Proceedings of the 2nd Annual International Conference on Electronics, Electrical Engineering and Information Science (EEEIS 2016)

Session: Chapter 2. Computer and Information Science

52 articles
Proceedings Article

Educational data mining for decision-making: a framework based on student development theory

Xiao-Feng Lei, Ming Yang, Yi Cai
Applying Educational Data Mining (EDM) for decision making is an emerging interdisciplinary research field. From the view of student development, this paper presents a framework for educational decision making, which can explore some laws and characteristics in student development to improve educational...
Proceedings Article

The Analysis and Design of Online Examination System Based on B/S

Guo-Quan Weng, Xin-Hua Zheng, Yu-Bin Zhang
Nowadays, with the university expansion and the increase of students' number, traditional written examination model is still adopted by universities, colleges and social organizations. There exist many problems in written examinations, such as complex exam procedures and prone errors. With the rapid...
Proceedings Article

One Oriented-Web Performance Test Scheme Based on PerformanceRunner

Yue-Hua Ding, Ri-Hua Xiang
The web application performance testing is gaining wide attention due to popularization of Web application rapidly. To improve performance test efficiency, this paper chose domestic performance test tool PerformanceRunner to study, and presented one oriented-web performance test scheme based on PerformanceRunner....
Proceedings Article

A single stage based on ARM PFCLED drive power control method

Hong-Li Cheng, Jian-Nan Wang
The traditional power factor correction (PFC) LED drive power due to its input rectifier circuit for nonlinear circuits, can bring a large number of high frequency current to power grid harmonic, the rectifier bridge after large capacitor filter will reduce the conduction Angle of input voltage, reducing...
Proceedings Article

Visualization platform design of failure outage risk assessment based on GIS

Peng Liu, Wan-Xing Sheng, Guang-Xian Lv, Xian-Guo Kang, Wei Meng, Zi-Jin Li
With the development of science and technology, a large amount of intermediate data is generated by computer needed to process by visualization technology, in order to achieve computer-aided analysis, reproduction of the objective. Modern data visualization refers to translate the data into the graphics...
Proceedings Article

The application of Galois fields operation with chaos mapping in digital image encryption

Bing Liu, Qiang Chen
A new digital image encryption method is proposed by introducing a chaos mapping combining matrix operations on Galois fields. The original image is mapped into two matrices by using chaos mapping, and then the original image matrix is processed sequentially with the two matrices over a Galois field...
Proceedings Article

A trusted routing algorithm based on D-S evidence theory combined with physical layer security

Lin Ma, Chong Tan, Jun Pan, Kai Yu
With the rapid development of the communication technology, the traditional routing algorithms which only consider functional QoS metrics are difficult to meet the needs of applications. In this paper, we propose a trusted routing algorithm to overcome this problem. First, we propose a trust evaluation...
Proceedings Article

Design and implementation of constrained predictive control simplified algorithm based on particle swarm optimization

Kai-Chen Wang, Ping Ma
In order to achieve the purpose of reducing the calculation quantity and improving the computation speed of predictive control, an aggregation algorithm was proposed to design the predictive control simplified algorithm. At the same time, consider the actuators' outputs with restrictions in industrial,...
Proceedings Article

A liquid level control system based on LabVIEW and MATLAB hybrid programming

Zhen Li, Ping Ma, Wei Liang
This control system is designed for process control experiment platform, which combines the advantages of LabVIEW and MATLAB , avoid the shortcomings of the two. Double tank water level control is the object of the system, using PCI data acquisition card to collect the data and send control signals,...
Proceedings Article

An Efficient Approximation Algorithm for Traffic Engineering in Software Defined Networks

Gang Wang, Gang Feng, Shuang Qin, Mu Yan, Yan-Tao Guo
In this paper, we focus on the efficient algorithm for solving the multi-commodity flow problems involved in TE and develop an improved approximation algorithm (i-FPTAS) based on the Fully Polynomial Time Approximation Scheme (FPTAS), with aim of greatly improving computational efficiency without compromising...
Proceedings Article

Planar array pattern null steering by controlling the side elements

Zhong-Hui Zhao, Hui-Ling Zhao, Yong-Chao Xu
In this article, a new planar array nulling approach which only adjusts the phase of the side elements was proposed. In this approach, pattern nulling problem was modeled as a constraint problem and solved by -self-adaptive differential evolution algorithm. Simulation results show that the proposed method...
Proceedings Article

A study on the combination of singular cancellation and AIM

Ming-Xuan Zheng, Hui-Ling Zhao, Zhong-hui Zhao
Near-singularity and far-filed storage in impedance matrix were two difficulties in MoM. In this paper, some simple methods, based on the Duffy transformation, were effectively used in dealing with the near-singularity. For the far part, AIM(Adaptive Integration Method) was used to reduce not only the...
Proceedings Article

A complex neural network algorithm for computing the largest sum of real part and imaginary part of eigenvalues and the corresponding eigenvector of a real normal matrix

Hang Tan, Li-Ping Wan, Rong Ye, Xue-Song Liang, Zhao-Yao Wu
In this study, we proposed a novel complex neural network algorithm, which extends the neural networks based approaches that can asymptotically compute the largest modulus of eigenvalues and the corresponding eigenvector to the case of directly computing the largest sum of real part and imaginary part...
Proceedings Article

Crowd flow forecast based on SOM neural network in application of energy-saving lighting

Jun-Feng Xu, Li-Xin Ma
Generally the common lights-control is set in the mode of preset time control, which cannot be adjusted and would not meet the requirements of fine and smart control, so the plug-in of Artificial intelligence algorithms can make a big change of common made. SOM (self-organizing feature map network) is...
Proceedings Article

Jamming method based on dynamical convolution against ISAR

Zhong-Gan Bai, Xing-Song Deng, Wen-Jun Xu, Kun Shu
A new active jamming method based on dynamical convolution against Inverse Synthetic Aperture Radar (ISAR) is set up in this paper. The traditional scatter jammer is non-cooperative with the dispenser's gesture, which makes ISAR easy to identify it. The new jamming strategy improves it in two steps....
Proceedings Article

Unmanned Ground Vehicle Positioning System by GPS/Dead-Reckoning/IMU Sensor Fusion

Meng Zhang, Ke Liu, Chen Li
Real-time positioning system is critical for control and navigation of unmanned ground vehicles. In this paper, we present a low-cost integrated GPS/DR/IMU positioning solution. A two-level adaptive Kalman Filter based algorithm is introduced to fuse sensor signals. Experimental results demonstrate a...
Proceedings Article

Proof of Theorems on Multisource Information Theory and Implementation in Wireless Relay Network proceedings

Geng Zhang, Jie Shen, Ou Wang, Lei Lv
In this paper, three theorems on multisource information theory are introduced, then analysis and proof of them are given. Source coding with SI and joint source coding problem can be used in wireless MAC channel, while source coding with one or two helpers can be used in wireless BC channel. Finally...
Proceedings Article

Network Optimization for Distributed Memory File System on High Performance Computers

Chun-Jia Wu, Guang-Ming Liu, Xin Liu
On high performance computers, each compute node's demand for memory may be different. Building a distributed file system in idle memory can improve the memory utilization of the whole system. When memory takes place of disk, the Socket-based communication becomes the main bottleneck. As most of current...
Proceedings Article

Improved localization algorithm with FDOA measurements

Ya-Xiao Niu, Shan-Wei Shi, Chun-Dong Qi, Zhi-Jie Zheng
Localization with FDOA measurements is an important passive location method. Traditional solution to nonlinear equations is Newton's iterative method. However, this method may encounter convergence problems. This paper proposes an algorithm that can find initial estimates by dividing target area into...
Proceedings Article

A novel complex neural network model for computing the largest real part of eigenvalues and the corresponding eigenvector of a real matrix

Rong Ye, Hang Tan, Xue-Song Liang, Ping-Li Wan
A novel complex neural network modelwasproposed, which can be used to compute the largestreal part of eigenvalues and the corresponding eigenvector of a general real matrixin this work. Because of the smart regulatory factorof the model, the largest real part also can be extracted in the case of all...
Proceedings Article

A zero velocity intervals detection algorithm based on sensor fusion for indoor navigation systems

Ming Ma, Qian Song, Yang-Huan Li, Zhi-Min Zhou
The Zero-velocity Update (ZUPT)-aided Extended Kalman Filter(EKF) algorithm is commonly deployed to resolve trajectories of pedestrians. To use the ZUPT, it is necessary to detect zero velocity intervals reliably. Existing zero velocity intervals detection algorithms cannot provides good performance...
Proceedings Article

Dynamic inversion control of UAV using ANN

Gong-Cai Xin, Wei-Lun Chen
The paper proposes a method to design ANN dynamic inversion controller through online ANN compensating inversion error. It mainly aims at evident shortage of dynamic inversion controller of UAV. A single hidden layer ANN structure is constructed and the stability of the whole closed loop system is proved....
Proceedings Article

Model of neutral network sliding design by large envelope flight control law

Wei-Lun Chen, Gong-Cai Xin
In this paper, the neural network sliding mode control design method is studied for the large enveloping flight control law of the model with very different flight parameters. The neural network theory is used to approximate the nonlinear system and eliminate the errors brought by the approximate inversion,...
Proceedings Article

Path-following control of remotely operated vehicle based on improved hybrid fuzzy PID control

Lei Zhang, Jia-Wang Chen, Yu-Xia Sun, Shuai Hao
A remotely operated vehicle (ROV) is essentially an underwater mobile robot that is controlled and powered by an operator outside of the robot working environment. The issue of 2D path-following control of ROV was studied. Based on single-input fuzzy controller expressed in analytical form, an improved...
Proceedings Article

A Method of Continuous Nonlinear Gamma Correction

Xue-Wen Zhang, Hao-Dong Shen, Xiao-Long Xu, Zhuo Zhang
Uneven illumination in image acquisition process often have a serious impact on image processing. For the deficiency of traditional adaptive Gamma correction in the process of light correction, we present a method of continuous nonlinear Gamma correction. The proposed method has effective compensation...
Proceedings Article

Neural network based robust tracking control for nonholonomic mobile robotic system

Ying-Nan Bian, Jin-Zhu Peng
A hybrid tracking control scheme which combines RBF neural network with nonlinear method is proposed. RBF neural network is designed to approximate the system uncertainty terms, and control is utilized to achieve a desired robust tracking performance. Based on Lyapunov theory, the tracking errors of...
Proceedings Article

Research on data control mechanism in the honeyfarm environment

Jian Li, Jing-Feng Xue, Chun Shan
There is always the potential of malware or attackers using a honeyfarm to infect or attack non-honeyfarm systems. Thus, each organization must implement data control of a compromised honeypot to minimize the risk. We have proposed a data control mechanism that exploits honeyfarm gateway, intrusion detection...
Proceedings Article

Identity-based signature scheme based on quintic residues

Xue-Dong Dong, Yuan Gao
We propose a new method to compute a quintic root of a quintic residue. Then we give a new identity-based signature scheme by the method. The scheme is secure against existential forgery on the adaptive chosen message and identity attacks assuming the hardness of factoring. The scheme is the first identity-based...
Proceedings Article

HKSD for deformation measurement of nonrigid biological tissues from MR images

Jia Chen, Ru-Han He, Xu-Bing Zhang, Jun Bai
Due to the nonlinear deformation of nonrigid and nonuniform tissues, it is challenging to accurately measure the displacements of feature points distributed on the inner parts, boundaries, and separatrices of tissue layers. To address this challenge, we propose a feature point matching technique called...
Proceedings Article

A survey of the past, present and future of echo state networks

Guan-Fang Wu, Hong-Yan Cui
Along with the development of Machine Learning, statistic and Artificial Intelligence, people are exposed to myriad of big data. Meanwhile, accurate data analysis is difficult. Echo state network (ESN) algorithms are widely researched and applied in many fields. Owing to their potential for exact prediction...
Proceedings Article

The application of big data-driven prognostic and health management on complex equipment based on internet of things

Guo-Shun Chen, Gang Niu
A novel big data-driven Prognostic and Health Management (PHM) method of Unmanned Air Vehicles (UAV) based on IoT was proposed. The method innovatively using big data of IoT analysis with health states to build the reference indicator, through probability-based techniques, and produced a degradation...
Proceedings Article

An improved multi-value cellular automata model for mixed bicycle traffic flow on campus

Bi-Xiang Li, Lan Fang
This paper analyzes the defaults of traffic model applying in campus road in China, such as lacking simulation of vehicles, pedestrians and bicycles under mixed traffic flow. An improved multi-value cellular automata model is proposed for revealing complex traffic phenomena for pedestrian-bicycles and...
Proceedings Article

Research on modeling and extraction of a dominant business process fragment

Wei Tan, Xuan Liu
With the rise of the Internet plus, companies have embarked Internet plus road. To implement business process resource sharing is one of the main ways for enterprises to achieve Internet plus. Due to the participation of many enterprises, the business process resources on the Internet are massive. It...
Proceedings Article

F-Codes

Chun-Hua Cao, Feng-Xia Zhang, Di Yang, Qiu-Jun Liao
By adding special conditions, Jean Berstel in 2012 proposed some new codes, for example: F- prefix codes, F- maximal prefix codes, F-maximal codes etc.. In this paper, we discuss the properties of F-completeness, F- denseness of those codes. At first, we present some sufficient and necessary conditions...
Proceedings Article

Dynamics modeling and nonlinear observer design for vehicle rollover avoidance

Chang-Fang Chen, Ming-Lei Shu, Ming Yang, Nuo Wei
A real-time accurate detecting the risk of an impending vehicle rollover is essential for active rollover avoidance systems. To this end, a 4DOF nonlinear vehicle roll dynamics model is developed, which fully exploit the coupling effects between the yaw dynamics, lateral dynamics, and roll dynamics....
Proceedings Article

OPC UA summary

Zhi-Ning Wang, Yi-Yang Liu, Feng Gao, Meng Tang, Yun Shi, Xiao-Ming Zhou
This paper illustrates the OPC technology's shortcomings of the platform portability, remote data access and security aspects of industrial automatic production. For the limitations of the OPC on these aspects, the OPC Foundation presented the improved concept of OPC UA. This paper described the OPC...
Proceedings Article

Design of remote monitor software based on C# and XML

Gao-Feng Pan, Sheng Liang, Si-Fang Liu, Yong Xie
The monitoring terminal is an important part, which is interactive with users in TT&C equipment remote monitoring system, but it has some problems such as more work patterns, data process, and data display, etc. The work patterns and state parameter is designed by XML file, and data in XML file is used...
Proceedings Article

The intrusion detection algorithm using statistic technology

Ming Gu
The intrusion detection algorithm calculates the deviation distance using Chi-square test statistic. The amount of calculation can be greatly reduced. Sample data coming from operating system LINUX and Windows8 was presented and compared. The results of this study show that the algorithm achieves the...
Proceedings Article

Computer technology to imitate traditional tie-dye patterns

Xiao-Sha Yin, Jian-Ming Wang
Because of its long tradition of printing and dyeing technology cycle, complicated production process, and the pollution of the environment, energy consumption in the future development of the ecological environment has hazards. By using Ultra Fractal to simulate fractal tie-dye pattern, reproduce the...
Proceedings Article

The application of movable water saturation from the calculation of neural network method

Wei Xiong, Jia-Feng Wu, Shu-Sheng Gao, Li-You Ye, Fei-Fei Gou
Movable water saturation can accurately evaluate the formation of gas and water layer. It is an important parameter to guide the development of tight gas reservoirs. Engineering often used single factor of porosity to estimate saturation of the movable water. And in the formation of strong heterogeneity...
Proceedings Article

Research of digital detection method based on model

Jing Li, Dan-Ya Zhang, Zhen-Yu Li
With the development of digital design and manufacturing technology of aircraf , The large-scale overall structural element amount used unceasing increase, as well as the civil aircraft efficiency and the secure request daily enhancement, also proposed to the product manufacture precision a higher request,...
Proceedings Article

Selection and its criteria of computational domain on numerical simulation of building fires

Yi Lu, Pan Li, Jia-Hao Liu, Qin-Pei Chen, Jian Wang
In the area of numerical simulation of building fires, the computational domain is directly related to the accuracy of the simulation results. This article would be focused on small compartment fires with a single vent opening where heat release rate lied into the transitional region, which is a transformation...
Proceedings Article

Development and achievement of software for cellular growth system

Min Shen
Constant direct current stimulation has facilitation for cellular growth of many histiocytes. This paper primarily introduces systemic, detailed development and achievement of software for this system. The system can accomplish controlling action of peripheral circuitry through computer interface. The...
Proceedings Article

A mechanism of resource co-reservation in cloud computing system based on virtual resource

Jing Li
Resource reservation is an important part of the resource management in Large Distributed System such as cloud computing. An architectural framework for specifying and processing co-reservations in cloud computing environments is presented. Compared to other approaches, the co-reservation framework in...
Proceedings Article

Software fault debugging based on data flow analysis

Xi Guo, Pan Wang, Peng-Fei Wu
Data Flow Analysis is a difficult issue in the domain of fault localization, and many software faults are related to the information of data flow. The dependency between the variants and the define-use chain are discussed in this paper, and trace the impact to the variants in the process of operation....
Proceedings Article

Design and implementation of automatic calibration system in ship docking

Xin-Bing Fang, Si-Fang Liu, Li-Li Xia, Xi-Quan Wang
Calibration is in dock ship-borne equipment to determine the error model and the basic process of establishing unified coordinate system, to be combed through the calibration project, and to be combined with the existing equipment, so automatic calibration system is designed. The automation to be realized...
Proceedings Article

Design and realization of wireless remote calibration system of ship-craft

Gao-Feng Pan, Si-Fang Liu, Cheng-Bin Zhou, Sheng Liang
To improve the orbit determination precision of the TT&C equipment, the equipment parameters need to calibrate accurately using the calibration tower during the dock calibration. Through comparing the remote control mode and analyzing the control object, this paper builds the wireless communication environment...
Proceedings Article

Multipoint weak signal acquisition based on orthogonal vector of the lock-in amplifier

Chao Sun, You-Ping Chen, Gang Zhang, Feng Wang, Guang-Sen Liu, Jian-Jun Ding
In the optical fiber sensor signals, most of them are weak. Generally, they are converted to weak current or voltage through the sensor unit. But the signal is too weak to measure because of the sensing unit background noise, circuit noise and external interference noise which is stronger than the useful...
Proceedings Article

Outlier detection method based on standard scores

Ya-Nan Wang
Agricultural monitoring data is the basis of environmental early warning, however, abnormal data is inevitable in the monitoring process. Aiming at the problem that the data of wireless sensor network is abnormal, an outlier detection method is proposed, in order to achieve the purpose of accurate calibration...
Proceedings Article

Design of central air conditioning controller with remote control based on STM32

Qiu Gao, Yan Dong, Liang-Wen Yan, Xue Yu, Nian-Feng Mei
At present, the decentralized control was adopted at the terminal of the central air conditioning system so that cluster management couldn't be achieved. Taking into account such as different user had different management level and unreasonable, unscientific control methods which leaded to great waste...
Proceedings Article

Multi-hop routing protocol design based of cluster density

Zhi-Jun Liu, Xue-Feng Pan
In wireless sensor network protocol, a multi hop routing protocol based on density clustering is proposed to deal with the problem of large communication overhead, unbalanced node consumption and hierarchical routing. Protocol divide clusters by density based method, and transfer the data with the base...
Proceedings Article

Analysis at Anti-collapse Capability of Such Dolomite

Xue-Peng Wang, Hua-Shu Yang, Wei Dong
Crag lurks danger to thorpe and road, which would bring on momentous losses of people and riches in case of collapse. Applicability of correlative theories and finite element method was studied. In allusion to specifically dolomite's occurrences and by virtue of data rooting in autoptic reconnaissance...