Proceedings of the 2016 International Conference on Computer Science and Electronic Technology

+ Advanced search
80 articles

Research on Intelligent Detecting Technology Based on Extension Fuzzy Method

Minghui Wang, Yongquan Yu, Ge Wei, Xiang Ren, Dan Liu, Yujing Wei
This paper studies a new kind of intelligent detecting technology which includes key detectable matter-elements distilling, adaptive degree analyzes, focusing and reasoning mechanism construction, focusing processing. This paper researches on the focusing and reasoning mechanism construction, which is...

NC-ODTN:Ocean DTN Network Coding Protocol

Xudong Zhang, Bingxin Li
In the oceanic environments, oceanic wireless communication networks suffer low link quality and intermittent connectivity, which in turn disable the stability of end-to-end communication path, which makes the oceanic wireless communication network a de facto Delay/Disruption Tolerant Network (DTN)....

Analysis and Design of a Novel Metamaterial-Based Microstrip Antenna

Shiquan Zhang
Two-layer lattice-type metamaterials unit is loaded above the coaxial feed microstrip antenna in order to gather electromagnetic wave by using the zero refraction index effect. The -type metamaterials unit is printed on the antenna substrate, and the band gap effect is used to suppress the backward wave...

Design and Realization of Topic Search Engine for Chinese Internet Fraud Information

Liang Hu, Ai-chun Ding, Yu-chi Zhu
According to the China Internet fraud criminal and victim information asymmetry, this paper makes Internet fraud information resources as the research object, constructing a cross platform Internet fraud database by data collection and extraction technology, the realization of the network anti fraud...

Track Data Split Measure Based on Least Square Algorithm

Xingfu Zhang, Yanbo Li, Lei Liu, Feng Zhao, Jingfeng Song
This paper describes the split measure algorithm about tracks data. In accordance with the needs of the project, the algorithm can be used to measure the two parts, the three parts and the five parts of the data and then combine them together. The algorithm is based on the overlap area of each measurement....

Secure Information Assets with Data: An Information Security Governance Framework Using Orchestrated Data Analytics from a Holistic Perspective

Huaying Chen, Zhijun Song
Information Security (InfoSec) Governance Framework is applied to help in-house professionals, including top-level officers, as well as practitioners doing field work, in order to operate the organizational InfoSec business within a systematic approach. This paper proposes a framework from the perspective...

Reliability Research of Vehicle Electric Window Control System Based on CAN-bus

Wansong Liu, Wenjun Xiao, Linhu Hui, Yi Wang
In recent years, the vehicle electric window control system based on CAN-Bus has been widely used, but its reliability research is insufficient. In this paper, factors that influence the reliability of the electric window control system had been qualitatively analyzed, and the failure rate of window...

Thermal Simulation for Continuous-flow PCR System

Shenglan Zeng, Bingyu Chen, Lingfeng Cai, Quanjun Liu
A continuous-flow PCR system is presented, which based on the microfluidic platform briefly consists of a PMMA chip with a PCR liquid channel, three heating units. Each of them contained a heat conducting block on a commercially available thin PI substrate. In order to ensure temperature uniformity across...

The Designing of Junior High School Online English Listening Test in ITS

Wan Liu, Jia Ruan
In the context of the development of education informationization, online test system is a teaching method to adapt to the education informationization development trend under the intelligent tutoringsystem (ITS), but at present, traditional listening test exists the issues of untimely feedback and lack...

Simulation Analysis on Mass Concrete Temperature Field of Navigation Lock in Changsha Integrated Hub

Ke Jin, Hui Peng, Chen Wen, Fan Wu, Shaofei Yin
Based on the development of Changsha Integrated Hub navigation lock structure engineering, on the finite element program ANSYS platform, using Parametric Design language(APDL) commands to simulate the temperature field analysis during layered pouring of concrete for the upper lock head structure, we...

Experiment and Evaluation of Acute Rheumatic Fever Diagnosis Application

Sanjib Raj Pandey, Chio-Hong Lai, Xiaoming Yao, Jixin Ma
This paper describes an Acute Rheumatic Fever (ARF) Diagnosis Application that is designed and developed based on the proposed Hybrid Approach. It is an integrated framework in terms of a combination of Knowledge-based System, Temporal Theory and Fuzzy Logic. The developed ARF Diagnosis Application was...

Design and Development of Real-Time Interactive Big Data Visualization Application for Studio Use

Jinbao Song, Jinhong Song, Jianping Chai, Yachen Li
The change of user habits, the intelligentization of mobile devices, and the development of new media have pushed the TV industry into a multi-screen era. While the discussion over TV programs by the Internet users keeps heating up, feedbacks from the social media have made a great influence on the content...

Hybrid TDOA/AOA Localization Algorithm in Non-line-of-sight Environments

Rongpei Ni, Hui Xiong, Luning Xu, Yanchun Xie
In reality, Non-line-of-sight(NLOS) error is the major factor which influences the positioning accuracy. NLOS identification and correction are the major techniques of reducing the positioning error. In this paper, we investigate the NLOS propagation identification and correction for time difference...

Design and Implementation of Photo Printer System Based on Wechat Public Platform

Fan Li, Xiangdong You
This paper introduces the design and implementation of a self-service photo printing system based on wechat public platform. The users can upload photos through wechat public platform, edit photo and select size through the web, then print photo using the machine. Mobile client is developed based on...

The Design and Implementation of User Autonomous Encryption Cloud Storage System Based on Dokan

Jiawei Yin, Junxiang Yang, Yang Chen
To solve the problem of low security in cloud storage system under the background of rapid prevailing cloud technology, this paper studies the design and implementation of User Autonomous Encryption Cloud Storage System based on Dokan. With the help of Dokan's file development model, a specific file...

Evaluation Method of Access Capacity Based on TSC in Distribution Network

Fengchuan Nie, Minfang Peng, Yong Xu, Haiyan Zhang, Liang Zhu, Hongwei Che, Zhengyi Liu
In order to select suitable lines and reduce approval process effectively, the article presents a method to evaluate access capacity based on total supply capability. Firstly, after making a brief introduction to total supply capability, we define access capacity and give two access capacity indexes,...

Diffusion Performance of Moisture in Conductive Adhesive Interconnection Structure

Yang Lu, Dejian Zhou
This paper studied on the environment temperature and humidity setting of conductive adhesive in microelectronic packaging, and established DGEBA /MPD linear homo-polymer model which simplified the conductive adhesive based on material Studio software , to access to diffusion mean square displacement...

Micro Channel and Heat Transfer Column Structure Effect on Heat Dissipation Performance of LTCC Microwave Component by Numerical Simulation Analysis

Zhiping Liao, Zhaohua Wu
Micro channel and heat transfer column of low temperature co-fired ceramic (LTCC) microwave component, its structural parameters will affect the heat transfer performance of high heat flux microwave module. To obtain the better thermal performance of micro channel and heat transfer column structure,...

Technical and Economic Analysis on the Large-scale Application of Renewable Energy in Buildings

Di Li, Suiqi Han, Jie Li
This paper mainly introduces the technical & economic analysis and evaluation on the monitoring data of two buildings in the Shandong Academy of Building Research by the application of data monitoring and evaluation system for renewable energy building application so as to provide a scientific and technical...

Design and Implementation of Fresh Food Micro Marketing Model -- A Case Study of WeChat Toon

Ruonan Sun, Xinlei Jin, Na Zhang, Juanjuan Shan, Jian Xu
With the development of mobile Internet and the increase of the Wechat users, using Wechat and other new media technology in the marketing of agricultural products has become an important form of marketing. However, fresh food with a short shelf life, difficult logistics and other characteristics, the...

Investigation on the Dominant Key to Achieve Superior Ge Surface Passivation by GeOx Based on the Ozone Oxidation

Jie Zhang, Shuhua Wei, Jing Zhang, Xiaolei Wang, Wenwu Wang
The dominant key to achieve superior Ge surface passivation by GeOx interfacial layer is investigated based on ozone oxidation. The interface state density (Dit) measured from low temperature conduction method is found to decrease with increasing the GeOx thickness (0.26-1.06 nm). The X-ray photoelectron...

The Idea of Effectively Building the Next Generation of Information Security Protection System

Ying Wu
Under the condition of the global situation of network security is becoming increasingly serious, the Chinese enterprise security defense level there is still a large gap compared with abroad. We put too much focus on the external attacks and threats, but ignored the enterprise information security have...

Superluminal Transmission of the Information and Its Applications in Communications and Computer

Zi-hua Zhang, Hua-an Zhang
We have proved the superluminal transmission of information is certainly possible in the theory and computer simulation, Meanwhile this paper discussed the contradiction between Special Relativity and superluminal phenomena from three aspects: 1, epistemology; 2, the defects of SR and 3, the special...

Design and Implementation of Photo Printing System Using WeChat and Electronic Payment

Zhixin Zhang, Xiangdong You
A real-time photo printing system is an innovative "Internet Plus" project, which is different from the traditional photo film industry. Users only need to speed a short period of time to complete the photo printing. At the same time, with the help of electronic payment, such as WeChat payment, Beijing...

Design and Research of Intelligent Greenhouse Monitoring System Based on Internet of Things

Fujuan Li, Shihua Li, Zhisong Wang, Zhongfei Chen, Xinyuan Zhao
Since the greenhouse has characters of temperature-humidity uneven distribution, strong coupling and traditional control strategy can't achieve the ideal control effect, the greenhouse monitoring system based on internet of things (IOT) is designed. The system uses a fuzzy neural network which has good...

Improvement of Single-pulse Angle Measurement and Tracking Performance Based on Real-time Calibration System for Amplitude and Phase

Zhonghua Zhang, Huidong Qiao, Manxi Wang
The radar using Single-pulse system is widely used in the field of electronic reconnaissance system for its superiority in angle measurement and tracking. But the system's angle measurement and tracking performance are affected by the angle error which is resulted by the inconsistency of the characteristics...

Mining Rare Sequential Patterns in Large Transaction Databases

Weimin Ouyang
Sequential pattern is an important research topic in data mining and knowledge discovery. During the discovery of sequential patterns, only the frequent sequences are considered while all the infrequent sequences are ignored. However, some infrequent patterns can provide very useful insight view into...

A Novel Algorithm for Detecting Spatial-Temporal Trajectory Outlier

Shenglan Lv, Yifan Zhang, Genlin Ji, Bin Zhao
As an important area of spatial-temporal data mining, trajectory outlier detection has already attracted broad attention in recent years. In this paper, we present a novel distance measurement between spatial-temporal sub-trajectories and propose algorithm STOD for detecting outliers in both spatial...

Research of Electrical Equipment State Identification Based on K-means Clustering Algorithm

Liting Lei, Hui Xu, Rongrong Fan
For the current heavy manual monitoring work and frequent failure of electrical equipment, an online monitoring scheme for equipment state based on current sensor, WIFI communication module and embedded development board is designed. K-means clustering algorithm is used to analyze the current data set...

Research on Phishing AP Attack Detection Technology Based on RSSI

Jie Ling, Shuangqi Jin
Wi-Fi wireless technology obtained rapid development because of its flexibility, mobility and easy scalability characteristics. But the network identifier (SSID,BSSID) is easy to be forged, the attacker is easy to forge AP that a common user can't identify it, and conduct other attacks, then get the...

Design of High Efficiency X - ray Detector

Bo Yang
This paper presents a fast time response, high efficiency miniaturized X ray detector design. Mainly includes the front readout circuit and signal processing circuit, is composed of plastic scintillator, photomultiplier tubes, high-performance pre-charge amplifier circuit..For x-ray detector at the field...

OCControl: A Novel Congestion Protocol for Oceanic Delay Tolerant Networks

Bingxin Li, Xudong Zhang
Because of oceanic surface's complex environments, such as varied weather conditions, and its easy reflection and refraction of wireless signals, Oceanic Wireless Communication Networks (OWCN) suffer low link quality and intermittent connectivity, which in turn disable the stability of end-to-end communication...

Research on CAD Key Technology for Crystal Lamps with Body Shape Distribution

Yanxia Liang, Guangguang Dong
With colorful and changing light effect, crystal lamp has become the first choice for the indoor lighting facilities. Crystal lamps have many identical or similar elements in structure, so using CAD technology can assist the designers for the design and modeling of crystal lamps rapidly. In this paper,...

How to Test Location-based Mobile Apps

Jing Cheng, Yi-an Zhu, Tao Zhang, Jerry Gao, Tao Wang
Location-based services are growing in popularity due to the ubiquity of smartphone users. The availability and validity of location-based services are often effected by mobile user location contexts, which make mobile location-based services testing becomes one urgent and challenging issue. In this...

Towards Ontology-Based Battlefield Information Fusion Framework for Decision Support

Xiaoli Li, Weihua Li, Youmiao Qu
Thorough awareness of battlefield situation is vital for combat while battlefield information is constantly changing and distributed. The commanders are faced with more complicated and dynamic situations to make decisions than ever before. Ontology technology has received increasing interest in computer...

A Trusted Recommendation Method Based on Social Circles

Chengjian Su, Genlang Chen, Guanghui Song
The crisis of confidence has become increasingly rigorous, especially in recommendation domain. Deception and malicious attacks are found among the traditional collaborative filtering recommendation systems. Taking into account the credibility, the behaviour-based trust relationship, and the social circle-based...

Petri Net-based Modeling and VHDL Implementation of Digital Systems

Jun Wan
Petri net-based digital systems modeling and hardware implementation method is well-studied. However, the existing methods are mainly applied to synchronous circuits. In this paper, a new approach is proposed for the modeling and VHDL implementation of digital systems based on an extended class of Petri...

An Outline of Big Data Emerging from Food Supply Chain and Potential Value in Food Management

Shuangyang Li, Feng Tan, Jiaqi Liu, Shaoyuan Cheng, Haoming Liu, Wally Keith, Xiang Dong
Big data is a data group with a huge amount of data that cannot be easily captured, managed and processed in a certain time. The paper concerns the development of big data in food industry, introduces overview of big data, discusses three big data mining technologies, and outlines its potential value...

Research on the Efficiency of Minesweeping Operation for Multi-Magnetic Minesweeping Gear

Xinqin Chen, Wei Zhang, Longteng Li, Yu Ge, Chang Shu, Xianyu Meng, Chengwen Zhu
The multi-magnet minesweeping gear can eliminate new smart mines because the magnetic field of it can simulate the characteristic of target ship more closely. But at the same time, the magnetic field of different regions will strengthen or weaken due to the superposition of the magnetic field in the...

Two Schemes Of Finger Vein Cryptosystem

Gesi Meng, Peiyu Fang
Biometric Authentication Technology is an important means to guarantee information security. As one of the most important technology of authentication, finger vein recognition attracts our attention because of its high security, reliable accuracy and excellent performance. However, in the current system,...

The Application of Sparse Partial Least Squares Regression in Electricity Consumption of Yunnan Province

Shuting Peng, Lin Dai, Tingting Guo
It's extremely important to screen key variables from high-dimesional electricity data that contains many predic- tors and presents multi-collinearity. In this paper, sparse partial least-squares regression(SPLS) is employed to investigate the electricity consumption from Yunnan province of China. SPLS...

A Method of Subject Extension Pitch Extraction for Humming and Singing Signals

Jinghui Zhang, Shen Yang, Huahua Wu
Pitch extraction is a key task of ahumming query system.The purpose of this paper isto find a method to extract pitch accuratelyfortwo input modes, humming and singing.According to the characteristics of Chinese pronunciation, this paper presentsa new method, namely the Pitch Extraction of Subject Extension.According...

FDLDA: An Fast Direct LDA Algorithm For Face Recognition

Zhibo Guo, Kejun Lin, Yunyang Yan
Feature extraction is one of the hot topics in face recognition. However, many face extraction methods will suffer from the "small sample size" problem, such as Linear Discriminant Analysis (LDA). Direct Linear Discriminant Analysis (DLDA) is an effective method to address this problem. But conventional...

A Scribble-Based Interface for Mesh Segmentation

Fuyan Yang
This paper presents a method for three-dimensional mesh surface models segmentation that combines interactive part selection with region growth. First, some mesh vertices are selected as object and background seeds using scribble-based selection methods, and the others are unknown region. Then, the mesh...

A Static Comprehensive Analytical Method for Buffer Overflow Vulnerability Detection

Bilin Shao, Jiafen Yan, Genqing Bian, Yu Zhao, Dan Song
Buffer overflow vulnerability is a widespread and dangerous security problem. Detecting buffer overflow vulnerability has great research value in information security area. This paper proposesa static comprehensive analyticalmethod for buffer overflow vulnerability detection. Firstly, this methodadoptsmany...

The Big Data Analysis of Two-degree Contacts on Hadoop

Hao Wu, Xiongfei Li
The social network has undergone a rapid development along of the popularity of the Internet. In face of the huge social data increasingly, the common processing methods or algorithm is difficult to deal with it. With its technology maturing gradually, Hadoop has been popularized and used to the different...

Research on RoboCup Passing Ball Based on Partial Least Square

Yuan Song, Zekai Cheng
Passing ball action runs through the RoboCup simulation games, both teams spare no effort to win the game, the paper is going to study the connection between passing ball action and the game deeply. It puts forward to adopt the idea of Data Mining, analyzes games' log files by C language program in order...

Neural Network Front-ends Based Speech Recognition in Reverberant Environments

Zhen Zhang, Peng Li
This paper presents an investigation of reverberant speech recognition using frond-ends based methods. A 2-channel dereverberation method is adopted to achieve robust derever-beration under different reverberant conditions. Also a 2-channel spectral enhancement method is used where the gain of each frequency...

Optimization of SU's Revenue Based on Price Compensation for Collision

Huan Huang, Xuxi Li, Xiuxiu Zhang, Jing Luo, Fengyang Zhang, Gang Xie
In the cognitive radio network, when the primary user doesn't use its licensed spectrum, the secondary user can access the spectrum hole opportunistically to share the spectrum. However, if the secondary user's behaviors cause collisions with the primary user in spectrum band, which may lead to a decline...

A Smoothing Multidimensional Filter Method for Nonlinear Complementarity Problems

Congwei Wu, Jiping Cao, Yahong Zhu
A smoothing multidimensional filter method for solving NCP is proposed, and the solution of the complementarity problems on the framework of the filter-trust-region method is obtained. The new algorithm does not depend on any extra restoration procedure and the results of numerical experiments show its...