Proceedings of the 2019 International Conference on Computer, Network, Communication and Information Systems (CNCI 2019)

+ Advanced search
101 articles

Design of Autonomous Navigation Algorithm For Security Inspection Robot

Xiaowei Han, Changwen Liu
The security inspection robot is mainly used for large-scale warehouse security and automatic inspection of various warehouses, community security inspections, industrial site monitoring and other automated inspections. The security inspection robot uses the SLAM algorithm to map the inspection target...

Design and Current Tracking Control of Leg Press Training Device With Clutch

Hongbo Wang, Hao Yan, Baoshan Niu, Xincheng Wang, Hongfei Yu
Aimed at the characteristics of the existing stretch leg rehabilitation products with single function and complicated structure, a leg stretching training device with multiple training modes is proposed. At the same time, a controller strategy based on fuzzy slip film algorithm is proposed for the constant...

A Blinn-Phong Light Enhancement Algorithm Based on the Gradient of Voxel

Ying Gao, Qifan Li, Binzhou Yan, Shuxia Guo
Although the classical Blinn-Phong illumination model in direct volume rendering has a good display effect on the boundary of volume data field. However, the setting of the parameters fails to provide information about the valid combination data, thus limiting the performance of the model. To solve this...

A Method for Precise Distance and Velocity Measurement of Automotive Radar

Haitao Yue, Chengfa Xu
When using Fast Fourier Transform (FFT) to perform spectrum analysis on frequency modulated continuous wave (FMCW) radar signals, there are problems of barrier effect and spectral leakage. In order to keep away from barrier effect and improve precision of frequency estimation, we propose a method that...

A Collaborative Filtering Algorithm Based on SVD and Trust Factor

Jianfang Wang, Pengfei Han, Yanling Miao, Fengming Zhang
At present, most collaborative filtering algorithms use similarity as a criterion. In order to alleviate problems of cold start and sparsity in recommender system, a Collaborative Filtering Algorithm Combined with the Singular Value Decomposition (SVD) and Trust Factors (CFSVD-TF) is presented. Further...

Visual c + + and MFC Application in Safety Monitoring System of Airplane Depot

Wenhua Qiu, Yongliang Zhang, Liang Wang
In order to avoid airplanes parking in the depot from crashing other moving objects, this paper proposed a method of designing an intelligent security surveillance system for airplane depot. The function of the system is divided into two relatively independent modules. The first part is the monitoring...

Visualization of Sina Weibo Propagation and Sentiment Analysis

Yunzhi Ye, Xiao Tan
Propagation and sentiment get more attention in social network research, but there is no intuitive way for users to get information directly and quickly. In this paper, combing data analysis and sentiment analysis, we build a system to analyze the Sina Weibo data and provide the results in a visual way....

The Integration and Evolution Mechanism of the COSCO Container Lines and the China Shipping Container Lines Shipping Networks Based on Theoretical Complex Networks

Shan Xu, Mingjun Ji, Yue Song
For the shipping industry’s competition, the merges among companies bring lots of problems such as routing optimization and integration.Based on this, which is more suitable for the characteristics of shipping system, is studied in this paper.Firstly, taking the reorganization of the COSCO networks and...

Customer Identification of Potential Energy Substitution Based on Big Data Method

Yunzhao Li
The usage of clean energy such as electric energy will help promote energy conservation and emission reduction, optimize energy use structure and improve energy efficiency. The realization of the "electric energy substitution" strategy can realize the replacement of loose coal and direct fuel in the...

Analysis of PV Poverty Alleviation Users Based on Big Data

Jian Li
Based on the historical data of power customers, the index system needed to determine the model is determined based on the customer's basic attributes, power usage behavior, payment behavior, customer credit, geographic region, and weather environment. Through the correlation coefficient matrix and information...

Character-level Based Conference Named Entity Recognition Using Bi-LSTM

Rui Xiong, Chensheng Wu, Li Xiong, Luyu Li
For name entity recognition in specific field, a character-level bidirectional LSTM(Bidirectional Long Short-Term Memory, BiLSTM-based conference named entity recognition method is proposed. Introducing word embedding as the input of BiLSTM. each character in a sentence is mapped from a one-hot vector...

Ontology Based Reasoning Rules for Target Tracking in WSNs

Jing Zhang, Qingxu Xiong
Wireless sensor networks (WSNs) are widely used for target tracking. For different tracking tasks, appropriate tracking methods should be deployed properly with WSNs according to various task environment and requirements. In this work, ontology based reasoning rules for target tracking are proposed....

Experimental Study and XY Model Simulation on the Polarization and Depolarization Characteristics of Oil-paper Insulation

Wenxiang Xue, Hui Wang, Shuyuan Wang, Jinghai Xie, Xiangyu Chen
In order to use polarization and depolarization current to diagnose the insulation statement of power transformer oil-paper composite insulation on site, XY conductivity model is put forward and deduced, and the test value of polarization current and depolarization current is used to verify the effectiveness...

A New ISTA-net Solution to Inverse Problem of Electrocardiology

Liansheng Wang, Weiqi Wu, Yiping Chen, Changhua Liu
In this paper, we combined the traditional ISTA approach with deep learning, transferred the application domain from image inverse problem to ECG inverse problem because of its excellent performance to propose a new ISTA-net method to solve the inverse problem of ECG. The proposed method has quick...

Analysis of TCP Flow Characteristics

Xiaoyu Cui, Xingchen Xu, Qingguo ShenLi, Xuefei Liang
The coexistence of long-lived TCP flow and short-lived TCP flow is studied through the analysis of a large number of literatures. Extract long-lived TCP flow and short-lived TCP flow and count the traffic characteristics of TCP flow, including the flow number, maximum flow rate, average rate and average...

Improved Weighted Median Filter with Superpixel for Disparity Refinement

Yuli Fei, Li Cao
Stereo matching cannot get high accuracy for disparity estimations, especially at depth boundaries and textureless regions. To solve the problems, a disparity refinement method based on superpixel segmentation is proposed. A weighted median filter with superpixel information is designed. We give a penalty...

An 1GHz~6.25GHz Phase-Locked Loop for SERDES

Xuan Ma, Zongmin Wang, Tieliang Zhang, Song Yang,, Wen Xiao
An 1GHz~6.25GHz phase-locked loop (PLL) for SERDES is presented in this paper. For achieving optimized balance between acquisition speed and jitter performance at all frequency points, this PLL adopts an adaptive bandwidth method. A current-programmable charge pump is introduced to make loop bandwidth...

Extended Rank Reduction Estimator for Noncircular Sources

Chong Li, Xiaowen Li, Xiaobao Fu
Researchers have placed much attention on direction-of-arrival (DOA) estimation algorithms for noncircular sources in recent years. However, inevitable sensor errors will cause considerable deterioration of estimation performance of these algorithms. This paper proposes an extended rank reduction estimator...

Research on Parallel Pipeline Strategy and Controllable Write Allocation of High Speed Solid State Storage Array

Xiaowen Wang, SongYan Liu, Huan Liu, Yanlin Chen, Yifei Niu
Due to the special write mode and limited lifetime characteristics of NAND Flash, a variety of technologies for the solid state disk flash translation layer (FTL) have been spawned. The existing Flash channel management method does not completely release the bandwidth of the Flash channel. In response...

Application Analysis of Ultrasonic Technology in Insulator Contamination Discharge Detection

Dantian Zhong, Fang Yuan, Jianchun Yao, Jiayu Pan
Line insulator detection is a very important part of the power system. At present, the commonly used detection methods at home and abroad have certain defects. By referring to the application of ultrasonic technology in the United States and South Korea, this paper proposes a method of applying ultrasonic...

A Novel Cognitive Frequency Hopping Detection Algorithm

Tong Li, Chenglin Miao, Huiming Wu, Cheng Chang
Cognitive frequency hopping technology is to apply cognitive radio to frequency hopping communication. The spectrum hole in cognitive frequency hopping spectrum can be detected effectively to avoid the collision of frequency points and improve the spectral efficiency to update the frequency hopping points....

A Land Cover Refined Classification Method Based on the Fusion of LiDAR Data and UAV Image

Lian Liu, Xing Liu, Junjiong Shi, Anran Li
Refined classification is one of the important research directions of remote sensing data classification. With the support of LiDAR data, the fusion of UAV image feature will be an effective mean to expand feature sets and improve classification category differentiation. After expanding the feature sets,...

Indoor Localization Based on CFR Environment Awareness

Xinyu Huang, Bo He
Accurate amplitude information provides the possibility for indoor localization, it is easy to acquire and does not require complex corrections like phase. However, the amplitude information is sensitive to the environment, which reduces the localization accuracy. This paper proposes an indoor localization...

Global Fast Terminal Sliding Mode Control Law Design of a Quadrotor

Hwachou Chen, Haiyun Chen, Ping Xu
The conventional sliding mode control cannot converge to zero in finite time, and it has a feeble robustness because of its linear sliding mode surface with uncertain variable disturbances, in order to solve these problems, this paper presents an adaptive global fast terminal sliding mode control (GFTSMC)...

Research of Spark SQL Query Optimization Based on Massive Small Files on HDFS

Kefei Cheng, Xudong Chen, Ke Zhou, Xianjun Deng, Zhao Luo
This paper focuses on the low efficiency of Spark SQL reading massive small files on HDFS in 4G Industry Application Card (IAC) business analysis system. To solve this issue, we propose a Local Merge Storage Model (LMSM) for 4G IAC small files. In this model, locality is enhanced by exploring the type...

An Improved Mechanism for Universal Sentence Representations Learnt from Natural Language Inference Data Using Bi-directional Information

Dian Jiao, Sheng Gao, Baodong Zhang
BiLSTM with max pooling is adopted as a well-performed supervised universal sentence encoder. Max pooling is a common mechanism to get a fixed-size sentence representation. But we find that the max pooling for sentence encoder discards some useful backward and forward information at each time step and...

Facial Expression Recognition Method Based on Difference Center-Symmetric Local Directional Pattern

Yang Jiao, Xuefei Jia, Junxi Zhao
To solve the problem of insufficient feature extraction and low feature extraction efficiency of local directional pattern, this paper proposes a new facial expression extraction method based on difference center-symmetric local directional pattern (DCS-LDP). The grey values in the fields of neighborhood...

Research on Improved LBP Algorithm Based on Euclidean Distance and Differential Coding

Xuefei Jia, Yang Jiao, Wenhao Zhang, Junxi Zhao
Local Binary Pattern (LBP) algorithm is a classical algorithm in the field of face recognition. It can capture local detail features, but its robustness and recognition rate are easily affected by external environmental changes.In this paper, an improved LBP algorithm which combines Euclidean distance...

Analysis and Design on the Security Management Technology of the Confidential LAN

Haiyan Liu, Jiankang Yang, Zeng Zhang
On the basis of analyzing the security threats faced by hosts in a confidential LAN and the existing security measures, this paper designs a security management and control system for the network access control of LAN hosts. Based on the working principle and implementation details of the ARP protocol,...

Discussion on the Integration of ERP and ISO/TS16949

Xiaoxue Yang
The purpose of ERP is to support the enterprise's development strategy and enhance its core competitive power.ISO/TS16949 is the demands of the quality management system of ISO.This paper discusses the disadvantages of the traditional ERP system,analyzes the developing trend of EBP and the demands of...

A Regional Positioning Algorithm for Non-line-of-sight (NOLS) Propagation

Huiming Wu, Jiankang Yang, Cheng Chang
This paper presents a Regional Positioning Algorithm based on NOLS propagation, which is a Positioning Algorithm based on measured value of arrival time, using geometric constraints to estimate the position of the mobile station. One of its remarkable features is that, compared with other algorithms,...

A Hybrid Approach of Combining BP Neural Network and GARCH Model for Forecasting Stock Price

Peipei Zhang, Chuanhe Shen
In this paper, we first construct a three-layer (one hidden layer) multilayer back propagation neural network (BPNN) model to forecast daily closing prices of stocks, but there are considerable errors between the actual values and predicted values. Then, to get better prediction results with higher accuracy,...

A Blockchain Based Authentication Mechanism in Wireless Local Area Network

Yuan Yao, Tao Xie
Considering the security of the widely used WLAN technology, a secure, flexible and reliable authentication scheme is definitely necessary. Most of the existing schemes adopt centralized authentication process, making it vulnerable to DDoS attack, faked AP and the leak of shared secrets. We propose a...

Research on Behavior Recognition in Infrared Video

Ruming Yang, Meng Ding, Xu Zhang, Xinyan Jiang
We trained a neural network for behavior recognition task in infrared video and took a small amount of infrared video to evaluate performance. Limited by the quantity of data, we pre-trained the network on the visible datasets and fine-tuned on our infrared dataset. In order to explore the effect of...

Diversity on the Influence of Atmospheric Turbulence for the States Carrying Orbital Angular Momentum

Fei Cao, Ruyong He, Chaopeng Wei, Zequn Lin, Shengmei Zhao
We have proposed a spatial diversity scheme to mitigate the influence of atmospheric turbulence on the system employing Orbital Angular Momentum (OAM) state. The results show that, in comparison with the system without diversity, the ratio of SNR tends to two in weak turbulent region, and the ratio tends...

Intersatellite Doppler Shift Simulation Analysis of Laser Frequency Band Based on Navigation Satellite Ephemeris

Zhangjian Lu, Yansong Meng, Guoyong Wang, Yuanbo Yao
Inter-satellite Doppler shift is the main factor affecting the accuracy of laser frequency transmission. In order to provide more Doppler frequency shift data for ground validation system of navigation system. In this paper, the ephemeris of Beidou satellite navigation system is used to simulate the...

Forecasting the Ionospheric f0F2 Parameter One Hour in Advance Using Recurrent Neural Network

Zhe Lv, Changjun Yu, Aijun Liu
It is difficult to forecast the state of ionosphere because the time-varying characteristics. Using recurrent neural network(RNN) one hour ahead prediction of the critical parameter of ionospheric F2 layer(f0F2) is realized. The prediction model is developed based on 11 years (from 2005 to 2016) of data...

Beetle Antennae Search Algorithm Based on PSO and Fibonacci

Hongmei Wang, Zhibin Liu, Dan Qu
Beetle Antennae Search Algorithm (BAS) is simple and efficient, but is not stable. The calculation precision is not high and the algorithm is easy to get into local optimum. To overcome these defects, the idea of particle swarm is used to search and traditional Fibnacci method to determine the search...

Gesture Recognition Based on Improved HOG-LBP Features

Gang Nie, Junxi Zhao
With the development of computer technology, vision-based human gesture recognition has become an important hotspot technology in the field of human-computer interaction. However, the performance of gesture recognition is often affected by conditions such as lighting changes, background complexity, and...

An Approach of Suspected Code Plagiarism Detection Based on XGBoost Incremental Learning

Qiubo Huang, Guozheng Fang, Keyuan Jiang
Code plagiarism is a serious problem in the teaching evaluation process, and the programming assignment is related to the student's grades. Therefore, it is especially important to detect code plagiarism submitted by students. As all the codes submitted are kept in the database, and the data are gradually...

Complex Background Gesture Recognition Based on Convolutional Pose Machines

Ganzhou Liao, Xia Zeng
Gesture recognition is a research hotspot in HCI (Human-Computer Interaction). The camera-based gesture recognition method has become the focus of research in this field due to its low cost. Due to the lack of three-dimensional coordinate information and depth information, image-based gesture recognition...

Real-time Buffering, Parallel Processing and High-Speed Transmission System for Multi-Channel Video Images Based on ADER

MingWang Chen, JianPing Xiong, Cheng Ma, Qi Zhao, Sen Feng
Aiming at the problem that the brain inspired multi- core processing chip processes high-speed images in real time, a real-time data buffer of multi-channel high-definition images is designed, and the image is processed and transmitted at the pixel level. The design uses field-programmable gate array...

Marine Object Recognition Based on Deep Learning

Bo Shi, Hao Zhou
In the research of unmanned surface vessel(USV), accurately perceiving the environment around the USV and recognizing the obstacles in real time are the major difficulties. The existing methods based on lidar or unmanned air vehicle have got good performance, but time and money costs are not what we...

Identification of Key Nodes by Algorithm of Betweenness Centrality Based on Traversal of Spark Graph

Hongye Xue, Tianmei Li, Xiangyu Luo
The betweenness center algorithm, which relies on the global network topology, can effectively identify the key nodes of the network.In the existing algorithm for accurately calculating betweenness centrality, the algorithm proposed by Ulrik brands based on the backtracking of graph is recognized as...

An Efficient Protocol for Privately Determining the Relationship between Two Rectangles

Wenli Wang, Xuhong Liu
Secure multiparty computation (smc) is a research focus in the international cryptographic community, while secure multiparty geometry computation is an important field of smc. In this paper, we study an important secure computational geometric problem, that is, to privately determine the location relation...

Provable Security Against Differential Attacks for Generalized SPN Structures

Ruya Fan
In the practice of block cipher design, designers usually choose linear functions over with large branch numbers to achieve provable security against differential and linear attack. Recently, the Internet-of-Things gives rise to a number of applications that require Lightweight block ciphers, some new...

An Effective Visual Attention Mechanism

Zhuanghui Wu, Guoheng Huang, Lianglun Cheng
Visual sentiment analysis is mainly to study the emotional response of the observer after reading the image. Now, as images become exploding in social networks, the need for visual sentiment analysis is increasing. A major problem with the existing image sentiment analysis is that the emotional label...

Task Assignment in Business Processes Based on Completion Rate Evaluation

Tingting Zheng, Jiexuan Chen, Yingchi Huang
In order to ensure the completion of cases and tasks on time in business processes, an approach for task assignment based on completion rate evaluation of resources is proposed. The approach is based on the data analysis of the event logs, in which the related historical temporal information is extracted...

Collision Avoidance Algorithm for Unmanned Surface Vehicle Based on Improved Artificial Potential Field and Ant Colony Optimization

Wen Ou, Xuan Guo
There is a growing concern to design collision avoidance algorithm for unmanned surface vehicle (USV) as a solution to many naval and civilian requirements. Due to the anti-jamming performance of the traditional collision avoidance algorithm decrease with the influence of environmental disturbances,...

Mode-selective Absorption for Spectrum Shaping

De He, Zhijun Liu
We report on realization of a spectrum shaping approach using mechanism of mode-selective absorption in a thin-film layered structure. Ultra-thin lossy films are inserted in the asymmetrical dielectric cavity at the location of nodes or antinodes of standing wave mode to reserve or absorb the energy...