Proceedings of the 2018 International Conference on Computer Science, Electronics and Communication Engineering (CSECE 2018)

+ Advanced search
119 articles

A New Method for Sorting Radar Signal Based on Entropy Features

Jun Han, Xiaofei Lu, Minghao He, Xiaojie Tang
In order to figure out shortcomings of the existing method, such as the accuracy is not high and the method is sensitive to noise, we firstly Obtain the Wigner distribution space and bispectrum space for the received radar signal, then divide the space into subspace. Under the subspace distribution probability,...

A Spectrum Analysis Algorithm Based on GPU

Kunyuan Xu, Yanhua Jin, Fangyuan Zhao, Haoran Ma
Considering the requirement of spectrum analysis, the parallel spectrum analysis algorithm is designed for a software radio platform built on the spectrum analyzer, where CPU is the controller and GPU is the baseband processor. The software platform is combined with the GPU processor, making it possible...

Research on Access Control Model Based on User Trust Degree and Resource Life Cycle under Mobile Environment

Xiaoyan Zhang, Kai Kang
Traditional role-based access control models cannot meet the changing requirements of the roles and users under the mobile Internet environment due to their static attributes. To address such issue, this paper proposes an access control model, which is based on the user trust degree and the resource...

A Probe into the Key Parameter Monitor of V2G System on Electric Vehicle Based on Wireless Power Transmission Technology

Wangcheng Zhu, Zhenchao Xie, Xinshu Wan
As it is both significant and practical to study how the bidirectional wireless power transmission system can be applied to the monitor control of electric vehicle under V2G environment, this paper analyzes how the bidirectional wireless power transmission system works, based on which, probes into the...

An Air Bearing Facility for Antenna Pointing Mechanism

Guoyong Yang, Hongguang Wang, Lie Ling, Feng Gao
An air bearing facility is built to test the antenna pointing mechanism of track and data relay satellite. A hierarchical and simultaneous gravity unloading method is proposed to unload the gravity on the ground. The air bearing facility is a two layers structure. Planar air bearings and air spindle...

Research on Multi-Hop Routing Protocol of Wireless Sensor Networks Based on Gradients

Chenglong Hu, Yongzhen Li
The purposes of this paper are to lower the energy consumption in the wireless sensor network and to prolong network life cycle. Based on the maximum power a node can transmit, a multi-hop routing algorithm is proposed in this paper on the basis of gradients. We conducted a simulative experiment on the...

Observation-based Clock Synchronization in Wireless Sensor Networks

Ayako Arao, Hiroaki Higaki
In wireless sensor networks, each wireless sensor node records events occurred in its observation area with their observation time. Each wireless sensor node possesses its own local clock whose drift and offset are generally different from the others. By using observation records of the commonly observed...

Properties of a Self - gain Optical Fiber Differential Pressure Sensor Based on Damping Piston

Hao Hu, Liqiong Zhong
In this paper, the performance of a self-gain optical fiber differential pressure sensor based on damping piston is studied. Firstly, proposes the structure of mechanical packaging sensor probe based on the damping piston, and designs the sensor system; then, it carries out the theoretical research on...

Identifying Route Preferences over Origin-Destination Using Cellular Network Data

Zhichao Guo, Tongyu Zhu
Current research on studying people's routing behavior focus on how to provide the minimum cost routes while ignore users' preference. Therefore, to analyze user's routing preference, identifying routes they actually choose is a crucial task. Cellular network data contains sufficient spatio-temporal...

Two New Closed Form Approximate Maximum Likelihood Location Methods Based on Time Difference of Arrival Measurements

Wanchun Li, Qiu Tang, Yingxiang Li, Guobin Qian
In this paper, we propose two new closed form approximate maximum likelihood location methods via time difference of arrival (TDOA) measurements to determine the location of a target. For both two methods, an initial estimation is acquired by least square method in the first step. Then, supposing that...

A Dynamic Symmetric Fully Homomorphic Encryption Mechanism for Privacy Protection of Cooperative Precision Positioning Cloud Service

Dibin Shan, Xuehui Du, Wenjuan Wang, Nan Wang
With the increasingly serious threat of privacy protect, the collaborative precision positioning cloud service urgently needs to be carried out homomorphic encryption protection for sensitive data. But the existing asymmetrical approaches are inefficient and are not practical for applications, while...

Research on Temperature Control System Based on WeChat Remote Operation

Xuchen Guan, Yingqing Guo, Xinghuai Huang
In this paper, a temperature control system using WeChat remote operation is designed, including a design of the connection method, circuit and improved PID control algorithm. Besides, the STM32f103 control board with ENC28J60 Ethernet transceiver chip, WeChat server, connection and data exchange mode...

Anti-sunlight Jamming Technology of Laser Fuze

Xiangjin Zhang, Ruoyu Wu, Chengfang Shen, Wei Dai
Environmental elements, especially sunny weather, can easily interfere with the operation of a pulsed laser fuze. The solar radiation entering the detection system causes the fuze to produce a "false alarm." Consequently, the bomb may not work accurately. On the basis of the traditional theory of spectral...

Elevation Angle Estimation by Time Reversal Method in Homogeneous Shallow Sea Environment

Haixia Jing, Haiyan Wang, Zhengguo Liu, Xiaohong Shen, Tianyi Jia
This article discusses the problem of active detection and estimation for the elevation angle of a target in a homogeneous shallow sea environment, where a method using active detection on virtual time reversal (ADVTR) is proposed to solve the estimator performance decline problem caused by multipath...

An Improved TLD Tracking Algorithm for Fast-moving Object

Shijie Zhou, Yuanxi Peng, Kecheng Gong, Leizhi Shu
Traditional object tracking is easily affected by deformation, scale changes, illumination changes, partial occlusions and so on. TLD(Tracking-Learning-Detection) is a classic effective algorithm in long-term tracking which can solve these problems well. Meanwhile, the real-time performance of the system...

Multiple Centroid-Based Multi-Object Tracking by Decision Making

Hao Zhou, Jian He, Zhangqin Huang
Multiple object tracking(MOT) has many applications in different life scenes, such as autonomous driving and traffic management. A novel approach to object predictive tracking, which is based on the Multiple centroid, is proposed in this paper to overcome the problems of occlusion, scale changes and...

Characterizing the Impact of DDoS Attack on Inter-domain Routing System: A Case Study of the Dyn Cyberattack

Yujing Liu, Zhilin Wang, Nan Li
The inter-domain routing protocol BGP is sensitive to severe network congestion. In order to study the reliability of BGP under stress, we take the Dyn cyberattack on October 21st, 2016 as a study case to characterize the impact of DDoS attack on inter-domain routing system. We propose several metrics...

IoT Node Trust Authorization Model

Ruizhong Du, Chong Liu, Fanming Liu
Aiming at the characteristics of strong heterogeneity and limited computing ability of IoT nodes, this dissertation proposes a Trust Authorization Model based on detection feedback in IoT, combined with the current trust model of IoT and implement storage and other tasks by calculating and storing the...

A Network System Security Assessment Method Based on Penetration Testing

Yue Li, Xiaolin Zhao, Chonghan Zeng, Yu Fu, Ning Wang
As the development of the information technology, people show strong interest to the emergence of all sorts of convenient and new technologies. However, there will be vulnerability in these technologies and bad attackers may be attack it to break it down. So, if we want to protect a system in detail,...

A Novel Weak Deduction Password Strength Meter of Chinese Websites

Yu Wu
With the increasing situation of passwords datasets disclosure, the security of user's account faces rising risks under various kinds of password attack. To protect the security of user authentication system, password strength meter (PSM), which is used to measure user's password strength is widely accepted...

A Novel Video Encryption Method Based on Faster R-CNN

Lijuan Duan, Dongkui Zhang, Fan Xu, Guoqin Cui
In order to improve the generalization perfor-mance of video encryption and reduce the amount of data in vid-eo en-cryption, this paper proposes a video encryption on regions of interest (ROI) method based on Faster R-CNN by combining machine learning with information security. The method trains a Faster...

Common-Key Cryptosystem with Mixture of Fake Plaintexts

Masayoshi Hayashi, Hiroaki Higaki
One of the fundamental methods for eavesdroppers to achieve a plaintext from a cryptogram is the brute force attack where possible candidates of decryption keys are exhaustively applied to the decryption algorithm. Here the only reason why the eavesdroppers believe to find the common-key and to achieve...

Modeling Confrontations in Complex Networks Based on Game Theory

Yapeng Li, Jun Wu
To fully understand the structure robustness of complex networks where confrontations of attackers and defenders happen, we build a game model which is a zero-sum game in simultaneous form. We assume that the attack and defense are only against the top-n vital nodes and evaluate the payoffs using the...

Complex Project Schedule Risk Simulation Based on Multi-agent

Haolin Wen, Tao Hu, Gongda Yan
In order to solve the problems of complex projects schedule risk assessment, a project schedule risk assessment model based on the multi-agent was established by the Anylogic software in this paper. In this model, a "process" agent, a "process flow", a "risk factor" and a "control" agent were designed...

Research on Risk of Online Supply Chain Finance

Daozhi Zhao, Di Wang, Baosen Wang
In recent years, with the deeply combine of "Internet + finance", traditional supply chain finance has also accelerated the pace of online operation, and its risks have gradually been exposed. Therefore, it is necessary to study the risk of the online supply chain finance in order to clarify its characteristics,...

Supply Chain Financial Ecology Model Design and Risk Management Research

Baosen Wang, Wenjiao Lan, Chunming Fan
Supply chain finance is an emerging model, which treats the core enterprises in the supply chain and the upstream and downstream SMEs as a whole. The commercial banks provide financial services to the entire supply chain. According to the natural ecosystem structure model, this paper summarized the composition...

The Effect of Behavior Conformity on Prisoner's Dilemma Game

Zidong Chai, Yanbo Zhang, Xinyu Zhang, Xiaobo Liu
Explaining the evolution of cooperative behavior is one of the most important and interesting problems in a myriad of disciplines. Game players on complex networks usually change their strategies by copying special rules. In this research, we combine the prisoner's dilemma game player's behavior conformity...

The Application of Real-Time Object Detection on Aerial HD Videos Based on Deep CNN

Guanghui Xu, Shuai Xie, Jun Wang, Guodong Wu
Efficient real-time object detection in aerial HD videos is an urgent need, with the increasing use of UAV(unmanned aerial vehicles) in various fields. But it is still challenging to detect objects accurately and timely due to its large pixel size and relatively small objects. We use the popular SSD...

Design of the UAV Digital Actuator Automatic Test System Based on Dual-core Microcontroller TMS320F28377D

Tao Yang, Liren Chai, Gang Wang
For purpose of UAV digital actuator test, one of UAV's key components, whose static and dynamic performance impacts on the UAV maneuvering performance, this paper studies an automatic digital actuator test system, introduces its hardware and software design scheme, and demonstrates its application. The...

A Load Identification Technology for Wireless Smart Home Systems

Zhenchao Xie, Daohong Lin, Yufeng Chen, Xinshu Wan
Aiming at the applications in wireless smart homes, a wireless charging system based on LCL topology is designed. Moreover, the constant-current (CC) output of the system is realized according to the charging characteristics of lithium batteries. On this basis, a charging strategy is proposed, which...

A Feasible Control Method for Incomplete Symmetrical Marine Robot

Lei Zhang, Zaopeng Dong, Yongsuo Yan, Yuyin Cao
For the incomplete symmetrical underactuated USV (unmanned surface vehicle), this paper proposed a global asymptotic stabilization control method. The global diffeomorphism transformation for the USV model was performed twice in order to obtain the form of nonlinear cascade systems, so the stabilization...

Develop the AI Literacy of Infants by Deeply Integrated English Learning and Robot Education

Zhongyu Zhang
In this paper, a new learning model which integrate the English Learning and Robot Education for infants was proposed. According to this model, a textbook of using robot to teach English was designed. A corresponding course which matched with the textbook was developed. An experiment of using this course...

A Hybrid Fusion Algorithm for Integrated INS/UWB Navigation and Its Application in Vehicle Platoon Formation Control

Yingmao Lu, Jianjun Yi, Liang He, Xiaomin Zhu, Pengfei Liu
The vehicle positioning technology is playing an important role in Cooperative Vehicle Infrastructure System (CVIS). In those single positioning modes, the precision of wireless positioning is greatly affected by the environment. However, the accumulative errors of inertial navigation system (INS) and...

The Research of Internet Identity Authentication System Based on Fingerprint Information

Feng Xiao, Yue Zhang, Fei Zhang, Yongzhen Li
With the Internet stepping into thousands of households, human beings really come into in the age of the Internet, When people are cheering for their achievements, however, information security has gradually become our incubus. And how to ensure the security of information is the most urgent problem...

Multi-Network Fusion Based on CNN for Facial Expression Recognition

Chao Li, Ning Ma, Yalin Deng
We propose a method which is multi-network fusion (MNF) based on CNN to recognize facial expressions. Our experimental data adopts the ICML2013 facial expression recognition contest's dataset (FER-2013) and JAFFE dataset. Based on the classic Tang's network structure and Caffe-ImageNet structure, we...

Human Face Age Recognition Based on Convolutional Neural Networks

Zijiang Zhu, Yi Hu, Dong Liu, Xiaoguang Deng, Junshan Li
In the field of image recognition, the issue of face age recognition has attracted the attention of many scholars, and a lot of outstanding algorithms have been proposed, but the correctness rate of age recognition is not high. To improve the AGE identification accuracy, this paper proposes a face AGE...

Face Recognition Based on LBP(2D)2PCA+SVM

Yanmei Jiang, Wei Wei, Xue Liu, Ying Shi
In this work, we present a novel approach of face recognition which considers local binary pattern (LBP), principal component analysis (PCA) and support vector machine (SVM) algorithms, which is named as LBP(2D)2PCA+SVM. This method firstly extracts facial texture features, then uses (2D)2PCA algorithm...

The Colony Count Based on Image Processing Using Matlab and Photoshop

Xiaoming Chen, Shufang Li, Zhijun Zhang, Jun Gao
Using two conventional software programs to do a counting method on the colony image from a normal photograph, and the comparison between the methods.

CT Image Segmentation Algorithm Based on Merging of Similar Adjacent Components

Xueguang Sun, Weigen Qiu
CT is one of the most widely used medical imaging techniques. Image segmentation is of great significance to medical image aided clinical diagnosis. Due to the complexity of structure and shape of CT image, and the inhomogeneity of organization, the commonly used image segmentation algorithm can not...

BDS Common-View Method Based on CGGTTS V2E Standard

Xu Liu, Dangli Zhao, Junliang Liu
CCTF published CGGTTS for Common GNSS Generic Time Transfer Standard that is CGGTTS V2E. To support the standard in the BDS common-view, the paper refers to the standard and simulates corresponding algorithm in the standard realizing BDS common-view method based on CGGTTS V2E. The result show that the...

An Adaptive Bitrate Algorithm Based on Estimation and Video Adaptation for Improving QoE in DASH

Saba Qasim Jabbar, Dheyaa Jasim Kadhim, Yu Li
Dynamic Adaptive streaming over HTTP (DASH) is widely used by content providers for video delivery and dominates traffic on cellular networks. The variation in both video bitrate and network bandwidth badly impacts on the user Quality of Experience (QoE), so recent works is going to submitting better...

Vehicle Target Detection Based on Improved Mixed Gaussian Modeling

Caiyun Xie, Ruxia Hong, Jing Wang, Hong Yu
In the modern world, with the rapid development of science and technology, computer and related technologies have been used in many fields; of course, intelligent video surveillance system cannot do without computer technology. This system also cannot do without the core issue: the detection of the goal...

A Precision Evaluating Method of DEM Using Map Spots Generated by Contour Superposition

Zechun Huang, Zhu Xu, Qianning Zhang, Min Xiao, Zipu Liu, Yongyou Qian, Tianting He
Aiming at the shortcomings of traditional contour superposition analysis in quantitative evaluation of DEM error, the purpose of this paper is to propose a new method to measure the DEM accuracy by using the map spots of contour superposition. To begin with, the concepts of the difference rate and the...

Sight Spot Buffer Model Based on Tourists' Interests

Xiao Zhou, Shun He, Shixiang Zhang, Wei Chen, Yu Chen, Youwei Ma
Aim at the current problems that tourism GIS cannot provide individual service to meet the needs of tourists, this paper brings forward sight spot buffer model based on tourists' interests and needs. Firstly, sight spot classification model is set up and all the sight spots are coded. According to tourists'...

Research on Creation and Technology to Make Large-scale Production of Vertical Greening Wall

Wanlu Luo, Jianwu Ma
This paper introduces a kind of vertical greening wall system on which climbing plants could grow. It emphasizes on illustrating that this system could be manufactured in large scale in factories in advance, and climbing plants can grow on a nursery-land-based structure to become a landscape. It has...

Research on Assessment Method of Grid Frequency Fluctuation Characteristics and Optimization of Speed-governor Parameters

Daohong Lin, Qiang Wu, Xinshu Wan, Yunqian Li, Lei Shao, Hongjun Zhou
With the enlargement of power grid scale, connections between different power subsystems in interconnected network have been more-closely related and the analysis of power system dynamic behaviors becomes more complex. This paper selects 3 area indexes which comprehensively reflect frequency change through...

Research on Control Strategies for Performance Optimization of Wireless Powering System for Smart Home Appliances

Zhenchao Xie, Daohong Lin, Wangcheng Zhu
With the development of smart technology and the improvement of living standard, the demand for a life with smart home appliance is increasing. The advancement of wireless power transfer technology has provided an opportunity to charge home appliance wirelessly. The combination of smart home appliance...

Design of Intelligent Charging Access System for Home Appliances

Wangcheng Zhu, Xinshu Wan, Taobei Lin, Yun Liu
In order to realize intelligent charging of electric equipment in the circumstances of Smart Grid, such as sweeping robots, inspection robots and automatic guided vehicles, this paper designs a new intelligent charging access system using intelligent outlet technology and wireless charging technology....

Coupling Characteristics and Optimization of the Resonators Applied to the Power Supply System of Tail-free Household Appliances

Daohong Lin, Wangcheng Zhu, Zhenchao Xie
As household appliances become more and more intelligent, increasingly strict demands are put forward for their power supply. Existing draw-out power supply mode of household appliances has many shortcomings including low waterproof grade, touch spark, and wire constraint. Considering this, a tail-free...

Research on Networked Sliding Mode Predictive Controller Based on Particle Swarm Optimization

Yang Yin, Hongke Li, Zhengying Ren
Aiming at the development of ship information and intellectualization, this paper researched the control law design problems of the network control system under total ship computing environment (TSCE). Firstly, we analyzed and constructed the computing environment network architecture for the development...