Proceedings of the 2016 7th International Conference on Education, Management, Computer and Medicine (EMCM 2016)
Session: Computer
79 articles
Proceedings Article
[WITHDRAWN] A New Algorithm of Detecting Community Structure Based on Clustering
Pengli Lu, Chaohui Gou
The node intimacy based on information centrality which Fortunato proposed is established, the node intimacy matrix of the network is also established, and the idea of clustering the intimacy matrix of nodes is chosen in this paper. Thus, a new algorithm of detecting community structure based on clustering...
Proceedings Article
Fuzzy PID Iterative learning control for a class of Nonlinear Systems with Arbitrary Initial Value
Xiaohong Hao, Dongjiang Wang
Aiming at a class of nonlinear systems running repeatedly in the study of the convergence of iterative learning control, a PID fuzzy iterative learning control algorithm has been proposed in the arbitrary initial value using fuzzy PID control algorithm, using traditional experience PID parameters by...
Proceedings Article
Research on Client-side Defense Techniques of Cross-Site Scripting Attack
Xuyang Wang, Mingyang Xu
The Cross-site scripting (XSS) is among the most serious and common threat in Web application today. The main purpose of XSS is to steal the user's sensitive information, as its behavior is to send user's sensitive information to a third party without the user's authorization,we can get the XSS attack...
Proceedings Article
Multi-degree-of-freedom Manipulator Driven by Micro Hydraulic System
Nan Li
Now on the market are used motor-driven robot, so the ultimate environment (such as underwater) and cannot successfully complete the operation, and the use of micro-hydraulic system can effectively improve the torque, and can better be used in harsh environments. Using a fuel tank as the power source,...
Proceedings Article
Design of Hardware-in-the-loop Simulation Platform in Propulsion Control Systems of Aero-Engine
Bei Yang, Xiaowu Ding
The performance of the electronic controller is of significance to the development of turbofan engine with afterburner. To verify the feasibility of the control algorithm and the design scheme of hardware and software of the controller, the embedded computer based on PC104 architecture was used as the...
Proceedings Article
Research on Texture Mapping of Geological Models
Jixin Tan, Jianxun Chen
Texture mapping of 3D models is an important problem in realistic graphics. However, there are few methods that are put forward to solve texture mapping of models constructed from nature scenes for the reason that those 3D models are difficult to parameterize to 2D. This paper proposes an algorithm for...
Proceedings Article
Research on the SAR Image Target Tracking Algorithm Based on Sparse Representation and Dictionary Learning
Wenzhun Huang, Xinxin Xie
In this paper, we conduct research on the SAR image target tracking algorithm based on the sparse representation and dictionary learning. The key technology of target tracking is to target can be extracted from the image detection, and to establish corresponding relationship with tracked target. Search...
Proceedings Article
Adding-weight One- rank Local Predication Model of Busy Traffic based on Correlation
Zhimei Duan, Xiaojin Yuan, Yan Xiong
In order to improve accuracy of adding-weight one-rank local prediction, the paper proposed the correlation function to measure the correlation between different phase points, which is used to determine reference neighborhood of prediction center point, and made the values of expressing correlation to...
Proceedings Article
Network Development Under the Condition of Network Supervision and Network Ethics
Deng Tian
With the rapid development of Internet, it also brings a lot of ethical and social problems. If we do not regulate the development of the network and ethics, it is bound to affect the healthy and orderly development of the network. Through the analysis of the influence of network ethics on the development...
Proceedings Article
A Novel Similarity Measure and Its Application in Medical Diagnosis under Intuitionistic Fuzzy Settings
Lishi Zhang
The purpose of this paper is to develop a novel approach for medical diagnosis reasoning, in which a novel similarity measure is defined and used in the application of medical pattern recognition; the information is in the form of intuitionistic fuzzy numbers. First, a new biparametric similarity measure...
Proceedings Article
Research on Robust Task Space Control Uncertainty Based on Legendre Polynomial
Xinwen Bi, Zeliang Zhang, Ming Ma
Usually, the uncertainty bound is needed to design the control law in conventional robust control approaches. However, the proposed bound may increase the amplitude of the control signal and damage the system. To solve this problem, a robust control law is proposed in this paper. The uncertainty bound...
Proceedings Article
High-Contact-First Immunization Strategy on Complex Networks
Fuzhong Nian, Longjing Wang, Tong Liu, Ke Wang
Different from traditional immunization strategies, which suppose that the contact frequency of all nodes is same, in this paper, a new immunization strategy was established based on the principle of 'High-Contact-First'. The different link with different weight describes the relationship between different...
Proceedings Article
The Cloud Data Security and Access Control Model in the Study
Jing Dong
Cloud computing is a kind of based on the calculation of the Internet, through the cloud computing, to other computers and other devices to share information and resources. Although it can bring convenience, operated and managed in a cloud computing infrastructure services in the security problem of...
Proceedings Article
Research on Hand-Held Insulation Tool Detection Alarm Device of Power Operation
Nan Li
In the power operation, according to safety regulations, the staff must wear insulated gloves. However, in practice, the staff is easy to overlook, therefore, to improve security, we have developed a hand-held insulation tool detection alarm device. Method: Device using k60 microcontroller, microcontroller...
Proceedings Article
Numerical Simulation of Glass Molding
Bo Tao
Glass molding is a mass fabrication method for precision glass lenses. Residual stresses induced during cooling process were inevitable reserved in molded glass lenses, and can cause the quality deterioration. Control of the cooling rate is one of the methods to keep residual stresses at a required level....
Proceedings Article
Design for Environmental Three-Dimensional Parking Equipment
Min Zhang, Songling Zhang, Jia Jin, Pengpeng Wang
In this paper, a kind of environmental three-dimensional parking equipment was designed, which was flexible, easy to assemble, disassembled and portable. As a result, the vertical and transverse movements of the parked vehicles were realized in need. Easy assembled and removable steel structure was used...
Proceedings Article
A Study on the Lightweight Mobile IPv6 Protocol Based on Fixed Terminal Node
Yan Pan
Mobile ubiquitous technology and IPv6 technology makes it possible to perform the remote control and information transfer by using the mobile terminal, and it promotes the development of the Internet of things. Therefore, more and more intelligent terminal devices need mobility support, such as intelligent...
Proceedings Article
Technology Using Neural Network Optimization Path in Packet Switching Network
Shoubai Xiao
How to find the optimal path between two nodes has been one of the most difficult problems in the internet. In this paper, a method of finding the optimal path based on neural network technology is proposed, which solves the problem of finding the optimal path by adjusting the weight of the neuron. The...
Proceedings Article
3D Collision Detection Algorithm based on Composite Balanced Binary Bounding Box Tree
Jinping Liu, Jianxun Chen
The existing bounding box has the contradiction between compactness and complexity. On the one hand, the poor compactness of the bounding box often leads to the poor effect of removing the disjoint objects, which leads to the low efficiency of collision detection. On the another hand, the good compactness...
Proceedings Article
A New Feature Selection Method Based on K-Nearest Neighbor Approach
Xianchang Wang, Lishi Zhang, Yonggang Ma
In many data analysis tasks, one is often confronted with very high dimensional data. Feature selection is an effective method to solve the problem with high dimensional data. The aim of feature selection is to reduce the number of features used in classification or recognition. This reduction is expected...
Proceedings Article
The Research about Data Mining of Network Intrusion Based on Apriori Algorithm
Jigang Zheng, Jingmei Zhang
Found that the association between each characteristic attributes and behavior based on network intrusion data to achieve intrusion valuable data extraction and analysis,the use of denial of service attacks recorded KDDCup99 dataset simulation experiments.Weka software using association rule mining algorithms...
Proceedings Article
Research on Date Mining Service Mode under the Environment of Cloud Computing
Wei Huang
Along with the arrival of information era, the network is inundated with all kinds of information, and people are facing various kinds of confusion among the mass information, data analysis becomes a relatively hot potato. The proposal of cloud computing is able to well solve this problem and improve...
Proceedings Article
The Wave Packet Frames with Several Generators
Jinzhou Li, Zheng Wang
The main goal of this paper is to consider the necessary conditions of wave packet systems to be frames in higher dimensions. The necessary conditions of wave packet frames are established, which include the corresponding results of wavelet analysis and Gabor theory as the special cases. The existing...
Proceedings Article
Eternal War in Software Security: A Survey of Control Flow Protection
Bowen Tang, Huan Ying, Wei Wang, Huabin Tang
Software security is the cornerstone of computer system security. Among all the elements consisting of software security, control flow protection is undoubtedly the most important one. Once the process's control flow is hijacked, attacker can manipulate it to implement a variety of malicious acts and...
Proceedings Article
Discussion on Construction of Network Teaching Platform Resources
Keying Jiao
With the development of era and the innovation of the society, people pay more and more attention to the reform and innovation of the education. The network teaching platform as the new teaching mode of the university. Through analyzing the construction of network teaching platform in the colleges, understand...
Proceedings Article
Application Study on Optical Fiber Network Technology in Communication Engineering
Li Li
With the development and progress of society, electronic information technology has made great progress where rapid development of optical fiber technology adds a thick and heavy color. Compared with traditional network technology, optical network technology has advantages of large capacity, fast speed,...
Proceedings Article
The Influence of Self-media on the Ideological and Political Education in Higher Vocational College
Xiaoqun Zhang, JingYu Xu
With the popularization and development of the Internet and the extensive use of electronic products, Self-media has become an important part of people's lives, profoundly affecting people's way of life and communication. And the current higher vocational students are influenced by the most profound...
Proceedings Article
A High-Power High-Fidelity Headphone Amplifier Design
Jian Huang
This circuit is designed to convert the differential output current of an audio digital-to-analog converter(DAC) into a single-ended voltage capable of driving low impedance headphones. Two op amps are used as transimpedance amplifiers which convert the DAC output current to a differential voltage. A...
Proceedings Article
Research on Dynamic System Simulation Model and Algorithm Based on Artificial Neural Network
Shoubai Xiao
With the continuous expansion of applications field on the computer system simulation, the problems of system modeling faced has become more and more complex. At present, there are two main problems: First, modeling object is complex, with a variety of uncertainties and nonlinear characteristics difficult...
Proceedings Article
Application in Grade Early Warning of PCA
Xueli Ren, Yubiao Dai
Students are misled by the traditional concepts after enrolling university, these make some students face many problems such as no goal of learning, no power, that causes students to face serious consequences that failed in courses and quit, bring serious influence to student management. In order to...
Proceedings Article
The Application of Cloud Computing in the Management of Digital Archives in Colleges and Universities
Yingle Yao
Based on the demand of integration and sharing of digital archives resources, this paper analyzes the fit and advantage of cloud computing and digital archives resource management, and puts forward a new idea of sharing and sharing digital archives resources in the cloud computing technology that make...
Proceedings Article
Parameter Optimization of ARQ System based on Proximity-1 Protocol
Jie Wang, Chenghua Wang, Hao Wu, Qiangqiang Mao
In order to improve the communication efficiency of the spacecraft in the Proximity space link, a GBN-ARQ scheme is designed based on the proximity-1 protocol. On the basis of this, to maximize the system throughput and normalized throughput, the data frame length and the sliding window length are optimized,...
Proceedings Article
Construction of Multidimensional Data Knowledge Base by Improved Classification Association Rule Mining Algorithm
Qing Tan
Firstly, this paper analyzes the advantages and disadvantages of the existing association rules mining algorithm, and gives the method of multidimensional data analysis. In order to remedy the defects, this paper discusses and improves clustering and classification algorithm for constructing intelligent...
Proceedings Article
Study on the Response of PM2.5 Pollution to Land Use Change Based on GIS
Ping Zhang, Liang He, Yajuan Zhou, Peishu Huo, Wenbiao Tian
PM2.5 pollution is harmful to human health and ecological environment, and effective control of PM2.5 pollution has important practical significance for regional sustainable development. This paper analyzed the impact of land use change on PM2.5 pollution based on Geographic Information System (GIS),...
Proceedings Article
Research on Key Technologies and Development Status of Cross Border E-commerce
Yongliang Li, Kaifeng Huang
Cross border e-commerce not only broke through the barriers between countries, so that international trade to trade without borders, but it is also causing great changes in world economic and trade. Cross-border electronic business platform is divided into information services platform and online trading...
Proceedings Article
Multi-kernel Partial Least Squares for Multi-Modal Data Analysis
Ping Wang, Hong Zhang
In recent years, multi-modal data analysis has enjoyed an increasing attention. Multi-modal data mean the different modal data representing the same semantics. Moreover, many subspace learning methods are proposed to measure the correlation between different modal data. As the most representative subspace...
Proceedings Article
Computer Network Security Analysis and Research
Limei Cui
In today's era is the era of information technology rapid development, with the constant progress of the society, the network technology is in constant development, now the network is essential in our daily life people less a thing. Using the network, at home the whole messy, never leave home can know...
Proceedings Article
Building Intelligent Precise Logistics Service System by Key Technologies of RFID in the Internet of Things
Guofang Kuang, Zhenfang Song
This paper describes the analysis and research of new intelligent precise logistics system. The development of intelligent logistics is precise, intelligent, integrated and collaborative features. Then this paper discusses the application and prospect of RFID key technology in intelligent logistics....
Proceedings Article
Analysis of Decision Tree Mining Algorithm Based on Improved Rough Set Classification
Lan Wang, Hongsheng Xu
Classification is to find a set of models (functions) that describe the typical features of data set. In this paper, firstly, the rough set classification algorithm is improved. Then, analysis and application of classification algorithm based on improved rough set are described. This paper analyzes the...
Proceedings Article
An Improved Zigbee Routing Algorithm Based on Energy Level Partition
JianQiang Wang
Based on the analysis of large temperature and humidity monitoring system, this paper proposes an improved AODVjr routing algorithm based on node energy level classification. The algorithm is based on the traditional AODVjr algorithm, the tree routing algorithm of node forwarding rules based on parent-child...
Proceedings Article
Some Notes on the Controllability in a Steady State for the Q-W Equations With Weak Decay
Shuxian Deng, Hongen Li
We present a new method of investigating the so-called quasilinear strongly-damped wave equations in this paper, we concerned with the Controllability in a steady state for the Quasilinear Wave Equations with weak decay, and we use a so-called energy perturbation method to establish weak controllability...
Proceedings Article
Research and Design of a Commodities Trading System
Suolan Liu, Lizhi Kong
With the growing development of electronic commerce, the business behavior of many traditional had better play in the Internet. Products transaction market can be said to be a typical example. Compared with the traditional trading model, online operation of commodities trading is more convenient, real-time,...
Proceedings Article
Overview of Tourism Data Mining in Big Data Environment
Wenjie Xiao, Changguo Xiang
With the advent of the information age, the network is filled with all kinds of information and people in the vast amount of information are in the face of all kinds of confusion, thus data analysis has become a more difficult problem. Big data can solve this problem well and can greatly improve the...
Proceedings Article
Development of Alarm System Based on Speech Recognition
Qingsong Zhu, Hongzhao Li, Ruyan Ye, Meide Xu, Fayue Zheng
Aiming at the burglary, fire and the safety and health of the elderly in current living quarters, a kind of alarm system based on speech recognition is developed. The video monitoring device can be triggered by the voice alarm signal which is sent to the mobile client at the same time. Monitor people...
Proceedings Article
Design and Implementation of Single-Phase Inverter Based on Lightweight TCP/IP Protocol
Botao Zhang, Hongwei Xiao
As for resource-limited embedded devices, lightweight TCP/IP protocol (LwIP) is used for communication in order to meet real-time requirements of embedded devices. This paper offered and implemented a single-phase inverter solution based on lightweight TCP/IP protocol. The designed hardware circuit of...
Proceedings Article
Research on Internet Payment Security Based on the Strong Authentication of the Timeliness and Multi-factors
Junsheng Wang, Qingsu He, Qingzhi Han
Security and convenience is the main consideration for the user to select the Internet payment, and also the key issue of the development of the Internet payment industry. At present, on Third-Party Payment Platform, E-bank and other Internet payment platform, when users change the password, pay or transfer...
Proceedings Article
The Computational Model of Spring back Accuracy on Steel Bar Bending Hoop Stirrup
Bianjing Li, Zhiliang Liu
The hooked steel will spring back under the affection of residual stress, in order to improve the precision of the hoop, spring back angle should be taken into consideration. According to spring-back theory, considering the work hardening of steel under the straightening rollers, the relation was deduced...
Proceedings Article
Research on Mars Communication Link Budget
Hao Wu, Chenghua Wang, Jie Wang
This paper presents the budget method of the Mars-earth communication link. The calculation models of Mars atmosphere loss, Mars sandstorm loss, solar scintillation loss, earth atmosphere absorption; rainfall loss and hot body noise are studied. The propagation characteristics of electromagnetic waves...
Proceedings Article
Research on the High Performance System Development and Cloud Platform Building Mode under Parallel Framework
Xinxin Xie, Wenzhun Huang
In this paper, we conduct research on the high performance system development and basic cloud platform building model under parallel framework. Cloud computing is a kind of the public service, its security problem is complex and requires skill, standard, regulation, law and so on various aspects, multi-pronged...
Proceedings Article
Analysis of Network Attack Technologies and Network Security
Xu Pei
With the continuous development and progress of Internet technology, network security has become the focus of social concern. Internet technology occupies a place in all areas of the society and provide a new model for people's lives and learning. While giving full play to the advantages of Internet...
Proceedings Article
Fault Diagnosis of Gearbox based on the Optimized BP Neural Networks by Improved Particle Swarm Algorithm
Zhimei Duan, Xiaojin Yuan, Yan Xiong
In order to improve accuracy of fault diagnosis of gearbox, adaptive mutation particle swarm optimization (AMPSO) algorithm is used to optimize weight of BP. According to fault feature, fault diagnosis is accomplished by optimized BP. The algorithm overcomes disadvantages that slowly convergence and...
Proceedings Article
Research on Network Security Based on IPSec
Yanru Liu
With the development of information technology, Network security issues are very prominent, Network security incidents occur frequently. In order to enhance network security, we must take certain measures that are the use of IP protocol. IP protocol also called Internet Protocol. As defined in the network...
Proceedings Article
Discovery of Fuzzy Rare Association Rules from Large Transaction Databases
Weimin Ouyang
Rare association rules is an association rule which has low support and high confidence. In recent years, the discovery of rare association rules has got quite a lot of attention, which has become a hot topic in data mining research. However, current discovery algorithms for rare association rules are...
Proceedings Article
The Application of Virtual Reality Technology in Ancient Garden Restoration
Jiwei Li, Yingchun Cao
Most traditional methods of ancient garden restoration are to record with text, charts and graphic drawings and then observe the restoration effect through miniatures or color effect pictures. However, those methods are too inflexible, which cannot reflect the unique artistic conception and steric space...
Proceedings Article
Modeling and Simulation of Milling Force of New Type Ball-nose End Mill
Shuai Li
Ball-nose end mill is an essential tool for 3D hook face machining. It is extensively applied in mold, automobile and other fields. The paper set the geometric model of ball-nose end mill as the research basis, conducted discretization for ball-nose end mill cutter, deemed each discrete unit as inclined...
Proceedings Article
Mobile Terminal Security Monitoring System Based on Distributed Agent
Huan Ying, Yu Luo, Lifang Han, Liang Zhou, Songling Shan, Yanhong Chen
Aiming at the lack of effective security monitoring of mobile terminals, this paper proposes a mobile terminal security monitoring system based on distributed agent, which adopts distributed deployment and centralized management. Also, a multi-level malicious behavior monitoring model is proposed to...
Proceedings Article
The Application of TOPSIS Method to Group Decision Making based on Similarity Measures under Interval-valued Intuitionistic Fuzzy Settings
Lishi Zhang
The aim of this paper is to develop a novel approach for multiple attributes group decision making, in which the decision information, provided by multiple decision makers, is presented in the form of interval-valued intuitionistic fuzzy numbers. First, the aggregated information matrix corresponding...
Proceedings Article
On the Advantages of Applying Photoshop Software Technology in Graphic Character Design
Hui Zhang
Figure has been the main theme of art creation since ancient times, and it has been more and more widely used in graphic advertisement design nowadays. In the design of a perfect graphic advertisement character's makeup and style, every link cannot be ignored from design graphic-model selection-props...
Proceedings Article
Process of Computer-assisted Gift Package Design
Lizhen Liu
On the basis of designating concrete data of the product package or conducting measurement and calculation in accordance with the object size, we carry out the physical design for product graphic carton and outer carton. It introduces various stages of the design process. Assisted by some design software,...
Proceedings Article
Improvement of Dirichlet Observation Matrix based on Super Prime Numbers
Huanan Yu, Xin Zhang, Yao Du
The reconstruction quality of the signal is directly determined by the observation matrix in the sense of signal compression. The observation matrix has a strong randomness to ensure the quality of the signal reconstruction, but the hardware implementation of the random observation matrix is more difficult....
Proceedings Article
Design and Implementation of Short-wave Packets Fast Processing System
Haidong Zou, Shengguan He, Ning Dong
Based on the shortcomings in the existing short-wave packets processing procedure, a design and implementation scheme of short-wave packets fast processing system based on single-chip microcomputer processor with high efficiency and high accuracy is introduced. The design of the processing system is...
Proceedings Article
Comparison of Two Kinds of CFA Algorithms in Iris Identification
Hongqi Li, Yan Deng, Wei Su
In an iris recognition system, the iris image quality of CCD signal acquisition is the key factor of system identification. Two kinds of CFA algorithms in iris recognition system image processing module are compared in this paper. Compared with SC interpolation algorithm, SCEE algorithm can improve the...
Proceedings Article
A Tentative Study on Ward Monitoring System based on Zigbee Technology
Jifeng Liang
ZigBee technology is a two-way wireless communication technology. In recent years, wireless sensor network technology based on Zigbee technology has been widely used in many fields, such as environment monitoring, medical care etc. This paper mainly introduces the Zigbee technology, and the Zigbee wireless...
Proceedings Article
Research on Application of Security Technology in Network Engineering
Deng Tian
With the rapid development of computer network, the sharing of various network resources is further strengthened, and the information security problem is becoming more and more prominent. In fact, resource sharing and security has always been a contradiction. In an open network environment, a large number...
Proceedings Article
The Influence and Application of Plug-in Technology on Computer Software
Xinlin Zhang
Plug-in technology is an application that carries a lot of functionality. With the development of plug-in technology, it has a greater influence on computer software. This paper analyzes the concept and connotation of plug-in technology, and brings forward its great influence on the computer software...
Proceedings Article
The Actual Application of Flipped Classroom Mode in Cost Accounting Practical Training
Tangmei Yuan
Cost accounting course consists of the theory teaching and practice teaching. Now, the cost accounting teaching hard to meet the needs of cost accounting jobs due to the compression of total teaching hours and lack of practical input. This paper discuss how to design and implement cost accounting practice...
Retraction
RETRACTION: Application of Redundancy and Information Retrieval Systems in Congestion Control Based on Combined Grey Neural Network and CC and RBF-DDA Algorithms
Feihua Qu
In April 2020, Atlantis Press was alerted to fake proceedings articles hosted on our platform. These articles, mostly in computer science and engineering, were generated by the SCIgen computer program and were all published between 2006-2018. Immediately after receiving the alert, Atlantis Press initiated...
Proceedings Article
The Influence of "Internet +" of the Current Era
Yu Xiang
Throughout the history of human development, every technological change has a great impact on our production and life. The Internet occupies the core position in the new technological innovation, and its development will inevitably have a huge impact on our life. The "Internet plus" is a new form of...
Proceedings Article
Analysis of Data Encryption Technology and Secure Electronic Transaction
Jian Wang
With the rapid development of the modern Internet, e-commerce has been greatly promoted. The advantages of e-commerce gradually appear, as a result, virtual enterprise, virtual bank, Internet marketing, online shopping, online payment, online advertising business and a large number of new business which...
Proceedings Article
Application of Power Electronics in Power System
Mengyao Yang
As the society develops, automation and intelligence is becoming the inevitable tendency of power system, and power electronics is an essential technology for modern science. Advanced power electronics can strengthen and optimize power system to ensure the stability and safety of operation and improve...
Proceedings Article
Design of Experimental Platform for Intelligent Car
Hongtao Yu, Sen Wang, Heyan Wang, Yanhua Lei
Based on the study of the principle of intelligent car movement, this paper designs the tracking process, the PID adjustment process, the real-time monitoring process, and displays the simulation interface on the intelligent car software platform. So that the simulation results can be used to determine...
Proceedings Article
Application and Research of Big Data in E-Commerce Enterprises.Amazon as the Case
Yujie Chen
With the change of people's living habit and consumption concept, the demand of highly personalized products and accurate products is increasing. This condition has a huge impact on the enterprise which cannot adapt to the transformations in the Big Data Era. This paper based on the supply chain which...
Proceedings Article
Analysis and Simulation of 2ASK Digital Band-pass Transmission System Basing on SIMULINK
Geng Wang, Wei Cheng
Digital modulation and demodulation system as an important part of digital communication system,its research is necessary. Based on the analysis of 2ASK digital band-pass system transmission characteristics, SIMULINK software is used to simulate the digital band-pass transmission system. Having been...
Proceedings Article
Overview of System Reliability Modeling Tools
Jiacong Zhao, Yanxia Lu, Qisong Zhang, Xiaoyan Zhang
System reliability is a critical aspect of a system, which incurs the proposing of related modeling tools. Tools like Reliability Block Diagrams (RBD) and Fault Tree (FT) provide static representation of system reliability. RBD is a graphical representation that depicts a network of system components...
Proceedings Article
Research on Dynamic Target Distribution Path Planning Based on Improved Artificial Potential Field-Fish Algorithm in Logistics System
Qisong Zhang, Peng Zhang
Studied on path planning problem of logistics distribution vehicle in logistics system, and put forward an algorithm of artificial fish Swarm with improved potential field. The paper synthesizes variety of factors and takes the total cost of minimum distribution as goal in order to find out the optimal...
Proceedings Article
Design of Signal Conditioning Circuit for Photoelectric Sensor
Nan Xie, Zhennan Zhang, Weimin Chen
The photoelectric sensor is widely used in the detection field, and its two key parts are the light transmitting and the signal receiving. This paper has designed the pulse modulated light emitting diode constant current source drive circuit, photoelectric diode receiving signal amplifying & filtering...
Proceedings Article
Research on Infrared Image Segmentation Method for Electrical Equipment
Yanhua Lei, Yan Bao, Chen Li, Hongtao Yu
Infrared Thermography(IRT) plays a very important role in monitoring and inspecting thermal defects of electrical equipment without shutting down. This paper analyzes two methods on the infrared image gray pretreatment. According to the noise types and characteristics of the infrared image, this paper...
Proceedings Article
Review of Verification Methodologies for Dynamic Reliability Block Diagram
Jiacong Zhao, Dongzhao Zhou, Shuang Gao, Yao Li
Reliability modeling tool Dynamic Reliability Block Diagrams (DRBD) is widely used in modeling reliability of large and complex system. It gains highly achievement of dynamic behaviors like dynamics, dependencies, redundancy and load sharing. In order to guarantee the modeling results of DRBD are correct,...
Proceedings Article
Risk Analysis and Safety Protection of Android Phone
Haiyan Wang, Yan-qing Deng, Ping Zhang
With the all-round development of science and technology, the Android phones represented by Android begin to become an important part in people's lives gradually. People perform voice calls, sending and receiving mail, processing all kinds of information, enjoying the convenience through the Android...