Proceedings of the 2013 International Conference on Advanced Computer Science and Electronics Information (ICACSEI 2013)
A Fault Propagation Model of Embedded Systems Based on Fault Association
Qing Hua Gao, Chang zhen Hu, Kun sheng Wang, Huai Zhi Yan
According to the characteristics of the hardware associated with software in embedded systems, this paper defined a new Fuzzy Petri Nets, and presented a model of embedded systems based on the Fuzzy Petri Nets according to the new definition. Finally, an example showed the specific modeling method and...
New Forgery Attack on Chang et al.'s signature scheme
Li Kou, Ming Jin
Chang proposed one new digital signature scheme with message recovery and claimed the scheme is secure without using one-way hash function and message recovery.Two forgery attacks have been proposed to show that attackers who have a valid signature can forge signatures that can be verified validly on...
Solutions for a Class of the higherDiophantine equation
Yin xia Ran
We studied the Diophantine equation x2+4n=y9. By using the elementary method and algebaic number theroy, we obtain the following concusions: (i) Let X be an odd number, one necessary condition which the equation has integer solutions is that 28n-1/3 contains some square factors. (ii) Let X be an even...
Design and research of Wind powergenerati on power controller
Zhi jie Tang, Ping long Liu, Jia li Shen, Jun Luo
Wind energy is a kind of inexhaustible and clean renewable energy. Wind power system has some characters of simple structure, convenient maintenance and easy management, which gets a lot of attention. This paper analyses the composition and the principle of wind power system. Based on variable speed...
Cryptanalysis of an Implementation of TTM Cryptosystems Based on Q2k -module
Hong wei Tao
TTM cryptosystems proposed by T.Moh are very fast due to the properties of tame automorphisms and small finite fields. The success of the first implementation of this system relies on the construction of Q8-module. Unfortunately, Jintai Ding and Timonthy Hodges have defeated it by decomposing function...
A new method of DEM drainage extraction based on geoprocessing service
Heng ling Huang, Qun yong Wu
DEM-based drainage extraction is a hot spot in digital hydrology research. This paper has analyzed the method of drainage extraction based on DEM, used Hydrology tools in ArcGIS software to build the model of drainage extraction and published the model to geoprocessing service. Taking Jiulong River basin...
Gaussian Mixture Noise Improving Nonlinear Multiple Signal Detection
You guo Wang, Huan Li, Qiu yun Hu
Based on a nonlinear signal detector, stochastic resonance (SR) of noise-improved multiple signal detection is discussed for Gaussian mixture noise with different parameters. Signal transits from supra-threshold to sub-threshold when the threshold of the nonlinear signal detector is raised and noise...
The Non-Uniform Grid in the FDTD Modeling of the Earthing Conductor in the Transient Grounding resistance Analysis
Jian Hong Xu, Yun Fei Mao, Jian Chen
The grounding system plays an important part in the lightning protection system of power and communication systems. The finite-difference time-domain (FDTD) method is widely used in modeling complex electromagnetic interaction problems. However, it is difficult to model the earthing conductor using the...
The Construction of Smart City Based on SoS
Han hua Lu, Fei Guo, Feng Huang, Ren de Chen
Because of its promotion in social development, Information Communication Technology (ICT) is drawing attention globally. As a result, the development of Smart City in our country is coming to the forefront. Correctly understanding the essence of Smart City is crucial for its development. In this paper,...
The Optimal Stopping Method for Search Engine Returning Trustworthy Results
Jing jing Huang, Guo sun Zeng
The search engine generally returns a large number of results corresponding to a given query, making it more difficult for users to get the information they really look for. This paper gives a research on the optimal stopping method for search engine returning trustworthy results: firstly, it describes...
Fluid-dynamic-based Three-dimensional Space Smoke Rendering Method
Ping Zhang, Jie Xiao, Hong hui Li
Based the theory of fluid dynamics, an efficient method is proposed for rendering smoke movement in three-dimensional space. Real-time rendering of smoke movement is implemented with coarse grid and larger time interval by solving Navier-Stokes equations. Experimental results show that the method is...
Observation on Scientific Development of Our Forest Product Trade from Viewpoints of Trade Dilemma
Xuan deng Xue, Cong cong Lan
The forest product trade is a very important part in the foreign trade.Under the current situation of increasingly fierce world trade competition and worse trade barriers, the promotion of the scientific development of foreign trade of forest products is an objective requirement of practising the scientific...
An Anomaly Detection Method for Spacecraft Using ICA Technology
Bing lin Xu, Zhan huai Li
Anomalies, outlier and fault means that the received data do not fit the common pattern, and may often be occur in spacecraft missions because of the high complexity and rugged operating environment of spacecraft. In order to reveal the potential faults or anomalies many methods and technology have been...
Study on Acquisition System of Diversification Heartbeat Information based on Body Sensor Network
Jun rong Bao, Wen feng Li, Bi zhen Lian, Jian Li, Yan hong Ge, Jia gen Jin
Heartbeat information and motion parameters have a close relationship with human’s health and emotion. The feasibility of acquisition heartbeat information associated with emotional states based on body sensor network is a hot research topic. In this paper, we investigate four kinds of method to collect...
An Investigation of Range-velocity Deception Jamming Modeling
Ying Xiong, Hai yan Gu, Bin Tang, Yong qiang Zhang
This paper explores the modeling method of range-velocity deception jamming, which can deceive the victim radar on range and velocity information simultaneously. By analysis of the producing mechanism, maneuvering strategies and pulling rules of this jamming, the basic mathematical models are established...
A New Method for Cloud Data Reduction Using Uniform Grids
San yuan Zhao, Fen xia Li, Yong mei Liu, Yong hui Rao
Due to the continuous development of 3D scanning technology, the point cloud data is becoming more and more redundant. Storing or handling these data will consume a lot of time and computer resources. In this paper, a method for cloud data reduction based on 3D Grids is proposed. It includes searching...
Micro-Electro-Mechanical Systems United Constrained Model Construction and Application
You ping Gong, Guo jin Chen, Zhi hua Li
Micro-Electro-Mechanical Systems (MEMS) are the integration of mechanical elements, sensors, actuators, and electronics at the micron-scale or even at nano-scale through micro fabrication technology, which involves the mechanical, electronic, fluid, thermal, optical, magnetic and other disciplines, how...
Study on the Management Certification and the Process Management of the Carbon Sequestration and Utilization
With the attention paid to the management of carbon emission, the technology of carbon sequestration and utilization has become hot technologies and integrated disciplines. In addition to technical issues, risks and effectives are concerned. On the basis of CCUS exploring, drawing the references from...
Design and Implementation of Network Time-Frequency Test System
Rui qiong Chen, Ya Liu, Ye Ren, Xiao hui Li
As a key technology of the measurement of precise time-frequency signal, network test is one of the important directions of development of the test system. By means of putting the measurement equipment under remote control via Internet, the network test system provides anytime and anywhere monitoring...
Towards the Independent Spanning Trees in Conditional BC Networks
Bao lei Cheng, Jian xi Fan, Shu kui Zhang, Yan Wang, Xi Wang, Wen jun Liu
Independent spanning trees (ISTs for short) in networks have applications such as reliable communication protocols, the multi-node broadcasting, one-to-all broadcasting, reliable broadcasting, and secure message distribution. However, it is an open problem whether there are ISTs rooted at any node in...
The Time-Frequency Characters Analysis Of The Snoring Signal
Yin hong Zhang, Quan lu Li, Jing Wu, Jin Li
The snoring is a typical inspiratory sound appearing during sleep. It is an important characters of upper airway obstruction. The severe snoring sound leads to the Obstructive Sleep Apnea Syndrome during persistent ventilatory movements and it can result in cessation of breathing. This paper presents...
A Component-based Software Development Method Combined with Enterprise Architecture
Yi Luo, Chan le Wu, Lei Huang, Gang Ye
It’s very important to ensure the unity of software architecture and business goal in application software development. This paper presents a new software development method based on enterprise architecture, describes the process of building enterprise IT architecture and transformation enterprise IT...
Global Synchronization Analysis For Complex Networks With Coupling Delay
Jin fang Zhang, Yuan hua Qiao, Jun Miao, Li juan Duan
Global synchronization analysis for complex networks with coupling delay is investigated in this paper. The delay considered in this paper is constant. Sufficient conditions depending on the time delay are given based on Lyapunov functional, linear matrix inequality and Kronecker product technique. The...
Investigation On Space-Time Signal Processing Technology Based On Data Channelization
Chun Hua Yang, Zhen Lin Tu
High accuracy of parameter estimation and real-time processing is difficult in electronic support management signal processing with low SNR(Signal -Noise-Ratio). Traditional algorithms can be only effective for high SNR. In this work, classical spatial spectrum estimation is integrated with data channelization...
Application of LS-SVM in fault Diagnosis for Diesel Generator Set of Marine Power Station
Li wei Chen, Huan Liu
In this paper support vector machine (SVM) algorithm being discussed, then discussed least squares support vector machine(LS-SVM) algorithm, at the same time, the applications of SVM in the fault diagnosis of turbocharger system for diesel generator set of marine power station being discussed, the least...
OFDM Channel Estimation Algorithm Research and Simulation in Tunnel Environment
Ting Wang, Ming Lv
Least square (LS) algorithm based on least square criterion has poor estimation performance under low signal to noise ratio, if we directly use this method in tunnel environment, it will lead to larger estimation error. Considering the defects of the LS algorithm, this paper propose an improved LS channel...
A hierarchical orderly layout algorithm based on channel points
Yi kun Zhang, Kai bao Hu, Xin hong Hei, Ming Zhao, Ming hui Zhang, Hao Chen
Since the conventional hierarchical layout algorithm has the disadvantage of wiring chaos in large programs, so on the basis of Sugiyama layout algorithm, this paper proposes a hierarchical orderly layout algorithm based on channel points. Adjust the number of each node in the channel dynamically according...
The Relation Research of Data Quality to Decision Quality and Results in Emergency Decision-making
Sheng li Pan, Jun Tian
The data and information usually are inaccurate in emergency decision, which influence decision results and quality. The paper aims explore how to determine relation of data quality to decision results and quality in emergency decision-making. The paper methods apply Bayes decision, involve prior and...
Research of Meteorological Facsimile Map Vectorization Algorithm
Ling ling Feng, Guo qing Qi
An algorithm for extracting information from meteorological facsimile maps and transform the map into vector format is proposed. The algorithm contains two parts. The first one is annotation information extraction method based on the regular pattern of position and angle, the second part is isobars vectorization...
Design and implementation of Wavelet Transform using Adaptive Genetic Algorithms and Analog filters
Mu Li, Yi gang He, Yang liang Ou, Jun nian Wang
This paper presents a low power and low-voltage analog switched-current (SI) filters implementation of wavelet transform (WT) for real-time requirements in signal processing. First, an adaptive genetic algorithm (AGA) is used to calculate the transfer function of the filters, whose impulse response is...
Research on Fuzzy Guidance Law for Unmanned Aerial Vehicle
Hui Wang, Zuo yu Guan, Li jun Yu, Bo bo Zhang
The UAV guidance in combating airspace need to make UAV close to the target and complete air strikes, which need to receive all necessary data and information and use these parameters to achieve the UAV guidance. For processing the problems that are irregular and complex, this paper presents a new guidance...
Design Fuzzy Controller Based on Function Self-tuning
Hui Wang, Bo bo Zhang, Li jun Yu, Zuo yu Guan
Fuzzy Control is one of important and effective way in intelligent control, with its unique fuzzy theory, summed control rules directly from the experiences of control, opened up new avenues for the time-lag systems. In order to make the fuzzy control system can maintain a rapid and efficient control,...
An Algorithm of Selecting more than Four Satellites from GNSS
Dan Song, Peng fei Zhang, Guo chao Fan, Cheng dong Xu
By analyzing the relationship between the GDOP value and the area of the polygon formed with the endpoints of the satellite-receiver unit vectors in 2-D, the optimal satellite-receiver geometry (SRG) and the minimum GDOP value of n satellites( ) in 3-D were deduced in this paper. Based on the minimum...
Automated Counting and Identification of Cell Colonies Based on Distance Transform and Progressive Erosion
Zhi feng Hu
In this paper, a novel algorithm is proposed to facilitate the automated counting and identification of cell colonies in a Petri dish. In order to detect all the individual colonies, the original Petri dish image is converted to a black white version, after which a distance transform is carried out to...
Central-Type Fusion-based Methods for Degraded Image Understanding
Cui Zhang, Xiu jun Zhang, Sheng ying Zhao, Li na Shang, Kai Xiong
Information fusion in target recognition is widely used, and application of information fusion in image field is developing continuously. When the degraded image is acquired, we often use the clearness algorithm to enhance image quality, Then the image of the target is identified, due to the lack of...
Error Signal Difference Based Variable Step Size LMS Algorithm
Min Zhang, Bao qi Huang, Li qian Wang
A variable step size Least Mean Square (LMS) algorithm based on the difference of the error signal (ESD-VSS) is proposed. The convergence and steady state behavior of the ESD-VSS is analyzed and the key parameters are given. Simulations are conducted and the results show that, compared with the Modified...
Hot Data Detector based High-Performance NAND and PRAM Hybrid Storage
Yu Zhang, Yi zhi Wu, De min Li, Hai xiao Shan
The high-performance and low cost NAND Flash and PRAM (Phase-changed RAM) hybrid storage designs have been proposed for embedded systems. However, the system is still suffering from serious performance degradation for continuous write/read operations in the same logical address frequently due to physical...
Research on Heterogeneous Data Integration Technology for Personal Public Utility Bills Management Platform
Jia yun Pan, Ying hua Xie, Zhuan Song
At present public utility bills systems are independent of each other and data in these systems are heterogeneous. In view of this issue, this paper combines the middleware and Web Service technology to come up with an integrated management platform to integrate heterogeneous data and query public utility...
A Key Management and Public Auditing Scheme for Outsourced Data
Chang sheng Wan, Juan Zhang, Lin Zhou, Zhong yuan Qin
Public auditing has vital significance in cloud computing. However, current auditing scheme are costly. This paper brings out an AAA based public auditing architecture for cloud computing, which is much more efficient than current schemes.
Key Frame Extraction Towards Kernel-SIFT Identification
Zhen yu Wu, Rui qing Wu, Hong yang Yu, Bin Tang
Key frame detection is a fundamental technique in video retrieving and video summarizing. In this paper, an effective and efficient content-based key-frame detection method is proposed. This method is based on content analysis and features detection from key frames. There are two main contributions in...
Infrastructure Communication Reliability for WSN on Sink-manycast and Sink-anycast Model
Chun yu Miao, Li na Chen
We consider the problem of the infrastructure communication reliability (ICR) of wireless sensor networks (WSN) on sink-manycast and sink-anycast model. We formulate ICR metrics for WSN with hierarchical clustered topology base on an reduced ordered binary decision diagrams (ROBDD) approach. Furthermore,...
Wireless Remote Data Transmission Technology be Used in the Grating Demodulation Instrument
Xian wei Meng, Zhuo jing Yang, Qing Zhang, Yan xin Shi, Xiao fei Zhang
According to the property of GPRS network transmission, wireless remote data transmission technology is applied to the monitoring data of fiber Bragg grating, through the GPRS network to transmit the FBG monitoring data to data monitoring center, in the numerical control center can understand the monitoring...
The Transitive-Closures of Matrices over Idempotent Semirings and its Applications
Zhixi Wang, Yana Wang, Yong He, Binliang Hu
The Algebraic Path Problem is an important issue with a broad background. Consider the problem to solve the algebraic path problem can be concluded to find the Kleene closure of the adjacency matrix, an algorithm of time complexity to find the transitive_closure of matrices over idempotent semiring is...
A Small Ultra-Wideband Folded Half E-shaped patch antenna
Zhi wei Shi, Si wei Xie, Yu shan Pan
A novel fourth wavelength folded Ultra-wideband microstrip antenna is presented in this paper. This patch antenna is combined half structure technique and folded patch technique to create a Ultra-wide impedance broadband patch antenna with small geometric size. It is employed the same parameters as the...
A Modified Staged Continuous Tabu Search Algorithm
Feng chen Wang, Rong hua Ji, Li jun Qi, Wan lin Gao
Based on the staged continuous tabu search (SCTS) algorithm, a modified staged continuous tabu search (MSCTS) algorithm is proposed in this paper to improve the convergence, speed and robustness of tabu search (TS) algorithm. The improvements focus on the selection method of the neighborhoods in MSCTS...
A New Large Family of Binary Sequences with Large Linear Span and Low Correlation
Jun Chen, Yun Chen
Let n, m and r be three positive integers such that n = 2m and gcd(r, 2m - 1) = 1, a new family S(r) of 25n/2 binary sequences of period 2n - 1 is proposed. The presented family takes 7-valued out-of-phase atuo- and cross-correlation values -2n/2 - 1, -1, 2n/2 - 1, 2.2n/2 - 1, 3.2n/2 - 1, 4.2n/2 - 1...
The Analysis of Total User Experience for B2C Mobile Shopping
Su dong Jiang, Cong cong Chen, Xiao Li
The B2C mobile shopping has become the highlight of the development of mobile e-commerce gradually, user experience is becoming increasingly important. Firstly, according to the "2012 of Chinese e-commerce market data monitoring report" published by the China Electronic Commerce Research Center, 10 typical...
Energy-efficient clustering routing algorithm for heterogeneous wireless sensor networks
Si qing Li
Energy heterogeneity is ubiquitous in wireless sensor networks. Because of nodes’ initial energy of multi-level energy heterogeneity in wireless sensor networks distributing within a certain scope randomly, this paper proposed an Energy-efficient clustering routing algorithm which is suit to the heterogeneous...
Markerless Registration Based on Natural Features Tracking for Augmented Reality
Zi liang Jiao
In augmented reality system, registration is always a problem which is difficult to resolve effectively, especially for marker less registration. Due to the placed marks for marked visual registration method, it would cause visual pollution, and the registration often fails when the mark is partially...
Optical Polarization Errors in Sagnac Fiber Optic Current Sensor
Li hui Wang, Jian Sun, Jian fei Ji, Sheng bao Xu
Sagnac fiber optic current sensor(S-FOCS) is a kind of precision instrument based on optical polarization and optical interference theory. There are several kinds of error characteristics from optical components in S-FOCS, including polarizer, integrated optical chip, quarter-wave retarder, sensing head...
Application of Intelligence Algorithm on TSP ----Based on the Data the Cities in Guangdong
Li yao Yang, Kai lian Lin, Shi yu Lin, Xiao fei Gao, Shi qi Ye
In this paper, we applied four intelligent algorithms into solving the classic Traveling Salesman Problem (TSP). By drawing comparisons and analysis on the pros and cons of this four algorithms, TSP problem can be better solved. This paper begins with the discussion of the background and principles of...
Free vibration analysis of embedded SWCNTs using DQM based on nonlocal Euler-Bernoulli beam theory
Maria Anna De Rosa, Maria Lippiello, Hector Martin, Francesco Vairo
The present paper deals with the free vibration analysis of single-walled carbon nanotube in an elastic medium based on nonlocal Euler-Bernoulli beam theory. The differential quadrature method (DQM) is applied to finding free frequencies of nano-beam systems having to the ends translational and rotational...
Design and Implementation of Wireless Temperature Controller Based on Zigbee
Qin xia Hao
This paper introduces a design of wireless temperature controller hardware platform based on ZigBee. Wireless temperature controller using ZigBee to build intelligent household heating control system. By CC2530 chip consis the core and related peripheral circuit. Interworking user can realize the information...
Research on Fault Diagnosis of Fin Stabilizer System Based on Optimum Searching Strategy
Li jun Yu, Jin Zhang, Hui Wang
As the composition, working principle and failure data recorded in the process of actual operation, in the non-retractable valve controlled anti-rolling fin system are in-depth analyzed. FTA method is used to set up the fault tree model, and the model is analyzed to determine the failure modes and the...
An Auto-Modeling Method for Industrial Systems
Zhong Han, Guicheng Zhang, Lixing Yuan, Shengdun Zhao
It is a difficult and valuable research to automatically generate the system model according to some rulers desired. So, a new auto-modeling method for industrial systems is presented. In the research, the industrial system is divided into many individual units, and some mathematical expressions are...
A New Scheme to Improve the BER Performance Based on Optimizing Energy Allocation
Ping Li, Xia Shao, Wei dang Zhang
How to improve the channel coding capacity and reduce the bit error rate have been the main research directions of channel coding. In order to improve the bit error rate (BER) performance based on a formula derived from the Union Bound which can estimate the bit error rate for every position in the codeword...
Design of Remote Monitoring System for Household Appliances and Home Security Based on GMS Network
Hua wei Pang
This paper introduces a SPCE061A MCU as the core of the system, it has remote control and remote alarm function. The system uses speech recognition technology and GSM communication network to control the state of the electrical equipment of indoor multi-channel. It also has real-time safety monitoring...
Concept Lattice-Based Semantic Web Service Ontology Merging
Using ontology semantically express the service of capabilities, correctly match, discovery and composition service. Domain ontology and Formal Concept Analysis aim at modeling concept. In ontology engineering the FCA role is reusing independently developed domain ontology. The method is intended to...
An Approach of Removing Stroke Based on Touching Pattern for Handwritten Digits Segmentation
Rui Ma, Ya ping Cheng, Yun hua Gu
For finding precise segmentation, a new approach to remove and amend stroke connecting touching handwriting digits based on touching pattern is presented. Firstly, background region of touching digits is analyzed by using water reservoirs concept, and then the classification scheme is developed to identify...
On Chase-Like Bound-Distance Decoding Algorithms
Ling bin Yan, Li rong Yu, Wei jia Lu, Hai feng Xu, Yuan sheng Tang
For the decoding of a binary linear block code of Hamming distance of d over AWGN channels, a soft-decision decoder is said to be bounded-distance (BD) decoding if its squared error-correction radius is equal to d. A Chase-like algorithm outputs the best (most likely) codeword in a list of candidates...
Study on the Doppler shift and Channel Model for V2I, V2V in ITS
Sun Kuk Noh, Byung Rae Cha, Jae Young Pyun, Dong You Choi
The use of Vehicle–to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication will be an integral part on Intelligent Transportation System (ITS), and work on ITS has been growing substantially in recent years. A recent standard for V2V communication in the 5.2GHz band has been developed. Characterization...
Super-resolution Reconstruction for Facial Images Based on Local Principal Component Analysis
Jin ping He, Guang da Su, Jian sheng Chen
In order to improve the ghosting effect appearing the reconstruction results which are obtained through applying Principle Component Analysis (PCA) on the whole images, a novel algorithm which is reconstructed through applying PCA on local image patches is proposed. The new method firstly proposes the...
Direction Measurement in Air Using Sensitivity Compensated Signal and Pulse Compression
Dai Chimura, Ryo Toh, Seiichi Motooka
Ultrasonic pulse-echo method is widely employed for acoustical measurement in ocean or remote sensing in air such as automobiles and robots. Time-of-flight (TOF) is usually employed for target ranging. In order to acquire TOF with higher accuracy, pulse compression method is usually employed. For high-resolution...
An Improved Gesture Tracking Algorithm Based On Depth Image Information
An improved Depth Image CamShift (DI_CamShift) algorithm is proposed to realize the accurate tracking of gestures in the sign language video. First, it used Kinect to obtain the depth image information of sign language gestures. Then it adjusted the search window by calculated spindle direction angle...
Research on An XML-based Metadata for Ancient Chinese Architecture
Jing Wan, Ze Yuan, Hui ming Luo, Jun kai Yi
Ancient Chinese architecture was digitalized preserved in the projects funded by the government in the past few years. Many application systems have been built in order to use these digital resources effectively. In this paper, we investigate a practical framework for data exchange and sharing among...
The Digital Correlator Based on FPGA in PCS
Hai ying Jiang, Yu liang Ma, Lu Zhang
Based on the calculation theory of photon correlation spectroscopy and the internal structure on the digital correlator, the digital correlator is designed for the photon correlation spectroscopy. Using FPGA powerful computing function and abundant memory resources to achieve the 256 channel digital...
The Intelligent Home System Controlled by SMS
Jia bo ZHang, Ke yu Bao, Xiang Liu, Chang chun Feng
It includes two parts for the controlling system of intelligent home. The remote controlling part is a smart phone with Android apps, and another is the operation and execution part, which is a monitoring system controlled by the Single Chip Microcomputer (SCM). The later provides information collection,...
Research and Implementation of Tobacco Leaf Value Chain Management Based on ERP and PDM in Tobacco Industry Enterprise
Nowadays tobacco enterprises are required to enhance the level of tobacco leaf management in order to increase their competitiveness in complex markets. Tobacco leaf value chain management plays a fundamental role in this process as the correct implementation of strategies is determined by the information...
Robust Mean Square Exponential Stability of Stochastic Interval Cellular Neural Networks with Time-delays
Zhi chao Liu, Jin fang Han
The problem of robust mean-square exponential stability for a class of stochastic interval cellular neural networks with time-delays is investigated. Firstly, a kind of equivalent description of this stochastic interval delayed cellular neural networks is presented. Then by using the formula, Razumikhin...
Design and Implementation of FSK Modulation and Demodulation Module Using CPLD
Lihua Wu, Yu Huang
According to the working principle of digital FSK modulation and demodulation, two kinds of circuit schemes based on CPLD and single chip are compared. The circuit module of FSK modulation and demodulation based on CPLD is designed, and CPLD is programmed by Quartus II software to carry out the function...
Microblog Keyphrase Extraction Based on Similarity Features
Li zi Liao, He yan Huang
This paper proposes to extract keyphrases from microblog based on similarity features. We analyze a large number of microblogs and find an interesting phenomenon that people use various nugget phrases to express the same factoid while many of these nugget phrases show similarity relationships. We propose...
Robust Range Assignment Strategy for Wireless Sensor Networks
Xue jian Zhao, Xiao jun Wang, Bin Xu
The RA (Range Assignment) strategy is an art of setting nodes’ transmitting ranges to generate a network with desired properties and at the same time reducing node energy consumption and/or increasing network capacity. In this paper, a distributed RA strategy RRAS (Robust Range Assignment Strategy) is...
Research on the Heavy Block Grinding Wheel Dynamic Balancing System Based on Fuzzy Control
Hai tao Ma, Shu fan Ma, Ying Yu
The balance principle of dynamic balance system and the fuzzy controller design method based on the principle of balance weight are introduced in this paper. In addition, we have discussed the grinding wheel dynamic balance with TMS320F240 as the core system of the hardware circuit and the implementation...
An Extensible Approach to Extracting Specification from Device Driver Source Codes Using XSL
Lei Xiao, Jian feng Cui, Xiao zhu Xie, Li juan Liu
Generally, device drivers have various implementations depending on the environments such as target devices and operating systems. The concept of device driver specification has been introduced to increase understand ability of device drivers and their implementation. This paper presents an XSL-based...
Research of corporate ERP performance evaluation model based on system dynamics
Ling Wei, Wei xi Zhang
With the rapid development of the global information technology and the widespread application, enterprises put higher forward requirements on the implementation of ERP performance management. In order to solve the problem that majority of enterprises performance evaluation system of ERP attach importance...
An Effective Computation Method Based on Field Velocity Approach for Acceleration Derivative
Jun Yang, Yu Qian
A novel method of calculating static derivatives and acceleration derivatives using Computational Fluid Dynamics is presented. This method uses field velocity approach to simulate the unsteady forced-plunging flow field over the aircraft without updating the field grids during each time step. This provides...
Image Recognition of Wheat Disease Based on RBF Support Vector Machine
Lian zhong Liu, Wu Zhang, Shuang bao Shu, Xiu Jin
The paper proposes an image recognition method of wheat disease. Image background is first removed by image segmentation using green feature of wheat leaf to obtain only disease pixels from original leaf image. Then disease features are calculated through 3 schemes: 1) mean values of R, G, B; 2) normalized...
Research of Mobile Augmented Reality Technology Applied in Agriculture
Ming Liu, Xiao Li, Xiao Lei, Sheng Wu
The application of mobile augmented reality in agriculture can effectively promote the digital agriculture and virtual agriculture, which is helpful to accelerate the transformation of agricultural science and technology achievements. This paper focuses on the design of technical framework of mobile...
Aggregation Strategy Based on Conversion from Dimension Classes to Dimension Hierarchies
Yan Zhang, Xu Luo
After analyzing the signification of structure and definition about dimension to aggregating operation, confirms that some dimension classes maybe produce analysis demands which are similar to dimension hierarchies, provides CDCDH method for conversion from dimension classes to dimension hierarchies....
A PSO-Based Overload Control Algorithm to Application Servers in Next Generation Electric Communication Networks
Hong hao Zhao, Fan bo Meng, Qing qi Zhao, Wei zhe Ma, Ri min Jiang, Xiao guang Bian
This paper analysis overload control characteristics of the application server in the next generation electric communication network, as well as the application server overload detection requirements, propose an energy efficiency overload control algorithm based on particle swarm. First of all, we consider...
A Method to Implement Data Extraction Using and Optical Gate Based on Soa - Nolm
Ya lin Guan, Rui dong Wang, Xin qiao Chen, Zhen Zhang, Zhong hang Duan, Cui zhu Chen
A method was proposed to implement data extraction using AND optical gate operation on semiconductor optical amplifier (SOA) based nonlinear optical loop mirror (NOLM). The optical data extraction in FSK/ASK orthogonal modulation system was achieved with the proposed AND gates, in order to prove its...
A Novel NRZ/RZ Format Converter Basedon Polarizer Modulator
Shi lei Bai, Zhong hang Duan, Xin qiao Chen
A novel non-return-to-zero (NRZ) to return-to-zero (RZ) format converter is proposed and demonstrated through an optical simulation software. This converter first adopt a polarizer modulator (PolM), to polarizer modulate the input NRZ signal, then a RF clock signal is used to restrain the side-lobes,...
Imaging Algorithm of Missile-borne SAR in Diving and Squint Mode
Zhen Wang, Xiao dong He, Bin Tang
In this paper, we propose an imaging algorithm of missile-borne SAR in diving and squint mode. The diving acceleration, vertical speed, and squint angle caused a large range cell migration (RCM). The algorithm divides the RCM correction (RCMC) into two steps. Firstly, correcting the main part of range...
Study on the Generation of Ultra-wideband Doublet Pulse Based on SOA-XPM in a Nonlinear Optical Loop Mirror
Ya lin Guan, Zhen Zhang, Xinq iao Chen, Rui dong Wang
Photonic generation of UWB signals is the one of the key technology of UWB-over-fiber system. This paper proposes a method to generate UWB doublet signals utilizing the cross-phase modulation (XPM) in a semiconductor optical amplifier (SOA) in a NOLM. The simulation experiment based on the proposed method...
The Design of Optical Fiber Transmission System Based on DCDM
Shi lei Bai, Cui zhu Chen, Zhong hang Duan, Rui dong Wang, Zhe Zhang
In this paper,we introduce a new technology named Duty Cycle Division Multiplexing(DCDM) which realizes multiplexing by assigning each user a different RZ duty cycle. Multiplexing and demultiplexing principle of DCDM are analyzed. And we design demultiplexer of DCDM system using Matlab. In order to verify...
Discovery of both Direct and Indirect Association Rules in Data Streams with a Sliding Window
Wei min Ouyang, Qin hua Huang
Association rules mining is a most of important tasks in data mining research. While most of the existing discovery algorithms are dedicated to efficiently mining of frequent patterns, it has been noted recently that some of the infrequent patterns can provide useful insight view into the data. As a...
A Novel Level Set Method for Ultrasonic Cardiogram Segmentation Based On Chan-Vese Model
Yu zhou Yang, Hong Yan, Yu hua Yao, Xue min Yin, Meng Xiao, Jin zhong Song
Level Set Method based on Chan-Vese(C-V) model is widely used in image processing and computer vision. However, there are some drawbacks when C-V model processes Ultrasonic Cardiogram(UCG) images. For example, the accuracy is influenced by noise and speckle in UCG image and some problems such as numerical...
CRUD Operations in MongoDB
Ciprian-Octavian Truica, Alexandru Boicea, Ionut Trifan
In this paper we will examine the key features of the database management system MongoDB. We will focus on the basic operations of CRUD and indexes. For our example we will create two databases one using MySQL and one in MongoDB. We will also compare the way that data will be created, selected, inserted...
The Effect of Frequency Offset on Network Coding with 4FSK Modulation
Heng yong Wang, Wei pin Zhu, Qing min Meng, Hao Wei, Xin wang Wan
We evaluate a scheme of single-relay network coding based on 4FSK (4 Frequency Shift Keying) modulation. Firstly, a loose upper bound BER (Bit Error Rate) of 4FSK is derived in the presence of frequency offset in the direct link. Secondly, 4FSK modulation is utilized in the three-slot two-way relay network...
Hyperspectral Imaging via Three-dimensional Compressed Sampling
Li Wang, Yan Feng
Hyperspectral images (HSI) are a collection of hundreds of images which have been acquired simultaneously in narrow and adjacent spectral bands. Aimed at meeting the needs of real-time process of hyperspectral data, the development of compressive techniques before the transmission and storage becomes...
A Study of Image Segmentation Based on Level Set Method
Xiao wei Chang, Dao wang Li, Yi hong Xu
Geometric active contour model has many advantages over parametric active contour model, such as computational simplicity and the ability to change curve topology during deformation, et al. The level set method is a class of curve evolution methods based on the geometry active contour model. Level set...
A Viral Infection Model with Lytic Immune Response and Periodic Medication Strategy
Bao dan Tian, Shou ming Zhong, Liu Yang, Xian qing Liu
In this paper, a viral infection SVI model with lytic immune response is studied. What’s more, in order to control the quantity of the virus population, periodic medication strategy is introduced to the classical SVI model. By some mathematical analysis techniques, an important threshold R0 is found...
The Classification of Environmental Audio with Ensemble Learning
Yan Zhang, Dan jv Lv, Ying Lin
Environmental audio classification has been the focus in the field of speech recognition. The paper proposes using ensemble learning to perform environmental audio classification. Ensemble learning is to train multiple component learners and combine their predictions to enhance the accuracy of classification....
High-Definition 3D Reconstruction in Real-Time from a Moving Depth Sensor
Xu Hu, Yuan yuan Yu, Zhao zhong Wang
This paper proposes a method to reconstruct 3D point clouds of a static scene in real-time by a moving depth sensor. Based on a base-line 3D reconstruction algorithm which fuses depth maps from the moving camera, a depth map enhancement module is embedded in the depth fusion stage to improve the level...
Comprehensive Validation Platform for Complex Aircraft Avionics Systems
Nicolas Favarcq, Pierre Palluau, Olivier Sentier, Jia Wang
Since 10 years, aerospace industry is facing an unprecedented cycle time reduction driven by high competition between Aircraft manufacturers. To safely sustain such optimizations, virtual test is becoming essential in avionic development cycle. Modern aircraft validation techniques rely heavily on virtual...
A Kind of Reducing PAPR Algorithm Based on OFDM System Model in Wireless Sensor Network
Chun Chen, Fan Zhang, Peng fei Ma, Hai bo Yang, Ji chun Zhang, Wen bo Wei, Min Ni
In Orthogonal Frequency Division Multiplexing (OFDM) used in Wireless Sensor Network (WSN), in order to restrain the intermodulation interference between subcarrier and out-of-band radiation brought by system nonlinearity of Peak-to-Average Ratio (PAPR), a kind of joint algorithm is put forward, which...
A Chinese New Year Aware ARIMA Model for Electricity Consumption Forecast
Tiao Cai, Xin Wang, Sui Huang
The forecast of electricity consumption has a siginificant impact on both economics and society. Various models have been developed to make this forecast accurate. Among them is the highly successful ARIMA model which is based on time series analysis. However, when applied local in China, ARIMA forecast...
The two Variable (G'/G,1/G) -expansion Method for Finding Exact Traveling Wave Solutions of the (3+1) -Dimensional Nonlinear Potential Yu-Toda-Sasa-Fukuyama equation
E. M. E. Zayed, S. A. Hoda Ibrahim
The two variable (G / G, 1 / G) - expansion method is employed to construct exact traveling wave solutions with parameters of the (3 + 1)-dimensional nonlinear potential Yu-Toda-Sasa-Fukuyama (YTSF) equation. When the parameters are replaced by special values, the well-known solitary wave solutions of...
Dynamic Relatedness Analysis of Three Exchange Rate Markets’ Volatility: Study of Korea, Taiwan and Thailand’s Countries
Jyi Horng Wann, Chung Hu Tien
This paper studies the association and the model construction of the Korea’s, the Taiwan’s and the Thailand’s exchange rate markets. In this paper we can construct a dynamic conditional correlation (DCC) and a trivariate IGARCH (1, 2) model to evaluate the association and there are not exist an asymmetrical...
Exploration of Distance Education Mechanical Engineering Experimental Teaching Model
Gang jun Zhai, Lei Xu
The article introduces and discusses the mechanical experimental teaching model under the condition of the modern distance education. Aimed at mechanical engineering experimental model exploration based on the distance education, according to the characteristics of distance education students and the...