Proceedings of the International Conference on Computer Networks and Communication Technology (CNCT 2016)
Session: Information Technology
37 articles
Proceedings Article
Study on Solving On-line Decision Making System of Power System Based on Big Data
Qi-yan DAI
The development of power big data technology provides the new opportunity for solving the problems in many technical fields of electric power system. This paper discusses the accuracy and implementation issues for solving on-line decision making system based on power big data. First, we elaborate the...
Proceedings Article
Network Situation Awareness Model Prediction Method Based on Genetic Optimization Support Vector Machine
Wei-peng CHEN, Zhi-gang AO, Yi-qiang TU, Xing-dang KANG, Zhen-nan ZHAO
The support vector machine model is based on the network security situation has strong randomness, is affected by many factors, and the number of types of network security incidents is uncertain, the reference sample is small, the prediction model of need "intelligent", according to SVM forecast algorithm....
Proceedings Article
Viewpoint Ranking Method Based on PageRank in Group Discussion
Jian ZHOU, Ning DU, Li-juan SUN, Fu XIAO
Real-time display viewpoint ranking information in the divergent discussion process, has a great significance in group discussion of Hall for Workshop of Meta-synthetic Engineering. Since divergent discussion has the characteristics of continuity and randomized complexity, a viewpoint ranking method...
Proceedings Article
Improved ESPRIT Algorithm Based DOA Estimation for Multi-target Tracking
Liu-yang GAO, Song CHEN, Zhi-min WANG
ESPRIT algorithm is one of the main algorithms for DOA estimation, which is a basic problem in multi-target tracking. This paper proposes an improved ESPRIT algorithm for multi-target tracking, and takes simulation analysis of the performance of DOA estimation of the SNR and sub-array spacing, then compares...
Proceedings Article
An Overview of the SCV Simulator for Vehicular Networks
Jihene REZGUI, C,dryk DOUCET, Phillipe ALEXANDRE
The increasing number of vehicles on roads brings more risks associated with vehicular travel. In fact, 50 million victims of accidents with personal injury on the roads are reported around the globe every year. Therefore, it is important to have new technologies that enhance active safety and ensures...
Proceedings Article
The Improved LEACH-C Protocol with the Cuckoo Search Algorithm
Yun-sheng GE, Jie KONG, Kun TANG
LEACH-C routing protocol chooses the cluster head by simulated annealing algorithm, although the simulated annealing algorithm can optimize network communication distance, however, the convergence of annealing algorithm is very slow. Improved LEACH-C uses the cuckoo search algorithm to optimize network...
Proceedings Article
Fluorescence Microscopic Image Three-dimensional Reconstruction Based on Space-variant Point Spread Function
Yu WANG, Na ZHANG, Huan JIANG
Three-dimensional (3D) reconstruction of fluorescence microscopic images is a challenging topic in the image processing, because the imaging system is very complex, and the point spread function (PSF) continuously varies along the optical axis. Generally, the more exact the PSF is, the higher the reconstruction...
Proceedings Article
Image Super-resolution Reconstruction based on Deep Learning and Sparse Representation
Qian LEI, Zhao-hui ZHANG, Cun-ming HAO
This paper addresses the problem of super-resolution(SR) image reconstruction based on sparse representation and deep learning. we approached this problem from the dictionary learning. Firstly, in order to realize the correspondence between the sparse representation coefficients, we proposed the method...
Proceedings Article
Pre-Warning System for Sudden Events in Public Based on Pedestrian Behavior's Understanding from Surveillance Video
Yuan-zhi LIANG
Surveillance video records the situation of pedestrians in public. If some sudden event such as a robbery or someone gravely ill, guards or managers can get this by watching and understanding pedestrians behaviors from surveillance video in time. In this paper, we propose a system to warning the guard...
Proceedings Article
A New Method for Feature Extraction and Image Classification Based on PCNN and Image Quality
Yuan-zhi Liang, Rong Ma
Considering that PCNN is in accordance with human vision, so it has a good performance in image binaryzation and segmentation, the PCNN-based methods have advantage in feature extraction and image classification. In this paper, we propose a new method for feature extraction and image classification based...
Proceedings Article
Research on Fault Diagnosis Technique of Spacecraft Payload
Qun WEI, Fei GAO
This paper elaborates the fault classification and different fault processing methods of spacecraft payload in orbit. The advantages and disadvantages of diagnostic method based on knowledge are analyzed. According to monitoring requirements on orbit management of spacecraft, a hybrid diagnosis model...
Proceedings Article
A New Method for Construction of Orthomorphic Permutations with the Highest Degree
Zi-dong LU, Xue-jia LAI
Orthomorphic permutation is proposed in 1942, which is a special permutation with many good cryptographic properties. Orthomorphic permutation has similar structure with a one-way function used in hash functions called Davies-Meyer construction. However, the algebraic degrees of previous constructions...
Proceedings Article
Exploiting Document Boltzmann Machine in Query Extension
Li-ming HUANG, Xiao-zhao ZHAO, Yue-xian HOU, Ya-ping ZHANG
Most work related to query extension (QE) adopted the assumption that terms in a document are independent, and multinomial distribution is widely used for feedback documents modeling in lots of QE models. We argue that in QE methods, the relevance model (RM) which generates the feedback documents should...
Proceedings Article
Autonomous Optical Navigation for Spacecraft in Earth Departure Phase
Fu-peng HE, Sheng-ying ZHU, Ping-yuan CUI
With the development of navigation technology, the interplanetary missions have made large progress in the past decades. In order to accurately estimate the states of the spacecraft and correctly deliver the spacecraft to the predetermined orbit, deep space autonomous navigation system is investigated....
Proceedings Article
Extraction and Feature Analysis of Mouse Trabecular with Active Contour Model Based on Micro-CT Images
Shu-yue CHEN, Ying LI, Kai-bin CHU
To solve the non-uniformity of micro-CT image with CV(Chan-Vese) model and the influence of location of initial contour curves on segmentation speed in the LGIF(Local and Global Intensity Fitting) model, K-LGIF(K-means-Local and Global Intensity Fitting) model was proposed through adding K-means clustering...
Proceedings Article
Decision Support Systems for Predicting Erectile Dysfunction
Hsuan-Hung LIN, Po-Chou CHAN, Ming-Huei LEE, Yung-Fu CHEN, Yung-Kuan CHAN, Wei-Sheng CHUNG, Dah-Jye LEE
Men with ED generally complain failure to attain or maintain an adequate erection during sexual activity. The prevalence of ED is strongly correlated with age, affecting about 40% of men at age 40 and nearly 70% at aged 70. A variety of chronic diseases, including diabetes, hypertension, cardiovascular...
Proceedings Article
Goods Logistics Management Based on the Line Of Transport Operators
Yi-peng LI, Chun-yan XIE
The supply chain management based on electronic commerce has gradually become the mainstream management mode of the enterprises. Logistics management is very important in the whole supply chain management. It is the link between suppliers and manufacturers, manufacturers and distributors, vendors and...
Proceedings Article
The Study of Consumer Purchase and Forward Intention in WeChat E-Commerce Marketing
Jia-Jia MENG, Wen-Jun LIU
In the context of Wechat marketing, this study investigated antecedents and boundary conditions of consumer purchase and forward intention. The results indicated relationship intensity, brand image and dispositional trust have positive effect on consumer purchase and forward intention; the effects are...
Proceedings Article
Using Immune Genetic Algorithm to Optimize BP Neural Network and Its Application
Peng-fei LIU, Qun-tai SHEN, Jun ZHI
It proposes a target classification and recognition method based on immune genetic neural network algorithm. Immune genetic algorithm is adopted to optimize the initial weights and thresholds of BP(Back Propagation)network. Respectively use traditional BP neural network algorithm and immune genetic neural...
Proceedings Article
Research of Semantic Similarity Algorithm Based on the Knowledge of Medical Domain
Li-quan HAN, Zheng-chao XU, Xiao-bo WANG
With the development of medical information technology, the research and application of medical big data has become an important direction of data research. The semantic similarity evaluation between medical domain knowledge is an important part of the understanding of medical large data, which can effectively...
Proceedings Article
Pattern Recognition Method of PD Signals Based on Fuzzy Clustering
Zhi-Gang REN, Wei LI, Wen-Jie JIN, Yao CHE, Song-Lin ZHOU, Dian-Chun ZHENG, Lan-Xiang HE
Fuzzy clustering is a technique which adopts the fuzzy mathematics method to build up faintness relations on the basis of signal features. In this paper, two methods adopting fuzzy hierarchical clustering and fuzzy equivalent matrix method for distinguishing the partial discharge(PD) signals are demonstrated...
Proceedings Article
Research on Improved IPSO-LSSVM Method and Its Application
Peng-fei LIU, Qun-tai SHEN, Jun ZHI
It adopts support vector machine which is applicable for small sample prediction and constructs the prediction model. It is based on analyzing characteristics of particle swarm optimization and support vector machine. The improved IPSO-LSSVM prediction model shall be used to predict the development cost...
Proceedings Article
Industrial Big Data Platform Based on Open Source Software
Wen YANG, Syed Naeem Haider, Jian-hong ZOU, Qian-chuan ZHAO
Deep integration of industrial system and information technology triggered the fourth industrial revolution-Industry 4.0 which based on cyber physical system and Industrial Big Data. Although many researchers have discussed the basic concept of industry 4.0 and Industrial Big Data, as we known no literatures...
Proceedings Article
Research on Expert System for Hydraulic Support in Fully Mechanized Mining Based on FTA
Xiu-cai GUO, Ren-jun Wang
According to the problem that the fault of the hydraulic support was difficult and the recognition rate was low, the fault diagnosis method was put forward based on the FTA fully mechanized coal mining hydraulic support. This method was integrated with fault tree diagnosis technology and expert system....
Proceedings Article
Analysis of students' e-learning behavior based on Bik-Means clustering algorithm
Li-xian Zhao, Rong Li, Jun-min Ye, Zhi-feng Wang, Xun Bin, Da-xiong Luo
With the development of education technology, the number of E-learning users rises dramatically. How to evaluate and classify students through their learning ability and how to provide personalized guidance to students become valuable research points. Work in this paper based on the open source e-learning...
Proceedings Article
A Way to Evaluate the Site Classification by Chinese Seismic Design Specification From VS30data of NGA
Mei-Li SUN, Xia-xin TAO, Rui ZHI
On the basis of Vs30 and Vs20calculated from shearwave velocity profiles of 732 boreholes, a formula to estimate Vs20 from Vs30 is presented in this paper by reference to a recent suggestion, an iterative process to estimate rough overburden thickness is suggested based on two formulas for the average...
Proceedings Article
Quantitative Risk Assessment Method Based on Risk Theory of Subway Station
Bao-qian DAI, Jin ZHANG, Yang-fan ZHOU, Tong WANG
With the development of economy and the improvement of society in China, the problem of traffic jam in cities is increasingly serious. The subway is an effect way to reduce the traffic jam in big cities, such as Beijing. This article takes subway station of Beijing as the main study subject. Through...
Proceedings Article
Damage Identification of Space Trusses Based on the Modal Strain Energy and Wavelet Transformation
Yong ZHANG, Gong-fa CHEN, Jian-bing Lš, Zhao-feng Xš
To demonstrate the applicability of damage identification methods, wavelet analysis is used in damage detection of space trusses. For a single identification method may not be sensitive to structural damages in multiple locations. A damage identification approach based on the modal strain energy and...
Proceedings Article
The Impact of Population Growth on the Future Air Traffic Demand in Singapore
S.M. Phyoe, N.Y. Nguyen, S. Aneeka, Z.W. Zhong
Forecasting air traffic demands is important when planning for the future density and capacity of a Flight Information Region (FIR). There are many factors that affect air traffic demand such as Gross Domestic Product (GDP), air fare, service level, travel time etc. Our previous study analyzed the relationship...
Proceedings Article
An Improved Matrix Perturbation Method for Modified Structures
Zhong-hai XU, Zhong-yuan NIU, Jian-zhao ZHANG, Rong-guo WANG
In this paper, an improved matrix perturbation method for modified structures is presented. First we construct an iterative format on the basis of the matrix perturbation theory. By introducing a pair of initial eigensolution, we can obtain the natural vibration mode of the modified structure, and then...
Proceedings Article
Get Rid of Data Disaster: An Active-active Model with VRN Network for Smart Grid DFS
Jun YU, Xi-gao LI, Heng-mao PANG, Min BU, Lin QIAN
Data storage security issues are expanding to global area, while "Internet+" Smart Energy is prospering in high speed. Therefore, the security backup for the distributed file system (DFS) has become the key factor in the construction of smart grid in electric power. However, due to remote data synchronization...
Proceedings Article
The Subway Ticket System's Design and Research Based on Internet
Peng-yuan SUN
With the new technology development of Internet & mobile payment and intelligent cities construction deep going, the city's network subway transportation system is occurring a great renovation. Directing at the passengers' transfer needs, the paper does investigation, summarizes its basic characteristic,...
Proceedings Article
Temporal Compressive Video Reconstruction Using Gaussian Scale Mixture Model
Xiao-hai HE, Mao-jiao WANG
Compressive sensing has been used to acquire the information in high-frame-rate video using low-frame-rate compressive measurements. Under the framework of coded aperture compressive temporal imaging, we propose a video reconstruction algorithm using Gaussian scale mixture model from temporal compressive...
Proceedings Article
Research on Vehicle Classification Algorithm Based on Information Fusion of Dual Reluctance Sensor
Xu LEI, Shuai WANG, Li-wang MA, Rong HE
In view of some errors existing in the vehicle detection system of single sensor node, a vehicle detection algorithm based on dual sensor information fusion for vehicle classification is proposed. The single sensor signal is detected by double threshold method, then matching the vehicle information detected...
Proceedings Article
Authoring of Personalized Web Page from Heterogeneous Web Pages by Content Extraction and Integration
Wei-gang LI, Ke SUN, Shuo-chen WANG
Authoring of personalized Web page by integrating heterogeneous Web page elements from different sites is a challenging task in Web 2.0 applications. An approach to extract various of partitions or elements, which can be the basic HTML elements, CSS definitions, JavaScript source code, etc, from different...
Proceedings Article
A Dynamic Load Balancing Method for Reducing Migrations in DVE Systems
Wei ZHANG, Hang-jun ZHOU, Zhao-ning ZHANG
Adopting multi-server infrastructure is an important way to improve the scalability of distributed virtual environment (DVE) system. Under this infrastructure, maintaining balanced load among multiple servers is of crucial to keep system usability. Existing load balancing methods mainly focus on the...
Proceedings Article
A New Generalized Assignment Problem Model and Its Method
Sheng XIONG, Yu-qi YANG, Ming-fang NI
The assignment problem generally assumes that one person undertakes one task and one task must be accomplished by only one person. However, a real task usually calls for more than one person. In some cases, those persons are required to work at the same time, if so, the classical assignment model will...