Proceedings of the 2012 National Conference on Information Technology and Computer Science
Session: S2: Fuzzy Measures and Integrals
132 articles
Proceedings Article
A New Method of Self-Adapted Learning Mechanism Based on Neural Network
Hua Hu
This paper describes a new method to neural network model based self-adapted learning mechanism for deriving a complex system. This Learning scheme is organized based on a multi-agent-based self-adapted learning method as well as a multi-agent-based self-adapted method, while an Neural Network Decision...
Proceedings Article
Using Sensor Network to implement Mental Factor Analysis and Evaluation
Wen yan Wang
Effective and rapid mental disorder evaluation under emergency is the basis to carry out Mental Disorder Intervention (MDI). In this paper, based on existing research, a index system to evaluate the state of Mental disorder is established and the index system is simplified by the model integrated factor...
Proceedings Article
Using Network Concept Method and Data Mining Techniques to Implement Self-realization and Happiness Factor analysis
Wen yan Wang
This paper is achieved by means of the method of Information content Inclusion Relation-IIR and Data mining techniques. We present what an IIR is, and how IIR can be identified from both a concept and a database, and then reasoning about them. Data mining techniques and tools are developed for finding...
Proceedings Article
An Effective SALS Image Denoising Method based on 2-D Discrete Wavelet Decomposition
Guang-ming Xian, Bi-qing Zeng
This paper describes an effective small angle light scattering (SALS) image denoising method based on 2-D discrete wavelet decomposition. The phenomenon of small angle light scattering has been applied to giving information about transparent structures on morphology. The potential of using SALS to probe...
Proceedings Article
A Research of USB Device Redirection Mechanism over IP network in Desktop Cloud System
Yi-min Zhou, Hui-hui Guo
As most existing device sharing technologies are only abstract operations sharable, such as read and write, virtual desktop users can't share the device-specific characteristics of USB devices attached to cloud terminal. In this paper, we propose USB device redirection as a peripheral bus extension over...
Proceedings Article
The Role of Software Architecture and Trusted Computing in Software Design Guiding Principles and Quality Assessment Standard
Mingguang Dioa, Tao Xue, SenZhong Zou
In software engineering, software design guiding principles and quality evaluation standard is not only an important theoretical problem but also a very practical problem. Against to some inappropriate dissertation in the popular textbooks, we put forward that the rationality of software architecture...
Proceedings Article
A Sequential Circuits Test Set Generation Method Based on Ant Colony Particle Swarmalgorithm
Xin Fu, Shuai Fu
There exists a lot of trigger unit in Timing circuit, and this leads to high computational complexity in its initialization and test set generation for deterministic method. This paper presents a timing circuit initialization and test set generation method. In the proposed method, a particle swarm algorithm...
Proceedings Article
Random Time Slot Assignment for enhancing wireless security in Multi-User SISO Systems
Guang Jin, Tiantong Zhang
Considering a multi-user SISO system, a random time slot assignment scheme is proposed for enhancing wireless security. For each time slot, single antenna transmitter selects a user randomly. Signals of the intended user are pre-processed before transmitting using known wireless channel state information,...
Proceedings Article
Construct a based on Mealy!The Meaning of the Machine Process Validation Method
Hong Gan, Dan Pan
semantic validation is bound semantics and semantic programming language software development problem. To solve this problem, in this paper introduces a kind of semantic Web services based on semantic programming language SPL and its knowledge base business domain ontology ( BDO ) foundation, proposed...
Proceedings Article
A New Kind of File Uploading of LIMS Based on VB.NET
ZhuoMa CaiRang, Chenghui Yang
At developing of website always come across some problem of file uploading .There are very complication to use some scripts dealing with this problem. In this paper we introduced a way of uploading file which edited with VB.NET. We emphasized to discuss the theory of uploading file which edited by VB....
Proceedings Article
A Research of the Development of VME Bus in VxWorks
Yi-min Zhou, Jun Wang
Based on the principle of the VME bus and combined with lithography machine control system, This paper briefly introduced the development of VME bus under VxWorks operating system, including the bus address space allocation and interrupt setting method. VG5, VME bus master board, is GE Fanuc's high-performance...
Proceedings Article
Plant Simulation Research Based on GLSence
Yun-Kai Huang, Fang-Cheng Liu
Firstly, some present methods of plant simulation are briefly discussed. Then tree simulation program developing processes are put forward which take Delphi7 as the software developing tool and are combined with module database of GLSence. An example is given to explain the way that GLSence module database's...
Proceedings Article
Multi-rope Hoist Steel Rope Tension On-line Monitoring System
Jian Liu, Yuan-xiang Liu
A multi-rope hoist steel rope tension on-line monitoring system is introduced in this paper, which consists of hydraulic sensors, data acquisition and sending devices, wireless communication devices and IPC. This system monitors the tension of multi-rope hoist steel ropes, in order to get the actual...
Proceedings Article
Using Skin Color and HAD-AdaBoost Algorithm for Face Detection in Color Images
Li-Jie Xue, Zheng-Ming Li
Owing to the interference of the complex background in color image, high false positive rate is a problem in face detection based on AdaBoost algorithm. In addition, the training process of AdaBoost is very time consuming. To address these problems, this paper proposes a two-stage face detection method...
Proceedings Article
A General System Design and Implementation of SQL Injection Precaution
Xin Fang, Wei Fang
SQL injection attack is very easy to implement intrusion detection, Attacker through the webpage address into the entrance, constructs a SQL statement, illegal access to the web resources. This paper introduces the SQL is injected into the formation reasons, SQL injection methods, to prevent SQL injection...
Proceedings Article
A Data Mining Method on Software System Layer
Yonghui Liu, Yanhui Wang, Yinan Hu
This paper puts forward a data mining method on software system layer which is based on researches on clustering data mining. At first, this method gathers all kinds of software data. Then it extracts characters from them to mark softwares on Halstead software science. Thirdly, it classifies the softwares...
Proceedings Article
A Distributed Network Fault Diagnosis Platform based on Web Services
Bo LI, Guo-min Zhang, Xiang-lin Wei, Ming Chen, Bing Li
Large-scale network services bring great challenges to fault diagnosis, which include the unpredictability of the fault, the difficulty of collecting the fault information, high cost and technical complexity of diagnosis system deployment. To address these challenges, a web services-based distributed...
Proceedings Article
A Study On Data Mining Algorithm Gragh-based
Qiuyu Tang, Yifan Tang
In computer science, graph is one of the most complex data structures. But graph can be used in research and in bussiness because of its intuitive expression. It is a focus in data mining how to derive the interesting subgraph patterns from a great number of graphs. This article introduces a data mining...
Proceedings Article
Design and Realization of Nature Language Processing in The Application of Computer-assisted Teaching
Xianming Meng, Feng Kong
with the development of computer technology, computer-assisted teaching has become an important aspect in modern education application. More and more educational software plays a major role on helping people learn the language. In this paper, we combine natural language process technology to multimedia...
Proceedings Article
Design and Implementation of the Defense Contract Management System based on B/S structure
Tianming Huang, Chao Xie
The defense contract management manual work involving multiple departments and multiple content, low efficiency and error-prone. Based on the characteristics of the defense contract management business, design and development of a defense contract management system. The system was developed based on...
Proceedings Article
Planning and Designing of Letters and Calls Management System Based on E-government
Zhenhua Xie, Chunlin Deng, Kai Zou, Bo Zhou
Based on analysis of Chang-Zhu-Tan area online letters and calls problems, by letters and calls management system as the research object, with electronic government network and service concept to provide support, to enhance the government and the public communication level, strengthen supervisory, and...
Proceedings Article
Method of Key Rating Ascertainment for Space Software based on Fuzzy Synthetic Evaluation and Quantitative Fault Tree Analysis
Yang Li, Kefei Song
Software key rating ascertainment is very important in development of space software. It can guide manager develop the congruent software using the optimal benefit-cost ratio in management. It can also provide the direction in software measurement, and help designer improve system reliability finally....
Proceedings Article
The Algorithm for Unstructured Road to Abstract Road Surface based on Color Feature
Xintian Cheng, Zhenmin Tang
Visual navigation of mobile robots is an important issue in the field of computer vision research. For the characteristics of unstructured roads, in this paper, we use color feature and space information to solve this problem. First, compress color space of color image containing unstructured road to...
Proceedings Article
Modified PFA with the Azimuth Resampling in Post Fourier Transformed Data Domain
Lu Liang, Pan Li
The polar format algorithm (PFA) is the most popular way for spotlight synthetic aperture radar (SAR) image formation and is still attractive nowadays. Conventionally, the algorithm is carried out sequentially as a range resampling, an azimuth resampling, a Fourier transform (FT) in azimuth, and an FT...
Proceedings Article
Characterizing Petri Nets with the Temporal Logic CTL
Zhifeng Liu, Zhihu Xing
Model checking is a powerful technique for verifying systems and detecting errors at early stages of the design process. When model checking is used to check properties of Petri net, the specification has to be expressed in temporal logics. In this paper we will focus on how to characterize some important...
Proceedings Article
Study on Design of Fault Injection System Based on Testability Verification
Zhiyu Li, Kaoli Huang, Guangyao Lian
Based on testability verification, the paper studies on designing of fault injection system and it is used on designing stage of some auto-driving instrument. The previous design only adapted the designer's request, and ignored testability verification, and it was a large problem to equipment. This paper...
Proceedings Article
Ordovician Limestone Aquifer Seepage Field Simulation Based on Modflow
Jiuchuan Wei, Huiyong Yin, Shasha Wang, Daolei Xie
According to the data of draining test, we simulated the Ordovician limestone aquifer seepage field by MODFLOW module of GMS (Groundwater Modeling System). After numerical simulation model building, we successfully simulated the seepage field formed by draining test and dynamic changes in the water level...
Proceedings Article
Least Squares Method Prediction-based Spray and Focus Routing Protocol in Opportunistic Networks
Zhuowei Shen, Ying Tu
Opportunistic Networks develops rapidly in recent years. With the popularity of GPS (Global Positioning System), velocity or position prediction plays an important role in opportunistic network routing. In this paper, a new opportunistic routing protocol named LSMPSF (Least Squares Method Prediction-based...
Proceedings Article
Design and Implementation of Value-added Services Platform Valet Operating Subsystem
Ke Zhang, Jiaqi Zhu, Jia Meng
Customer relationship management system is a system through systemic research towards the client. In order to improve the service level for client, establish a long-term, stable relationship between enterprises and clients, and elevates the rate of client?s loyalty, and so as to seek more profits for...
Proceedings Article
Research on DSP-GPU Heterogeneous Computing System
Xiangzhen Li, Jingying Hu, Weiguo Lv, Guiqiang Wang, Xinrong Cai
In this paper, DSP-GPU heterogeneous computing system is studied and the system architecture is designed. The task scheduling model is analyzed and the discrete particle swarm optimization algorithm is used for the DSP-GPU heterogeneous computing. The communication framework between DSP and GPU is designed...
Proceedings Article
Analysis and Application of Carrier Aggregation Technology in Wireless Communications
Binglin Li, Hao Zhang, Jiming Yao, Hongbin Yao
Carrier aggregation is a key technology in the LTE-A. Carrier aggregation can be achieved within the same frequency bands continuous carrier aggregate, non-continuous carrier aggregation and different frequency bands within the carrier aggregation. It analyses the two implementations of carrier aggregation:...
Proceedings Article
Attribute Reduction Algorithm Based on Incomplete Decision Table
Yue Du, Jian Wang, Xu Zhang
The paper describes the basic concepts of rough set theory and discernibility matrix and presents an attribute reduction algorithm based on reduced discernibility matrix, which aims at resolving the inadequate of the existing attribute reduction based on incomplete decision table. There only contain...
Proceedings Article
Muti-wheel Bogie Braking System Simulation of Civil Aircraft
Hua-wei Wu, Te-fang Chen, Lin-feng Wang, Wei-ming Huang
In order to meet the development needs of large civil aircraft, this paper takes four-wheel bogie landing gear as example and introduces the muti-wheel braking system control mode and control law. The kinematics of aircraft braking process and the mathematical models of wheels, tyres and runway, hydraulic...
Proceedings Article
A study on applying KFCM algorithm to source code mining
Yonghui Liu, Jingjing Tian, Lei Zhang
This paper provides a algorithm, which is based on that kernelized fuzzy C-means uses on the study of source code mining, to solve the problem that the large number of quantities, multiple attributes and most of them discrete of software engineering. By using this algorithm, we can improve the efficiency...
Proceedings Article
A New Data Compressed Algorithm on Mobile Device under Cloud Service
Tong Zhu, Zhuo Gao
In this paper, we discuss how to use cloud services to provide seed data for data compression algorithm on mobile device. Seed data can remove redundant information from GPS data. Then, through the shift encoding algorithm, we provide a more simple and effective data compression method for real-time...
Proceedings Article
Research of Fast Cloth Simulation Based on Mass- Spring Model
Zhenfang Cao, Bing He
In cloth simulation based on the spring-mass model, algorithm dealing with super-elasticity reduces the simulation efficiency to some extent. Based on the correction algorithm of modifying position and velocity, an improved algorithm is proposed which can improve the efficiency effectively. Meanwhile,...
Proceedings Article
Evaluating Mission-Oriented Network Reliability via Simulation Test
Mo Chen, Yuejin Tan, Hongzhong Deng
This paper proposed a simulated test method for evaluating mission-oriented network reliability. We first defined the mission-network model and entity-capability model. Then, to test the mission-oriented network reliability, we employed a three-layer network, including mission-layer, sampling-layer and...
Proceedings Article
Generalized Regression Neural Network Based Quantitative Structure-Property Relationship for the Prediction of Absorption Energy
Hui Li, Yinghua Lu, Ting Gao, Hongzhi Li, Lihong Hu
Generalized Regression Neural Network (GRNN) was used to develop a quantitative structure-property relationship (QSPR) model to improve the calculation accuracy of density functional theory (DFT). The model has been applied to evaluate optical absorption energies of 150 organic molecules based on the...
Proceedings Article
Numerical Modeling Approach of an Air-launched AUV Initially Impacting on Water
Yonghu Wang
Water-entry impact of air-launched AUV (AL-AUV) is considered as a timedepended strongly nonlinear fluid-structure Interaction phenomenon. Numerical modeling technique of AL-AUV on its initial water-entry impact is given by using the Multi-Material ALE-Lagrange coupling algorithm. The key aim is focused...
Proceedings Article
Numerical Simulation Study of Aerodynamic Characteristic on Hypersonic Aircraft
Jiang Chen, Song-ping Wu
In this paper, a three dimension model that is similar to the hypersonic cruise aircraft X-51A has been generated by using a graphics processing technology and an anti-modeling method from the published pictures and related articles about the X-51A. This paper adopts the Harten-Yee's scheme to simulate...
Proceedings Article
Dynamic Binary Instrumentation Technology Overview
Kunping Du, Fei Kang, Hui Shu, Li Dai
The Dynamic Binary Analysis technology is a newly emerged technology which can analysis program execution dynamicly. Using this technology, the process of program analysis became more simple and accurate. Foreign researchers had put forward several Dynamic Binary Analysis Platform in recent 10 years....
Proceedings Article
An Optimization Method for Missile Testing Vehicle Based on Genetic Algorithm
Ai-zhen Liu, Li-yun Chen, Xiu-feng Gao, Xi Li
Planning the optimum number of Missile Testing Vehicles is very important to decrease testing cost especially testing time of kinds of missiles. To determine the number of vehicles, the mathematics model was established and an optimization method based on Genetic Algorithm was proposed. And an encoding...
Proceedings Article
Traffic Adaptive Geographic Routing for Vehicular Ad Hoc Networks
Xiang-yu Bai, Xin-ming Ye, Yan-jun Huang, Jun Li
Vehicular Ad Hoc Network (VANET) has recently attracted considerable attention. The design of routing protocol for VANET is a challenge given rapid topology changes and frequent network disconnection. Current routing protocols usually use geographic information to forward packets. In this paper, we propose...
Proceedings Article
Design and Implementation of 802.1x Authentication Module in Security Switch for Industrial Control System Based on FPGA
Yanan Zou, Dongqin Feng
Aiming at the safety of the industrial control system, an authentication module based on 802.1x with dual authentication model in safety switch is proposed. The authentication mechanism of 802.1x is stated. The dual authentication model, namely the authentication between the safety switch and the server...
Proceedings Article
A Novel Design of Wideband Frequency Antenna for WLAN
Rongrong Zhang, Yalin Guan
A novel and simple coplanar waveguide (CPW)-fed monopole antenna with wideband dual-frequency is proposed in this paper. The proposed antenna printed and integrated on a small region of a microwave substrate has a compact size of 22?35mm2. This antenna, fed by CPW and connecting a 50' SMA connector,...
Proceedings Article
Feature Extraction and Recognition of Analog Circuit Fault Signal Based on Wavelet Transform and Partial Singular Values Decomposition
Si-yang Liang, Jian-hong Lv
A new algorithm for the effective characteristics' extraction of analog circuit fault signal is proposed with consideration of its complexity. The proposed method is based on wavelet transform and partial singular values decomposition. Firstly, the analog circuit fault signal is decomposed into different...
Proceedings Article
Effect of User Distribution on the Capacity of Cellular Networks
Xue Tang, Hongwen Yang
User distribution is a critical issue in cellular networks. In most previous works, a uniform user distribution is often assumed within a cell. In this paper, we purpose a non-uniform user distribution model. Both its effects on downlink and uplink capacities of a cellular network are evaluated under...
Retraction
RETRACTION: Introspective, Client-Server Technology
Yanchun Ma, Jixin Pan
In April 2020, Atlantis Press was alerted to fake proceedings articles hosted on our platform. These articles, mostly in computer science and engineering, were generated by the SCIgen computer program and were all published between 2006-2018. Immediately after receiving the alert, Atlantis Press initiated...
Proceedings Article
A Train Algorithm of Multi-Aggregation Process Neural Networks Based on Chaos Genetic Optimization
Yue-Wu Pang, Shao-Hua XU
Aiming at the learning problem of multi-aggregation process neural networks, an optimization train method based on chaos genetic algorithm (CGA) with lowest mean square algorithm (LMS) is proposed in the paper. The learning problem of the network weight functions is converted to the training of basis...
Proceedings Article
A Channel Allocation Algorithm Based on Demand in Cognitive Wireless Mesh Networks
Tingrui Pei, Jing Li, Zhetao Li
We proposed a channel allocation algorithm, which was a modification of graph theory and based on demand to optimize the performance of cognitive wireless Mesh network. The key idea of the algorithm was to design a proportion coefficient of actual flow to demand flow, and then cognitive users with the...
Proceedings Article
Location-based Security Authentication Mechanism for Ad hoc Network
Cui Li, Ze Wang
With the growing prevalence of wireless networks, location information plays a critical role in many applications. Especially, in unattended and hostile environment, whether the location of a node lies on a security area became very important. In this paper, we first analyze the security and vulnerability...
Proceedings Article
Scalable Distributed Standard Definition Video Conferencing System: Architecture and Forwarding Model
Suiming Guo, Congxiao Bao, Xing Li
Videoconferencing system is widely and successfully used on the Internet and standard/high definition videoconferencing is a new heated topic in research. However, researches in various videoconferencing systems (e.g. Access Grid, DVTS, VLC, and Ultra Grid) are faced with the problem of scalability....
Proceedings Article
Arranging course automatically algorithm based on multi-factor priority
Wei Zhi, Huaping Feng
The problems of course timetabling mainly involve time, curriculum, the number of classrooms and so on. A new algorithm based on multi-factor priority is proposed in this paper. The algorithm use time division, the compute of the priority, the provisional matrix and quick sort to achieve the function...
Proceedings Article
Protect Cloud Computing's Data Using Fully Homomorphic Encryption
Xu-dong Wu, Xin Li
With the fast development and wide application of cloud computing,more and more security accident has been appeared.Though some traditional security measure has been applied, the security problem has become the main abstacle to apply cloud computing technology This paper based on the newly developed...
Proceedings Article
Load Balancing Technology Based On Consistent Hashing For Database Cluster Systems
Zhenguo Xuan
The database cluster is an effective mechanism to improve the throughput of database systems and reduce the response time of the database. Generally, it is used to solve the single-node bottleneck problem of data access in network services. Load balancing technology is the key factor to determine the...
Proceedings Article
The Logical Structure of the E-Commerce Platform Design and External Interfaces to Achieve of O To O
Li-jun Wei, Hai-bo Wu, Liao-liang Xiao, Jiang-tao Gong, Xin-xi Chen, Dong-mei Tang
O2O namely Online To Offline, it is a line from online to down, and combine online resources with real economy ,therefore allowing the network to become the real economy to an e-commerce model extends to the virtual world of the "front", different from the B2B - (Business To Business) and B2C (Business...
Proceedings Article
A Hybrid Evolution Algorithm with Application Based on Chaos Genetic Algorithm and Particle Swarm Optimization
Yu Fu, Bing Wang, Shao-Hua Xu
Aiming at the complex function extreme value and non-linear system model parameters adjust, a hybrid optimization algorithm based on chaos GA combined with PSO is proposed in the paper. With application of applying experience of PSO, sharing information of GA, and traversing pathway of chaos, the adaptive...
Proceedings Article
Smoke Detection Algorithm Based On Wavelet Transformation and Energy Analysis
Yijun Xu, Ning Han
A novel algorithm to detect the forest fire smoke based on the wavelet transformation and high-frequency energy analysis is proposed. The conventional color-based RGB algorithm has the difficulty to distinguish the smoke from other objects with the same color, such as clouds and fogs, so it leads to...
Proceedings Article
Stream Cipher Method Based on Neural Network
Haiyan Long
A new stream cipher algorithm based on one-way function of neural network is proposed. The nonlinear system comprised of such neural network is used to transform a group of LFSRs for key stream generation. As a result, the complexity of sequences is increased with period expanding. The produced cipher...
Proceedings Article
A Java Source-code SQL Injection Attack Detection Algorithm Based on Static Analysis
Tian Wang, Lihao Wei, Hong Zou
This paper researches the method of SQL injection attack detection and the principle of static analysis scanning, and presents a Java source-code SQL injection attack detection algorithm. The detection algorithm includes these steps: lexical analysis of source code, parsing of source code, constructing...
Proceedings Article
Research on the Association Rules of Marketing Resources Demand and Supply in Grid Environment
Jianyou Zhang
This paper introduces processes and methods access to the demand for marketing resources, describes the steps for marketing resources planning and the marketing resources demand-supply model in grid environment,finally lists several association rules of marketing resources demand and supply. It provides...
Proceedings Article
A method to implement data extraction using AND optical gate based on SOA-XGM
Ya-lin Guan, Rui-dong Wang, Lei Zhang
A method was proposed to implement data extraction using AND optical gate based on cross gain modulation (XGM) of semiconductor optical amplifier (SOA). The optical data extraction in DPSK/ASK orthogonal modulation system was achieved with the proposed AND gates, in order to prove its feasibility. Through...
Proceedings Article
A Wireless Mouse Design and Implementation Based on J2ME
Yuhe Song, Changying Liu, Tianhao Wang, Xin Zhang, Lingling Zheng
J2ME is a Java technology specification which was advanced by The United States of America SUN company.It was used to develop Java applications which run on small equipments, consumer electronic equipment, Internet mobile equipment, embedded equipment. Hereby, this paper will introduce a J2ME-Based program...
Proceedings Article
Based on Prospective Dynamic Frequency Scale Power Optimize Method for Multi-Cores Processor's I/O System
Yufeng Guo
Power problem has been one of the most restricting development barriers of processor. I/O system power is an import part of the processor's power. The paper aims at I/O dynamic power of multi-cores processor, and put forwards a prospective dynamic frequency scale with clock gating power optimize method....
Proceedings Article
RAID Storage Systems with Early-warning and Data Migration
Yin Yang, Zhihu Tan, Wei Liang, ChangSheng Xie
This paper proposes a new RAID-based system, we defined as REM: RAID system with Early-warning and data Migration. REM can predict RAID potential fault according to disk health degree and array health. Once the fault has been predicted, it takes data migration to protect the data, which allocates reserved...
Proceedings Article
Weak Electricity Pipeline Management System Development Based on Seam Framework
Kai Yang, Yiming Li
As information technology and accelerating the process of the network, many companies, schools or government agencies are densely covered with a variety of weak lines, of which both China Unicom's mobile telecommunications network cable has a telephone line and broadcast television Some TV lines. Although...
Proceedings Article
Morphological Characteristics of Drug-loaded Nanoparticles based on Microscope Images Analysis System
Bohua Feng, Siyuan Mo, Liufen Peng, Huoyan Xu
Microscope images analysis of drug carriers was a widely used method for those nanomaterials. Usually manual measuring and analysis of microscope images were subject to errors, and bad stability of results. Nanoparticles microscope images analysis method was combined with computer image processing technique...
Proceedings Article
A research on error handling model of service fault-tolerant strategy
Yongqing Wang, Yan Chen, Ming Yang
With the rapid development of web services, web services fault-tolerant mechanism has become a new research focus. This paper presents an innovative error handling model of service fault-tolerant strategy. For the goal of enhancing the fault-tolerant performance of web services, we analyze the key technologies...
Proceedings Article
Solving linear PDEs with the aid of two-dimensional Legendre wavelets
Fukang Yin, Junqiang Song
In this paper, we develop a method, which using twodimensional Legendre wavelets, to solve linear PDEs. Based on the properties of shifted Legendre polynomials, we give a brief proof about the general procedure of two-dimensional operational matrices of integration, and then employ aforementioned matrices...
Proceedings Article
Typical cloud computing system design
HaiYan Liu, Zhiyuan An
Cloud computing more widely applied to study the structure of the cloud computing system, and in-depth understanding of cloud computing technology is necessary.Is very meaningful for the development of cloud computing systems.Designed in a typical cloud computing system framework, including the central...
Proceedings Article
Design and Implementation of hidden key loggers under .NET platform
Zhiyuan An, HaiYan Liu
keyboard recording technology has been widely applied to the system monitoring program.This paper describes the design and implementation keyboard loggers based on the the HOOK, under .NET platform. At the same time, in order to reach the hidden effect, record keyboard function module is inserted into...
Proceedings Article
Design and Implementation of Remote Buffer Overflow and implanted Backdoor
Xin Zhang, HaiYan Liu
Network security research focused content is a buffer overflow. It is a technology used by hackers mostly. This paper, based buffer overflow, given the use of the remote overflow implanted backdoor design, and implementation methods. In this paper, introduce the detailed steps to structure Shellcode,...
Proceedings Article
Syntactic Dependency for relation extraction from Biomedical literature
Xiaomei Wei, Jianyong Wang, Yang Li
Relation extraction is important to improve complex natural language processing (NLP) applications. The Bio-Event extraction in GE shared task is important to understand biological processes. Although some progress has made in GE research, there is still much work to do to improve the performance of...
Proceedings Article
An Exponential Distribution-based Model for Equipment Remaining Life Prediction
Xiao-Hong Meng, Wei Wang, Yong-Tao Zhou
The article proposed and established an exponential distribution-based model for equipment remaining life prediction. The model is a general decision model for detectable continuous degradation process. The modeling method and application example is introduced. Compared with other models, the model has...
Proceedings Article
Application study on multiple network communication of power engineering
LiMing Zhang, Rui Guo
The application of network communication in the field of engineering monitoring software has been very common, but most of them used a network communication mode. This paper introduces the multiple network communication modes (asynchronous network socket communication, wave communication, named pipe...
Proceedings Article
A study of test oracle for application interface testing of distributed system
Jingyan Cui, Gang Ye, Xianjun Li, Shilong Ma
The application interface testing is an important part of automated software testing of distributed system. It is based on network data which is produced when the distributed system is running. It is used to verify whether the network data is correctly exchanged. In this paper firstly we design test...
Proceedings Article
The actual diagnosis and rational appeal of college network courses
Jixin Pan, Lulu Cheng, Fuping Guo, Liping Liu
Nowadays, people have wrong conclusions and unreasonable concepts about the essential attribute in college network courses. These can be illustrated by the following aspects: such as in the value, the fixed position is not conformity with expectation; in teaching, the current teaching situation is deviated...
Proceedings Article
Method of Software Development Based on Component Technology
Yan Li, Li Jiang
Component-based software development methodology is a software development reuse software solutions in order to avoid duplication of effort, the current software component technology is regarded as one of the key factors of successful reuse. The article describes the main content of the basic concepts...
Proceedings Article
Research on IT Service Management of Local Colleges Based on ITIL
Zhengang LI, Zhigang Zhang
At present, the key of IT work faces to convert construction to service, however, the local colleges have not established complete management in order to fit for these changes. This paper discusses on IT service management mechanism and implement scheme for local colleges after analyzed the problem of...
Proceedings Article
The application of data source authentication protocol to video multicast
Shijie Zhao, Zhirun Liu, Liehuang Zhu, Rufeng An
An efficient packet-injection resistant data source authentication protocol for group communication(EPJRSA) was proposed to authenticate data source. It can recognize which packets are injected by attacker and delete them. But it cannot recover the lost packets. So an advanced protocol based on EPJRSA...
Proceedings Article
The research of multimedia data transmission Basis on the inventory and queuing theory
Jia-jie Shen
Aim to problem how the packet size effect to the multimedia data transmission and how to design the packet size to reach the best efficient of transmission. The research is mainly to use the inventory and queuing theory find the best way to design the send packet size. Though the model is established...
Proceedings Article
Constellation Design of the Beidou satellite navigation system and performance simulation
Xiaomeng Wang, Ruihua Liu
To improve the positioning accuracy and reliability of Beidou ,an analysis of the Beidou satellite navigation system has been performed; combination of technical experience of the foreign global satellite navigation system and the current release of technical information, we have designed Beidou satellite...
Proceedings Article
A Design of Digital Handheld Terminal in Wireless Data Acquisition System
Xingguo Sun, Lei Xu, Shouxian Wen, Xiaohui Li
In order to make data collection more convenient, quick and accurate in working site in the existing wireless data acquisition system, one kind of multi-function handheld terminal is designed which combines the wireless and wired data acquisition. The paper adopts Atmega128 of ATMEL as microcontroller,...
Proceedings Article
Angle-of-Arrival based Constrained Total Least-Squares Location Algorithm
Gangcan Sun, Xuefei Xu, Kai Yang
A source location algorithm based on the angle-ofarrival (AOA) measurements of a signal received at spatially separated sensors is proposed. The algorithm is based on the constrained total least-squares (CTLS) technique and gives an explicit solution. Simulation results demonstrate that the proposed...
Proceedings Article
Parallel Processing Imaging Algorithm for Synthetic Aperture Radar based on pipeline
Zhili Hua, Chao Hui, Hongping Li
Parallel processing is an effective way to process Synthetic Aperture Radar (SAR) data quickly and realize realtime imaging. Based on the traditional serial Range-Doppler algorithm, a parallel SAR imaging processing scheme is present by using of pipeline technology, and partition approach of computing...
Proceedings Article
The Research of Using Animation Design to Promote the tourism economy under the Guilin Folk Cultural Characteristics
Yu-ting Zhang, Zhi-hong Liu
Guilin is not only a minority living area that full of profound folk cultural but also a world famous tourism city. Research and analysis of the Guilin folk culture, give full play to its inheritance and creativity and display in the form of animation, it is a meaningful exploration and research for...
Proceedings Article
SeqARM: An Association Rule Mining Algorithm Based on Sequence Constraint
Shenshen Bai
Sequence constraint mainly considers the occurrence time of item, which can determine whether an association rule is valid. This paper proposes a novel algorithm SeqARM that aims to mine strong association rule with sequence constraint and runs on the second phase of association rule mining. SeqARM employs...
Proceedings Article
Research of Workflow nets Application Based on the Petri nets
Dabin Qi, Jun Yao, Qiuju Li
This paper introduced basic knowledge of Petri nets and workflow, and invariant analysis technique of Petri nets models structure, and integrate the real application circumstances of the workflow of receive document in document management, constructs an integrated workflow model based on Petri net. Further...
Proceedings Article
The Application of Threshold Segmentation Algorithm in Loess Microstructure Image Analysis
Nian-dong Deng, Xiao Wang, Feng Wang, Yang Zhou
The image research on loess microstructure which has profound influence on loess engineering mechanics properties is a new subject of geotechnical, the loess microstructure information and its section of the occurrence can be reflected via CT or electron microscope technology. The loess microstructure...
Proceedings Article
Simulation and Analysis of Influence of Group Delay Distortion on Performance of DBF System
Hao Gao, Xiaohui Li
Group delay distortion between channels is one of the most important factors which affect the BER (bit error rate) performance of DBF (digital beam forming) System. The basic principles of DBF and the concept of group delay are first introduced, and a linear group delay filter is designed based on the...
Proceedings Article
An Efficient Solver for the Stokes equations with Random Inputs
Dong Qu, Jing Yang
In this paper we present a high order method to solve the Stokes equations with random coefficients numerically. A stochastic Galerkin approach, based on the truncated Karhunen- Loeve decomposition technique for the stochastic inputs, is used to reduce the original stochastic Stokes equations into a...
Proceedings Article
Analysis of the Performance about Actual Quantum Key Distribution System Based on BB84 Protocol
Kai-guo Huang, Yan-bo Wang, Qi-ye Zhang, Xiao Wang, Min He
Analyzed how did the fiber length, the attenuation and the average photon number of the pulse emitted by the single photon source affect the receive efficiency in the fiber channel quantum key distribution system based on the BB84 protocol. A theoretic model relative to the system was represented. It...
Proceedings Article
Trust-Based Service Matching Access Control Model
Yongsheng Zhang, Yuanyuan Li, Mingfeng Wu
By the research of Web service architecture, the article puts forward a new trust-based access control model, which is based on service-oriented architecture (SOA) and combines with service matching. The model puts the trust as matching criterion. Transaction is divided into three grades according to...
Proceedings Article
Study on feature extraction method of Han Dynasty stone carving images
Juan Wang, Man Tang
Han Dynasty stone carving is Chinese nation's outstanding cultural heritage, how to protect and promote it is an historical responsibility. In recent years, there has been a lot of research on the Han Dynasty stone carving, and has achieved certain results. But the digital research on it is still very...
Proceedings Article
Research on the Pairwise Test Case Generation of Two-Dimensional Expansion
Shuai Yuan, Gang Ye, Jingyan Cui, Shilong Ma
The recently widely-spreading usage of combinatorial interaction testing is dramatically improving the effectiveness of highly-configurable software. Conventional techniques based on greedy or heuristic algorithms can lead to suboptimal result in the size of the built test suite with unstability. In...
Proceedings Article
A Design of Remote Monitoring System based on 3G and Internet Technology
Shouxian Wen, Lei Xu, Xingguo Sun, Xiaohui Li
Aiming at the low-rate and short-distance communication in existing temperature and humidity monitoring system, this paper designs a remote monitoring system based on 3G and Internet technology. This system consists of data acquisition module and data remote transmission module. Atmega128 is used to...
Proceedings Article
Analysis of Channel Model for GEO Satellite Mobile Communication System
Lu Lu, Daoxing Guo, Aijun Liu, Maoqiang Yang
In GEO satellite mobile communication system, a line-of-sight (LOS) component exists as well as multipath component, which are influenced by buildings or foliage that causing shadowing effect. Satellite mobile channel is described as fading model based on Markov process for channel properties in large...
Proceedings Article
The research on personalized service of digital library based on data mining
Nan Pang, Feng Yan
In recent years, with the deepening of information technology, people facing increasing amounts of information resources. At the same time, people's demand of information is more and more. For digital library, with a wealth of information resources, how to give readers a deeper level of personalized...
Proceedings Article
Research On the Legal Protection of the Network Virtual Propeity
Xuejng Ren
Along with the rapid development of the network games in China, the disputes around the virtual property occur frequently, but our country's existing law doesn't have clear rules to solve the problems. To speed up the related legal system construction in order to protect the healthy development of the...
Proceedings Article
Analysis on the Teaching Reform of Programming Courses of the Specialized Computer Science in Agriculture and Forestry Universities
Ying Zhang, Yingze Ye
At present, there are many problems in the core programming curriculums of the specialized computer science such as low coordination with other courses, insufficient fusion and poor integration with the overall development of special discipline. The present study is mainly focused on programming curriculums...
Proceedings Article
Miner Face Recognition Based on Improved Singular Value Decomposition
Chao Jiang, Guyong Han, Lin Zhu, Jun Zhou, Weixing Huang
This paper depended on that video monitoring and video images in the coal mine were susceptible to dust, light and miner's safety helmet and other special environmental impact. In order to realize the real-time and accurate face recognition rate, and lay good foundation for miners behavior characteristics...
Proceedings Article
The Research of Semantic Retrieval Model Based on Idiom Literary Quotation Ontology
Jie Ran, Li-juan Qi
Aiming at the problem that users often can not retrieve useful information or retrieved information is inaccurate, in this paper we put forward an information retrieval model based on Idiom Literary quotation Ontology. The model and its characteristics were analyzed in detail. Through a systematic in-depth...
Proceedings Article
A Novel Grouping Aggregation Algorithm for Online Analytical Processing
Wei Chen, Yongshan Liu, Ning Wang
As regard to improve the efficiency of grouping aggregation calculation, the data is compressed by using binary encoding, and the dimension hierarchical grouping attribute set encodings of each dimension table are calculated by using the dimension hierarchy tree. Then different encodings are put into...
Proceedings Article
Design and Implementation of A Bicycle Parking System Based on Internet-of-things
Yujia Huang, Zhongliang Yang, Shuhua Xiong
How to manage increasing bicycles in a university campus is a challenging problem. To solve the problem, we design and implement an intelligent bicycle parking system based on the Internet of things. The system architecture is described, and the system modules are introduced. Moreover, we present the...
Proceedings Article
A Satellite Heterogeneous Network Selection Algorithm Combining AHP and TOPSIS
Long Yang, Daoxing Guo
Against the satellite heterogeneous network optimal selection problem, in this paper we propose a network selection algorithm based on the Analytic Hierarchy Process (AHP) method and the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) method. The algorithm considers the parameters...
Proceedings Article
A Variable Step Size RPE Algorithm for Echo Cancelation
Hongxing Yuan, Renxiang Zhu, Shaoqun Wu, Li Guo
Acoustic echo cancellation (AEC) algorithms are widely used in communication devices. One of the main design problems is double-talk issue. The recursive prediction error (RPE) algorithm based on autoregressive (AR) model has been proven to be more attractive to traditional approaches. However, it adapts...
Proceedings Article
The Semi-join Query Optimization In Distributed Database System
Lin Zhou, Yan Chen, Taoying Li, Yingying Yu
In distributed database system, the distributed deposition and redundancy data brought convenient to fault recovery, but they make distributed query processing more complicated at the same time. Query optimization and processing is one of the key technologies in distributed database system. It generally...
Proceedings Article
FPGA Design of Switch Module with Multicast Function on the Satellite Onboard Switch
Zemin Shen, Lufeng Qiao, Menglei Wang
This paper implements a shared memory switching structure with multicast function due to the demand of multicast function on the satellite onboard switch, introduced each module of the ideas and working process in detail. Key modules are programmed and realized with Verilog HDL. The results of ModelSim...
Proceedings Article
A Graph-Based Text Similarity Algorithm
Zuoguo Liu, Xiaorong Chen
This paper is trying to research a text similarity algorithm which based on graph theory. A text is mapped into a graph which consists of terms as its nodes and term sequences as its undirected edges. The Maximum Common Subgraph (MCS) of two graphs is useful for analyzing their similarity and the similarity...
Proceedings Article
An Improved MELP Algorithm for Transition Frames
Tian Qiu, Feifei Wang, Weitao Du
The MELP vocoder has a good performance at 2.4 kb/s and is selected as the Federal Standard Vocoder of the United States. However, due to the simple U/V decision of MELP, desired synthesis performance is not achieved in transition frames. This paper presents an improved MELP algorithm in which transition...
Proceedings Article
Indexing Coded Stripe Patterns Based on De Bruijn in Color Structured Light System
Cheng Han, Zhengang Jiang
The problem of relating projected and captured stripes, here called the Indexing Problem, has proved to be difficult to overcome reliably for stripe patterns in color structured light, due to color fidelity of the projector and the camera, the ambient light, texture of measured object and other factors....
Proceedings Article
Marker Technique and Its Application in the Source Address Recognition Research
Zhiyu Zhu, Huiliang Duan
SPi is an end system of validation technique, in which routers mark packets, and end system performs filtering. we construct the simulation with various network topologies to verify the effectiveness and the filtering accuracy of the SVA architecture. The simulation results show that, SVA can respond...
Proceedings Article
The Study of the Spacecraft Telemetry Data Credibility Calculation Method based on the Probability Statistics and Fuzzy Algorithm
Hongzheng Fang, Haodong Ma, Liming Han, Kai Luo, Rui Li
The credibility of the spacecraft telemetry data can be used to characterize the confidence degree of telemetry data and improve the accuracy of the spacecraft condition monitoring and diagnosis system. This paper proposed the telemetry data credibility calculation methods based on the probability statistics...
Proceedings Article
A Clustering Algorithm towards Microblogs based on Vector Space Model
Guoyou Chen, Jiajia Miao, Handong Mao, Le Wang, Siyu Jiang
Weibos have become wildly popular in China in recent years, and state media reports that there are more than 300 million registered users. The Real Name Policy[1] requires all users on Chinese weibo websites to register with the name that corresponds with their government issued ID card. With the rapid...
Proceedings Article
A Private Cloud Document Management System with Document Clustering Algorithm
Jiajia Miao, Zhongjun Fan, Guoyou Chen, Handong Mao, Le Wang
Recently, more and more enterprises use virtualization technology and cloud computing technology to improve the level of information management. Private cloud document management system from the lab to practical application. We launched a private cloud file management system is characterized by the automatic...
Proceedings Article
A Public Opinions Monitoring System based on Similarity of Microblogs
Jiajia Miao, Xuelin Fang, Guoyou Chen, Handong Mao, Le Wang
Public opinion is the development and changes in certain social space around the intermediary social events, public social managers and held social and political attitudes. In order to improve the efficiency of text clustering, this paper proposes a new similarity measure model OFM. In the first stage,...
Proceedings Article
Numerical Simulation of Muti-jet ejector
Lin Jiang, Song-ping WU
The influence of nozzle location on the efficiency of ejector was discussed according to lots of calculated results. Changing nozzle location will have influence on the efficiency of ejector without modifying ejector structure
Proceedings Article
A process-oriented evaluation framework for cyber-attacker's capability
Baofeng Luo, Junhu Zhu
Accurately and reasonably evaluating cyber-attacker's capability can help to scientifically forecast following attacks in order to give tailor-made defense tactics. At present, the evaluation measures of cyber-attacker's capability are primarily based on attack effect and the related achievements are...
Proceedings Article
A Cellular Automata Model of Pine Wilt Disease Spread and Its Simulation Tool for Application
Mingxiang Huang, Chaohui Yu, Dali Zhou, Fang Bei
In the study a cellular automata (CA) was applied to model the spread process of pine wilt disease (PWD), and a PWDCASim tool was developed to simulate PWD spread based on the CA model using VC++6.0 platform. For the further understanding of PWD spread with the CA model, a case study was implemented...
Proceedings Article
Analysis on Event Delay in Event-Driven Wireless Sensor Networks
Rong Zhou, Luqun Li, Jun Zhang
In this paper, we consider an event-driven wireless sensor network (WSN) scenario, in which the events arrive with a certain probability in a time of interval. Firstly, we analyze the event delay in a single node in an M/G/1 vacation queueing model. Then, considering the limited buffer space, channel...
Proceedings Article
A Video Service Cloud Platform with Multi-Network Convergence Application
Hong Liu, MinLu Dai, Gang Li, FangChun Yang
With network technology advances, how to take advantages of different networks to provide users with creative and convergence service experience is of great strategic significance to tri-play service providers. A new video service cloud platform iVideo platform is proposed in this paper. The overall...
Proceedings Article
3D Dynamic Target Simulation Experiments Based On the OpenGL
Su-Yue Zhang, Yong Zhu, Jin Duan, Tian-Tian Ma
The simulation technology saves the cost of test, improves efficiency and in favor of the image acquisition. This article based on the OpenGL simulates the real-time dynamic 3D target, the physical characteristics of the target and the notion characteristics in the real world. The target images collected...
Proceedings Article
The Algorithm of Gravity Master Sensor Game Based on the Android Platform
Ahui Yang, Yunming Pu
The ball game is designed with 3D physical sensor technology based on the Android platform. There are three modules in the game, the presentation layer module, the background logic module and mobile phone posture calculation module, and the classes in the module are introduced, the algorithm of gravity...
Proceedings Article
Pivot Selection Methods Based on Covariance and Correlation for Metric-space Indexing
Kewei Ma, Yuanjun Liu, Honglong Xu, Pang Yue, Fuli Lei, Sheng Liu, Rui Mao, Jiaxin Han
Metric-space indexing is a general method for similarity queries of complex data. The quality of the index tree is a critical factor of the query performance. Bulkloading a metricspace indexing tree can be represented by two recursive steps, pivot selection and data partition, while pivot selection dominants...
Proceedings Article
Automatic Face Segmentation Based on the Level Set Method
Chaoyi Zhang, Yanning Zhang, Zenggang Lin
Face segmentation is a crucial problem in face recognition and other areas like pedestrian detection. Level set methods have been widely used in image segmentation. In this paper, the modified level set evolution equation is used in the level set method to segment the face. Based on the signed pressure...
Proceedings Article
Rating the Raters A new statistical method for evaluating
Yong Li
In this paper, with the actual data of a lecture contest'prevailing method's defects to remove a maximum score and a minimum score, average of the rest to determine the ranking of the contestants are found. Comparison of three methods of evaluation that prevailing method, calculating raters weight once...
Proceedings Article
Design and Implementation of Positioning and Navigation System Based on Android
YuanYuan Yuan, LiJun Zhang
With the development of mobile Internet, more and more people begin to get convenient service by mobile phones. Obtaining one's current location by GPS positioning or network positioning has become one of the important foundations in most applications of location based service. In this paper, we designed...
Proceedings Article
A new DFT based channel estimation method for OFDM systems over multipath channels
Jing Wang, Yuehong Qiu
Channel estimation is one of the most significant technologies in the orthogonal frequency division multiplexing (OFDM) system and its accuracy will influence the performance of the whole system directly. Among all kinds of channel estimation algorithms, the least square'LS'estimation and the linear...
Proceedings Article
The computer-aided design of the multiplexer
Meng Pan, HongJuan Tang
The difficult of multiplexer design is to eliminate residual susceptance. In order to eliminate residual susceptance obtaining impedance matching ,this paper designs the computeraided design software of star-point diplexer, star-point triplexer and constant impedance diplexer based on the Matlab development...
Proceedings Article
LLE Based Pivot Selection for Similarity Search of Biological Data
Kewei Ma, Honglong Xu, Pang Yue, Fuli Lei, Sheng Liu, Ru Mao, Jiaxin Han
Distance-based indexing is a widely used technique for general purpose search. Pivot selection is the most crucial step of bulkloading a metric-space indexing tree. Current pivot selection methods are mainly based on linear methods. A non-linear method based on Locally Linear Embedding is proposed. Empirical...
Proceedings Article
Protocol of Steganography in Streaming Media on VOIP Network Based on Variable Length Coding
Zhen Yang, Huaizhou Tao, Yongfeng Huang, Wanxia Yang
Based on the three-layer model theory for steganography communication system, this paper designs a new steganography transmission protocol, to achieve a more effective frame structure, more reliable transmitting mechanism. Both text message dialogue and file transmission communication based on the proposed...
Proceedings Article
Alarm Correlation Analysis in SDH Network Failure
Zhen-dong Zhao, Nan Huang, Zi-han Li
According to the characteristics of alarm data and the alarm spread in SDH system, and the existence of various shortcomings of the classical algorithm, this paper presents the FP-Growth of non-temporal association rule mining algorithm. We join the relationship between network topology as a constraint...