at the same time it has the organic composition of capital is low, less investment, quick returns characteristics, is more industry...