Proceedings of the 2nd Annual International Conference on Electronics, Electrical Engineering and Information Science (EEEIS 2016)

+ Advanced search
127 articles
Proceedings Article

Neural network based robust tracking control for nonholonomic mobile robotic system

Ying-Nan Bian, Jin-Zhu Peng
A hybrid tracking control scheme which combines RBF neural network with nonlinear method is proposed. RBF neural network is designed to approximate the system uncertainty terms, and control is utilized to achieve a desired robust tracking performance. Based on Lyapunov theory, the tracking errors of...
Proceedings Article

Research on data control mechanism in the honeyfarm environment

Jian Li, Jing-Feng Xue, Chun Shan
There is always the potential of malware or attackers using a honeyfarm to infect or attack non-honeyfarm systems. Thus, each organization must implement data control of a compromised honeypot to minimize the risk. We have proposed a data control mechanism that exploits honeyfarm gateway, intrusion detection...
Proceedings Article

Identity-based signature scheme based on quintic residues

Xue-Dong Dong, Yuan Gao
We propose a new method to compute a quintic root of a quintic residue. Then we give a new identity-based signature scheme by the method. The scheme is secure against existential forgery on the adaptive chosen message and identity attacks assuming the hardness of factoring. The scheme is the first identity-based...
Proceedings Article

HKSD for deformation measurement of nonrigid biological tissues from MR images

Jia Chen, Ru-Han He, Xu-Bing Zhang, Jun Bai
Due to the nonlinear deformation of nonrigid and nonuniform tissues, it is challenging to accurately measure the displacements of feature points distributed on the inner parts, boundaries, and separatrices of tissue layers. To address this challenge, we propose a feature point matching technique called...
Proceedings Article

A survey of the past, present and future of echo state networks

Guan-Fang Wu, Hong-Yan Cui
Along with the development of Machine Learning, statistic and Artificial Intelligence, people are exposed to myriad of big data. Meanwhile, accurate data analysis is difficult. Echo state network (ESN) algorithms are widely researched and applied in many fields. Owing to their potential for exact prediction...
Proceedings Article

The application of big data-driven prognostic and health management on complex equipment based on internet of things

Guo-Shun Chen, Gang Niu
A novel big data-driven Prognostic and Health Management (PHM) method of Unmanned Air Vehicles (UAV) based on IoT was proposed. The method innovatively using big data of IoT analysis with health states to build the reference indicator, through probability-based techniques, and produced a degradation...
Proceedings Article

An improved multi-value cellular automata model for mixed bicycle traffic flow on campus

Bi-Xiang Li, Lan Fang
This paper analyzes the defaults of traffic model applying in campus road in China, such as lacking simulation of vehicles, pedestrians and bicycles under mixed traffic flow. An improved multi-value cellular automata model is proposed for revealing complex traffic phenomena for pedestrian-bicycles and...
Proceedings Article

Research on modeling and extraction of a dominant business process fragment

Wei Tan, Xuan Liu
With the rise of the Internet plus, companies have embarked Internet plus road. To implement business process resource sharing is one of the main ways for enterprises to achieve Internet plus. Due to the participation of many enterprises, the business process resources on the Internet are massive. It...
Proceedings Article

F-Codes

Chun-Hua Cao, Feng-Xia Zhang, Di Yang, Qiu-Jun Liao
By adding special conditions, Jean Berstel in 2012 proposed some new codes, for example: F- prefix codes, F- maximal prefix codes, F-maximal codes etc.. In this paper, we discuss the properties of F-completeness, F- denseness of those codes. At first, we present some sufficient and necessary conditions...
Proceedings Article

Dynamics modeling and nonlinear observer design for vehicle rollover avoidance

Chang-Fang Chen, Ming-Lei Shu, Ming Yang, Nuo Wei
A real-time accurate detecting the risk of an impending vehicle rollover is essential for active rollover avoidance systems. To this end, a 4DOF nonlinear vehicle roll dynamics model is developed, which fully exploit the coupling effects between the yaw dynamics, lateral dynamics, and roll dynamics....
Proceedings Article

OPC UA summary

Zhi-Ning Wang, Yi-Yang Liu, Feng Gao, Meng Tang, Yun Shi, Xiao-Ming Zhou
This paper illustrates the OPC technology's shortcomings of the platform portability, remote data access and security aspects of industrial automatic production. For the limitations of the OPC on these aspects, the OPC Foundation presented the improved concept of OPC UA. This paper described the OPC...
Proceedings Article

Design of remote monitor software based on C# and XML

Gao-Feng Pan, Sheng Liang, Si-Fang Liu, Yong Xie
The monitoring terminal is an important part, which is interactive with users in TT&C equipment remote monitoring system, but it has some problems such as more work patterns, data process, and data display, etc. The work patterns and state parameter is designed by XML file, and data in XML file is used...
Proceedings Article

The intrusion detection algorithm using statistic technology

Ming Gu
The intrusion detection algorithm calculates the deviation distance using Chi-square test statistic. The amount of calculation can be greatly reduced. Sample data coming from operating system LINUX and Windows8 was presented and compared. The results of this study show that the algorithm achieves the...
Proceedings Article

Computer technology to imitate traditional tie-dye patterns

Xiao-Sha Yin, Jian-Ming Wang
Because of its long tradition of printing and dyeing technology cycle, complicated production process, and the pollution of the environment, energy consumption in the future development of the ecological environment has hazards. By using Ultra Fractal to simulate fractal tie-dye pattern, reproduce the...
Proceedings Article

The application of movable water saturation from the calculation of neural network method

Wei Xiong, Jia-Feng Wu, Shu-Sheng Gao, Li-You Ye, Fei-Fei Gou
Movable water saturation can accurately evaluate the formation of gas and water layer. It is an important parameter to guide the development of tight gas reservoirs. Engineering often used single factor of porosity to estimate saturation of the movable water. And in the formation of strong heterogeneity...
Proceedings Article

Research of digital detection method based on model

Jing Li, Dan-Ya Zhang, Zhen-Yu Li
With the development of digital design and manufacturing technology of aircraf , The large-scale overall structural element amount used unceasing increase, as well as the civil aircraft efficiency and the secure request daily enhancement, also proposed to the product manufacture precision a higher request,...
Proceedings Article

Selection and its criteria of computational domain on numerical simulation of building fires

Yi Lu, Pan Li, Jia-Hao Liu, Qin-Pei Chen, Jian Wang
In the area of numerical simulation of building fires, the computational domain is directly related to the accuracy of the simulation results. This article would be focused on small compartment fires with a single vent opening where heat release rate lied into the transitional region, which is a transformation...
Proceedings Article

Development and achievement of software for cellular growth system

Min Shen
Constant direct current stimulation has facilitation for cellular growth of many histiocytes. This paper primarily introduces systemic, detailed development and achievement of software for this system. The system can accomplish controlling action of peripheral circuitry through computer interface. The...
Proceedings Article

A mechanism of resource co-reservation in cloud computing system based on virtual resource

Jing Li
Resource reservation is an important part of the resource management in Large Distributed System such as cloud computing. An architectural framework for specifying and processing co-reservations in cloud computing environments is presented. Compared to other approaches, the co-reservation framework in...
Proceedings Article

Software fault debugging based on data flow analysis

Xi Guo, Pan Wang, Peng-Fei Wu
Data Flow Analysis is a difficult issue in the domain of fault localization, and many software faults are related to the information of data flow. The dependency between the variants and the define-use chain are discussed in this paper, and trace the impact to the variants in the process of operation....
Proceedings Article

Design and implementation of automatic calibration system in ship docking

Xin-Bing Fang, Si-Fang Liu, Li-Li Xia, Xi-Quan Wang
Calibration is in dock ship-borne equipment to determine the error model and the basic process of establishing unified coordinate system, to be combed through the calibration project, and to be combined with the existing equipment, so automatic calibration system is designed. The automation to be realized...
Proceedings Article

Design and realization of wireless remote calibration system of ship-craft

Gao-Feng Pan, Si-Fang Liu, Cheng-Bin Zhou, Sheng Liang
To improve the orbit determination precision of the TT&C equipment, the equipment parameters need to calibrate accurately using the calibration tower during the dock calibration. Through comparing the remote control mode and analyzing the control object, this paper builds the wireless communication environment...
Proceedings Article

Multipoint weak signal acquisition based on orthogonal vector of the lock-in amplifier

Chao Sun, You-Ping Chen, Gang Zhang, Feng Wang, Guang-Sen Liu, Jian-Jun Ding
In the optical fiber sensor signals, most of them are weak. Generally, they are converted to weak current or voltage through the sensor unit. But the signal is too weak to measure because of the sensing unit background noise, circuit noise and external interference noise which is stronger than the useful...
Proceedings Article

Outlier detection method based on standard scores

Ya-Nan Wang
Agricultural monitoring data is the basis of environmental early warning, however, abnormal data is inevitable in the monitoring process. Aiming at the problem that the data of wireless sensor network is abnormal, an outlier detection method is proposed, in order to achieve the purpose of accurate calibration...
Proceedings Article

Design of central air conditioning controller with remote control based on STM32

Qiu Gao, Yan Dong, Liang-Wen Yan, Xue Yu, Nian-Feng Mei
At present, the decentralized control was adopted at the terminal of the central air conditioning system so that cluster management couldn't be achieved. Taking into account such as different user had different management level and unreasonable, unscientific control methods which leaded to great waste...
Proceedings Article

Multi-hop routing protocol design based of cluster density

Zhi-Jun Liu, Xue-Feng Pan
In wireless sensor network protocol, a multi hop routing protocol based on density clustering is proposed to deal with the problem of large communication overhead, unbalanced node consumption and hierarchical routing. Protocol divide clusters by density based method, and transfer the data with the base...
Proceedings Article

Analysis at Anti-collapse Capability of Such Dolomite

Xue-Peng Wang, Hua-Shu Yang, Wei Dong
Crag lurks danger to thorpe and road, which would bring on momentous losses of people and riches in case of collapse. Applicability of correlative theories and finite element method was studied. In allusion to specifically dolomite's occurrences and by virtue of data rooting in autoptic reconnaissance...