Proceedings of the 2013 International Conference on Advanced Computer Science and Electronics Information (ICACSEI 2013)

+ Advanced search
170 articles

Solutions for a Class of the higherDiophantine equation

Yin xia Ran
We studied the Diophantine equation x2+4n=y9. By using the elementary method and algebaic number theroy, we obtain the following concusions: (i) Let X be an odd number, one necessary condition which the equation has integer solutions is that 28n-1/3 contains some square factors. (ii) Let X be an even...

Design and research of Wind powergenerati on power controller

Zhi jie Tang, Ping long Liu, Jia li Shen, Jun Luo
Wind energy is a kind of inexhaustible and clean renewable energy. Wind power system has some characters of simple structure, convenient maintenance and easy management, which gets a lot of attention. This paper analyses the composition and the principle of wind power system. Based on variable speed...

A new method of DEM drainage extraction based on geoprocessing service

Heng ling Huang, Qun yong Wu
DEM-based drainage extraction is a hot spot in digital hydrology research. This paper has analyzed the method of drainage extraction based on DEM, used Hydrology tools in ArcGIS software to build the model of drainage extraction and published the model to geoprocessing service. Taking Jiulong River basin...

An Anomaly Detection Method for Spacecraft Using ICA Technology

Bing lin Xu, Zhan huai Li
Anomalies, outlier and fault means that the received data do not fit the common pattern, and may often be occur in spacecraft missions because of the high complexity and rugged operating environment of spacecraft. In order to reveal the potential faults or anomalies many methods and technology have been...

Research of Meteorological Facsimile Map Vectorization Algorithm

Ling ling Feng, Guo qing Qi
An algorithm for extracting information from meteorological facsimile maps and transform the map into vector format is proposed. The algorithm contains two parts. The first one is annotation information extraction method based on the regular pattern of position and angle, the second part is isobars vectorization...

Design and implementation of Wavelet Transform using Adaptive Genetic Algorithms and Analog filters

Mu Li, Yi gang He, Yang liang Ou, Jun nian Wang
This paper presents a low power and low-voltage analog switched-current (SI) filters implementation of wavelet transform (WT) for real-time requirements in signal processing. First, an adaptive genetic algorithm (AGA) is used to calculate the transfer function of the filters, whose impulse response is...

Research on Fuzzy Guidance Law for Unmanned Aerial Vehicle

Hui Wang, Zuo yu Guan, Li jun Yu, Bo bo Zhang
The UAV guidance in combating airspace need to make UAV close to the target and complete air strikes, which need to receive all necessary data and information and use these parameters to achieve the UAV guidance. For processing the problems that are irregular and complex, this paper presents a new guidance...

Infrastructure Communication Reliability for WSN on Sink-manycast and Sink-anycast Model

Chun yu Miao, Li na Chen
We consider the problem of the infrastructure communication reliability (ICR) of wireless sensor networks (WSN) on sink-manycast and sink-anycast model. We formulate ICR metrics for WSN with hierarchical clustered topology base on an reduced ordered binary decision diagrams (ROBDD) approach. Furthermore,...

Design and Implementation of Wireless Temperature Controller Based on Zigbee

Qin xia Hao
This paper introduces a design of wireless temperature controller hardware platform based on ZigBee. Wireless temperature controller using ZigBee to build intelligent household heating control system. By CC2530 chip consis the core and related peripheral circuit. Interworking user can realize the information...

Research on Fault Diagnosis of Fin Stabilizer System Based on Optimum Searching Strategy

Li jun Yu, Jin Zhang, Hui Wang
As the composition, working principle and failure data recorded in the process of actual operation, in the non-retractable valve controlled anti-rolling fin system are in-depth analyzed. FTA method is used to set up the fault tree model, and the model is analyzed to determine the failure modes and the...

An Auto-Modeling Method for Industrial Systems

Zhong Han, Guicheng Zhang, Lixing Yuan, Shengdun Zhao
It is a difficult and valuable research to automatically generate the system model according to some rulers desired. So, a new auto-modeling method for industrial systems is presented. In the research, the industrial system is divided into many individual units, and some mathematical expressions are...

A New Scheme to Improve the BER Performance Based on Optimizing Energy Allocation

Ping Li, Xia Shao, Wei dang Zhang
How to improve the channel coding capacity and reduce the bit error rate have been the main research directions of channel coding. In order to improve the bit error rate (BER) performance based on a formula derived from the Union Bound which can estimate the bit error rate for every position in the codeword...

Design of Remote Monitoring System for Household Appliances and Home Security Based on GMS Network

Hua wei Pang
This paper introduces a SPCE061A MCU as the core of the system, it has remote control and remote alarm function. The system uses speech recognition technology and GSM communication network to control the state of the electrical equipment of indoor multi-channel. It also has real-time safety monitoring...

On Chase-Like Bound-Distance Decoding Algorithms

Ling bin Yan, Li rong Yu, Wei jia Lu, Hai feng Xu, Yuan sheng Tang
For the decoding of a binary linear block code of Hamming distance of d over AWGN channels, a soft-decision decoder is said to be bounded-distance (BD) decoding if its squared error-correction radius is equal to d. A Chase-like algorithm outputs the best (most likely) codeword in a list of candidates...

Parameter Calibration of VISSIM Simulation Model Based on Genetic Algorithm

Nu er lan Mu han, Yong Qin, Qing hua Zhang, Yan fang Yang, Zun dong Zhang
Genetic algorithm is used to calibrate four driving behavior parameters and a set of calibration procedure is put forward based on VISSIM. Using the approach maximum queue length and travel time as the evaluation indexes and applying the calibration method to a single signalized intersection of Yizhuang...

A Graphical Password Scheme against Snapshot, Remote Monitoring, And Shoulder-surfing with Its Application in One-Time Password

Cheng xue Qian, Xing wei Song, Yun Huang, Xue jia Lai
In this paper, we present a novel user-friendly graphical password scheme resistant against "watching" attacks. Snapshot, remote monitoring, and shoulder-surfing have in common that all these attacks act as if one could directly watch the users' behavior on the screen, resulting in an insecure use of...

Design and Implementation of Mine Personnel Vital Signs Monitoring Terminal Based on WSN Network

Wen li Lei, Xin cheng Ren, Xin liang Cao, Yang Zhang
For domestic mine poor working conditions and market demand for mine personnel monitoring of characteristic parameters information, the paper presents a WSN-based mine personnel vital signs monitoring terminal which used to collect body temperature, pulse and other physical characteristic parameters....

Research on Privacy-Preserving Technology for Cloud Computing

Xiao long Wang
Consumers will be able to access applications and data anywhere in the world on demand by cloud computing which promises reliable services delivered through next-generation data centers. Cloud computing has a very broad application prospects such as virtualization, large-scale, dynamic configuration...

Application of Neural Network in Wine Grape Quality Evaluation

Wei Fan, Zhi Pan
The aim of this paper is to help select suitable grapes for making red wine by studying the correlation between ingredients of the grapes and the resulting wine. Two progressive models are carried out in determining the relation between physical and chemical indexes of the grapes and the resulting wine....

Research on Modeling Method Based on Least Squares Support Vector Machine

Jun Xu, Kang Du, Yao hui Zhang, Xiao bing Zhu
A method of support vector machine based on particle swarm optimization was proposed for the question of parameter selecting difficult of least square support vector machine in modeling of gas sensor. Least square support vector machine is used to build the model of gas sensor. Particle swarm optimization...

A Threshold Model of Gold Price Market on the Two Stock Markets: Study of the Taiwan and the Korea Markets

Jyi Horng Wann, Chen Chang Jui
Under the factor of gold price market, the empirical results show that the dynamic conditional correlation (DCC) and the bivariate asymmetric IGARCH (1, 1) model is appropriate in evaluating the relationship of the Taiwan’s and the Korea’s stock markets. The empirical result also indicates that the Taiwan’s...

Preparation and Characterization of Electrodeposited Aluminum Oxide Thin Films

Farzana Majid, Saira Riaz, Muhammad I. Akram, Shahid Atiq, Shahzad Naseem
Aluminum Oxide (Al2O3) deposition is being sought for application in space / aerospace as a barrier coating. Al2O3 not only changes the mechanical properties of the aluminum based alloys, it acts as a barrier for harmful radiations. Ionizing radiations are harmful to electronic components, which runaway...

Teaching and researching power electronics with the help of Finite Element Analysis

Rosa Ana Salas, Jorge Pleite
Ferrite inductors are widely used in the field of power electronics, a subject included in various curricula in the universities both at the undergraduate and postgraduate level. These inductors are difficult to model due to the wide variety of shapes, number of turns, and the nonlinear behavior of the...

Considerations On The Stability Analysis Of Subterranean Mining Sites In The Sasar Mining Area – Romania Using Topographical Methods For A Future Re-Usage

Ovidiu Stefan
If the subterranean mining sites are expected to be re-used, determining their stability is fundamental for defining the type of application that will be used. This paper presents general considerations concerning the movement of the rocks in the subterranean mining sites and the topographical measurements...

Some Statistical Models vs. Models Based on SC Applied to Daily Exchange Rates

Dusan Marcek
We developed forecasting models based on the advanced statistical (stochastic) and soft computing (computational intelligence) techniques for predicting high frequency data sets. Firstly, we used the standard statistical tools such as the autocorrelation/partial autocorrelation function, clustering,...

The Research on Classifying Denitrification Electricity Price Based on Method of Operating Period Electricity Price and DEA

Jian guo Zhou, Xiao dan Pan, Lin Meng
In this paper, a vision of classifying denitrification electricity price of various denitrification unit based on different relative efficiency of denitrification is put forward. First of all, take 46 denitrification unit sample of randomly selected nationwide to be the calculation object, using the...

Comparison Between Bag of Words and Word Sense Disambiguation

Ayoub Mohamed H. Elyasir, Kalaiarasi Sonai Muthu Anbananthen
Bag of Words (BoW) and Word Sense Disambiguation (WSD) are the main approaches utilized in almost every data mining project for classification and data processing. The two approaches are extensively used in constructing various classifiers including supervised, unsupervised and semi-supervised classifiers....

Communicating with Lunar Orbiter by Relay Satellites at Earth-Moon Lagrange Points

Hui Li
In order to continuous communication with lunar orbiter and even far side station at the back of Moon, Lagrange points L1, L2, L4and L5 is considered to be candidates for relay satellites or orbiters in the Earth-Moon restricted three body system. Positions of Lagrange points in solar system including...

A Note on Finite Groups Whose all of Subgroups are C-Normal

Z. Mostaghim
A subgroup H of a group G is said to be c-normal in G if there exists a normal subgroup N of G such that HN=G and H N Core(H) where Core (H) is the largest normal subgroup of G contained in H . In this paper we consider finite P-groups of order at most P4 where P is a prime and show that all of their...

A Research on Deviation of Analysts Forecast -Based on Chinese Stock Market

Wei guo Xiao, Yu rui Huang
This Study extends prior research on analyst forecast and market price discovery. Based on data of Chinese stock market, I found that security analysts’ accuracy of earnings forecasts shows a weak maintenance and their accuracy increases with the boldness of their forecasts. Chinese analysts appear more...

Linking personality traits and job satisfaction to creativity

Qin xuan Gu, Ming chuan Yu, Yu Guan
In this study, we examine the roles of job satisfaction and proactive personality in the relationship between the four Big Five traits and creativity. Regression analysis is used to test the hypotheses in a sample of 162 respondents. The results show that extraversion and agreeable are positively related...

Robust Range Assignment Strategy for Wireless Sensor Networks

Xue jian Zhao, Xiao jun Wang, Bin Xu
The RA (Range Assignment) strategy is an art of setting nodes’ transmitting ranges to generate a network with desired properties and at the same time reducing node energy consumption and/or increasing network capacity. In this paper, a distributed RA strategy RRAS (Robust Range Assignment Strategy) is...

An Extensible Approach to Extracting Specification from Device Driver Source Codes Using XSL

Lei Xiao, Jian feng Cui, Xiao zhu Xie, Li juan Liu
Generally, device drivers have various implementations depending on the environments such as target devices and operating systems. The concept of device driver specification has been introduced to increase understand ability of device drivers and their implementation. This paper presents an XSL-based...

Research of corporate ERP performance evaluation model based on system dynamics

Ling Wei, Wei xi Zhang
With the rapid development of the global information technology and the widespread application, enterprises put higher forward requirements on the implementation of ERP performance management. In order to solve the problem that majority of enterprises performance evaluation system of ERP attach importance...

Image Recognition of Wheat Disease Based on RBF Support Vector Machine

Lian zhong Liu, Wu Zhang, Shuang bao Shu, Xiu Jin
The paper proposes an image recognition method of wheat disease. Image background is first removed by image segmentation using green feature of wheat leaf to obtain only disease pixels from original leaf image. Then disease features are calculated through 3 schemes: 1) mean values of R, G, B; 2) normalized...

A PSO-Based Overload Control Algorithm to Application Servers in Next Generation Electric Communication Networks

Hong hao Zhao, Fan bo Meng, Qing qi Zhao, Wei zhe Ma, Ri min Jiang, Xiao guang Bian
This paper analysis overload control characteristics of the application server in the next generation electric communication network, as well as the application server overload detection requirements, propose an energy efficiency overload control algorithm based on particle swarm. First of all, we consider...

Imaging Algorithm of Missile-borne SAR in Diving and Squint Mode

Zhen Wang, Xiao dong He, Bin Tang
In this paper, we propose an imaging algorithm of missile-borne SAR in diving and squint mode. The diving acceleration, vertical speed, and squint angle caused a large range cell migration (RCM). The algorithm divides the RCM correction (RCMC) into two steps. Firstly, correcting the main part of range...

The Classification of Environmental Audio with Ensemble Learning

Yan Zhang, Dan jv Lv, Ying Lin
Environmental audio classification has been the focus in the field of speech recognition. The paper proposes using ensemble learning to perform environmental audio classification. Ensemble learning is to train multiple component learners and combine their predictions to enhance the accuracy of classification....

Comprehensive Validation Platform for Complex Aircraft Avionics Systems

Nicolas Favarcq, Pierre Palluau, Olivier Sentier, Jia Wang
Since 10 years, aerospace industry is facing an unprecedented cycle time reduction driven by high competition between Aircraft manufacturers. To safely sustain such optimizations, virtual test is becoming essential in avionic development cycle. Modern aircraft validation techniques rely heavily on virtual...

A Fault Propagation Model of Embedded Systems Based on Fault Association

Qing Hua Gao, Chang zhen Hu, Kun sheng Wang, Huai Zhi Yan
According to the characteristics of the hardware associated with software in embedded systems, this paper defined a new Fuzzy Petri Nets, and presented a model of embedded systems based on the Fuzzy Petri Nets according to the new definition. Finally, an example showed the specific modeling method and...

The Optimal Stopping Method for Search Engine Returning Trustworthy Results

Jing jing Huang, Guo sun Zeng
The search engine generally returns a large number of results corresponding to a given query, making it more difficult for users to get the information they really look for. This paper gives a research on the optimal stopping method for search engine returning trustworthy results: firstly, it describes...

Observation on Scientific Development of Our Forest Product Trade from Viewpoints of Trade Dilemma

Xuan deng Xue, Cong cong Lan
The forest product trade is a very important part in the foreign trade.Under the current situation of increasingly fierce world trade competition and worse trade barriers, the promotion of the scientific development of foreign trade of forest products is an objective requirement of practising the scientific...

Study on the Management Certification and the Process Management of the Carbon Sequestration and Utilization

Hui Ma
With the attention paid to the management of carbon emission, the technology of carbon sequestration and utilization has become hot technologies and integrated disciplines. In addition to technical issues, risks and effectives are concerned. On the basis of CCUS exploring, drawing the references from...

OFDM Channel Estimation Algorithm Research and Simulation in Tunnel Environment

Ting Wang, Ming Lv
Least square (LS) algorithm based on least square criterion has poor estimation performance under low signal to noise ratio, if we directly use this method in tunnel environment, it will lead to larger estimation error. Considering the defects of the LS algorithm, this paper propose an improved LS channel...

A hierarchical orderly layout algorithm based on channel points

Yi kun Zhang, Kai bao Hu, Xin hong Hei, Ming Zhao, Ming hui Zhang, Hao Chen
Since the conventional hierarchical layout algorithm has the disadvantage of wiring chaos in large programs, so on the basis of Sugiyama layout algorithm, this paper proposes a hierarchical orderly layout algorithm based on channel points. Adjust the number of each node in the channel dynamically according...

Error Signal Difference Based Variable Step Size LMS Algorithm

Min Zhang, Bao qi Huang, Li qian Wang
A variable step size Least Mean Square (LMS) algorithm based on the difference of the error signal (ESD-VSS) is proposed. The convergence and steady state behavior of the ESD-VSS is analyzed and the key parameters are given. Simulations are conducted and the results show that, compared with the Modified...

A Key Management and Public Auditing Scheme for Outsourced Data

Chang sheng Wan, Juan Zhang, Lin Zhou, Zhong yuan Qin
Public auditing has vital significance in cloud computing. However, current auditing scheme are costly. This paper brings out an AAA based public auditing architecture for cloud computing, which is much more efficient than current schemes.

The Development and Application of Automated External Defibrillator

Yu rong Huang, Hua qiao Lv, Yuan yuan Hou
Using Automated External Defibrillator (AED) to treat sudden cardiac death patients is recognized to be one of the most effective methods at present, and AED has been used widely in the United States, Japan, Britain and other countries, and some countries also had legislated to promote the installation...

Exemplar-based Image Inpainting using Structure Tesnor

Kui Liu, Jie qing Tan, Ben yue Su
Exemplar-based image inpainting techniques face two main problems. One is the decision of filling-in order which has a strong impact on image inpainting effect. Another problem is greedy search process while searching for the best exemplar patch. This paper presents a robust method for exemplar-based...

Infrared and Vsible Image Fusion Method Based on Wavelet Transform

Yu Chen Lin, Tian Hua Chen
According to the feature of infrared and visible image , a method of image fusion based on wavelet transform is proposed in this paper . Firstly, we make wavelet transform for the infrared and visible image after Preprocessing and regist-ration, so we get the different frequency wavelet coefficients...