Proceedings of the 3rd International Conference on Computer Science and Service System

Session: Computer science and technology

131 articles
Proceedings Article

A Scalable Proximity Measure for Link Prediction via Low-rank Matrix Estimation

Liu Ye, Wang Zhisheng, Yin Jian, Pan Yan
Recent years, the link prediction problem in social network and other complex networks become a popular research field. One of the most significant task in link prediction is to design the proximity measure to calculate the similarities of the nodes in the network. The potential structure of the networks...
Proceedings Article

An Improved Patch based Multi-View Stereo (PMVS) Algorithm

Lichun Wang, Ran Chen, Dehui Kong
Multi-view based reconstruction is always focused in computer graphics and many excellent algorithms have been reported these years. According to Middlebury benchmark, PMVS(Patch based Multi-View Stereo) outperforms all the other submitted algorithms [1]. In this paper, we propose an improved PMVS algorithm...
Proceedings Article

Spiral QAM Modulated CO-OFDM System with Increased Tolerance toward Laser Phase Noise

Li Chong, Chen Lin
To mitigate the phase noise, we propose Spiral QAM in CO-OFDM. Simulation results, based on 40-GS/s CO-OFDM systems, show that 16 Spiral QAM can increase the phase noise tolerance, as compared to square 16 QAM.
Proceedings Article

A Second-Order Two-Scale FEM Analysis for Time-Fractional Diffusion Equation with Small Periodic Coefficients

Wang Ziqiang, Cao Junying
In this paper, a second-order two-scale method for time-fractional diffusion equation with rough periodic coefficients is presented by means of construction way. Based on the second-order two-scale asymptotic expansion, the homogenization solution and the cell functions are obtained. The second-order...
Proceedings Article

The Research and Analysis of Association Rules on the Internet of Things

Yanxin Xie, Yongjiang Wang
Temperature, humidity, and light intensity are the important influence indicators of crop production. In order to achieve good economic and social benefits, we could use of modern network technology (3G network, wireless sensor network, mobile network, and local area network), sensing technology, RFID...
Proceedings Article

Research of Global Localization for Humanoid Robot Based on Vision

Qiubo Zhong, Chunya Tong, Yu Wang
Vision perception plays a key role in the research on humanoid robot. A new version of particle filters called coevolution based adaptive particle filters (CEAPF) is proposed for robot localization. Using vision and odometer, a robust perception model extracting from environmental features, which are...
Proceedings Article

The acoustic analysis of voice parameters about thevowels and consonants of Lhasa Tibetan

Liu Zeguo, Chen Xiaoying, Ai Jinyong
this paper’s study focuses on the vowels and consonants of Lhasa Tibetan, with the basic voice parameters, it is found that there is high relevance among the fundamental frequency(F0),open quotient (OQ) and speed quotient (SQ)of the 8 monophthongs which are in the V,CV and VC 3 types. Among the 3 types,...
Proceedings Article

Fast Incremental SVM Learning Algorithm based on Center Convex Vector

Bai DongYing, Han Jun, Zhang Ci
A fast SVM learning algorithm is proposed according to incremental learning and center convex hull operator. It is established on analyzing the relevance of support vector and convex hull from the angle of calculation geometry. The convex hull of current training samples is solved in the first place....
Proceedings Article

An Allocation Method for Resource of IaaS Platform with Energy-saving Consideration in the Data Center

Xia Qingxin, Lan Yuqing, Wang Long, Xiao Limin, Wang Xiang
Reducing energy consumption and maximizing resource efficiency have become two important issues without violating service level agreements(SLAs) on Infrastructure as a Service(IaaS) clouds. For the important issues, using the method of resource classification, this study proposes a resource provisioning...
Proceedings Article

Thin Cloud-fog Cover Removed from Remote Sensing Imagery Based on Stationary Wavelet Transformation

He Hui, Chen Hai
A new method based on stationary wavelet transformation and nonlinear gray-scale transformation was proposed to weaken the thin cloud-fog cover of remote sensing imagery in this paper, which can not only to weak the cover of thin cloud-fog effectively with enhanced image resolution but also to preserve...
Proceedings Article

A Concept of Applying Social Network Analysis in Medical Diagnosis

Sodsee Sunantha, Komkhao Maytiyanin
This paper aims to apply a social network analysis (SNA) to a medical diagnosis issue, which is the Caesarean sections due to Cephalopelvic disproportion (CPD). Firstly, the pregnant women, here is called “Patients”, are connected with each other by a medical examination consideration. The patients are...
Proceedings Article

An Improved LQI- based Link Quality Estimation Mechanism for Wireless Sensor Networks

Chen Wei, Luo Jian
An accurate and efficient link quality estimation method is crucial for the performance of the upper layer routing protocol, flow distribution and topology control algorithms in WSNs (Wireless Sensor Networks). Based on the analysis of the cause for packet loss and bit error, an improved LQI (Link Quality...
Proceedings Article

Gaussian process regression prediction-based dynamic risk negotiation strategy

Hu Jun, Zou Li
In this paper, we use Gaussian process regression to predict the opponent concessions, and introduce the dynamic risk mechanism in Agent negotiation. We can change the risk factor by the utility of opponents and set a threshold in this dynamic risk mechanism. Dynamic risk strategies associated with opponent...
Proceedings Article

The Influence of Railway Bridge Vehicle Vibration on Sand Liquefaction in a Dam Foundation

Ma Donghe, Guo Xuezhong, Li Yanping, Xu Xiaowu, Huang Ruhui, Zhang Fengde
Saturated sandy soil liquefaction of a dam foundation caused by vehicle vibration was studied by using the QUAKE/W finite element software combined with a concrete project example. Two high-speed trains were used to simulate vibration under driving conditions. The results showed that foundation soil...
Proceedings Article

Author-Topic-Sentiment Mixture(ATSM) model for Author's Sentiment Analysis

Yang KeHua, Yang Xiang
In this paper,we propose a probabilistic modeling framework,called Author-Topic-Sentiment Mixture(ATSM) model,which based on Latent Dirichlet Allocation (LDA) to include authorship information and sentiments information.The proposed model can reveal the sentiment-topic and author’s sentiment.Each author...
Proceedings Article

An Analysis of Characters and Structures of Web Pages Based on Regular Expressions

Xu Lei
This paper introduces a method to analyze characters and structures of web pages via regular expressions. From encoding to HMTL elements, characters in Web pages are counted one by one. The effectiveness of this tool is proven in experiments with more than one hundred real-world web pages. All work can...
Proceedings Article

Efficient Spectral-Galerkin Method for eigenvalue problems

Jun Zhang, Xinyue Fan
we provide a priori error estimates for linear elliptic eigenvalue problems based on the spectral-Galerkin method, and also provide an efficient Galerkin method is proposed for solving this problems,with this scheme ,the solution of an eigenvalue problem on a big spectral space is reduced to the solution...
Proceedings Article

Design and Implementation of Cluster Evolution based Mobility Model

Wang Dong, Wang Zhouli, Li Xiaohong, Xiao Zhu
The movement of nodes has a great influence on the performance of protocols in mobile ad hoc networks. Mobility model is used to describe the movement of nodes, react the mobile characteristics really. In real circumstances, mobile devices are usually attached to humans ,so the movement of such devices...
Proceedings Article

Image Reconstruction Using WTA-ICA Model in Contourlet Transform Domain

Shang Li, Sun Zhanli
A new image reconstruction method using the WTA-ICA model in contourlet transform domain is discussed in this paper. WTA-ICA is in fact an sparse ICA algorithm, and is simpler and faster under high dimensional computational requirements. Contourlet transform can offer a flexible multi-resolution and...
Proceedings Article

A similarity algorithm of trees with complicated labels

Jihua Wang, Yiliang Liu
A tree with complicated labels can widely represent objects in the real world. In this paper, the sum of matched pair similarity is used only to measure the similarity of such trees, while omitting inserted nodes and deleted nodes in the maximum mapping conditions of edit operations. The principle of...
Proceedings Article

Frequency Domain Acquisition Method for Dual-System GNSS

Zhang Zhan, Xiong Zhang, Zhang Xiaolin, Su Linlin
In Global Navigation Satellite System (GNSS), acquisition process adjusts the code phases of the incoming signal and the local pseudo-random sequence of the corresponding satellite to less than a code chip offset, and generate the correct local carrier frequency. In BD2/GPS Dual-System GNSS, the code...
Proceedings Article

A Large-capacity Information Hiding Method for HEVC Video

Jiaji Wang, Rangding Wang, Wei Li, Dawen Xu, Meiling Huang
A large-capacity information hiding algorithm for HEVC is proposed. We modify the intra prediction modes in 4x4 luminance blocks to embed secret information. According to the probability distribution of the statistical optimal prediction mode and suboptimal prediction mode, we are establishing a mapping...
Proceedings Article

Oil production prediction with neural network method

Liu Haohan, Zhang Songlin, Li Wei
Many kinds of method can be used to predict oil production, and the neural network method is one of the most basic methods to predict oil production. In this study a modified neural network method is proposed to predict oil production in oil field. A fuzzy cluster analysis is introduced to determine...
Proceedings Article

Oil production predicting with modified BP neural network method

Liu Haohan, Li Wei, Zhang Songlin
Feasibility of oil production predicting results influence the annual planning and long-term field development plan of oil field, so the selection of predicting models plays a core role. In this paper, a common and useful model is introduced, it is,the neural network model. By using this model to predict...
Proceedings Article

Efficient multimodal fusion for person authentication combining three biometric modalities

Wang Fenghua, Zheng Qiumei, Meng Wenjie
Fusion of multiple biometric modalities for person authentication can compensate for the limitations in performance of each individual biometric system. This paper proposed an efficient person authentication method based on multimodal biometric fusion at the matching score level. For score level fusion,...
Proceedings Article

Research on Video Object Extraction Technology

Rencai Gao, Li Zhang
As the application of intelligent video surveillance system is more and more widely, the scale is also expanding with it. People is also more and more getting attention of the video object extraction which is the key technology in the intelligent video surveillance and attracted plenty of experts and...
Proceedings Article

A New Hybrid Model for Video Shot Saliency Extraction

Tao Fang
Video screen shots of images are special, and they are motive compare to other images. To extract saliency maps from video images quickly and accurately is a hard task. This paper is inspired by some excellent works, employing the combination of several ideas to propose a hybrid model for extracting...
Proceedings Article

A Novel Improved TFIDF Algorithm

Yang KeHua, Ye Dan
Feature weighting algorithm has a great effect on the accuracy of text categorization. The classical Term Frequency and Inverse Documentation Frequency algorithm (TFIDF) ignores the semantic relationships between terms in the document set, thus to influence the accuracy of term weight calculation. To...
Proceedings Article

A case of area- and energy-efficient heterogeneous mesh network-on-chip

Jili Yan, Guoming Lai, Xiaola Lin
In this paper, based on observation on performance analysis of mesh network, we proposed a case of area- and energy-efficient heterogeneous mesh network by redistributing and reconfiguring scarce network resources, buffers, links and ports, to enhance network performance. Experimental results show that...
Proceedings Article

An efficient mixed scheduling algorithm for the hybrid task set on heterogeneous multiprocessor

Wang Hui, Xu Cheng, Zeng Lining
In this paper we study the schedulability conditions of multiple types of real-time tasks (periodic real-time tasks, sporadic real-time tasks and aperiodic soft real-time tasks) in a heterogeneous multiprocessing environment. With the practical application of complicated environment, we propose a mixed...
Proceedings Article

Data Mining as a Tool for Information Retrieval in Digital Institutional Repositories

Tonon Leticia, Fusco Elvis
Currently there is a large volume of data stored in informational bases of digital repositories and the problem of finding useful data in information retrieval systems has intensified, making the processes of recovery increasingly sophisticated. This study aims to make use of data mining techniques to...
Proceedings Article

An approach to ensure the trustworthiness of cloud platform using the trusted chain

Wang Guan, Gao Lubaihui
IaaS (Infrastructure as a Service) provides users with "pay" calculation mode in cloud platform. Users can obtain computing or storage resources he needed from suppliers to load related applications and just rent that part of the resources to pay for at the same time. However, users start to lose their...
Proceedings Article

Design of Frequency Response Masking Based Reconfigurable Filter Banks for Software Radio Channelization Using Semidefinite Programming

Wu Chen, Xu Xinzhou, Zhao Li, Zou Cairong
A new reconfigurable filter bank architecture based on frequency response masking (FRM) was recently proposed for software defined radio (SDR) channelization. However, in previous works all the subfilters were designed separately, which makes the solutions suboptimal. In this paper, we propose an improved...
Proceedings Article

A Time Reservation Dynamic Algorithm Based on the Variable Frequency Interval DVFS Technology

Jun Xiao, Cheng Xu, Lining Zeng
embedded systems have been used in various areas of people's lives. However, the contradictions between performance and power consumption of embedded products have become increasingly prominent. DVFS technologies provide the possibility for solving the contradiction between performance and power consumption...
Proceedings Article

Learning Objects Automatic Generation System for Multiple Data Formats

Li Yushun, Li Meng
This paper focuses on object processing digital resources to enhance their reusability and adaptability. Deep into content level of digital resources belonging to different formats, to achieve fine-grained knowledge-based learning objects automated generation, this paper presents a MPLOG framework that...
Proceedings Article

Sequence Dataset Similarity Measure by Aggregated Shared Emerging Sequences

Chen Xiangtao, Wang Jing, Ding Pingjian
Emerging sequences (ESs) represent some strong distinguishing knowledge and are very useful for building powerful classifiers. The shared emerging sequences (SESs) are some emerging sequences shared by two or more datasets, which show great values in dataset similarity measure. As for the application...
Proceedings Article

The analysis on the duration and pitch of Lhasa Tibetan prosodic unit

Ai Jinyong, Chen Xiaoying, Guo Xiaodan
Based on the small speech database of Tibetan single sentences, we get three layers of prosodic structure units by prosodic marking, syllables, prosodic words and prosodic phrases, to study the internal and boundary syllable duration and fundamental frequency data in different prosodic units. The statistical...
Proceedings Article

Adaptive Weight-Based Energy-Efficient Scheduling Algorithm for heterogeneous computing systems

Xu Cheng, Shu Pan, Li Tao, Liu Yan
Energy-saving scheduling algorithm for parallel applications on heterogeneous computing systems has become an important research subject. Considering that the existing energy-efficient scheduling algorithms have strong locality and cannot flexibly adapt to the application performance (makespan /schedule...
Proceedings Article

Research on a Bilateral Filtering Based Image Denoising Algorithm for Nightly Infrared Monitoring Images

Wang Zhong-ce, Xu Wei
Special information search from video images is a field with very utility value. In this paper, we use the bilateral filter to denoise nightly infrared monitoring images for preprocessing step, so that noises are reduced and edges are preserved. Considering that traditional bilateral filters do not balance...
Proceedings Article

Virtual Reality_Digital preservation and display of the national cultural heritage

Li Jianyang, Ruan Sishi
The digitization of the national cultural heritage and relics are actualized through virtual reality technology. Research on the protection and display of digitization of the national cultural heritage lies in the 3D scanning techniques, 3D color model and 3D texture mapping, which explains the operational...
Proceedings Article

Privacy Preserving Mechanism for Multi-sensitive attributes Based on Time sequence

Yang Qiuwei, Li Yingting
Current privacy preserving data publishing techniques mostly concentrate on attributes of a single releasing. Nevertheless , most of the practical application may contain multiple release attributes. Directly applying the existing single release attribute to privacy preserving techniques often leads...
Proceedings Article

Rate Control Algorithm of H.264 on IPP for TETRA

Jian-qing Liu, Shu-juan Hou, Hai Li
To overcome the disadvantages of output stream volatility due to the ignorance of the complexity of different frame types by IPP development platform for H.264 in TETRA, a layered rate control algorithm is proposed. According to the channel conditions and buffer state, the proposed algorithm allocates...
Proceedings Article

A Brief Analysis of Shape Recognition

Zhaoyang Qiao
The shape recognition is an important research problem in the field of computer vision. It has been widely applied in the field of scientific research and engineering technology, such as object recognition, image retrieval based on content, character recognition, and medical diagnosis, etc. This paper...
Proceedings Article

Study on prediction of cement-soil gravity retaining wall security risk based on BP

Cai-hui Li
In order to forecast the security risk of cement-soil gravity wall, an index system whose function is to forecast the security of cement-soil gravity wall is established from four aspects of soil properties, mechanical properties of mixer, materials, error of a pile position and verticality deviation....
Proceedings Article

The design and implementation of the analysis system of data-providing behavior based on data mining

Xiaoguo Wang, Chuan Sun, Dandan Zhang
In this paper, we conduct the analysis of the behavior of data providers in a given period of time, utilizing the theory of data warehouse, data mining, version control and data comparison. We classify data providers via decision tree, then designing and implementing the whole analysis system of data-providing...
Proceedings Article

Feature matching algorithm based on KAZE and fast approximate nearest neighbor search

Cai Ze-Ping, Xiao De-Gui
This paper proposed a feature matching algorithm based on KAZE and fast approximate nearest neighbor search for that SIFT and SURF feature detection algorithm,extracting features by Gaussian pyramid in the linear scale space has the problems of fuzzy boundaries, detail missing, and low feature points...
Proceedings Article

Cryptanalysis of a Shoulder-Surfng Resistant Password Authentication Scheme

Tsaur Maw-Jinn, Lue Chung-Chia
Researchers have been trying to improve authentication for a long time. User still uses textual passwords to authenticate the systems. However, since weak textual passwords are susceptible to the dictionary attack and strong textual passwords are hard to remember. Graphical passwords have been proposed...
Proceedings Article

Research of Trusted Authentication in Wireless Mesh Networks

Peng Zhai, Liping Zhang, Manman Cao, Ke Han
WMNs (Wireless Mesh Networks) are a new wireless broadband network structure based completely on IP technologies and have rapidly become a broadband access measure to offer high capacity, high speed and wide coverage. WMN is such a network that doesn’t need to rely on fixed infrastructure and is operated...
Proceedings Article

Frame-based skip mode decision for distributed video coding

Gang Wang, Gaobo Yang, Leida Li, Yun Song
Distributed video coding (DVC) is a coding paradigm that can shift the computational expensive task from the encoder to the decoder. Though in theory the reverse of encoder and decoder complexity does not cause coding performance degradation compared with traditional hybrid video codecs, the gap between...
Proceedings Article

Study on Complexity Metrics of Business Process

Sun Huan, Hou Hong
The understandability of business process is closely related to its complexity, thus, calculating and controlling the complexity of the business process is becoming important. According to the idea of information flow method proposed by shepperd in the software engineering, we present a method named...
Proceedings Article

CCA secure type-based proxy re-encryption in the adaptive corruption model without random oracle

Yanni Chang, Mingxing He
Type-based proxy re-encryption can solve the fine-grained delegation perfectly, and being more and more important in applications. However, as we know, there is still a problem come up with type-based proxy re-encryption in adaptive corruption model. In this paper, we propose a typed-based proxy re-encryption...
Proceedings Article

INS: A Novel P2P Semantic Search Approach Using Interest Attenuation Policy

Yu Shuangyuan, Ju Zhuoya
Semantic overlay could improve query performance in peer-to-peer (P2P) systems. When peers join or leave frequently, it will lead to network traffic surge, since most semantic search methods maintaining a large number of routing tables. In this paper, we address these problems by proposing Interest Attenuation...
Proceedings Article

A Biterm-based Dirichlet Process Topic Model for Short Texts

Pan Yali, Yin Jian, Liu Shaopeng, Li Jing
Topic models are prevalent in many fields (e.g. context analysis), which are applied to discovering the latent topics. In document modeling, conventional topic models (e.g. latent Dirichlet allocation and its variants) do well for normal documents. However, the severe data sparsity problem makes the...
Proceedings Article

3D Skeleton Extraction Method using Potential Field on OpenCL

Lu Lu, Wang Xuewen
For 3D skeleton extraction, the algorithm based on generalized potential fields, known as the outstandingly flexible and robust method, is suffering from seriously heavy computational burden. In this paper, we put forward a parallel algorithm based on OpenCL heterogeneous parallel framework, which can...
Proceedings Article

Research on Path Planning for Humanoid Robot based on Ant Colony Algorithm

Xiaoliang Zhang, Qiubo Zhong
In order to solve the complex problems in path planning of humanoid robot, an algorithm model based on ant colony algorithm is proposed. The robot simulation modeling environment is formed by the grid. The idea of the algorithm is simulating the process of ants foraging, and many ants complete optimal...
Proceedings Article

Comparison of two VBM arithmetic based on Alzheimer's Disease MRI analysis

Ke Zhou, Jie Cai, Gangqiang Xiong
Objective In order to study the difference of process and result, both optimized VBM and DARTEL arithmetic were used in the MR images of Alzheimer’s Disease. Materials and Methods Baseline and 3 years longitudinal MCI controls were enrolled in the study. Gray matter differences of the whole brain were...
Proceedings Article

Solving Diffusion Equation Using a New Multiquadric Quasi-interpolation

Cao Junying, Wang Ziqiang
In this paper, a new univariate quasi-interpolation operator is presented by means of construction way with cubic Multiquadric functions. It possesses univariate cubic polynomial reproduction property, quasi convexity-preserving and shape-preserving of order 4 properties, and a higher convergence rate....
Proceedings Article

Zero-IF and Modularization RF Design of Wireless Identification Reader for UHF Passive Tags

Li Linsen, Chen Gongliang, Wu Yue, Li Jianhua
In this paper, a zero-IF and modularization RF design scheme of wireless identification reader for UHF passive tags is presented. The reader works at 860-960MHz, and corresponds to the standard of EPC C1 G2 and ISO/IEC 18000-6C. The realization of some key modules is elaborated. The tests have shown...
Proceedings Article

Research of Network Teaching Platform based on the Technology of Data Mining

Fan Hongjun, Kang Dong
Basing on the basis of the traditional network teaching platform, this paper has made the intelligent optimization for network teaching platform through the data mining technology. Based on the data analysis, data warehouse has been set up among the database. This new network teaching platform can find...
Proceedings Article

Improved TLS-ESPRIT Algorithm Research for Uniform Line Array

Si Yuanlei
It has proved that the improved TLS-ESPRIT algorithm is more accurate than the TLS-ESPRIT algorithm in DOA estimation such as azimuth and elevation estimation at different SNR through experiments. The improved algorithm can show its superiority especially under the condition of the low SNR, its variance...
Proceedings Article

The Feeling-of -knowing and Feeling-of-not-knowing Judgment under Different Levels of Processing and Memory Materials

Sun Yunyi, Chen Xi, Bai Ye, Chen Yiwen
Previous research implicated that feeling-of-knowing (FOK) and feeling-of-not-knowing (FOnK) might be two different cognitive processes. Based on this hypothesis, an experiment was conducted by examining FOK and FOnK judgment under different levels of processing and different kinds of materials. The...
Proceedings Article

A Test Data Compression Method Based on K-L Transform

Cheng Yali, Kuang Jishun
A test data compression method based on K-L transform is presented in this paper. The original test vector is divided into two parts by using K-L transform: the reference vector and the error vector. The reference vector is implemented approximately via Hadamard Matrix that has a simple hardware structure,...
Proceedings Article

An Automatic Network Live Migration Mechanism for Cloud Computing

Chen Min-Xiou, Terng Huai-Hsien
The Cloud Computing is the most popular topic at present that allows creating their services on a virtual network environment. The migration mechanism was proposed to provide services, computing jobs and resources moved from a virtual environment to another virtual environment, and service providers...
Proceedings Article

Optimization and Realization of G.729 Protocol Based on ARM 9 Platform

Wu Chunming, Zhang Bowen, Li Yanxia
In order to simplify the complexity of the algorithm structure of G.729 protocol and make the speech transmitted real-time on the ARM 9 platform, the present paper analyzes the G.729 protocol and designs the hard and software of the ARM 9 platform. Optimization and upgrading of Language C and algorithm...
Proceedings Article

Progress in Machine Learning-based Predicting Subcellular Localizations of Proteins with Multiple Sites

Qiao Shanping
Prediction of protein subcellular localizations is a key step to determinate the functions of proteins. The experimental methods are both expensive and time-consuming. Therefore, many machine learning based computational approaches were proposed in the last two decades. Recently, it is proved that the...
Proceedings Article

Dynamic Analysis of a Suspected Stuxnet Malicious Code

Guangwei Wang, Hong Pan, Mingyu Fan
Stuxnet known as "shock” is a malicious code for Microsoft systems and Siemens industrial systems.It is sweeping the globe.Industrial systems and individual users in many countries and regions are infected. Different from previous malicious code, the code is very complicated, but less relevant analytical...
Proceedings Article

Design and Implementation of the Networked measurement and Control System based on the Internet

Ma Shengqian, Liu Weibing, Li Xiaoyong
Distributed and networked measurement and control system has become a trend. In this paper, we designed and implemented an Internet-based networked measurement and control system. High-speed Ethernet plays the role of the field measurement and control subsystem. In this subsystem, we use the gateway...
Proceedings Article

An improved ADRC and its Application

Guo-dong Zhou, Dun-Li Zhang
Electro-hydraulic servo control system has a typical large delay, nonlinear and time-varying characteristics, which is Controlled effectively by using ADRC. To optimize the parameters of ADRC quickly, the paper presents a new ADRC structure of configurable zero point, and analysis the effect of strong...
Proceedings Article

Application of Concatenated Codes in the IEEE802.11b Channel Coding

Sun Zengyou, Li Huanhuan
According to the problem of the data transmission system of IEEE802.11b in the presence of random noise and burst interference which make the receiver error, we use the channel coding scheme of concatenated codes, RS codes and convolution codes concatenated, as a block code and non-block code concatenated...
Proceedings Article

Delayed projection neural network for solving degenerate quadratic program

Yong Yang, Jing-wen Zhang
A delayed projection neural network model is presented for solving degenerate quadratic programming problem with general linear constraints. By constructing suitable Lyapunov functions, the proposed neural network is proved to be global convergent to the equilibrium points set. Compared with the existing...
Proceedings Article

Principal Orientation and Generalized Vanish Point Based Road Detection

Xu Cheng, Cai Youqi, Tian Zheng, Li Tao, Liu Yan
With the development of road detection related applications, higher performance is required on the accuracy, robustness and time efficiency. Road detection algorithm based on vanishing point estimation has been paid lots attention on for its adaptability when processing complicated situations. However,...
Proceedings Article

An Efficient Method of License Plate Location under Complicated Background

Fengsong Hu, Manman Zhou
License plate location is the key of license plate recognition.In order to locate license plate quickly and accurately under complicated background,this paper presents a new location algorithm.Firstly,we make a set of pretreatment to original image,such as graying,binarization,noise reduction and edge...
Proceedings Article

A Fast Stitching Algorithm for Generating Panorama on Mobile Intelligent Terminal

Bian Guangyu, Zhang Dengkui
This article proposes an improved stitching algorithm based on grayscale to generate panorama. We adopted Moravec operator to extract the feature point and simplified the extraction and image fusion process to downsize the scale of calculation. Meanwhile, with the utilization of noise reduction, exposure...
Proceedings Article

Performance Analysis of Dual-Hop Multi-Relaying with Max-Mini Relay Selection over Composite Fading Channels

Wu Chia-Hao, An John F.
In dual-hop multi-relaying wireless systems, the non-closed form expression in log-normal probability distributions and high varying standard deviations makes it impossible to effectively execute performance analyses of outage probability and bit-error-rate (BER) performance levels; thus, an analysis...
Proceedings Article

A Promotion SAR Raw Data Compressing Algorithm Based on BAQ

Li Sun, Yuedong Zhang, Min Wang, Fufei Gu
BAQ algorithm is widely used in SAR raw data compressing, but SAR raw data does not perfectly submit to normal distribution in some cases. One of situation is fractional saturation of raw data. This paper proposes a promoted BAQ algorithm to compress SAR raw data by changing the quantization algorithm....
Proceedings Article

The Algorithm Analysis and Computer Implementation of Digital Filter

Yuying Liu
As information science,super-large-scale integrated cir- cuit and computer science develop rapidly,digital signal processing (DSP) has become a new and independent discipline since FFT algorithm was put forward in 1965. It permeates almost the all fields of engineering, science and technology. Signal...
Proceedings Article

A New Data Transfer Scheme for eMMC Connected Subsystems

Deng Shulan
One of the issues in data transfer between host CPU and its eMMC connected subsystem is to determine when to send data from host to subsystem and when to receive data from subsystem to host with least CPU interference. The conventional approach to achieving data transfer synchronization is by polling,...
Proceedings Article

Image Preprocessing Methods Used In Meteorological Measurement of the Temperature Testing System

Jiajia Zhang, Ruyi Liang, Yu Liu, Tao Jiang, Xianluo Meng, Chunai Wu
The Meteorological measurement automatic temperature testing system having a defect image. For example: noise problem, contrast is insufficient problem, put forward research programme for image pretreatment, try the median filter, histogram equalization, image binarization methods to remove noise, enhanced...
Proceedings Article

Scrambling Code and Channelisation Code Parallel Generation for WCDMA on Vector Core

Yu Yongguang, You Hongyan
In a Wideband Code Division Multiple Access (WCDMA) environment, each user is assigned a unique complex-valued spreading codes to encode its information-bearing signal. The spreading sequence composed of scrambling codes and channelisation codes spread transmitted symbols and despread received chips....
Proceedings Article

Towards Cloud Computing Security Considerations in Smart Grid

Ma Shouming, Yu Chunlei, Gu Wei
Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or consumer IT services over the Internet. The cloud computing technology is especially suitable for handling series of problems in smart grid. However, the development of cloud computing technology is currently...
Proceedings Article

An Improved Ant Colony Algorithm for Probabilistic QoS Routing

Ding Genhong, Guo Dongwei, Ding Yuchen
The actual dynamic network environment urgently requires us to give full consideration to the non-precision of the network state when we design the QoS routing algorithm. Mainly by substituting the piecewise function for the probability constant which is chosen by ants when a route is selected, changing...
Proceedings Article

Design of IP Traceback System based on Generalized Bloom Filter

Chen Zhouguo, Liu Bo, Pu Shi, Huang Chen
With the rapid development of Internet, network security technology has recently attracted a lot of interest, both from academia and industry. By tracing and locating the source of network intrusion, IP traceback technology help defenders to take targeted defensive measures, counter attackers and collect...
Proceedings Article

Sinusoidal Steady-state Response Research Based on the Time Domain, S Domain and MATLAB Software

Yuying Liu, Zhijian Yin
Circuital sinusoidal steady-state analysis is the important content in such curriculums as Circuital Analysis and Signals and Systems.It is the essential knowledge for college students majoring in electric, signals and procession of signals, communication, etc.Studying the usage of time-domain method...
Proceedings Article

An Effective Strategy of Area Reduction for Custom Instruction Based on Basic Cell

Liu Haiming, Ma Yuchun, Wu Qiang
Area reduction is very important for CI (Custom Instruction) on reconfigurable processor. However, for FPGA (Field Programmable Gate Array) structure, resource sharing method is inefficient for area reduction of data-path. In the paper, we propose an effective strategy of area reduction for custom instruction....
Proceedings Article

Research on Quickly Search in Massive Remote Sensing Images Based on Hbase

Chen Wu, Jicheng Quan, Yuwei Yuan, Yu Liu, Hongwei Wang, Xiuying Zhao, Mingquan Yang
On the basis of analyzing massive remote sensing images storage and HBase, Hilbert Curve was applied in image pyramid model. A solution about quickly search in massive remote sensing images was put forward in this paper. The experiment showed that the solution not only could solve the storage problem...
Proceedings Article

The Analysis of the Location Algorithm for Mobile Targets Based on Mono-Station Passive Infrared Method

Zhang Shi-quan, Yin Shi-min, Zeng Jun
The passive infrared mono-station location algorithm for mobile targets due to stationary platform are investigated. The passive location physical model and related algorithm of mobile target are established. The algorithm in this paper can be effectively applied to the location for both uniformly accelerated...
Proceedings Article

Topological Optimization of Hubs in P2P Network

Yanmei Liu, Huanhuan Cui, Yuda Chen
This paper further studied the hubs in P2P network, and presented a strategy based on hierarchical P2P network by controlling the logical topology structure and through enhanced mechanism to avoid the formation of hubs. It firstly introduced the idea of control model, and the specific implementation...
Proceedings Article

A MAC Protocol Optimization Algorithm in Wireless Sensor Network Based on Real Platform

Zhang Leilei, Luo Jian
For multi-hop wireless sensor networks traffic aggregation mode transmission characteristics, proposed optimization algorithm based on CSMA protocol. Adjust the channel access strategy based on the location of of the nodes in the network, The optimization algorithm improves the equalization channel access...
Proceedings Article

Security in Next-Generation Wireless Sensor Networks

Gao Lijie, Chen Zhigang
Wireless Sensor Networks (WSNs) have been widely used in various applications. Recent advances in micro-electro-mechanical systems (MEMS) technology have enabled the development of WSN. Hardware constraints and application scenarios lead to safety problems become important problem that restrict the development...
Proceedings Article

Independent Component Analysis in development of Chinese Agriculture insurance

Xiaoxia Chen
Independent Component Analysis is a useful method to find some internal keyelement which play an important role in the development. This paper uses ICA to analyze agriculture insurance to try to find the major factorwhich has great impact. We take FastICA as analysis tool and designed parameters. According...
Proceedings Article

Provably Secure ID-Based Signature without Trusted PKG for Smart Grid

Peng Wei, Bai Xia
By using Gap Diffie-Hellman groups, we construct an efficient ID-based signature scheme without trusted PKG for smart grid, which security relies on the hardness of the Computational Diffie-Hellman Problem (CDHP). In this scheme, PKG is prevented from forging a legal user’s signature because it only...
Proceedings Article

A Two-Dimensional Cellular Automata Based Method for Multiple Image

Ping Ping, Wang Zhi-jian, Xu Feng
This paper presents a novel CA-based multiple image encryption by using a kind of two-dimensional (2-D) reversible CA, and by using a circular chaining mode of operation. The proposed method allows images to be processed in a 2-D way and makes the statistical information of each plain image in the group...
Proceedings Article

Extracting Historical Information and Fault Localization Information that may Contribute to the Effectiveness of Test Case Prioritization

Lin Chu-Ti, Guo Sin-Ting, Wang Jiun-Shiang, Tsai Chang-Shi
The goal of test case prioritization is to schedule the test cases in an order so that the faults in the software will be detected early during the regression testing. So far, a lot of test case prioritization techniques have been proposed and received considerable attention. However, there is currently...
Proceedings Article

Automatic MR Brain Tumor Image Segmentation

Lu Yisu, Chen Wufan
Traditional Dirichlet process mixture (MDP) models has the characteristic that the image segmentation can be done without initialization of clustering numbers. For the computing speed of the classical MDP segmentation is jogging, a new kind of nonparametric segmentation (DMMDP algorithm) combined with...
Proceedings Article

The Application of Genetic Algorithm in the Optimal Offer of Stochastic Number of Bidders

Chen Guodong
Competitive bidding is widely used in international equipment procurements and construction projects for the moment. With the development of market economy in our country, competitive bidding is introduced in various industries, especially popular in the large-scale construction projects and government...
Proceedings Article

Weight Calculation And Purity Identification Of Symplectic Self-orthogonal Codes

Kai Cao, Luobin Guo, Chaoyang Li, Yuxiang Zheng, Leinan He, Zhenpeng Zhao
The purity identification of quantum error-correcting codes and symplectic self-orthogonal is a pivotal problem in quantum code theory. This work is dedicated to some issues of symplectic codes. First, by the MacWillams identity, a fast algorithm to determine the weight polynomial of high-dimension symplectic...
Proceedings Article

User-credibility Based Service Reputation Management for Service Selection

Jiuxin Cao, Yi Dong, Yi Qin, Bo Liu, Fang Dong, Tao Zhou
In composite services, the atomic service reputation is becoming important when many similar functional services could be provided for selecting under the heterogeneous and loose- coupled circumstance . However, existing reputation measurement methods pay little attention on user credibility which has...
Proceedings Article

Realization of High-Performance Confidential Data Transmission Based on FPGA

Fan Yu, Peipei Yang
This paper uses advanced encryption standard, AES, to implement encryption algorithm and FPGA devices to achieve hardware encryption. AES commonly used to provide several security services such as data confidentiality. However, it is a challenge to design efficient hardware architectures with small hardware...
Proceedings Article

A Framework for Providing Dynamic Context-Aware User Interface of the Secondary Devices using the SmartTV in Home Network Environment

Moon Jaewon, Lim Tae-Beom, Park Sungju, Kum Seungwoo, Kim Kyungwon, Park Jongbin, Yoon Myunghyun, Shin Dong-Hee
The growing number of smart devices having different capabilities, service providers want to provide a nicer user interface and experience to individual users with considering device status and other environments. And a second device also allows user to interact with the contents he/she is consuming....
Proceedings Article

The Information System Security Situational Awareness Based On Cloud Computing

Zhicheng Ma, Lin Jin, Peng Yang
With the increasing amount of data in the information network, various network threats are growing. Designing efficient and reliable security situational awareness methods becomes one of the main tasks of information security. By using the Apriori algorithm based on MapReduce in the cloud computing environment...
Proceedings Article

A Fast Mode Decision Algorithm for Intra Prediction in HEVC

Wei Li, Rangding Wang, Jiaji Wang, Dawen Xu, Jian Xu
To reduce the intra encoding complexity of HEVC, a fast intra prediction mode decision algorithm is proposed in this paper. According to different size of prediction unit, based on statistical data, the algorithm uses threshold method to exclude the intra prediction modes of small possibility, then reduce...
Proceedings Article

Improved Grouping Genetic Algorithm for the Pickup and Delivery Problem with Time Windows

Ding Genhong, Mao Juncheng, Ding Yuchen
The Pickup and Delivery Problem with Time Windows (PDPTW) is an NP-hard problem. This paper studies the Grouping Genetic Algorithm for solving the PDPTW. The insertion heuristic algorithm which can generate feasible solutions was improved by adding a certain taboo mechanism, and then five adjustment...
Proceedings Article

Secure Communication Scheme for Color Image Based on Index Technology

Peng Jingyu, Ren Yong
A secure communication scheme for true color image was proposed. It is aimed at the hiding problem of a huge amount of true-color image data in the covert communication and maintaining the good visual quality of carrier image. Secure communication is achieved by combining encryption and hiding. Encryption...
Proceedings Article

Spectral Clustering Based on Multi-scale Stochastic Tree Image Segmentation Algorithm

Chen Yuantao, Zuo Jingwen
For spectral clustering is applied to image segmentation is difficult to calculate the spectral weight matrix of the actual problem, we have defined the pixel distance between the point and the class is given a sampling theorem, the design of a hierarchical image segmentation algorithm in the use of...
Proceedings Article

An Improved Monte Carlo Ray Tracing for Large-Scale Rendering in Hadoop

Li Rui, Zheng Yue
To improve the performance of large-scale rendering, it requires not only a good view of data structure, but also less disk and network access, especially for achieving the realistic visual effects. This paper presents an optimization method of global illumination rendering for large datasets. We improved...
Proceedings Article

An Estimation Algorithm of Carrier Frequency Offset Based on Signal Reconstruction in Cooperative OFDM System

Bao Jingjing, Liu Yuan
In cooperative OFDM system, because of the OFDM technology, cooperative communication system is very sensitive to carrier frequency offset, a tiny carrier frequency offset will cause the inter-carrier interference. An estimation algorithm of carrier frequency offset based on signal reconstruction is...
Proceedings Article

Application of Association Rules Data Mining in the Determination the Operation Target Values in the Thermal Power Plant

Xiang Wan, Niansu Hu, Min Huo
As the parameters from the thermal power plant DCS (Distributed Control System) data have closely relationships, the association rules data mining is tried to be applied in the determination the optimization values in the thermal power plant. A model is built by the mining tools Clementine 12.0 based...
Proceedings Article

Airy pulses interactions with solitons

Wu Hao, Fu Xiquan
We investigate and analyze finite energy Airy pulses interactions with temporal solitons in nonlinear fiber at the same center wavelength, via split step Fourier numerical simulation. The results show that the Airy main lobe is partly trapped by temporal solitons, and the trapped pulse that can present...
Proceedings Article

A Computer Aided Case Tool for Temporal Knowledge Visualization

Wang Yue, Ma Jixin
The Internet has become a very important information source. Take Twitter for example: the tweets people post various kinds of data on the internet, usually with rich temporal and spatial aspects such as valid time, transaction time, location, and so on. In this paper we introduce a computer aided case...
Proceedings Article

Optimization Service Migration Scheme for Load Balance in Cloud Computing

Yingchi Mao, Jiulong Wang, Lili Zhu, Qing Jie
Large-scale development of Web services and cloud computing bring enterprises and users new experience. In the traditional service system architecture, large-scale number of service access and execution make some of the nodes overload and seriously affect the quality of services. Therefore, it becomes...
Proceedings Article

A Novel Lightweight Authentication Protocol for YML Framework

Lv Xin, Chen Hao, Xu Feng, Mao Yingchi
YML framework is a well-adapted advanced tool to support designing and executing portable parallel applications over large scale peer to peer and grid middleware. It is necessary to introduce some security mechanisms for the improvement and extension of the framework. To secure the authentication process,...
Proceedings Article

PSDRA: Priority selection delivery routing algorithm in opportunity network

Wu Jia, Chen Zhi-gang
The randomness of the opportunistic network and the disconnection of transmission area results in many difficulties in information transmission. In this paper, a new routing algorithm is called priority selection delivery routing algorithm (PSDRA). It has been designed through selecting the optimal node...
Proceedings Article

Identification of Different Patterns of MP3 and Duration Calculation

Li Yaqi, Cao Yizhen
With the development of technology and internet, mp3 has become a recognized music data format due to the advantages of its convenience. At present, the developers use some methods to analyze header and calculate the duration of mp3 with different header format. However some of the calculated durations...
Proceedings Article

Limiting Privacy Breaches in Differential Privacy

Ouyang Jia, Yin Jian, Liu Shaopeng
In recently years, privacy-preserving data mining has become more import and attractedmore attention from data mining community. Among the existing privacy preserving models, -differential privacy provides the strongest privacy guarantees and has no assumption about the adversary’s background information...
Proceedings Article

Improved PSO Algorithm and its Application in Function Optimization

Dun-Li Zhang, Guo-dong Zhou
To solve the problem in function optimization using Particle Swarm Optimization algorithm (PSO), this paper propose an improved PSO algorithm adopting gradient information. There are some merits such as simplicity, high effectiveness and so on about function optimization using PSO algorithm. But some...
Proceedings Article

Mobile Data Exchange Model for Large-scale Campus Network based on EXI

Chunyan Yu, Huibin Wang, Shenghui Zhao
In large-scale campus network, large amounts of mobile data exchange frequently. Transmission time and energy are consumed too much when smart mobile devices accessing the XML-based Web services. In this paper, a data exchange model is proposed which is based on EXI (Efficient XML Interchange) standard....
Proceedings Article

A New Method to Detect Primary User Emulation Attacks in Cognitive Radio Networks

Peng Kai, Zeng Fanzi, Zeng Qingguang
Cognitive radio (CR) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. However, the security aspects of cognitive radio networks have garnered little attention. In this paper, we identify a threat to cognitive radio networks, which we call the...
Proceedings Article

Sequence Join

Xiaomei Song, Xiaojun Ye, Xiaoqing Zeng, Dong Xie
This article put forward a new join technology for tables of relational database, named sequence join.Sequence join make a tuplematch other one tuple according to the disk address. The technology of the specific method can help solve these problems: the number of columns in arelational table is too large...
Proceedings Article

The Impact of Topological Characteristics on Ad Hoc Networks based on Complex Network

Wang Dong, Li Xianyu
Topological characteristics is the foundation for optimizing topology structure and designing protocols. In this work, we study broadly the topological characteristics of Ad hoc networks through the perspective of complex network and identify the small-world effect, scale-free property, clustering property...
Proceedings Article

Spectrum allocation algorithm under the novel channel handover constraint in cognitive radio network

Chen Kuangyu, Zeng Fanzi, Zeng Qingguang
Dynamic spectrum (channel) allocation in cognitive radio network is the effective measure to solve the low utility of spectrum resource. Spectrum (channel) handover will degrade network performance and cause large amounts of energy consumption. This paper proposes a novel spectrum allocation algorithm...
Proceedings Article

A Robust Image Retireval Algorithm Based on Interest points

Gao Wenwen, Sun Yanhong
The global features can not capture all parts of the image having different characteristics and can not contain the spatial features. so in this work we present a novel approach which extracts the local color and texture features based on interest points and utilizes the local information of the interest...
Proceedings Article

EPKM:An Efficient and Practical Key Management Scheme for Hierarchical Wireless Sensor Networks

Wei Yang, Yue Qi, Xinqiang Luo, Qin Wang
Wirless sensor networks are becoming increasingly attactiv for military,wildlife monitoring and other applications. Usually the sensor nodes are deployed in a dangerous and untrusted area.Therefore,network security becomes very important.Key management is the core areas of the security. In this paper,we...
Proceedings Article

Improved Technique of PAPR Reduction Combined Pre-distortion in OFDM Systems

Luo Zhinian, Shi Jian
Orthogonal Frequency Division Multiplexing (OFDM) is an effective parallel multi-carrier transmission scheme. However, this technique has one weakness of a higher transmission signal Peak to Average Power Ratio (PAPR) when the signal is transmitted. To reduce the impact of High Power Amplifier (HPA)...
Proceedings Article

A Novel Protein Complex Identification Algorithm Based on the Integration of Local Network Topology and Gene Ontology

Luo Jiawei, Wang Xiaoping
The identification of protein complexes is an essential step to understand the principles of cellular organization and biochemical phenomena. A large dataset of experimentally detected protein-protein interactions (PPI) has been determined using high-throughput experimental techniques. However, these...
Proceedings Article

Vehicle service middleware based on OSGi

Luo Juan, Wu Feng, Alkubati Fahmi Ameen Abdo
Embedded system for the automotive electronics becomes increasingly powerful, whereas the system structure becomes more complex. There is a high coupling between hardware and software which makes it hard to develop applications. To solve this problem, we proposed a middleware based on OSGi, namely OSGiIV....
Proceedings Article

An Alternative Algorithm For Forward Resource Scheduling in CDMA2000-1X EVDO Network

Zou Tiegang, Du Wenpeng
G-fair algorithm is popularly used for forward resource scheduling in CDMA2000-1X EVDO network. It is generally acknowledged that G-fair algorithm takes into account both maximum system throughput and fairness. However, according to the result of simulation and test in actual network, when G-fair algorithm...
Proceedings Article

Combination of Color and Significant Edge Features in Image Retrieval

Chen Liu, Zhou Wei
Content Based Image Retrieval (CBIR) has been stirred in last decades since the dramatic rise in the sizes of images databases. In this paper, a CBIR system is proposed combining features of color and significant edge. To promote the whole performance, compact quantizing method in HSV color space and...
Proceedings Article

A Grid-based Unequal Clustering Algorithm for the Multi-hop Routing in WSN

Xu Ying, Zheng Xiongfei, Li Renfa
Wireless sensor network consists of energy-constrained sensor nodes that are densely distributed in a monitoring area. Therefore, how to effectively use the energy of nodes to prolong the network lifetime becomes a key research topic. A grid-based unequal clustering algorithm for the multi-hop routing...
Proceedings Article

Salient Region Detection based on Frequency-tuning and Region Contrast

Li-hua Fu, Liang Guo, Wei-dong Wu
Frequency-tuned saliency detection analyzes image saliency from the perspective of frequency domain and fully combines image segmentation method, which outputs well-defined boundaries of salient objects. However, the method ignores spatial relationships across image parts. This paper proposes an improved...
Proceedings Article

A scheme supporting efficient attribute revocation for cloud storage based on CPABE

Cai Bodong, Xiong LiaoTe, Ye Junyan, Ma Meng, Tang Zhuo
For low efficient of key management, most cloud centers lack fine-grained attribute revocation, which only support revocation of the keys. This paper proposes a novel access policy which supporting fine-grained attributes revocation based on CP-ABE. In this paper, we firstly re-design the key manage...
Proceedings Article

Disambiguating named entities by semantic web

Azari Ideh, Koohpeyma Fateme
There are many words in natural language sentences which describe an object or event in real world. An important step to understand a sentence is finding the exact meaning of all words. In this paper we propose an approach to identify meaning of each named entity of a text by using web of data (LOD)...