Proceedings of the 2015 International Conference on Computer Science and Intelligent Communication

+ Advanced search
121 articles

Implementation of a Mobile Application for Field Data Collection

Gang Qin, Can Chen, Haijing Fu
With the development of information technology, the working style and live style of people change a lot. Intelligent mobile terminals running Android system become popular in recent years. They are portable and powerful. Field data collection is an important job for researchers and personnel of nature...

The Vehicle Speed Detection Algorithm of Virtual Bayonet System

Lixia Xue, Yanli Luo, Qingbin Guo
With the deepening of the "safe city" construction, to introduce a large number of high-definition cameras video data as the foundation, construction of the virtual bayonet system. The system uses image processing technology for real-time monitoring of the movement of vehicles, the use of moving vehicle...

A Weighted APIT Localization Algorithm based on Vector Similarity

Li He, Zhiwei Kang
To reduce incorrect decisions of PIT test (Point-In-Triangulation Test) and localization error of APIT algorithm, a weighted APIT algorithm is proposed based on vector similarity. Firstly, for better distance precision, the estimated distances between nodes computed from RSSI attenuation model are corrected...

An Optimal Algorithm based on the Solution to the Coarse-Grained Arc Consistency Algorithms of the Constraint Satisfaction Problems

Gang Yang, Huifeng Li, Can Cao, Siyuan Chen, Yubo Zhao
Constraint satisfaction problem are widely used in the artificial intelligence field. We study the coarse-grained arc consistency algorithms of the Constraint satisfaction Problems. We find that variables whose degrees or domains are 1 have invalid revises which can be removed in the process. We demonstrate...

Research on Defense Technology of Relay Attacks in RFID Systems

Weiwei Shen, He Xu, Rui Sun, Ruchuan Wang
Relay attack is the most menacing attack that radio frequency identification technology (RFID) systems are facing currently. An attacker could use limited resources to build up this kind of attack with the encryption algorithm which is difficult to detect out. At present, the main methods to resist the...

Research on the Application of Planning Theory in the Material Delivery of EMUs Maintenance

Pu Wang, Li Li
The paper focuses on various planning theories in Operations research. As the warehouses, workstation and marshalling yards are scattered across EMUs maintenance base with a long distance, and materials are not allowed to be stored in the workshops for a long time, under strict maintenance requirements...

An Algorithm on Solving Car Sequencing Problem based on ACO

Yaoyao Bi, Chong Gao, Zhengyu Lu, Yonggang Zhang
Car sequencing problem is a auto-production-scheduling problem that meets certain conditions on the production line of cars.In this paper, we propose an algorithm, ACO-sequencing, on solving car sequencing problem based on ACO which introduces the two kinds of structure of pheromone. By comparing the...

On a Multiple Hilbert’s Type Integral Inequality with Non-homogeneous Kernel

Baoju Sun
By introducing the norm ||x|| and two parameters a, b , a multiple Hilbert’s type integral inequality with a non-homogeneous kernel and a best possible constant factor is given.

A Comparison of Implementations for Aspect-Oriented JavaScript

Wenhao Huang, Chengwan He, Zheng Li
JavaScript is widely used to build web applications. The increasing scale and complexity of JavaScript programs bring much difficulty to the subsequent development and maintenance because of the same functions scatter in the programs. We can use AOP to reduce the difficulty but there are few AOP frameworks...

Design of Distance Education Business for Wireless Broadcasting Networks

Shimin Liu, Lingjun Yang, Sanxing Cao
With the rapid development of Internet,the system of Radio Film and Television has faced a grave challenge,Over The Top(OTT) TV emerges as the times required. So in this paper,a platform of distance education based on Browser/Server is designed.Apache +PHP + MySQL are used in this platform,and Ueditor...

The Study on Dynamic Supply Chain Coordination under the Premise of Risk-neutral

Benhe Gao, Rongzhi Liu, Yanbei Zhao, Pingyuan Liu
In risk-neutral case, we obtain the coordination strategy of a two-stage supply chain in buy-back contract under the disruption of any two factors out of supplier’s production cost, retailer’s marginal cost and retail price. We analyze the relationship between the optimal order quantity after disruption...

CP Decomposition and Its Application in Noise Reduction and Multiple Sources Identification

Xuefeng Liu, Yuping Feng, Ximei Liu, Biao Huang
The CANDECOMP/PARAFAC (Canonical Decomposition / Parallel Factor Analysis, ab. CP) decomposition of a higher-order tensor is a powerful multilinear algebra, thus denoising observed data and identification of multiple sources can both be accomplished by the CP decomposition. In this paper, images are...

Research on Reconstruction Method for Illumination Field based on CMAC Neural Network

Qiansheng Fang, Jun Huang, Zhenya Zhang
In intelligent building applications, the awareness of built environment illumination filed representatively applies in intelligent lighting systems for providing decision and support. In fact, the dynamic analysis of the built environment can assist in the illumination field of security systems at the...

On the Leakage between Arithmetic Components of DES Algorithm

Yijie Ge, Zheng Guo, Zhigang Mao, Junrong Liu, Jiachao Chen
Security of cryptographic embedded devices has become a prevalent concern, especially since the introduction of Differential Power Analysis (DPA) by Paul Kocher et al. In the past years, many efforts have been made to improve the resistance against Side Channel Attack (SCA) of cryptographic devices....

A Broadband Conducted Emission Behavior Modeling Method of Active Devices Based on Vector Fitting Theory

Xi Chen, Yao Chen
This paper present a methodology about building the active device broadband behavior model that can prediction of its conducted emission accurately. The architecture of the model is composed of two sub-models: the Passive Distribution Network (PDN) sub-model and the Internal Source (IS) sub-model. An...

A Nearly Loss-less Compression Technology based on CTP and Partial Sample Points Calibration for OFDM Signal

Yan Li, Baoxian Yu, Dongri Su, Xianhua Dai
Traditional compression algorithms of OFDM signals with a low compression ratio and a low SNR come along with a high error rate, which fail to meet the requirements of OFDM systems. To achieve high compression ratio and low error rate, we propose a new algorithm based on a combination of clipping with...

Text Mining and Its Applications

Shengyu Guo, Buyang Cao
As nowadays data centers are processing more jobs and collecting more data, the system status monitoring and analyzing functionality ensuring the availability, scalability and efficiency becomes more and more important. In order to build an automated status monitoring and alerting system we need to group...

Research on Generation of Fractal Architecture Model Scheme via Iterated Function System (IFS)

Yongsop U, Ying Yu, Dong Han, Jizhou Sun
Able to directly study the internal rule by starting from the complicated phenomenon, fractal theory can describe complicated phenomenon in natural world. Nowadays, in-depth study and exploration are conducted for fractal in almost all domains of science; some architects have paid attention to it in...

Error Correction and Wavelet Neural Network Based Short-term Traffic Flow Prediction

Yulin Pan, Dong Wang, Xiaohong Li, Zhu Xiao
Real-time and accurate short-term traffic flow prediction is an important part of intelligent transportation system research. Wavelet neural network is a preferable method for predicting traffic flow. However, its performance is not satisfactory since it’s easy to fall into local optimum. This paper...

Learning to Recommend with Hidden Factor Models and Social Trust Ensemble

Dan Zhao, Junyi Wang, Andi Gao, Pengfei Yue
As one of the most successful approaches to building recommender systems, CollaborativeFiltering (CF) uses the known preferences of a group of users to make recomm-endations or predictions of the unknown preferences for other users. Themost successful approaches to CF are latent factor models, Latent...

Research on the Influence Law and Suppression Methods of Seismic Wavelet Time-varying Nature on Seismic Data Processing

Peng Zhang, Yongshou Dai, Manman Zhang, Rongrong Wang
To adjust to the development of dynamic prediction of oil and gas reservoir, exploration of subtle reservoir, exploration and development of thin interbeds, processed seismic profiles are required to be of high signal to noise ratio, high resolution and high fidelity. While the time-varying wavelet in...

An Augmented Reality Art Work for Museum

Fei Jiang
This paper surveys the field of augmented reality (AR), in which 3D virtual objects are integrated into a 3D real environment for Museum. It describes the interaction, visualization and entertainment applications that have been explored. This paper describes the characteristics of augmented reality art...

An Optimizational Scheme of Dealing with Massive Small Files based on HDFS

Yongsheng Du
This paper delves the hadoop distributed file system-HDFS, and presents a new file combining, indexing and extracting scheme to alleviate the question that HDFS cannot perform well when facing with massive small files instead of the perfect efficiency of dealing with big files in order, which could reduce...

Research on Differential Power Analysis of HMAC-SM3

Jun Xie, Wei Sun, Dawu Gu, Zheng Guo, Junrong Liu, Sigang Bao, Bo Ma
The HMAC algorithm is widely used to provide authentication and message integrity in digital communications. However, if the HMAC cryptographic algorithm is implemented in cryptographic circuit, it is vulnerable to side-channel attacks. A typical example is that in 2007, McEvoy proposed an attack strategy...

Bayesian Network Structure Learning and Its Applications in Intrusion Detection

Zuhong Feng, Chen Ye, Xiu-juan Gao
In this paper, an algorithm with attribute reduction based on rough set is introduced. The algorithm can effectively reduce the dimension of attributes and accurately determine the network structure using DBNI with the method of distribution in Bayesian network structure learning with incomplete data....

Networking, Safety and Security of Underwater Sensor Networks

Yangze Dong, Gangqiang Zhang, Xudong He, Huakui Wang
In integrated systems for ocean observation, underwater sensing is one of the main tasks. Though there would be various methods to realize the information exchanges, acoustic networking is among the effective ones. Owing to the special application environment, especially the unique communication channel,...

Saliency Region Detection via Local and Global Features

Dan Hu, Yan Wang, Shaohui Qian, Weiyu Yu
Saliency detection plays an important role in many applications such as image segmentation, retrieval, editor and object recognition. Salience detection methods mainly divide into two categories: local contrast method and global contrast method. AC method is one of the typically local contrast methods,...

High Performance Approximate Sort Algorithm Using GPUs

Jun Xiao, Hao Chen, Jianhua Sun
Sorting is a fundamental problem in computer science, and the strict sorting usually means a strict order with ascending or descending. However, some applications in reality don’t require the strict ascending or descending order and the approximate ascending or descending order just meets the requirement....

Research on 3D-Image Reconstruction Based on TEM Inversion Image

Faquan Zhang, Zongmin Li
TEM inversion image is a two-dimensional image, in which stratum structure does not reflect the image of the whole space, so that non-professionals can not accurately determine the exact location and shape of abnormal body. To solve this problem, two-dimensional inversion images are processed by the...

Modeling and Simulation on Desynchronization of Neuronal Networks under Electrostatic Field

Ruiquan Wang, Huaiyang Wang
To explore therapeutic mechanism for Parkinson's disease and other shivering senile diseases, the effect of external electrostatic field on the spiking of single Izhikevich neuron model and synchronized firing of large scale Izhikevich neuronal network were studied with computer simulation. The simulation...

A Novel Framework of Grid Cloud Operating and Comparison Analysis of Its Virtualization Realization

Liang Zhang, Xiaoliang Bi, Shudong Chen
In this paper, we propose a novel overall framework for Grid cloud operation based on cloud computing technologies. Considering the key role of virtualization software, we introduce three kinds of software which are popularly used in virtualization realization of the framework. From the point of view...

A J2EE-based MIS design and implementation of light industry

Yong Pan
Based on J2EE architecture design of the three B/S mode of Light (beer) industry MIS system. Its functional modules include sales management, purchasing management, and quality management. Connect to the database using EJB components, to achieve a distributed concept, to bring high economic efficiency.

A Fair (t,n) Threshold Secret Sharing Scheme

Minhong Xing, Wenmin Li
The cloud service provider offers various storage services for mass data. However, for safety and recovery concern, the provider distributes the components of the data file on different servers. Therefore it is important to design appropriate secret sharing scheme. In this paper, we hide the real secret...

Design of Portable Color Blindness Aid System Based on Camera

Qihua Chen, Dashun Que
Combining with video acquisition, signal processing, single chip microcomputer, wireless communication and other multiple technologies, we design a portable color blindness aid system based on camera. We have completed the overall design of the system and the design of hardware and software. Using MSP430...

Minimal Neuronal Model for the Transmission Path of Acupuncture Signal

Yingmei Qin, Chunxiao Han, Bei Liu, Yanqiu Che
Acupuncture has been proved to be effective for treatment of diseases, but the underlying mechanisms about acupuncture are still unknown. We design the animal experiment and process the data. We focus on the firing patterns evoked by acupuncture and developed Izhikevich neuronal model to characterize...

Detrended Fluctuation Analysis of Acupuncture based on Neural Electrical Signals

Xiaobin Wang, Yanqiu Che, Chunxiao Han, Yingmei Qin
Manual acupuncture (MA) is a traditional Chinese Medicine clinical therapy. Although its effectiveness has been proved by clinical trials over thousands of years, the effect and mechanism of acupuncture on the nervous system is not yet clear.Brain is senior central nervous system, and acupuncture as...

Face Description with Monogenic Ternary Pattern: Application to Face Recognition

He Yan, Pu Wang
This paper presents a new face description operator called monogenic ternary pattern (MTP) based on the theory of monogenic signal analysis and local ternary pattern ,then the histogram of MTP (HMTP) is subsequently and applied to the robust face recognition. HMTP consists of two parts:the first part...

Software Risk Assessment Method based on Fuzzy Neural Network

Hua Wang, Ben Wang, Longyong You, Wentong Zhang
With the development and improvement of technology and the progress of the theory of project management, software risk management plays a more and more important role in modern project management. In order to enhance the accuracy and objectivity of the software risk assessment, we propose a software...

License Plate Location Based on Simplified Pulse Coupled Neural Network and Comprehensive Feature

Guangjun Xie, Xiaoxi Ren
License plate location is the key of the license plate recognition system. In order to accurately to locate the license plate region in the complex environment, this paper puts forward a license plate locating method based on simplified pulse coupled neural network and comprehensive feature. Firstly,...

An incremental evolutionary algorithm suitable for industrial platform for analog circuit design

Yuehan Gao, Jingsong He
The design of analog circuits by evolutionary algorithm is an approach to automatic design of analog circuits. Applying the method of automatic analog circuit evolutionary design in engineering application has practical values. However, it also results in a lot of time-consuming. The purpose of this...

A High-Performance Key-Value Query Solution Based on Hash Dictionary and Trie Tree

Zhijia Yan, Zhonghan Sun, Yidong Zheng, Jiajun Bu, Wei Wang
With the development of Internet, tens of billions query were submitted every day. However, the old response mechanism of query which client submits query to server then server fetches data from database and sends data to client can't meet the requirements any more. We know the time of client to server...

Intelligent Product Design for Baby Weighing Scale

Leijing Zhou, Wei Chen
The weight of infant is quite important for doctors, which is obtained initially to assess infant growth and to determine if the infant is well-nourished. For the parents, they are eager to know how heavy their babies are. In this paper, we propose an intelligent design of baby weighing scale for the...

Improving Electoral Districting through Geographic Information Systems

Mawkae Hor, Yifan Peng
In this paper, we present an approach that can solve the electoral districting problems by integrating the technologies of dynamics programming, computational geometry as well as the geographic information systems. A quantitative measurement to evaluate the shape of the districting results is also presented....

A Sandbox Designed on User-level Virtualization Platform

Jin Xie
Network has been widely applied in all aspects of life with time. Spread of malicious programs and harm thereof are also gradually increased with network. Sandbox provides high isolation environment for operation of suspicious program, thereby detecting malicious code effectively. However, there are...

Multi-Relay Selection Algorithm for Optimizing Symbol Error Rate and Network Lifetime

Zhenchao Wang, Yan Li, Xiaolei Yuan
In order to jointly optimize the performance of symbol error rate (SER) and network lifetime (NL) in cooperative communications, an efficient multi-relay selection algorithm (JOMRS) based on statistics channel gain (SCG) and node residual energy (NRE) is put forward. Firstly, this algorithm obtains the...

Application of Factor Analysis Method in Establishing Exam Result Analysis Model

Hongmei Nie
In order to overcome shortcomings that the other analysis methods are not easy to reduce dimensions, difficult to establish a model, or not easy to analyze underlying factors, the paper presents to use factor analysis method to establish an exam result analysis model. Furthermore, the model can meet...

A Novel Efficient SDN Based Broadcast Scheme

Yanwei Xu, Xiaoyuan Lu, Tairan Zhang
Data centers with millions of physical and virtual end hosts are now the basis for many Internet and cloud computing services. Hence, it is no longer practical to employ the traditional flooding method for the broadcast tasks in such large networks. In order to improve the efficiency of broadcasting...

Evaluation of Investment Risk in Thermal Power Project Based on Risk Matrix

Jianna Zhao, Chunchen Wang
Under the complicated variable international economic environment, investment of thermal power project faces many risks. In order to reduce the risk loss which due to thermal power project investment, the paper uses risk matrix to evaluate factors of investment risk in thermal power project. First, the...

Support Vector Machine Based on Incremental Learning for Malware Detection

Weiwei Zhuang, Lei Xiao, Jianfeng Cui, WeiChuan Zhuang
The training of traditional SVM method requires the solution of quadratic programming, and consumes high memory and has low speed for large data training. Incremental learning is one of the meaningful methods to continuously update the data for learning, which keeps the previous learning results, re...

Environmental Audio Classification Based on Active Learning with SVM

Yan Zhang, Danjv Lv, Ying Lin
In order to solve the classification of environmental audio data under the fewer number of the training examples, this paper combined Support Vector Machines SVM) and Entropy Priority Sampling (EPS), and proposed the SVM_EPS method as the selecting sampling strategies in active learning. And the method...