Proceedings of the 2016 7th International Conference on Education, Management, Computer and Medicine (EMCM 2016)

Session: Computer

79 articles
Proceedings Article

[WITHDRAWN] A New Algorithm of Detecting Community Structure Based on Clustering

Pengli Lu, Chaohui Gou
The node intimacy based on information centrality which Fortunato proposed is established, the node intimacy matrix of the network is also established, and the idea of clustering the intimacy matrix of nodes is chosen in this paper. Thus, a new algorithm of detecting community structure based on clustering...
Proceedings Article

Fuzzy PID Iterative learning control for a class of Nonlinear Systems with Arbitrary Initial Value

Xiaohong Hao, Dongjiang Wang
Aiming at a class of nonlinear systems running repeatedly in the study of the convergence of iterative learning control, a PID fuzzy iterative learning control algorithm has been proposed in the arbitrary initial value using fuzzy PID control algorithm, using traditional experience PID parameters by...
Proceedings Article

Research on Client-side Defense Techniques of Cross-Site Scripting Attack

Xuyang Wang, Mingyang Xu
The Cross-site scripting (XSS) is among the most serious and common threat in Web application today. The main purpose of XSS is to steal the user's sensitive information, as its behavior is to send user's sensitive information to a third party without the user's authorization,we can get the XSS attack...
Proceedings Article

Multi-degree-of-freedom Manipulator Driven by Micro Hydraulic System

Nan Li
Now on the market are used motor-driven robot, so the ultimate environment (such as underwater) and cannot successfully complete the operation, and the use of micro-hydraulic system can effectively improve the torque, and can better be used in harsh environments. Using a fuel tank as the power source,...
Proceedings Article

Design of Hardware-in-the-loop Simulation Platform in Propulsion Control Systems of Aero-Engine

Bei Yang, Xiaowu Ding
The performance of the electronic controller is of significance to the development of turbofan engine with afterburner. To verify the feasibility of the control algorithm and the design scheme of hardware and software of the controller, the embedded computer based on PC104 architecture was used as the...
Proceedings Article

Research on Texture Mapping of Geological Models

Jixin Tan, Jianxun Chen
Texture mapping of 3D models is an important problem in realistic graphics. However, there are few methods that are put forward to solve texture mapping of models constructed from nature scenes for the reason that those 3D models are difficult to parameterize to 2D. This paper proposes an algorithm for...
Proceedings Article

Research on the SAR Image Target Tracking Algorithm Based on Sparse Representation and Dictionary Learning

Wenzhun Huang, Xinxin Xie
In this paper, we conduct research on the SAR image target tracking algorithm based on the sparse representation and dictionary learning. The key technology of target tracking is to target can be extracted from the image detection, and to establish corresponding relationship with tracked target. Search...
Proceedings Article

Adding-weight One- rank Local Predication Model of Busy Traffic based on Correlation

Zhimei Duan, Xiaojin Yuan, Yan Xiong
In order to improve accuracy of adding-weight one-rank local prediction, the paper proposed the correlation function to measure the correlation between different phase points, which is used to determine reference neighborhood of prediction center point, and made the values of expressing correlation to...
Proceedings Article

Network Development Under the Condition of Network Supervision and Network Ethics

Deng Tian
With the rapid development of Internet, it also brings a lot of ethical and social problems. If we do not regulate the development of the network and ethics, it is bound to affect the healthy and orderly development of the network. Through the analysis of the influence of network ethics on the development...
Proceedings Article

A Novel Similarity Measure and Its Application in Medical Diagnosis under Intuitionistic Fuzzy Settings

Lishi Zhang
The purpose of this paper is to develop a novel approach for medical diagnosis reasoning, in which a novel similarity measure is defined and used in the application of medical pattern recognition; the information is in the form of intuitionistic fuzzy numbers. First, a new biparametric similarity measure...
Proceedings Article

Research on Robust Task Space Control Uncertainty Based on Legendre Polynomial

Xinwen Bi, Zeliang Zhang, Ming Ma
Usually, the uncertainty bound is needed to design the control law in conventional robust control approaches. However, the proposed bound may increase the amplitude of the control signal and damage the system. To solve this problem, a robust control law is proposed in this paper. The uncertainty bound...
Proceedings Article

High-Contact-First Immunization Strategy on Complex Networks

Fuzhong Nian, Longjing Wang, Tong Liu, Ke Wang
Different from traditional immunization strategies, which suppose that the contact frequency of all nodes is same, in this paper, a new immunization strategy was established based on the principle of 'High-Contact-First'. The different link with different weight describes the relationship between different...
Proceedings Article

The Cloud Data Security and Access Control Model in the Study

Jing Dong
Cloud computing is a kind of based on the calculation of the Internet, through the cloud computing, to other computers and other devices to share information and resources. Although it can bring convenience, operated and managed in a cloud computing infrastructure services in the security problem of...
Proceedings Article

Research on Hand-Held Insulation Tool Detection Alarm Device of Power Operation

Nan Li
In the power operation, according to safety regulations, the staff must wear insulated gloves. However, in practice, the staff is easy to overlook, therefore, to improve security, we have developed a hand-held insulation tool detection alarm device. Method: Device using k60 microcontroller, microcontroller...
Proceedings Article

Numerical Simulation of Glass Molding

Bo Tao
Glass molding is a mass fabrication method for precision glass lenses. Residual stresses induced during cooling process were inevitable reserved in molded glass lenses, and can cause the quality deterioration. Control of the cooling rate is one of the methods to keep residual stresses at a required level....
Proceedings Article

Design for Environmental Three-Dimensional Parking Equipment

Min Zhang, Songling Zhang, Jia Jin, Pengpeng Wang
In this paper, a kind of environmental three-dimensional parking equipment was designed, which was flexible, easy to assemble, disassembled and portable. As a result, the vertical and transverse movements of the parked vehicles were realized in need. Easy assembled and removable steel structure was used...
Proceedings Article

A Study on the Lightweight Mobile IPv6 Protocol Based on Fixed Terminal Node

Yan Pan
Mobile ubiquitous technology and IPv6 technology makes it possible to perform the remote control and information transfer by using the mobile terminal, and it promotes the development of the Internet of things. Therefore, more and more intelligent terminal devices need mobility support, such as intelligent...
Proceedings Article

Technology Using Neural Network Optimization Path in Packet Switching Network

Shoubai Xiao
How to find the optimal path between two nodes has been one of the most difficult problems in the internet. In this paper, a method of finding the optimal path based on neural network technology is proposed, which solves the problem of finding the optimal path by adjusting the weight of the neuron. The...
Proceedings Article

3D Collision Detection Algorithm based on Composite Balanced Binary Bounding Box Tree

Jinping Liu, Jianxun Chen
The existing bounding box has the contradiction between compactness and complexity. On the one hand, the poor compactness of the bounding box often leads to the poor effect of removing the disjoint objects, which leads to the low efficiency of collision detection. On the another hand, the good compactness...
Proceedings Article

A New Feature Selection Method Based on K-Nearest Neighbor Approach

Xianchang Wang, Lishi Zhang, Yonggang Ma
In many data analysis tasks, one is often confronted with very high dimensional data. Feature selection is an effective method to solve the problem with high dimensional data. The aim of feature selection is to reduce the number of features used in classification or recognition. This reduction is expected...
Proceedings Article

The Research about Data Mining of Network Intrusion Based on Apriori Algorithm

Jigang Zheng, Jingmei Zhang
Found that the association between each characteristic attributes and behavior based on network intrusion data to achieve intrusion valuable data extraction and analysis,the use of denial of service attacks recorded KDDCup99 dataset simulation experiments.Weka software using association rule mining algorithms...
Proceedings Article

Research on Date Mining Service Mode under the Environment of Cloud Computing

Wei Huang
Along with the arrival of information era, the network is inundated with all kinds of information, and people are facing various kinds of confusion among the mass information, data analysis becomes a relatively hot potato. The proposal of cloud computing is able to well solve this problem and improve...
Proceedings Article

The Wave Packet Frames with Several Generators

Jinzhou Li, Zheng Wang
The main goal of this paper is to consider the necessary conditions of wave packet systems to be frames in higher dimensions. The necessary conditions of wave packet frames are established, which include the corresponding results of wavelet analysis and Gabor theory as the special cases. The existing...
Proceedings Article

Eternal War in Software Security: A Survey of Control Flow Protection

Bowen Tang, Huan Ying, Wei Wang, Huabin Tang
Software security is the cornerstone of computer system security. Among all the elements consisting of software security, control flow protection is undoubtedly the most important one. Once the process's control flow is hijacked, attacker can manipulate it to implement a variety of malicious acts and...
Proceedings Article

Discussion on Construction of Network Teaching Platform Resources

Keying Jiao
With the development of era and the innovation of the society, people pay more and more attention to the reform and innovation of the education. The network teaching platform as the new teaching mode of the university. Through analyzing the construction of network teaching platform in the colleges, understand...
Proceedings Article

Application Study on Optical Fiber Network Technology in Communication Engineering

Li Li
With the development and progress of society, electronic information technology has made great progress where rapid development of optical fiber technology adds a thick and heavy color. Compared with traditional network technology, optical network technology has advantages of large capacity, fast speed,...
Proceedings Article

The Influence of Self-media on the Ideological and Political Education in Higher Vocational College

Xiaoqun Zhang, JingYu Xu
With the popularization and development of the Internet and the extensive use of electronic products, Self-media has become an important part of people's lives, profoundly affecting people's way of life and communication. And the current higher vocational students are influenced by the most profound...
Proceedings Article

A High-Power High-Fidelity Headphone Amplifier Design

Jian Huang
This circuit is designed to convert the differential output current of an audio digital-to-analog converter(DAC) into a single-ended voltage capable of driving low impedance headphones. Two op amps are used as transimpedance amplifiers which convert the DAC output current to a differential voltage. A...
Proceedings Article

Research on Dynamic System Simulation Model and Algorithm Based on Artificial Neural Network

Shoubai Xiao
With the continuous expansion of applications field on the computer system simulation, the problems of system modeling faced has become more and more complex. At present, there are two main problems: First, modeling object is complex, with a variety of uncertainties and nonlinear characteristics difficult...
Proceedings Article

Application in Grade Early Warning of PCA

Xueli Ren, Yubiao Dai
Students are misled by the traditional concepts after enrolling university, these make some students face many problems such as no goal of learning, no power, that causes students to face serious consequences that failed in courses and quit, bring serious influence to student management. In order to...
Proceedings Article

The Application of Cloud Computing in the Management of Digital Archives in Colleges and Universities

Yingle Yao
Based on the demand of integration and sharing of digital archives resources, this paper analyzes the fit and advantage of cloud computing and digital archives resource management, and puts forward a new idea of sharing and sharing digital archives resources in the cloud computing technology that make...
Proceedings Article

Parameter Optimization of ARQ System based on Proximity-1 Protocol

Jie Wang, Chenghua Wang, Hao Wu, Qiangqiang Mao
In order to improve the communication efficiency of the spacecraft in the Proximity space link, a GBN-ARQ scheme is designed based on the proximity-1 protocol. On the basis of this, to maximize the system throughput and normalized throughput, the data frame length and the sliding window length are optimized,...
Proceedings Article

Construction of Multidimensional Data Knowledge Base by Improved Classification Association Rule Mining Algorithm

Qing Tan
Firstly, this paper analyzes the advantages and disadvantages of the existing association rules mining algorithm, and gives the method of multidimensional data analysis. In order to remedy the defects, this paper discusses and improves clustering and classification algorithm for constructing intelligent...
Proceedings Article

Study on the Response of PM2.5 Pollution to Land Use Change Based on GIS

Ping Zhang, Liang He, Yajuan Zhou, Peishu Huo, Wenbiao Tian
PM2.5 pollution is harmful to human health and ecological environment, and effective control of PM2.5 pollution has important practical significance for regional sustainable development. This paper analyzed the impact of land use change on PM2.5 pollution based on Geographic Information System (GIS),...
Proceedings Article

Research on Key Technologies and Development Status of Cross Border E-commerce

Yongliang Li, Kaifeng Huang
Cross border e-commerce not only broke through the barriers between countries, so that international trade to trade without borders, but it is also causing great changes in world economic and trade. Cross-border electronic business platform is divided into information services platform and online trading...
Proceedings Article

Multi-kernel Partial Least Squares for Multi-Modal Data Analysis

Ping Wang, Hong Zhang
In recent years, multi-modal data analysis has enjoyed an increasing attention. Multi-modal data mean the different modal data representing the same semantics. Moreover, many subspace learning methods are proposed to measure the correlation between different modal data. As the most representative subspace...
Proceedings Article

Computer Network Security Analysis and Research

Limei Cui
In today's era is the era of information technology rapid development, with the constant progress of the society, the network technology is in constant development, now the network is essential in our daily life people less a thing. Using the network, at home the whole messy, never leave home can know...
Proceedings Article

Building Intelligent Precise Logistics Service System by Key Technologies of RFID in the Internet of Things

Guofang Kuang, Zhenfang Song
This paper describes the analysis and research of new intelligent precise logistics system. The development of intelligent logistics is precise, intelligent, integrated and collaborative features. Then this paper discusses the application and prospect of RFID key technology in intelligent logistics....
Proceedings Article

Analysis of Decision Tree Mining Algorithm Based on Improved Rough Set Classification

Lan Wang, Hongsheng Xu
Classification is to find a set of models (functions) that describe the typical features of data set. In this paper, firstly, the rough set classification algorithm is improved. Then, analysis and application of classification algorithm based on improved rough set are described. This paper analyzes the...
Proceedings Article

An Improved Zigbee Routing Algorithm Based on Energy Level Partition

JianQiang Wang
Based on the analysis of large temperature and humidity monitoring system, this paper proposes an improved AODVjr routing algorithm based on node energy level classification. The algorithm is based on the traditional AODVjr algorithm, the tree routing algorithm of node forwarding rules based on parent-child...
Proceedings Article

Some Notes on the Controllability in a Steady State for the Q-W Equations With Weak Decay

Shuxian Deng, Hongen Li
We present a new method of investigating the so-called quasilinear strongly-damped wave equations in this paper, we concerned with the Controllability in a steady state for the Quasilinear Wave Equations with weak decay, and we use a so-called energy perturbation method to establish weak controllability...
Proceedings Article

Research and Design of a Commodities Trading System

Suolan Liu, Lizhi Kong
With the growing development of electronic commerce, the business behavior of many traditional had better play in the Internet. Products transaction market can be said to be a typical example. Compared with the traditional trading model, online operation of commodities trading is more convenient, real-time,...
Proceedings Article

Overview of Tourism Data Mining in Big Data Environment

Wenjie Xiao, Changguo Xiang
With the advent of the information age, the network is filled with all kinds of information and people in the vast amount of information are in the face of all kinds of confusion, thus data analysis has become a more difficult problem. Big data can solve this problem well and can greatly improve the...
Proceedings Article

Development of Alarm System Based on Speech Recognition

Qingsong Zhu, Hongzhao Li, Ruyan Ye, Meide Xu, Fayue Zheng
Aiming at the burglary, fire and the safety and health of the elderly in current living quarters, a kind of alarm system based on speech recognition is developed. The video monitoring device can be triggered by the voice alarm signal which is sent to the mobile client at the same time. Monitor people...
Proceedings Article

Design and Implementation of Single-Phase Inverter Based on Lightweight TCP/IP Protocol

Botao Zhang, Hongwei Xiao
As for resource-limited embedded devices, lightweight TCP/IP protocol (LwIP) is used for communication in order to meet real-time requirements of embedded devices. This paper offered and implemented a single-phase inverter solution based on lightweight TCP/IP protocol. The designed hardware circuit of...
Proceedings Article

Research on Internet Payment Security Based on the Strong Authentication of the Timeliness and Multi-factors

Junsheng Wang, Qingsu He, Qingzhi Han
Security and convenience is the main consideration for the user to select the Internet payment, and also the key issue of the development of the Internet payment industry. At present, on Third-Party Payment Platform, E-bank and other Internet payment platform, when users change the password, pay or transfer...
Proceedings Article

The Computational Model of Spring back Accuracy on Steel Bar Bending Hoop Stirrup

Bianjing Li, Zhiliang Liu
The hooked steel will spring back under the affection of residual stress, in order to improve the precision of the hoop, spring back angle should be taken into consideration. According to spring-back theory, considering the work hardening of steel under the straightening rollers, the relation was deduced...
Proceedings Article

Research on Mars Communication Link Budget

Hao Wu, Chenghua Wang, Jie Wang
This paper presents the budget method of the Mars-earth communication link. The calculation models of Mars atmosphere loss, Mars sandstorm loss, solar scintillation loss, earth atmosphere absorption; rainfall loss and hot body noise are studied. The propagation characteristics of electromagnetic waves...
Proceedings Article

Research on the High Performance System Development and Cloud Platform Building Mode under Parallel Framework

Xinxin Xie, Wenzhun Huang
In this paper, we conduct research on the high performance system development and basic cloud platform building model under parallel framework. Cloud computing is a kind of the public service, its security problem is complex and requires skill, standard, regulation, law and so on various aspects, multi-pronged...
Proceedings Article

Analysis of Network Attack Technologies and Network Security

Xu Pei
With the continuous development and progress of Internet technology, network security has become the focus of social concern. Internet technology occupies a place in all areas of the society and provide a new model for people's lives and learning. While giving full play to the advantages of Internet...
Proceedings Article

Fault Diagnosis of Gearbox based on the Optimized BP Neural Networks by Improved Particle Swarm Algorithm

Zhimei Duan, Xiaojin Yuan, Yan Xiong
In order to improve accuracy of fault diagnosis of gearbox, adaptive mutation particle swarm optimization (AMPSO) algorithm is used to optimize weight of BP. According to fault feature, fault diagnosis is accomplished by optimized BP. The algorithm overcomes disadvantages that slowly convergence and...
Proceedings Article

Research on Network Security Based on IPSec

Yanru Liu
With the development of information technology, Network security issues are very prominent, Network security incidents occur frequently. In order to enhance network security, we must take certain measures that are the use of IP protocol. IP protocol also called Internet Protocol. As defined in the network...
Proceedings Article

Discovery of Fuzzy Rare Association Rules from Large Transaction Databases

Weimin Ouyang
Rare association rules is an association rule which has low support and high confidence. In recent years, the discovery of rare association rules has got quite a lot of attention, which has become a hot topic in data mining research. However, current discovery algorithms for rare association rules are...
Proceedings Article

The Application of Virtual Reality Technology in Ancient Garden Restoration

Jiwei Li, Yingchun Cao
Most traditional methods of ancient garden restoration are to record with text, charts and graphic drawings and then observe the restoration effect through miniatures or color effect pictures. However, those methods are too inflexible, which cannot reflect the unique artistic conception and steric space...
Proceedings Article

Modeling and Simulation of Milling Force of New Type Ball-nose End Mill

Shuai Li
Ball-nose end mill is an essential tool for 3D hook face machining. It is extensively applied in mold, automobile and other fields. The paper set the geometric model of ball-nose end mill as the research basis, conducted discretization for ball-nose end mill cutter, deemed each discrete unit as inclined...
Proceedings Article

Mobile Terminal Security Monitoring System Based on Distributed Agent

Huan Ying, Yu Luo, Lifang Han, Liang Zhou, Songling Shan, Yanhong Chen
Aiming at the lack of effective security monitoring of mobile terminals, this paper proposes a mobile terminal security monitoring system based on distributed agent, which adopts distributed deployment and centralized management. Also, a multi-level malicious behavior monitoring model is proposed to...
Proceedings Article

The Application of TOPSIS Method to Group Decision Making based on Similarity Measures under Interval-valued Intuitionistic Fuzzy Settings

Lishi Zhang
The aim of this paper is to develop a novel approach for multiple attributes group decision making, in which the decision information, provided by multiple decision makers, is presented in the form of interval-valued intuitionistic fuzzy numbers. First, the aggregated information matrix corresponding...
Proceedings Article

On the Advantages of Applying Photoshop Software Technology in Graphic Character Design

Hui Zhang
Figure has been the main theme of art creation since ancient times, and it has been more and more widely used in graphic advertisement design nowadays. In the design of a perfect graphic advertisement character's makeup and style, every link cannot be ignored from design graphic-model selection-props...
Proceedings Article

Process of Computer-assisted Gift Package Design

Lizhen Liu
On the basis of designating concrete data of the product package or conducting measurement and calculation in accordance with the object size, we carry out the physical design for product graphic carton and outer carton. It introduces various stages of the design process. Assisted by some design software,...
Proceedings Article

Improvement of Dirichlet Observation Matrix based on Super Prime Numbers

Huanan Yu, Xin Zhang, Yao Du
The reconstruction quality of the signal is directly determined by the observation matrix in the sense of signal compression. The observation matrix has a strong randomness to ensure the quality of the signal reconstruction, but the hardware implementation of the random observation matrix is more difficult....
Proceedings Article

Design and Implementation of Short-wave Packets Fast Processing System

Haidong Zou, Shengguan He, Ning Dong
Based on the shortcomings in the existing short-wave packets processing procedure, a design and implementation scheme of short-wave packets fast processing system based on single-chip microcomputer processor with high efficiency and high accuracy is introduced. The design of the processing system is...
Proceedings Article

Comparison of Two Kinds of CFA Algorithms in Iris Identification

Hongqi Li, Yan Deng, Wei Su
In an iris recognition system, the iris image quality of CCD signal acquisition is the key factor of system identification. Two kinds of CFA algorithms in iris recognition system image processing module are compared in this paper. Compared with SC interpolation algorithm, SCEE algorithm can improve the...
Proceedings Article

A Tentative Study on Ward Monitoring System based on Zigbee Technology

Jifeng Liang
ZigBee technology is a two-way wireless communication technology. In recent years, wireless sensor network technology based on Zigbee technology has been widely used in many fields, such as environment monitoring, medical care etc. This paper mainly introduces the Zigbee technology, and the Zigbee wireless...
Proceedings Article

Research on Application of Security Technology in Network Engineering

Deng Tian
With the rapid development of computer network, the sharing of various network resources is further strengthened, and the information security problem is becoming more and more prominent. In fact, resource sharing and security has always been a contradiction. In an open network environment, a large number...
Proceedings Article

The Influence and Application of Plug-in Technology on Computer Software

Xinlin Zhang
Plug-in technology is an application that carries a lot of functionality. With the development of plug-in technology, it has a greater influence on computer software. This paper analyzes the concept and connotation of plug-in technology, and brings forward its great influence on the computer software...
Proceedings Article

The Actual Application of Flipped Classroom Mode in Cost Accounting Practical Training

Tangmei Yuan
Cost accounting course consists of the theory teaching and practice teaching. Now, the cost accounting teaching hard to meet the needs of cost accounting jobs due to the compression of total teaching hours and lack of practical input. This paper discuss how to design and implement cost accounting practice...
Retraction

RETRACTION: Application of Redundancy and Information Retrieval Systems in Congestion Control Based on Combined Grey Neural Network and CC and RBF-DDA Algorithms

Feihua Qu
In April 2020, Atlantis Press was alerted to fake proceedings articles hosted on our platform. These articles, mostly in computer science and engineering, were generated by the SCIgen computer program and were all published between 2006-2018. Immediately after receiving the alert, Atlantis Press initiated...
Proceedings Article

The Influence of "Internet +" of the Current Era

Yu Xiang
Throughout the history of human development, every technological change has a great impact on our production and life. The Internet occupies the core position in the new technological innovation, and its development will inevitably have a huge impact on our life. The "Internet plus" is a new form of...
Proceedings Article

Analysis of Data Encryption Technology and Secure Electronic Transaction

Jian Wang
With the rapid development of the modern Internet, e-commerce has been greatly promoted. The advantages of e-commerce gradually appear, as a result, virtual enterprise, virtual bank, Internet marketing, online shopping, online payment, online advertising business and a large number of new business which...
Proceedings Article

Application of Power Electronics in Power System

Mengyao Yang
As the society develops, automation and intelligence is becoming the inevitable tendency of power system, and power electronics is an essential technology for modern science. Advanced power electronics can strengthen and optimize power system to ensure the stability and safety of operation and improve...
Proceedings Article

Design of Experimental Platform for Intelligent Car

Hongtao Yu, Sen Wang, Heyan Wang, Yanhua Lei
Based on the study of the principle of intelligent car movement, this paper designs the tracking process, the PID adjustment process, the real-time monitoring process, and displays the simulation interface on the intelligent car software platform. So that the simulation results can be used to determine...
Proceedings Article

Application and Research of Big Data in E-Commerce Enterprises.Amazon as the Case

Yujie Chen
With the change of people's living habit and consumption concept, the demand of highly personalized products and accurate products is increasing. This condition has a huge impact on the enterprise which cannot adapt to the transformations in the Big Data Era. This paper based on the supply chain which...
Proceedings Article

Analysis and Simulation of 2ASK Digital Band-pass Transmission System Basing on SIMULINK

Geng Wang, Wei Cheng
Digital modulation and demodulation system as an important part of digital communication system,its research is necessary. Based on the analysis of 2ASK digital band-pass system transmission characteristics, SIMULINK software is used to simulate the digital band-pass transmission system. Having been...
Proceedings Article

Overview of System Reliability Modeling Tools

Jiacong Zhao, Yanxia Lu, Qisong Zhang, Xiaoyan Zhang
System reliability is a critical aspect of a system, which incurs the proposing of related modeling tools. Tools like Reliability Block Diagrams (RBD) and Fault Tree (FT) provide static representation of system reliability. RBD is a graphical representation that depicts a network of system components...
Proceedings Article

Research on Dynamic Target Distribution Path Planning Based on Improved Artificial Potential Field-Fish Algorithm in Logistics System

Qisong Zhang, Peng Zhang
Studied on path planning problem of logistics distribution vehicle in logistics system, and put forward an algorithm of artificial fish Swarm with improved potential field. The paper synthesizes variety of factors and takes the total cost of minimum distribution as goal in order to find out the optimal...
Proceedings Article

Design of Signal Conditioning Circuit for Photoelectric Sensor

Nan Xie, Zhennan Zhang, Weimin Chen
The photoelectric sensor is widely used in the detection field, and its two key parts are the light transmitting and the signal receiving. This paper has designed the pulse modulated light emitting diode constant current source drive circuit, photoelectric diode receiving signal amplifying & filtering...
Proceedings Article

Research on Infrared Image Segmentation Method for Electrical Equipment

Yanhua Lei, Yan Bao, Chen Li, Hongtao Yu
Infrared Thermography(IRT) plays a very important role in monitoring and inspecting thermal defects of electrical equipment without shutting down. This paper analyzes two methods on the infrared image gray pretreatment. According to the noise types and characteristics of the infrared image, this paper...
Proceedings Article

Review of Verification Methodologies for Dynamic Reliability Block Diagram

Jiacong Zhao, Dongzhao Zhou, Shuang Gao, Yao Li
Reliability modeling tool Dynamic Reliability Block Diagrams (DRBD) is widely used in modeling reliability of large and complex system. It gains highly achievement of dynamic behaviors like dynamics, dependencies, redundancy and load sharing. In order to guarantee the modeling results of DRBD are correct,...
Proceedings Article

Risk Analysis and Safety Protection of Android Phone

Haiyan Wang, Yan-qing Deng, Ping Zhang
With the all-round development of science and technology, the Android phones represented by Android begin to become an important part in people's lives gradually. People perform voice calls, sending and receiving mail, processing all kinds of information, enjoying the convenience through the Android...