Proceedings of the 2012 National Conference on Information Technology and Computer Science

Session: S2: Fuzzy Measures and Integrals

132 articles
Proceedings Article

A New Method of Self-Adapted Learning Mechanism Based on Neural Network

Hua Hu
This paper describes a new method to neural network model based self-adapted learning mechanism for deriving a complex system. This Learning scheme is organized based on a multi-agent-based self-adapted learning method as well as a multi-agent-based self-adapted method, while an Neural Network Decision...
Proceedings Article

Using Sensor Network to implement Mental Factor Analysis and Evaluation

Wen yan Wang
Effective and rapid mental disorder evaluation under emergency is the basis to carry out Mental Disorder Intervention (MDI). In this paper, based on existing research, a index system to evaluate the state of Mental disorder is established and the index system is simplified by the model integrated factor...
Proceedings Article

Using Network Concept Method and Data Mining Techniques to Implement Self-realization and Happiness Factor analysis

Wen yan Wang
This paper is achieved by means of the method of Information content Inclusion Relation-IIR and Data mining techniques. We present what an IIR is, and how IIR can be identified from both a concept and a database, and then reasoning about them. Data mining techniques and tools are developed for finding...
Proceedings Article

An Effective SALS Image Denoising Method based on 2-D Discrete Wavelet Decomposition

Guang-ming Xian, Bi-qing Zeng
This paper describes an effective small angle light scattering (SALS) image denoising method based on 2-D discrete wavelet decomposition. The phenomenon of small angle light scattering has been applied to giving information about transparent structures on morphology. The potential of using SALS to probe...
Proceedings Article

A Research of USB Device Redirection Mechanism over IP network in Desktop Cloud System

Yi-min Zhou, Hui-hui Guo
As most existing device sharing technologies are only abstract operations sharable, such as read and write, virtual desktop users can't share the device-specific characteristics of USB devices attached to cloud terminal. In this paper, we propose USB device redirection as a peripheral bus extension over...
Proceedings Article

The Role of Software Architecture and Trusted Computing in Software Design Guiding Principles and Quality Assessment Standard

Mingguang Dioa, Tao Xue, SenZhong Zou
In software engineering, software design guiding principles and quality evaluation standard is not only an important theoretical problem but also a very practical problem. Against to some inappropriate dissertation in the popular textbooks, we put forward that the rationality of software architecture...
Proceedings Article

A Sequential Circuits Test Set Generation Method Based on Ant Colony Particle Swarmalgorithm

Xin Fu, Shuai Fu
There exists a lot of trigger unit in Timing circuit, and this leads to high computational complexity in its initialization and test set generation for deterministic method. This paper presents a timing circuit initialization and test set generation method. In the proposed method, a particle swarm algorithm...
Proceedings Article

Random Time Slot Assignment for enhancing wireless security in Multi-User SISO Systems

Guang Jin, Tiantong Zhang
Considering a multi-user SISO system, a random time slot assignment scheme is proposed for enhancing wireless security. For each time slot, single antenna transmitter selects a user randomly. Signals of the intended user are pre-processed before transmitting using known wireless channel state information,...
Proceedings Article

Construct a based on Mealy!The Meaning of the Machine Process Validation Method

Hong Gan, Dan Pan
semantic validation is bound semantics and semantic programming language software development problem. To solve this problem, in this paper introduces a kind of semantic Web services based on semantic programming language SPL and its knowledge base business domain ontology ( BDO ) foundation, proposed...
Proceedings Article

A New Kind of File Uploading of LIMS Based on VB.NET

ZhuoMa CaiRang, Chenghui Yang
At developing of website always come across some problem of file uploading .There are very complication to use some scripts dealing with this problem. In this paper we introduced a way of uploading file which edited with VB.NET. We emphasized to discuss the theory of uploading file which edited by VB....
Proceedings Article

A Research of the Development of VME Bus in VxWorks

Yi-min Zhou, Jun Wang
Based on the principle of the VME bus and combined with lithography machine control system, This paper briefly introduced the development of VME bus under VxWorks operating system, including the bus address space allocation and interrupt setting method. VG5, VME bus master board, is GE Fanuc's high-performance...
Proceedings Article

Plant Simulation Research Based on GLSence

Yun-Kai Huang, Fang-Cheng Liu
Firstly, some present methods of plant simulation are briefly discussed. Then tree simulation program developing processes are put forward which take Delphi7 as the software developing tool and are combined with module database of GLSence. An example is given to explain the way that GLSence module database's...
Proceedings Article

Multi-rope Hoist Steel Rope Tension On-line Monitoring System

Jian Liu, Yuan-xiang Liu
A multi-rope hoist steel rope tension on-line monitoring system is introduced in this paper, which consists of hydraulic sensors, data acquisition and sending devices, wireless communication devices and IPC. This system monitors the tension of multi-rope hoist steel ropes, in order to get the actual...
Proceedings Article

Using Skin Color and HAD-AdaBoost Algorithm for Face Detection in Color Images

Li-Jie Xue, Zheng-Ming Li
Owing to the interference of the complex background in color image, high false positive rate is a problem in face detection based on AdaBoost algorithm. In addition, the training process of AdaBoost is very time consuming. To address these problems, this paper proposes a two-stage face detection method...
Proceedings Article

A General System Design and Implementation of SQL Injection Precaution

Xin Fang, Wei Fang
SQL injection attack is very easy to implement intrusion detection, Attacker through the webpage address into the entrance, constructs a SQL statement, illegal access to the web resources. This paper introduces the SQL is injected into the formation reasons, SQL injection methods, to prevent SQL injection...
Proceedings Article

A Data Mining Method on Software System Layer

Yonghui Liu, Yanhui Wang, Yinan Hu
This paper puts forward a data mining method on software system layer which is based on researches on clustering data mining. At first, this method gathers all kinds of software data. Then it extracts characters from them to mark softwares on Halstead software science. Thirdly, it classifies the softwares...
Proceedings Article

A Distributed Network Fault Diagnosis Platform based on Web Services

Bo LI, Guo-min Zhang, Xiang-lin Wei, Ming Chen, Bing Li
Large-scale network services bring great challenges to fault diagnosis, which include the unpredictability of the fault, the difficulty of collecting the fault information, high cost and technical complexity of diagnosis system deployment. To address these challenges, a web services-based distributed...
Proceedings Article

A Study On Data Mining Algorithm Gragh-based

Qiuyu Tang, Yifan Tang
In computer science, graph is one of the most complex data structures. But graph can be used in research and in bussiness because of its intuitive expression. It is a focus in data mining how to derive the interesting subgraph patterns from a great number of graphs. This article introduces a data mining...
Proceedings Article

Design and Realization of Nature Language Processing in The Application of Computer-assisted Teaching

Xianming Meng, Feng Kong
with the development of computer technology, computer-assisted teaching has become an important aspect in modern education application. More and more educational software plays a major role on helping people learn the language. In this paper, we combine natural language process technology to multimedia...
Proceedings Article

Design and Implementation of the Defense Contract Management System based on B/S structure

Tianming Huang, Chao Xie
The defense contract management manual work involving multiple departments and multiple content, low efficiency and error-prone. Based on the characteristics of the defense contract management business, design and development of a defense contract management system. The system was developed based on...
Proceedings Article

Planning and Designing of Letters and Calls Management System Based on E-government

Zhenhua Xie, Chunlin Deng, Kai Zou, Bo Zhou
Based on analysis of Chang-Zhu-Tan area online letters and calls problems, by letters and calls management system as the research object, with electronic government network and service concept to provide support, to enhance the government and the public communication level, strengthen supervisory, and...
Proceedings Article

Method of Key Rating Ascertainment for Space Software based on Fuzzy Synthetic Evaluation and Quantitative Fault Tree Analysis

Yang Li, Kefei Song
Software key rating ascertainment is very important in development of space software. It can guide manager develop the congruent software using the optimal benefit-cost ratio in management. It can also provide the direction in software measurement, and help designer improve system reliability finally....
Proceedings Article

The Algorithm for Unstructured Road to Abstract Road Surface based on Color Feature

Xintian Cheng, Zhenmin Tang
Visual navigation of mobile robots is an important issue in the field of computer vision research. For the characteristics of unstructured roads, in this paper, we use color feature and space information to solve this problem. First, compress color space of color image containing unstructured road to...
Proceedings Article

Modified PFA with the Azimuth Resampling in Post Fourier Transformed Data Domain

Lu Liang, Pan Li
The polar format algorithm (PFA) is the most popular way for spotlight synthetic aperture radar (SAR) image formation and is still attractive nowadays. Conventionally, the algorithm is carried out sequentially as a range resampling, an azimuth resampling, a Fourier transform (FT) in azimuth, and an FT...
Proceedings Article

Characterizing Petri Nets with the Temporal Logic CTL

Zhifeng Liu, Zhihu Xing
Model checking is a powerful technique for verifying systems and detecting errors at early stages of the design process. When model checking is used to check properties of Petri net, the specification has to be expressed in temporal logics. In this paper we will focus on how to characterize some important...
Proceedings Article

Study on Design of Fault Injection System Based on Testability Verification

Zhiyu Li, Kaoli Huang, Guangyao Lian
Based on testability verification, the paper studies on designing of fault injection system and it is used on designing stage of some auto-driving instrument. The previous design only adapted the designer's request, and ignored testability verification, and it was a large problem to equipment. This paper...
Proceedings Article

Ordovician Limestone Aquifer Seepage Field Simulation Based on Modflow

Jiuchuan Wei, Huiyong Yin, Shasha Wang, Daolei Xie
According to the data of draining test, we simulated the Ordovician limestone aquifer seepage field by MODFLOW module of GMS (Groundwater Modeling System). After numerical simulation model building, we successfully simulated the seepage field formed by draining test and dynamic changes in the water level...
Proceedings Article

Least Squares Method Prediction-based Spray and Focus Routing Protocol in Opportunistic Networks

Zhuowei Shen, Ying Tu
Opportunistic Networks develops rapidly in recent years. With the popularity of GPS (Global Positioning System), velocity or position prediction plays an important role in opportunistic network routing. In this paper, a new opportunistic routing protocol named LSMPSF (Least Squares Method Prediction-based...
Proceedings Article

Design and Implementation of Value-added Services Platform Valet Operating Subsystem

Ke Zhang, Jiaqi Zhu, Jia Meng
Customer relationship management system is a system through systemic research towards the client. In order to improve the service level for client, establish a long-term, stable relationship between enterprises and clients, and elevates the rate of client?s loyalty, and so as to seek more profits for...
Proceedings Article

Research on DSP-GPU Heterogeneous Computing System

Xiangzhen Li, Jingying Hu, Weiguo Lv, Guiqiang Wang, Xinrong Cai
In this paper, DSP-GPU heterogeneous computing system is studied and the system architecture is designed. The task scheduling model is analyzed and the discrete particle swarm optimization algorithm is used for the DSP-GPU heterogeneous computing. The communication framework between DSP and GPU is designed...
Proceedings Article

Analysis and Application of Carrier Aggregation Technology in Wireless Communications

Binglin Li, Hao Zhang, Jiming Yao, Hongbin Yao
Carrier aggregation is a key technology in the LTE-A. Carrier aggregation can be achieved within the same frequency bands continuous carrier aggregate, non-continuous carrier aggregation and different frequency bands within the carrier aggregation. It analyses the two implementations of carrier aggregation:...
Proceedings Article

Attribute Reduction Algorithm Based on Incomplete Decision Table

Yue Du, Jian Wang, Xu Zhang
The paper describes the basic concepts of rough set theory and discernibility matrix and presents an attribute reduction algorithm based on reduced discernibility matrix, which aims at resolving the inadequate of the existing attribute reduction based on incomplete decision table. There only contain...
Proceedings Article

Muti-wheel Bogie Braking System Simulation of Civil Aircraft

Hua-wei Wu, Te-fang Chen, Lin-feng Wang, Wei-ming Huang
In order to meet the development needs of large civil aircraft, this paper takes four-wheel bogie landing gear as example and introduces the muti-wheel braking system control mode and control law. The kinematics of aircraft braking process and the mathematical models of wheels, tyres and runway, hydraulic...
Proceedings Article

A study on applying KFCM algorithm to source code mining

Yonghui Liu, Jingjing Tian, Lei Zhang
This paper provides a algorithm, which is based on that kernelized fuzzy C-means uses on the study of source code mining, to solve the problem that the large number of quantities, multiple attributes and most of them discrete of software engineering. By using this algorithm, we can improve the efficiency...
Proceedings Article

A New Data Compressed Algorithm on Mobile Device under Cloud Service

Tong Zhu, Zhuo Gao
In this paper, we discuss how to use cloud services to provide seed data for data compression algorithm on mobile device. Seed data can remove redundant information from GPS data. Then, through the shift encoding algorithm, we provide a more simple and effective data compression method for real-time...
Proceedings Article

Research of Fast Cloth Simulation Based on Mass- Spring Model

Zhenfang Cao, Bing He
In cloth simulation based on the spring-mass model, algorithm dealing with super-elasticity reduces the simulation efficiency to some extent. Based on the correction algorithm of modifying position and velocity, an improved algorithm is proposed which can improve the efficiency effectively. Meanwhile,...
Proceedings Article

Evaluating Mission-Oriented Network Reliability via Simulation Test

Mo Chen, Yuejin Tan, Hongzhong Deng
This paper proposed a simulated test method for evaluating mission-oriented network reliability. We first defined the mission-network model and entity-capability model. Then, to test the mission-oriented network reliability, we employed a three-layer network, including mission-layer, sampling-layer and...
Proceedings Article

Generalized Regression Neural Network Based Quantitative Structure-Property Relationship for the Prediction of Absorption Energy

Hui Li, Yinghua Lu, Ting Gao, Hongzhi Li, Lihong Hu
Generalized Regression Neural Network (GRNN) was used to develop a quantitative structure-property relationship (QSPR) model to improve the calculation accuracy of density functional theory (DFT). The model has been applied to evaluate optical absorption energies of 150 organic molecules based on the...
Proceedings Article

Numerical Modeling Approach of an Air-launched AUV Initially Impacting on Water

Yonghu Wang
Water-entry impact of air-launched AUV (AL-AUV) is considered as a timedepended strongly nonlinear fluid-structure Interaction phenomenon. Numerical modeling technique of AL-AUV on its initial water-entry impact is given by using the Multi-Material ALE-Lagrange coupling algorithm. The key aim is focused...
Proceedings Article

Numerical Simulation Study of Aerodynamic Characteristic on Hypersonic Aircraft

Jiang Chen, Song-ping Wu
In this paper, a three dimension model that is similar to the hypersonic cruise aircraft X-51A has been generated by using a graphics processing technology and an anti-modeling method from the published pictures and related articles about the X-51A. This paper adopts the Harten-Yee's scheme to simulate...
Proceedings Article

Dynamic Binary Instrumentation Technology Overview

Kunping Du, Fei Kang, Hui Shu, Li Dai
The Dynamic Binary Analysis technology is a newly emerged technology which can analysis program execution dynamicly. Using this technology, the process of program analysis became more simple and accurate. Foreign researchers had put forward several Dynamic Binary Analysis Platform in recent 10 years....
Proceedings Article

An Optimization Method for Missile Testing Vehicle Based on Genetic Algorithm

Ai-zhen Liu, Li-yun Chen, Xiu-feng Gao, Xi Li
Planning the optimum number of Missile Testing Vehicles is very important to decrease testing cost especially testing time of kinds of missiles. To determine the number of vehicles, the mathematics model was established and an optimization method based on Genetic Algorithm was proposed. And an encoding...
Proceedings Article

Traffic Adaptive Geographic Routing for Vehicular Ad Hoc Networks

Xiang-yu Bai, Xin-ming Ye, Yan-jun Huang, Jun Li
Vehicular Ad Hoc Network (VANET) has recently attracted considerable attention. The design of routing protocol for VANET is a challenge given rapid topology changes and frequent network disconnection. Current routing protocols usually use geographic information to forward packets. In this paper, we propose...
Proceedings Article

Design and Implementation of 802.1x Authentication Module in Security Switch for Industrial Control System Based on FPGA

Yanan Zou, Dongqin Feng
Aiming at the safety of the industrial control system, an authentication module based on 802.1x with dual authentication model in safety switch is proposed. The authentication mechanism of 802.1x is stated. The dual authentication model, namely the authentication between the safety switch and the server...
Proceedings Article

A Novel Design of Wideband Frequency Antenna for WLAN

Rongrong Zhang, Yalin Guan
A novel and simple coplanar waveguide (CPW)-fed monopole antenna with wideband dual-frequency is proposed in this paper. The proposed antenna printed and integrated on a small region of a microwave substrate has a compact size of 22?35mm2. This antenna, fed by CPW and connecting a 50' SMA connector,...
Proceedings Article

Feature Extraction and Recognition of Analog Circuit Fault Signal Based on Wavelet Transform and Partial Singular Values Decomposition

Si-yang Liang, Jian-hong Lv
A new algorithm for the effective characteristics' extraction of analog circuit fault signal is proposed with consideration of its complexity. The proposed method is based on wavelet transform and partial singular values decomposition. Firstly, the analog circuit fault signal is decomposed into different...
Proceedings Article

Effect of User Distribution on the Capacity of Cellular Networks

Xue Tang, Hongwen Yang
User distribution is a critical issue in cellular networks. In most previous works, a uniform user distribution is often assumed within a cell. In this paper, we purpose a non-uniform user distribution model. Both its effects on downlink and uplink capacities of a cellular network are evaluated under...
Retraction

RETRACTION: Introspective, Client-Server Technology

Yanchun Ma, Jixin Pan
In April 2020, Atlantis Press was alerted to fake proceedings articles hosted on our platform. These articles, mostly in computer science and engineering, were generated by the SCIgen computer program and were all published between 2006-2018. Immediately after receiving the alert, Atlantis Press initiated...
Proceedings Article

A Train Algorithm of Multi-Aggregation Process Neural Networks Based on Chaos Genetic Optimization

Yue-Wu Pang, Shao-Hua XU
Aiming at the learning problem of multi-aggregation process neural networks, an optimization train method based on chaos genetic algorithm (CGA) with lowest mean square algorithm (LMS) is proposed in the paper. The learning problem of the network weight functions is converted to the training of basis...
Proceedings Article

A Channel Allocation Algorithm Based on Demand in Cognitive Wireless Mesh Networks

Tingrui Pei, Jing Li, Zhetao Li
We proposed a channel allocation algorithm, which was a modification of graph theory and based on demand to optimize the performance of cognitive wireless Mesh network. The key idea of the algorithm was to design a proportion coefficient of actual flow to demand flow, and then cognitive users with the...
Proceedings Article

Location-based Security Authentication Mechanism for Ad hoc Network

Cui Li, Ze Wang
With the growing prevalence of wireless networks, location information plays a critical role in many applications. Especially, in unattended and hostile environment, whether the location of a node lies on a security area became very important. In this paper, we first analyze the security and vulnerability...
Proceedings Article

Scalable Distributed Standard Definition Video Conferencing System: Architecture and Forwarding Model

Suiming Guo, Congxiao Bao, Xing Li
Videoconferencing system is widely and successfully used on the Internet and standard/high definition videoconferencing is a new heated topic in research. However, researches in various videoconferencing systems (e.g. Access Grid, DVTS, VLC, and Ultra Grid) are faced with the problem of scalability....
Proceedings Article

Arranging course automatically algorithm based on multi-factor priority

Wei Zhi, Huaping Feng
The problems of course timetabling mainly involve time, curriculum, the number of classrooms and so on. A new algorithm based on multi-factor priority is proposed in this paper. The algorithm use time division, the compute of the priority, the provisional matrix and quick sort to achieve the function...
Proceedings Article

Protect Cloud Computing's Data Using Fully Homomorphic Encryption

Xu-dong Wu, Xin Li
With the fast development and wide application of cloud computing,more and more security accident has been appeared.Though some traditional security measure has been applied, the security problem has become the main abstacle to apply cloud computing technology This paper based on the newly developed...
Proceedings Article

Load Balancing Technology Based On Consistent Hashing For Database Cluster Systems

Zhenguo Xuan
The database cluster is an effective mechanism to improve the throughput of database systems and reduce the response time of the database. Generally, it is used to solve the single-node bottleneck problem of data access in network services. Load balancing technology is the key factor to determine the...
Proceedings Article

The Logical Structure of the E-Commerce Platform Design and External Interfaces to Achieve of O To O

Li-jun Wei, Hai-bo Wu, Liao-liang Xiao, Jiang-tao Gong, Xin-xi Chen, Dong-mei Tang
O2O namely Online To Offline, it is a line from online to down, and combine online resources with real economy ,therefore allowing the network to become the real economy to an e-commerce model extends to the virtual world of the "front", different from the B2B - (Business To Business) and B2C (Business...
Proceedings Article

A Hybrid Evolution Algorithm with Application Based on Chaos Genetic Algorithm and Particle Swarm Optimization

Yu Fu, Bing Wang, Shao-Hua Xu
Aiming at the complex function extreme value and non-linear system model parameters adjust, a hybrid optimization algorithm based on chaos GA combined with PSO is proposed in the paper. With application of applying experience of PSO, sharing information of GA, and traversing pathway of chaos, the adaptive...
Proceedings Article

Smoke Detection Algorithm Based On Wavelet Transformation and Energy Analysis

Yijun Xu, Ning Han
A novel algorithm to detect the forest fire smoke based on the wavelet transformation and high-frequency energy analysis is proposed. The conventional color-based RGB algorithm has the difficulty to distinguish the smoke from other objects with the same color, such as clouds and fogs, so it leads to...
Proceedings Article

Stream Cipher Method Based on Neural Network

Haiyan Long
A new stream cipher algorithm based on one-way function of neural network is proposed. The nonlinear system comprised of such neural network is used to transform a group of LFSRs for key stream generation. As a result, the complexity of sequences is increased with period expanding. The produced cipher...
Proceedings Article

A Java Source-code SQL Injection Attack Detection Algorithm Based on Static Analysis

Tian Wang, Lihao Wei, Hong Zou
This paper researches the method of SQL injection attack detection and the principle of static analysis scanning, and presents a Java source-code SQL injection attack detection algorithm. The detection algorithm includes these steps: lexical analysis of source code, parsing of source code, constructing...
Proceedings Article

Research on the Association Rules of Marketing Resources Demand and Supply in Grid Environment

Jianyou Zhang
This paper introduces processes and methods access to the demand for marketing resources, describes the steps for marketing resources planning and the marketing resources demand-supply model in grid environment,finally lists several association rules of marketing resources demand and supply. It provides...
Proceedings Article

A method to implement data extraction using AND optical gate based on SOA-XGM

Ya-lin Guan, Rui-dong Wang, Lei Zhang
A method was proposed to implement data extraction using AND optical gate based on cross gain modulation (XGM) of semiconductor optical amplifier (SOA). The optical data extraction in DPSK/ASK orthogonal modulation system was achieved with the proposed AND gates, in order to prove its feasibility. Through...
Proceedings Article

A Wireless Mouse Design and Implementation Based on J2ME

Yuhe Song, Changying Liu, Tianhao Wang, Xin Zhang, Lingling Zheng
J2ME is a Java technology specification which was advanced by The United States of America SUN company.It was used to develop Java applications which run on small equipments, consumer electronic equipment, Internet mobile equipment, embedded equipment. Hereby, this paper will introduce a J2ME-Based program...
Proceedings Article

Based on Prospective Dynamic Frequency Scale Power Optimize Method for Multi-Cores Processor's I/O System

Yufeng Guo
Power problem has been one of the most restricting development barriers of processor. I/O system power is an import part of the processor's power. The paper aims at I/O dynamic power of multi-cores processor, and put forwards a prospective dynamic frequency scale with clock gating power optimize method....
Proceedings Article

RAID Storage Systems with Early-warning and Data Migration

Yin Yang, Zhihu Tan, Wei Liang, ChangSheng Xie
This paper proposes a new RAID-based system, we defined as REM: RAID system with Early-warning and data Migration. REM can predict RAID potential fault according to disk health degree and array health. Once the fault has been predicted, it takes data migration to protect the data, which allocates reserved...
Proceedings Article

Weak Electricity Pipeline Management System Development Based on Seam Framework

Kai Yang, Yiming Li
As information technology and accelerating the process of the network, many companies, schools or government agencies are densely covered with a variety of weak lines, of which both China Unicom's mobile telecommunications network cable has a telephone line and broadcast television Some TV lines. Although...
Proceedings Article

Morphological Characteristics of Drug-loaded Nanoparticles based on Microscope Images Analysis System

Bohua Feng, Siyuan Mo, Liufen Peng, Huoyan Xu
Microscope images analysis of drug carriers was a widely used method for those nanomaterials. Usually manual measuring and analysis of microscope images were subject to errors, and bad stability of results. Nanoparticles microscope images analysis method was combined with computer image processing technique...
Proceedings Article

A research on error handling model of service fault-tolerant strategy

Yongqing Wang, Yan Chen, Ming Yang
With the rapid development of web services, web services fault-tolerant mechanism has become a new research focus. This paper presents an innovative error handling model of service fault-tolerant strategy. For the goal of enhancing the fault-tolerant performance of web services, we analyze the key technologies...
Proceedings Article

Solving linear PDEs with the aid of two-dimensional Legendre wavelets

Fukang Yin, Junqiang Song
In this paper, we develop a method, which using twodimensional Legendre wavelets, to solve linear PDEs. Based on the properties of shifted Legendre polynomials, we give a brief proof about the general procedure of two-dimensional operational matrices of integration, and then employ aforementioned matrices...
Proceedings Article

Typical cloud computing system design

HaiYan Liu, Zhiyuan An
Cloud computing more widely applied to study the structure of the cloud computing system, and in-depth understanding of cloud computing technology is necessary.Is very meaningful for the development of cloud computing systems.Designed in a typical cloud computing system framework, including the central...
Proceedings Article

Design and Implementation of hidden key loggers under .NET platform

Zhiyuan An, HaiYan Liu
keyboard recording technology has been widely applied to the system monitoring program.This paper describes the design and implementation keyboard loggers based on the the HOOK, under .NET platform. At the same time, in order to reach the hidden effect, record keyboard function module is inserted into...
Proceedings Article

Design and Implementation of Remote Buffer Overflow and implanted Backdoor

Xin Zhang, HaiYan Liu
Network security research focused content is a buffer overflow. It is a technology used by hackers mostly. This paper, based buffer overflow, given the use of the remote overflow implanted backdoor design, and implementation methods. In this paper, introduce the detailed steps to structure Shellcode,...
Proceedings Article

Syntactic Dependency for relation extraction from Biomedical literature

Xiaomei Wei, Jianyong Wang, Yang Li
Relation extraction is important to improve complex natural language processing (NLP) applications. The Bio-Event extraction in GE shared task is important to understand biological processes. Although some progress has made in GE research, there is still much work to do to improve the performance of...
Proceedings Article

An Exponential Distribution-based Model for Equipment Remaining Life Prediction

Xiao-Hong Meng, Wei Wang, Yong-Tao Zhou
The article proposed and established an exponential distribution-based model for equipment remaining life prediction. The model is a general decision model for detectable continuous degradation process. The modeling method and application example is introduced. Compared with other models, the model has...
Proceedings Article

Application study on multiple network communication of power engineering

LiMing Zhang, Rui Guo
The application of network communication in the field of engineering monitoring software has been very common, but most of them used a network communication mode. This paper introduces the multiple network communication modes (asynchronous network socket communication, wave communication, named pipe...
Proceedings Article

A study of test oracle for application interface testing of distributed system

Jingyan Cui, Gang Ye, Xianjun Li, Shilong Ma
The application interface testing is an important part of automated software testing of distributed system. It is based on network data which is produced when the distributed system is running. It is used to verify whether the network data is correctly exchanged. In this paper firstly we design test...
Proceedings Article

The actual diagnosis and rational appeal of college network courses

Jixin Pan, Lulu Cheng, Fuping Guo, Liping Liu
Nowadays, people have wrong conclusions and unreasonable concepts about the essential attribute in college network courses. These can be illustrated by the following aspects: such as in the value, the fixed position is not conformity with expectation; in teaching, the current teaching situation is deviated...
Proceedings Article

Method of Software Development Based on Component Technology

Yan Li, Li Jiang
Component-based software development methodology is a software development reuse software solutions in order to avoid duplication of effort, the current software component technology is regarded as one of the key factors of successful reuse. The article describes the main content of the basic concepts...
Proceedings Article

Research on IT Service Management of Local Colleges Based on ITIL

Zhengang LI, Zhigang Zhang
At present, the key of IT work faces to convert construction to service, however, the local colleges have not established complete management in order to fit for these changes. This paper discusses on IT service management mechanism and implement scheme for local colleges after analyzed the problem of...
Proceedings Article

The application of data source authentication protocol to video multicast

Shijie Zhao, Zhirun Liu, Liehuang Zhu, Rufeng An
An efficient packet-injection resistant data source authentication protocol for group communication(EPJRSA) was proposed to authenticate data source. It can recognize which packets are injected by attacker and delete them. But it cannot recover the lost packets. So an advanced protocol based on EPJRSA...
Proceedings Article

The research of multimedia data transmission Basis on the inventory and queuing theory

Jia-jie Shen
Aim to problem how the packet size effect to the multimedia data transmission and how to design the packet size to reach the best efficient of transmission. The research is mainly to use the inventory and queuing theory find the best way to design the send packet size. Though the model is established...
Proceedings Article

Constellation Design of the Beidou satellite navigation system and performance simulation

Xiaomeng Wang, Ruihua Liu
To improve the positioning accuracy and reliability of Beidou ,an analysis of the Beidou satellite navigation system has been performed; combination of technical experience of the foreign global satellite navigation system and the current release of technical information, we have designed Beidou satellite...
Proceedings Article

A Design of Digital Handheld Terminal in Wireless Data Acquisition System

Xingguo Sun, Lei Xu, Shouxian Wen, Xiaohui Li
In order to make data collection more convenient, quick and accurate in working site in the existing wireless data acquisition system, one kind of multi-function handheld terminal is designed which combines the wireless and wired data acquisition. The paper adopts Atmega128 of ATMEL as microcontroller,...
Proceedings Article

Angle-of-Arrival based Constrained Total Least-Squares Location Algorithm

Gangcan Sun, Xuefei Xu, Kai Yang
A source location algorithm based on the angle-ofarrival (AOA) measurements of a signal received at spatially separated sensors is proposed. The algorithm is based on the constrained total least-squares (CTLS) technique and gives an explicit solution. Simulation results demonstrate that the proposed...
Proceedings Article

Parallel Processing Imaging Algorithm for Synthetic Aperture Radar based on pipeline

Zhili Hua, Chao Hui, Hongping Li
Parallel processing is an effective way to process Synthetic Aperture Radar (SAR) data quickly and realize realtime imaging. Based on the traditional serial Range-Doppler algorithm, a parallel SAR imaging processing scheme is present by using of pipeline technology, and partition approach of computing...
Proceedings Article

The Research of Using Animation Design to Promote the tourism economy under the Guilin Folk Cultural Characteristics

Yu-ting Zhang, Zhi-hong Liu
Guilin is not only a minority living area that full of profound folk cultural but also a world famous tourism city. Research and analysis of the Guilin folk culture, give full play to its inheritance and creativity and display in the form of animation, it is a meaningful exploration and research for...
Proceedings Article

SeqARM: An Association Rule Mining Algorithm Based on Sequence Constraint

Shenshen Bai
Sequence constraint mainly considers the occurrence time of item, which can determine whether an association rule is valid. This paper proposes a novel algorithm SeqARM that aims to mine strong association rule with sequence constraint and runs on the second phase of association rule mining. SeqARM employs...
Proceedings Article

Research of Workflow nets Application Based on the Petri nets

Dabin Qi, Jun Yao, Qiuju Li
This paper introduced basic knowledge of Petri nets and workflow, and invariant analysis technique of Petri nets models structure, and integrate the real application circumstances of the workflow of receive document in document management, constructs an integrated workflow model based on Petri net. Further...
Proceedings Article

The Application of Threshold Segmentation Algorithm in Loess Microstructure Image Analysis

Nian-dong Deng, Xiao Wang, Feng Wang, Yang Zhou
The image research on loess microstructure which has profound influence on loess engineering mechanics properties is a new subject of geotechnical, the loess microstructure information and its section of the occurrence can be reflected via CT or electron microscope technology. The loess microstructure...
Proceedings Article

Simulation and Analysis of Influence of Group Delay Distortion on Performance of DBF System

Hao Gao, Xiaohui Li
Group delay distortion between channels is one of the most important factors which affect the BER (bit error rate) performance of DBF (digital beam forming) System. The basic principles of DBF and the concept of group delay are first introduced, and a linear group delay filter is designed based on the...
Proceedings Article

An Efficient Solver for the Stokes equations with Random Inputs

Dong Qu, Jing Yang
In this paper we present a high order method to solve the Stokes equations with random coefficients numerically. A stochastic Galerkin approach, based on the truncated Karhunen- Loeve decomposition technique for the stochastic inputs, is used to reduce the original stochastic Stokes equations into a...
Proceedings Article

Analysis of the Performance about Actual Quantum Key Distribution System Based on BB84 Protocol

Kai-guo Huang, Yan-bo Wang, Qi-ye Zhang, Xiao Wang, Min He
Analyzed how did the fiber length, the attenuation and the average photon number of the pulse emitted by the single photon source affect the receive efficiency in the fiber channel quantum key distribution system based on the BB84 protocol. A theoretic model relative to the system was represented. It...
Proceedings Article

Trust-Based Service Matching Access Control Model

Yongsheng Zhang, Yuanyuan Li, Mingfeng Wu
By the research of Web service architecture, the article puts forward a new trust-based access control model, which is based on service-oriented architecture (SOA) and combines with service matching. The model puts the trust as matching criterion. Transaction is divided into three grades according to...
Proceedings Article

Study on feature extraction method of Han Dynasty stone carving images

Juan Wang, Man Tang
Han Dynasty stone carving is Chinese nation's outstanding cultural heritage, how to protect and promote it is an historical responsibility. In recent years, there has been a lot of research on the Han Dynasty stone carving, and has achieved certain results. But the digital research on it is still very...
Proceedings Article

Research on the Pairwise Test Case Generation of Two-Dimensional Expansion

Shuai Yuan, Gang Ye, Jingyan Cui, Shilong Ma
The recently widely-spreading usage of combinatorial interaction testing is dramatically improving the effectiveness of highly-configurable software. Conventional techniques based on greedy or heuristic algorithms can lead to suboptimal result in the size of the built test suite with unstability. In...
Proceedings Article

A Design of Remote Monitoring System based on 3G and Internet Technology

Shouxian Wen, Lei Xu, Xingguo Sun, Xiaohui Li
Aiming at the low-rate and short-distance communication in existing temperature and humidity monitoring system, this paper designs a remote monitoring system based on 3G and Internet technology. This system consists of data acquisition module and data remote transmission module. Atmega128 is used to...
Proceedings Article

Analysis of Channel Model for GEO Satellite Mobile Communication System

Lu Lu, Daoxing Guo, Aijun Liu, Maoqiang Yang
In GEO satellite mobile communication system, a line-of-sight (LOS) component exists as well as multipath component, which are influenced by buildings or foliage that causing shadowing effect. Satellite mobile channel is described as fading model based on Markov process for channel properties in large...
Proceedings Article

The research on personalized service of digital library based on data mining

Nan Pang, Feng Yan
In recent years, with the deepening of information technology, people facing increasing amounts of information resources. At the same time, people's demand of information is more and more. For digital library, with a wealth of information resources, how to give readers a deeper level of personalized...
Proceedings Article

Research On the Legal Protection of the Network Virtual Propeity

Xuejng Ren
Along with the rapid development of the network games in China, the disputes around the virtual property occur frequently, but our country's existing law doesn't have clear rules to solve the problems. To speed up the related legal system construction in order to protect the healthy development of the...
Proceedings Article

Analysis on the Teaching Reform of Programming Courses of the Specialized Computer Science in Agriculture and Forestry Universities

Ying Zhang, Yingze Ye
At present, there are many problems in the core programming curriculums of the specialized computer science such as low coordination with other courses, insufficient fusion and poor integration with the overall development of special discipline. The present study is mainly focused on programming curriculums...
Proceedings Article

Miner Face Recognition Based on Improved Singular Value Decomposition

Chao Jiang, Guyong Han, Lin Zhu, Jun Zhou, Weixing Huang
This paper depended on that video monitoring and video images in the coal mine were susceptible to dust, light and miner's safety helmet and other special environmental impact. In order to realize the real-time and accurate face recognition rate, and lay good foundation for miners behavior characteristics...
Proceedings Article

The Research of Semantic Retrieval Model Based on Idiom Literary Quotation Ontology

Jie Ran, Li-juan Qi
Aiming at the problem that users often can not retrieve useful information or retrieved information is inaccurate, in this paper we put forward an information retrieval model based on Idiom Literary quotation Ontology. The model and its characteristics were analyzed in detail. Through a systematic in-depth...
Proceedings Article

A Novel Grouping Aggregation Algorithm for Online Analytical Processing

Wei Chen, Yongshan Liu, Ning Wang
As regard to improve the efficiency of grouping aggregation calculation, the data is compressed by using binary encoding, and the dimension hierarchical grouping attribute set encodings of each dimension table are calculated by using the dimension hierarchy tree. Then different encodings are put into...
Proceedings Article

Design and Implementation of A Bicycle Parking System Based on Internet-of-things

Yujia Huang, Zhongliang Yang, Shuhua Xiong
How to manage increasing bicycles in a university campus is a challenging problem. To solve the problem, we design and implement an intelligent bicycle parking system based on the Internet of things. The system architecture is described, and the system modules are introduced. Moreover, we present the...
Proceedings Article

A Satellite Heterogeneous Network Selection Algorithm Combining AHP and TOPSIS

Long Yang, Daoxing Guo
Against the satellite heterogeneous network optimal selection problem, in this paper we propose a network selection algorithm based on the Analytic Hierarchy Process (AHP) method and the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) method. The algorithm considers the parameters...
Proceedings Article

A Variable Step Size RPE Algorithm for Echo Cancelation

Hongxing Yuan, Renxiang Zhu, Shaoqun Wu, Li Guo
Acoustic echo cancellation (AEC) algorithms are widely used in communication devices. One of the main design problems is double-talk issue. The recursive prediction error (RPE) algorithm based on autoregressive (AR) model has been proven to be more attractive to traditional approaches. However, it adapts...
Proceedings Article

The Semi-join Query Optimization In Distributed Database System

Lin Zhou, Yan Chen, Taoying Li, Yingying Yu
In distributed database system, the distributed deposition and redundancy data brought convenient to fault recovery, but they make distributed query processing more complicated at the same time. Query optimization and processing is one of the key technologies in distributed database system. It generally...
Proceedings Article

FPGA Design of Switch Module with Multicast Function on the Satellite Onboard Switch

Zemin Shen, Lufeng Qiao, Menglei Wang
This paper implements a shared memory switching structure with multicast function due to the demand of multicast function on the satellite onboard switch, introduced each module of the ideas and working process in detail. Key modules are programmed and realized with Verilog HDL. The results of ModelSim...
Proceedings Article

A Graph-Based Text Similarity Algorithm

Zuoguo Liu, Xiaorong Chen
This paper is trying to research a text similarity algorithm which based on graph theory. A text is mapped into a graph which consists of terms as its nodes and term sequences as its undirected edges. The Maximum Common Subgraph (MCS) of two graphs is useful for analyzing their similarity and the similarity...
Proceedings Article

An Improved MELP Algorithm for Transition Frames

Tian Qiu, Feifei Wang, Weitao Du
The MELP vocoder has a good performance at 2.4 kb/s and is selected as the Federal Standard Vocoder of the United States. However, due to the simple U/V decision of MELP, desired synthesis performance is not achieved in transition frames. This paper presents an improved MELP algorithm in which transition...
Proceedings Article

Indexing Coded Stripe Patterns Based on De Bruijn in Color Structured Light System

Cheng Han, Zhengang Jiang
The problem of relating projected and captured stripes, here called the Indexing Problem, has proved to be difficult to overcome reliably for stripe patterns in color structured light, due to color fidelity of the projector and the camera, the ambient light, texture of measured object and other factors....
Proceedings Article

Marker Technique and Its Application in the Source Address Recognition Research

Zhiyu Zhu, Huiliang Duan
SPi is an end system of validation technique, in which routers mark packets, and end system performs filtering. we construct the simulation with various network topologies to verify the effectiveness and the filtering accuracy of the SVA architecture. The simulation results show that, SVA can respond...
Proceedings Article

The Study of the Spacecraft Telemetry Data Credibility Calculation Method based on the Probability Statistics and Fuzzy Algorithm

Hongzheng Fang, Haodong Ma, Liming Han, Kai Luo, Rui Li
The credibility of the spacecraft telemetry data can be used to characterize the confidence degree of telemetry data and improve the accuracy of the spacecraft condition monitoring and diagnosis system. This paper proposed the telemetry data credibility calculation methods based on the probability statistics...
Proceedings Article

A Clustering Algorithm towards Microblogs based on Vector Space Model

Guoyou Chen, Jiajia Miao, Handong Mao, Le Wang, Siyu Jiang
Weibos have become wildly popular in China in recent years, and state media reports that there are more than 300 million registered users. The Real Name Policy[1] requires all users on Chinese weibo websites to register with the name that corresponds with their government issued ID card. With the rapid...
Proceedings Article

A Private Cloud Document Management System with Document Clustering Algorithm

Jiajia Miao, Zhongjun Fan, Guoyou Chen, Handong Mao, Le Wang
Recently, more and more enterprises use virtualization technology and cloud computing technology to improve the level of information management. Private cloud document management system from the lab to practical application. We launched a private cloud file management system is characterized by the automatic...
Proceedings Article

A Public Opinions Monitoring System based on Similarity of Microblogs

Jiajia Miao, Xuelin Fang, Guoyou Chen, Handong Mao, Le Wang
Public opinion is the development and changes in certain social space around the intermediary social events, public social managers and held social and political attitudes. In order to improve the efficiency of text clustering, this paper proposes a new similarity measure model OFM. In the first stage,...
Proceedings Article

Numerical Simulation of Muti-jet ejector

Lin Jiang, Song-ping WU
The influence of nozzle location on the efficiency of ejector was discussed according to lots of calculated results. Changing nozzle location will have influence on the efficiency of ejector without modifying ejector structure
Proceedings Article

A process-oriented evaluation framework for cyber-attacker's capability

Baofeng Luo, Junhu Zhu
Accurately and reasonably evaluating cyber-attacker's capability can help to scientifically forecast following attacks in order to give tailor-made defense tactics. At present, the evaluation measures of cyber-attacker's capability are primarily based on attack effect and the related achievements are...
Proceedings Article

A Cellular Automata Model of Pine Wilt Disease Spread and Its Simulation Tool for Application

Mingxiang Huang, Chaohui Yu, Dali Zhou, Fang Bei
In the study a cellular automata (CA) was applied to model the spread process of pine wilt disease (PWD), and a PWDCASim tool was developed to simulate PWD spread based on the CA model using VC++6.0 platform. For the further understanding of PWD spread with the CA model, a case study was implemented...
Proceedings Article

Analysis on Event Delay in Event-Driven Wireless Sensor Networks

Rong Zhou, Luqun Li, Jun Zhang
In this paper, we consider an event-driven wireless sensor network (WSN) scenario, in which the events arrive with a certain probability in a time of interval. Firstly, we analyze the event delay in a single node in an M/G/1 vacation queueing model. Then, considering the limited buffer space, channel...
Proceedings Article

A Video Service Cloud Platform with Multi-Network Convergence Application

Hong Liu, MinLu Dai, Gang Li, FangChun Yang
With network technology advances, how to take advantages of different networks to provide users with creative and convergence service experience is of great strategic significance to tri-play service providers. A new video service cloud platform iVideo platform is proposed in this paper. The overall...
Proceedings Article

3D Dynamic Target Simulation Experiments Based On the OpenGL

Su-Yue Zhang, Yong Zhu, Jin Duan, Tian-Tian Ma
The simulation technology saves the cost of test, improves efficiency and in favor of the image acquisition. This article based on the OpenGL simulates the real-time dynamic 3D target, the physical characteristics of the target and the notion characteristics in the real world. The target images collected...
Proceedings Article

The Algorithm of Gravity Master Sensor Game Based on the Android Platform

Ahui Yang, Yunming Pu
The ball game is designed with 3D physical sensor technology based on the Android platform. There are three modules in the game, the presentation layer module, the background logic module and mobile phone posture calculation module, and the classes in the module are introduced, the algorithm of gravity...
Proceedings Article

Pivot Selection Methods Based on Covariance and Correlation for Metric-space Indexing

Kewei Ma, Yuanjun Liu, Honglong Xu, Pang Yue, Fuli Lei, Sheng Liu, Rui Mao, Jiaxin Han
Metric-space indexing is a general method for similarity queries of complex data. The quality of the index tree is a critical factor of the query performance. Bulkloading a metricspace indexing tree can be represented by two recursive steps, pivot selection and data partition, while pivot selection dominants...
Proceedings Article

Automatic Face Segmentation Based on the Level Set Method

Chaoyi Zhang, Yanning Zhang, Zenggang Lin
Face segmentation is a crucial problem in face recognition and other areas like pedestrian detection. Level set methods have been widely used in image segmentation. In this paper, the modified level set evolution equation is used in the level set method to segment the face. Based on the signed pressure...
Proceedings Article

Rating the Raters A new statistical method for evaluating

Yong Li
In this paper, with the actual data of a lecture contest'prevailing method's defects to remove a maximum score and a minimum score, average of the rest to determine the ranking of the contestants are found. Comparison of three methods of evaluation that prevailing method, calculating raters weight once...
Proceedings Article

Design and Implementation of Positioning and Navigation System Based on Android

YuanYuan Yuan, LiJun Zhang
With the development of mobile Internet, more and more people begin to get convenient service by mobile phones. Obtaining one's current location by GPS positioning or network positioning has become one of the important foundations in most applications of location based service. In this paper, we designed...
Proceedings Article

A new DFT based channel estimation method for OFDM systems over multipath channels

Jing Wang, Yuehong Qiu
Channel estimation is one of the most significant technologies in the orthogonal frequency division multiplexing (OFDM) system and its accuracy will influence the performance of the whole system directly. Among all kinds of channel estimation algorithms, the least square'LS'estimation and the linear...
Proceedings Article

The computer-aided design of the multiplexer

Meng Pan, HongJuan Tang
The difficult of multiplexer design is to eliminate residual susceptance. In order to eliminate residual susceptance obtaining impedance matching ,this paper designs the computeraided design software of star-point diplexer, star-point triplexer and constant impedance diplexer based on the Matlab development...
Proceedings Article

LLE Based Pivot Selection for Similarity Search of Biological Data

Kewei Ma, Honglong Xu, Pang Yue, Fuli Lei, Sheng Liu, Ru Mao, Jiaxin Han
Distance-based indexing is a widely used technique for general purpose search. Pivot selection is the most crucial step of bulkloading a metric-space indexing tree. Current pivot selection methods are mainly based on linear methods. A non-linear method based on Locally Linear Embedding is proposed. Empirical...
Proceedings Article

Protocol of Steganography in Streaming Media on VOIP Network Based on Variable Length Coding

Zhen Yang, Huaizhou Tao, Yongfeng Huang, Wanxia Yang
Based on the three-layer model theory for steganography communication system, this paper designs a new steganography transmission protocol, to achieve a more effective frame structure, more reliable transmitting mechanism. Both text message dialogue and file transmission communication based on the proposed...
Proceedings Article

Alarm Correlation Analysis in SDH Network Failure

Zhen-dong Zhao, Nan Huang, Zi-han Li
According to the characteristics of alarm data and the alarm spread in SDH system, and the existence of various shortcomings of the classical algorithm, this paper presents the FP-Growth of non-temporal association rule mining algorithm. We join the relationship between network topology as a constraint...