Proceedings of the 2013 The International Conference on Artificial Intelligence and Software Engineering (ICAISE 2013)

Session: Software Engineering

35 articles
Proceedings Article

The Number of Economic Relations Analysis of Regional per Capita GDP and Quality Level in China

Wuyi Zhang, Yunfei Yang
This paper regarded the quality management level of regional pillar industries as the average level of regional quality, and selected the quality level of representative seven provinces of China as samples. By drawing scatter diagram and doing the fitting analysis, we ultimately find out the relation...
Proceedings Article

Study on the Model of Quality Safety Information Diffusion

Wuyi Zhang, Yunfei Yang, Linjing Tao
Based on the SI communicable disease model, this paper established the model of quality safety information diffusion by comparing the system composition of SI model and the diffusing process with the model of quality safety information diffusion. Then, the paper overcomes the defect that and are fixed...
Proceedings Article

Discussion on SME Financial Management Problems and Countermeasures

Xuhui Yang, Ruoxi Zhang
The paper analyzes the status of the financial management of SME based on the depiction of what to define SME, it can As to this, it gives the field research towards some representative SME financial management status, in order to find out where problems exist and dissect what the enterprise take counter...
Proceedings Article

Fuzzy Control of Obstacle Avoidance for Mobile Robot Based on Single Chip Microcomputer

Ling Wang
This paper aimed at the environment is unknown, the mobile robot can replace or partially substitute for personnel to enter the scene implementation of environmental detection and upload information. A path planning method is proposed for obstacle avoidance of robot based on fuzzy control algorithm is...
Proceedings Article

Cognitive Component Analysis of Basic Mathematics Achievement Assessment

Yenwen Yang
To provide some useful information into teaching practice adjustment, teachers usually need some professional supports. In this study, an analysis framework on item cognitive component is proposed and implemented. The sample for this study consisted of the Nursing and Management College student from...
Proceedings Article

Study on dielectric property of BST of gradient thick films

Maoyan Fan, Lifang Zhang
The multilayer BST thick film with composition gradient is becoming the important alternative material for the infrared detector and microwave modulator due to its good comprehensive dielectric properties such as moderate dielectric constant and high dielectric-temperature coefficient, etc. The Mn-doped...
Proceedings Article

Systematic Analysis on Pipeline Leak Detection and Location

Qibin Yang, Wei Sun
Because pipeline has large pipe diameter, large throughout and high pressure, once pipeline leakage accident happens, the damage is quite serious. In addition, pipeline leakage accident caused by man-made drilling oil stolen every year results in huge economic losses on oilfield. Therefore, a real-time...
Proceedings Article

A numerical method for nonlinear inverse heat conduction problem

Ailin Qian, Guangfu Wang
Inverse Heat Conduction Problems(IHCPs) have been extensively studied over the last 60 years. They have numerous applications in many branches of science and technology.The problem consists in determining the temperature and heat flux at inaccessible parts of the boundary of a 2- or 3-dimension al body...
Proceedings Article

Effective and Efficient ways of Hybridizing GA with various methods while reviewing a wide variety of Hybrid Genetic Approaches.

Nafisa Maqbool, Chaoyong Zhang, Mudabbir Baddir
Hybrid genetic algorithms significant interest over the decade are increasingly used to resolve real-world problems. Genetic algorithm’s ability to incorporate various techniques within its framework to produce a hybrid that secures the best from the blend. In this paper, different forms of integrations...
Proceedings Article

Ceramic Products Recommendation Based Improved Collaborative Filtering

Huiying Li, Yilai Zhang, Gongxun Cheng
In order to achieve personalized recommendation in the e-commerce platform for ceramic products, and improve the quality of recommendation, an improved collaborative filtering recommendation algorithm based on collaborative filtering algorithm was presented. By analyzing the insufficient of traditional...
Proceedings Article

Fusion Recognition Fingerprints and Handwritten Signature Recognition Fusion Based on the Bayesian Algorithm

Xiaojie Yang, Yunyun Zhou, Mandan Liu
This paper puts forward the fusion recognition using fingerprints and handwritten signature method, using Bayesian decision theory establishment decision-making optimization mathematical model to calculate the decision-making level fusion.
Proceedings Article

Checking Strong Optimality of Interval Linear Programming

Jiajia Luo, Wei Li
In this paper, we will discusse the strong optimality of general interval linear program (IvLP), that is, the IvLP has an optimal solution for each realization, and some necessary and sufficient conditions are established, based on the duality theory.
Proceedings Article

The Effect of Tourism Competitiveness relating to Tourist Arrivals and Revenue in East Asia

Minglang Yeh, Laichu Lin, Yaju Hsieh, Chinhsin Chiu
Tourism industry has been growing in recent years, thus becoming a highly competitive market. Government improves its tourism competitiveness to attract a large amount of foreign tourists, increase tourist revenue, and create local employment opportunities. Studies of tourism competitiveness abroad began...
Proceedings Article

Minimizing the Number of Tardy Jobs with Gammadistributed Processing Times

Haohao Li
This paper investigates two scheduling problems i.e., single machine scheduling problem with minimizing the number of tardy jobs and two machine flow shop scheduling problem with a common due date and minimizing the number of tardy jobs, in a stochastic setting in the class of non-preemptive static list...
Proceedings Article

Functionally Equivalent Clone Detection Using IOT-Behavior Algorithm

Xia Li, Tiantian Wang, Xiaohong Su, Peijun Ma
This paper presents an algorithm for the detection of functionally equivalent code clones in C code. The functionally equivalent code clones is the forth type of clones, which means that two or more code fragments that do the same calculation but with different syntax. Thus, we can detect the functionally...
Proceedings Article

Based on the improved AdaBoost OCSVM integrated application in image retrieval

Siqing Zhang, Run Zheng
In the traditional content-based image retrieval system, for a given query image, the number of relevant images in the database are not far outnumber correlation image. Therefore, a number of negative samples and the number of positive sample is unbalanced, the two class classifier traditional lose effectiveness....
Proceedings Article

Secure Mechanism for Remote Bitstream Updates of Reconfigurable Computing Platform

Runfeng Huang, Qinglei Zhou
Although FPGA-based reconfiguration computing platform has been shown as a promising technique in high productivity computing field, it may suffer security threats during its bitstream remote update process. A secure mechanism is proposed in this paper to prevent tamper and replay attacks during the...
Proceedings Article

Application of Count Data Models in Inbound Tourism Source Markets based on Data mining technology

Changfeng Yin
This paper applies Application of Count Data Models based on Data Ming technology by the index of Familiarity Degree of Scenic Destination and the index of Competitive State to carry out quantitative analysis on the inbound tourism market of Jiangxi Province in 2001-2012. The results show that: Most...
Proceedings Article

A robust region_based active contours model for image segmentation

Jiandong Bao, Fan Jiang
A novel region_based active contours model is proposed to deal with the images with intensity inhomogeneities and weak boundaries. For the proposed model, new global force and local force which compose hybrid energy functional are defined. Then, the energy functional is incorporated into a variational...
Proceedings Article

The Research on the Performance Evaluation of Civil Servant Based on Competency Model

Lei Zhao
This project roots in some common realistic problems in the performance evaluation of civil servant, such as paying attention to not quality but performance, which has led to serious division of talent development and evaluation in the public sector. So we devote to apply the competency model to job...
Proceedings Article

An Adaptive Bayesian Network Inference Algorithm for Network Situation Awareness

Jie Li, Lingwei Chu, Cheng Dong, Xiaoyuan Lu
The traditional Bayesian network is relatively fixed, the set of nodes, and intensity dependence relationships are rarely change, thus, it is unable to reflect changes in the actual network state. Such an inaccurate network model is also difficult to inference subsequent network. In order to solve the...
Proceedings Article

Neural network and improved method for wind power prediction

Rui Li
A single population genetic algorithm is introduced to optimize the weight value and threshold value of the BP network (SGABP) to overcome the issues of the slowly convergence speed and easy to fall into local optimum of BP neural network. Taking the premature of genetic algorithm (GA) into account,...
Proceedings Article

Design and Implementation of the Inference Machine of an Intelligent Ultrasonic Emulsification Instrument

Aili Li, Zhiwen Yang, Xuyan Tu, Xuefeng Zheng
Based on the research of the intelligent cataract ultrasonic emulsification instrument, mainly discusses the principle of design and inference algorithm of the inference machine of intelligent ultrasonic emulsification instrument. Designing the cataract expert knowledge base by the use of relational...
Proceedings Article

Rehabilitation evaluation model of a rehabilitation robot Based on fuzzy comprehensive evaluation

Lei Chen, Changniu Yang, Wenquan Huang, Zegang Sun, Yucong Liu
To solve rehabilitation evaluation problem of rehabilitation training, rehabilitation evaluation method based on fuzzy comprehensive evaluation was presented for 6-DOF wearable lower limb rehabilitation robot. Relative degradation degree was introduced to represent the transformation of the actual state...
Proceedings Article

Malicious Code Detection Based on Software Fingerprint

Zhimin Yin, Xiangzhan Yu, Linhua Niu
The malicious code on the network is increasingly rampant that the traditional detection method of characteristic code has been difficult to deal with malicious code, with features of various variants, deformations and other problems. In this paper we present a new static analysis model based on software...
Proceedings Article

Application Analysis of Wall and Deck Numerical of Modelling Composite Ship EN AC-AlSi10Mg (b)+SiC*/15p By Using ANSYS ver. 12.0

P.H. Tjahjanti, Septia Hardy Sujiatanti
Composite Materials AC-AlSi10Mg (b)+SiC*/15p as alternative material for ship building and has been modeled well using ANSYS software ver. 12.0. Application modeling applied in wall and deck superstructure with the result that the reduction in thickness composite ship AC-AlSi10Mg (b)+SiC*/15p significant...
Proceedings Article

Information Security based on Resource Conflict with SSH Architecture

Su Yu, Yin Wang, Ghassan M. Azar, Zhou Wei
Role-based access control has become the predominant model for advanced access control. SOD of RBAC is a good way to solve the problem of resource allocation and right management for improving the security of the system. According to the needs of the MVC-based information management system security,...
Proceedings Article

Optimizing Gaze Typing with Pupil Size for People with Severe Motor Disabilities

Xiangsheng Wang
Thanks to recent technological advances in the field of eye tracking, eye typing provides means of communication for people with severe disabilities. Typing with gaze using dwell time has been made possible by the development of eye tracking technologies. Recent research indicates that pupil size is...
Proceedings Article

Research on the Conceptual Modeling Method Base on System Six-view and Ontology

Wanghu Sun, Yanqi Bai, Xueming Zhang, Chuang Gu
With the application of simulation technology in the field of equipment support, how to solve the communication problems exist in the military field personnel and Simulation technicians has become a focus problem in the current research. On the basis of the research conceptual model approach, this paper...
Proceedings Article

Enterprise Network Business Process Incompatible Vulnerability Detection Method Based on FPN Model

Huaizhi Yan, Wenwen Ye
This paper proposes a kind of enterprise network business process characteristics, gives the definition of incompatible vulnerability, analyzes the formation mechanism of incompatible vulnerability. Then, we establish the FPN mapping model of incompatible vulnerability, propose an incompatible vulnerability...
Proceedings Article

Demonstration of an optical switch based on SOA-MZI operation at 10 Gbit/s

Yalin Guan, Ruidong Wang
It was demonstrated that an optical switch which was operated at 10 Gbit/s was realized using SOA’s in a Mach-Zehnder(SOA-MZI) configuration, which based on cross-phase modulation (XPM) in semiconductor optical amplifier(SOA) and interference struct. An analysis was presented to describe the phase changing...
Proceedings Article

The Infuence Of Noisy Data On Skype Traffic Classification

Linhua Niu, Xiangzhan Yu, Zhimin Yin
Because of its popularity, encrypted traffic and proprietary design, there has been difficult to detect Skype from other P2P traffics. The research of Skype traffic identification focuses on collecting traffic flow feature and using machine learning method to identification. The key of machine learning...
Proceedings Article

A New DFT-HQ Channel Estimation Algorithm in OFDM Systems for Sparse Multipath Channels

Li Chen, Yuanan Liu, Jinchun Gao, Gang Xie
In this paper, we propose an improved discrete Fourier transform (DFT)-based channel estimation scheme for Orthogonal Frequency Division Multiplexing (OFDM) systems. The proposed algorithm uses Hannan-Quinn (HQ) information criterion to estimate the number of most significant paths and the multipath...
Proceedings Article

The research and development of Cross-fault site based information systems

Wenchao Yue, Ruiqi Wang, Ning Wang
In view of location basic data that in cross-fault site based information management and use have incomplete, and many are the paper dielectric storages, inconvenient inquiry and use; venues of fault monitoring data and related foundation of geographic information location separates, does not help carrying...
Proceedings Article

A Solution of Indoor Positioning System

Chunchang Fu
This paper describes the use of ultra broadband indoor location technology within the area of the unified all personnel and equipment in planning, scheduling solution, realize the full view of the systematic monitoring sites, coherent continuous tracking and track the extraction. Realize the visible...