Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012)

+ Advanced search
453 articles

The Patient Admission Scheduling of an Ophthalmic Hospital Using Genetic Algorithm

Liming Zhang, Huiyou Chang, Ruitian Xu
Currently, FCFS scheduling method is widely used in hospitals for patient admission scheduling, which ignores the impacts of patient length of stay and surgery arrangement on the usage of hospital resources. This paper proposes a more comprehensive mathematical model and evaluation mechanism for the...

An Effective Image Fusion Method Based on Nonsubsampled Contourlet Transform and Pulse Coupled Neural Network

Lijuan Ma, Chunhui Zhao
In order to solve the problem of spectral distortion and the fuzzy texture in visible and infrared image fusion technology, a novel visible and infrared image fusion method based on the Nonsubsampled Contourlet Transform (NSCT) and Pulse Coupled Neural Networks (PCNN) is proposed in this paper. First,...

An Improved Personalized Recommendation System Research

Xingyuan Li, Qingshui Li
In order to find information of interest and found valuable information resources in enrich Internet data. This paper describes a personalized recommendation system, personalized recommendation system is an intelligent recommendation system to help e-commerce site for customers to provide complete personalized...

A New Energy-Efficient On-Demand Routing Protocol for Green Wireless Mesh Networks

Yinpeng Yu, Yuhuai Peng, Lei Guo, Meng Song
In order to solve the green energy saving problem with the wireless routing technology, a new energy-efficient survivable routing protocol, called Energy-efficient Survivable AODV (ES-AODV) for unicast demand in green Wireless Mesh Networks (WMNs), is proposed in this paper. The routing protocol uses...

Community evolution in dynamic social networks

Gang Wang, Yuli Lei, Chongjun Wang, Shaojie Qiao
This paper proposed a framework and an algorithm for identifying communities in dynamic social networks. In order to handle the drawbacks of traditional approaches for social network analysis, we utilize the community similarities and infrequent change of community members combined with community structure...

A Novel Hybrid Threshold Proxy Signature Scheme

Xin Yang, Long Zhang, Chunming Li, Guoqiang Li
In this paper, we propose a new type of threshold proxy signature scheme: hybrid threshold proxy signature (HTPS), in which a signature is cooperatively generated by the partial original signers themselves and the proxy signers on behalf of their own original signer in threshold proxy way. We formalize...

Gene Prediction Based on One-Dimensional Image Segmentation

Fei-Yu Wang, Zi-Wei Zheng, Wei-Hua Li
In the current study, using methods of signal processing to manage gene prediction has attracted great attention. At first, the voss mapping which can map the DNA alphabetic sequence into the numerical sequence and the 3-base periodicity of exon are introduced. Then a fixed-length sliding window approach...

Curriculum Schedule Arrangement Solved by An Improved Immune Optimization Algorithm

Xiao-feng Li, An Shi, Jian-guo Luo
To solve the university timetabling problem (UTP) effectively, a immune algorithm-based solution for UTP was proposed. The mathematical model of UTP was expounded, a framework of immune algorithm was given, and simulation experiments were done to validate algorithm. Experimental result shows that proposed...

A Localization Algorithm of Multi-hop Three Dimensional AOA with Space-based Angle Transmission and Its Application

Qingzhang Chen, Yunfeng Ni, Xinghua Li, Rongjie Wu, Yanjing Lei
Wireless sensor node's localization is a funda-mental technology in Wireless Sensor Networks. There are only quite a few study on three-dimensional (3D) localization which is suffered in slow progress, actually, is one of the main difficulties in WSN localization. Based on the study of the existing two-dimensional...

Research on Node Localization Algorithm in WSN basing Machine Learning

Qingzhang Chen, Yuzheng Chen, Congling Fan, Fan Yang, Peng Wang
Machine learning uses experience to improve its performance. Using Machine Learing, to locate the nodes in wireless sensor network. The basic idea is that: the network area is divided into several equal portions of small grids, each gird represents a certain class of Machine Learning algorithm. After...

Synchronous Optimization Method for Heterogeneous Database Based on the Minimal DataSet

Zhenyou Zhang, Dongguang Wang, Zhi Cao
The data synchronous of the distributed heterogeneous database was one of the important researches for the heterogeneous databases. This paper analyzed the data synchronization optimization mechanism of the distributed heterogeneous database and puts forward to get the minimum change data set from each...

Dynamic Integration System for Heterogeneous Database Based on S2SH

Zhenyou Zhang, Ziqi Zhao, Zhi Cao
Between each node database there must be different in the distributed heterogeneous database system, so how to resolve these different (It's said that realize the mutual transformation between heterogeneous databases) was an basic problem in the heterogeneous database system. This paper analyzes the...

Data Extraction method for Heterogeneous Database Based on EJB

Zhenyou Zhang, Bochen Sun, Zhi Cao
Data island exists in most of the information system. And the system platform integration could eliminate the existence of the information island. This paper visited database information system through the EJB component technology, and using the metadata way to extracted data information from the heterogeneous...

Target Tracking Based Adaptive Particle Filter in Binary Wireless Sensor Networks

Ling-Dong Su, Ming-Yue Zhai, Zhi-Yu Zhu
Since real-time and communication amount is crucial for the wireless sensor network target tracking, the performance of target tracking in the wireless sensor network is critically depended on real-time and communication amount reduction. This paper presents a target tracking method based on distributed...

Development Trend Analysis on Corn Futures Price in Our Country by Multiple Regression Model

Junyi Chen, Pingyuan Xi
As the main influence factors on price fluctuations of corn futures is more complex, so analyzing these factors that is very difficult. In this paper, China's consumer confidence index and consumer price index are selected as variables of the rational expectations so that the econometric model is created...

Research on the Credit Management of Commercial Banks of Lianyungang City for the SMEs

Junyi Chen, Shuping Han
At present, the credit management mode of commercial bank in lianyungang for the SMEs is still in the exploring, although the various credit policy for the small and medium-sized enterprises has been come out, the risk management plan and operation method that really suit for credit demand for the SMEs...

An Efficient Sleeping Scheduling for Save Energy Consumption in Wireless Sensor Networks

Shu-Guang Jia, Li-Peng Lu, Ling-Dong Su, Gui-Lan Xing, Ming-Yue Zhai
Smart grid has become one hot topic at home and abroad in recent years. Wireless Sensor Networks (WSNs) has applied to lots of fields of smart grid, such as monitoring and controlling. We should ensure that there are enough active sensors to satisfy the service request. But, the sensor nodes have limited...

Research of Node Energy consumption Based on Dynamic Power Management in Wireless Greenhouse Control System

Yongxian Song, Juanli Ma, Xianjin Zhang
The resources of wireless sensor nodes are limited, and the power of nodes is supplied with battery whose capacity is very limited, once the energy of battery is run out, the nodes will lose their effect, so there are serious energy constraint in wireless sensor network. In this paper, the specific energy...

Estimation Algorithm of Two-Dimensional Direction of Arrival based on Rectangle array of Distributed Source

Hui Yao, Ying Wu
For estimating two-dimensional direction of arrival (DOA) of local scattering distributed source, the computational complexity of various algorithms for DOA is prohibitively high, induced by high dimension searching manipulation. According to this problem, an ESPRIT-like algorithm is proposed. The proposed...

Blind Image Separation Based on an Optimized Fast Fixed Point Algorithm

Wei Yuan, Liyi Zhang
An optimized fast fixed point algorithm based on modified Newton iteration method has been proposed. With good performance of the blind image separation, the optimized algorithm can improve the convergence speed greatly. We proposed a new adaptive enhancement parameter to enhance the separated images...

A General Threshold Signature Scheme Based on Elliptic Curve

Yulian Shang, Xiujuan Wang, Yujuan Li, Yufei Zhang
Based on Elliptic Curve cryptosystem, a threshold signature scheme characterized by (k, l) joint verification for (t, n) signature is put forward. After being signed by a signer company employing (t, n) threshold signature scheme, the information m is transmitted to a particular verifier company, and...

Design and Implementation of Mongolian Wordnet Management Platform

Si Ha, Enbo Tang
With the development of natural language processing technology, a powerful tool containing semantic information is in great need in lexical semantic processing. Aiming at automatic processing of words in machine translation and automatic proofreading, Wordnet mainly provides semantic information in the...

A -calculus-based Complaint Model for a User-interactive Question Answering System

Yancheng Li, Hua Duan, Qingtian Zeng, Faming Lu
User-interactive question answering systems are catching more and more attention, however users’ complaints arise within it from such problems as unfair compensation. This paper focuses on a -calculus-based formal model for the complaint process of a user-interactive question answering system. The formal...

On the First-Order Markov Model for the PLC Fading Channel

Wei SHEN
The power line communications (PLC) channel is noisy one, which can be modeled by the Markov process. The order is the key concerning when used the Markov process. the level of complexity will be incurred from using higher order , while the first-order Markov models may lead to the less accurate channel...

A Realization of Security Model on Unified Database Console

Hui Wang, LianZhong Liu
As an extremely important platform of data storage, database management system(DBMS) is widely used in all kinds of enterprises and departments. The availability and security is a critical performance index for database. How to help administrator keep database secure and effective is a key job of database...

Face Recognition Algorithm Based on Kernel Collaborative Representation

Liang Zhang, Jiwen Dong
Aiming at solving the problems of occlusion and illumination in face recognition, a new method of face recognition based on Kernel Principal Components Analysis (KPCA) and Collaborative Representation Classifier (CRC) is developed. The KPCA can obtain effective discriminative information and reduce the...

A Verifiable Visual Cryptography Scheme Using Neural Networks

Yuqiao Deng, Ge Song
This paper proposes a new verifiable visual cryptography scheme for general access structures using pi-sigma neural networks (VVCSPSN), which is based on probabilistic signature scheme (PSS), which is considered as security and effective verification method. Compared to other high-order networks, PSN...

Kernel Methods and Its Application in Wavefront Reconstruction

Zhiying Tan, Ying Chen, Kun She, Yong Feng
Kernel methods can effectively deal with the nonlinear problem. The methods not only can be used for data de-noising, also be effective for classification problems. Using kernel PCA method, we provide a more precise Zernike expansion, which can apparently improve the reconstruction accuracy. At the same...

Design and Implementation on Auto Test Set of an Airborne Radar

Fulu Jin, Yunpeng Li, Hongrui Wang
To automatic test the function and performance of an airborne radar, changeable test adapter is adopted to implement the hardware and software design of the automatic test set of the antenna, transceiver and indicator of the radar based on AT89C52. Problems such as t the different types of interfaces,...

A Novel Data Access Scheme in Cloud Computing

Xiaowei Gao, Zemin Jiang, Rui Jiang
Recently, Hota et al. present a Capability-based Cryptographic Data Access Control in Cloud Computing. This scheme implements data storage, user authorization, data access and integrity checking. However, we find two fatal attacks in the data exchange between CSP and User. These attacks makes a registered...

Slotting Optimization Algorithm of the Stereo Warehouse

JunHui Wu, TongDi Qin, Jie Chen, HuiPing Si, KaiYan Lin
In order to solve the problem of slotting optimization management with automated storage and retrieval system (AS / RS), the genetic algorithms of the slotting optimization process with stereo warehouse were discussed. The process of the slotting optimization was designed by the real-number coding. The...

Efficient Data Structures for Range Selections Problem

Xiaodong Wang, Jun Tian
Building an efficient data structure for range selection problems is considered. While there are several theoretical solutions to the problem, only a few have been tried out, and there is little idea on how the others would perform. The computation model used in this paper is the RAM model with word-size...

Software Simulation Method for Digital IF GNSS Signal

Xiangyu Wu, Jinrui Liu, Hang Gong, Gang Ou
Data simulation is an important auxiliary method for baseband signal processing algorithm design of digital IF GNSS receiver. Especially when the high sensitivity and high dynamic receivers are developed, or multipath and cross correlation mitigation techniques are considered, exact and complete tests...

A Design for Water Surface Communication System of Ultra Short Base Line Positioning System

FuPeng Qiu, HongJie Wan, XueWei Wang
In order to satisfy the requirement of the underwater acoustic positioning system for offshore oil exploration, a design idea for water surface communication system of ultra short base line(USBL) positioning system. The main function of this design is to achieve high-quality communication with underwater...

Non-uniform Cluster-Based Mobile Data Collector Routing Protocol in Wireless Sensor Networks

Xinlian Zhou, Sheng Chen
One fundamental task of wireless sensor networks (WSNs) is to save sensor power, and try to prolong the lifetime of WSNs. Traditional routing protocols are almost based on homogeneous WSNs, all sensors are use single hop or multi-hop to transmit data to base station, which lead to overload sensors next...

Dynamic Evolution of Requirement Goal Deployed on Network Environment

Yang Liu, Jinzhao Wu
Under the network environment, it inevitably exists inconsistency and dynamic information in users’ requirements because of the complicated and volatile network, update, restructuring and so on. This paper studies how to handle the inconsistent information and keep correctness of the requirement goals...

Accelerating Unpopular Channel through Federation

Jing He, Wei Zhou, Shipu Wang
Nowadays, peer-to-peer technology has provided users with cheap and powerful communicating facilities. However, P2P streaming system faces two challenges. Firstly, how to improve the poor Quality-of-Experience (QoE) in unpopular channel Secondly, how to select peers to contribute their resources for...

Research On DB2 Performance Testing Automation

Lei Zhuang, Zhen Gao, Hao Wu, ChunXin Yang, Miao Zheng
Software testing play a significant role in modern software development and maintenance process, which is also an important means to ensure software reliability and improve software quality. With the continuous improvement of quality requirements of the software products and software engineering technology...

Design of Dual-mode RFID Reader

Yulin Zhang, Tongtong Wang, Changbin Shang
The Internet of Things accelerates the development of RFID technology. Logistics, transportation, aviation and other fields has increasingly high demand on the reader's identification distance and reliability. In order to meet the market demand, the design of RFID reader based on the dual-mode was proposed....

Remote Video Surveillance System Based on DirectShow and Image Compression

Shangfu Gong, Ligang Wu, Yanjun Wang
Video surveillance, convenience and rich information, has been widely used in security, protection, monitoring and other occasions, and has already been one of the most important precautionary measures in commercial, residential and transportation areas. However, considering the massive data transmission...

The Implementation of Serial Communication CSerial the Port Class

Naining Wen, Shangfu Gong, Yanjun Wang
Illustrating the advantages and disadvantages of several commonly used methods to develop serial communication program under Microsoft Windows, this article uses a serial communication class through a third party, namely the use the Remon Spekrijse provided free serial port class CSerial the Port class,...

The Globally Linear Embedding Algorithm

Jieyun Xia, Shuaibin Lian
LLE is a very effective non-linear dimension reduction algorithm and widely explored in machine learning, pattern recognition, data mining and etc. ‘Locally linear, Globally non-linear’ has always been regarded as the features and advantages of LLE. However, the theoretical derivation presented in this...

Network Modeling and Performance Analysis under Time-varying Channel and General Arrival of M2M Services

Fu Li, Xue-fen Chi, Jia-sheng Zhang, Xu-dong Li
To investigate and forecast the traffic characteristics of important M2M service--Small data service, we modeled its arrival process and analyzed the effects it has on current wireless network. By simulating service logic and designing traffic generation function of typical M2M small data service on...

A Performance Tool for Earth System Models Development

Hang Li, Zhongzhi Luan
We present a performance tool for Earth system models development to aid in analyzing the performance of the climate modeling applications. It is difficult for existing tools to handle with the complex, coupled structure and the long execution time of models. Our performance tool implements rapid analysis...

Improvements based on the IPSec VPN Secuirity

Ya-qin Fan, Ling Lv, Mei-lin Liu, Fei Xie
In this paper, through specific description of the concept of virtual private network VPN, operating principles and the IPSec protocol, and using the OPNET software for performance simulation of IPSec VPN network, we get the result of IPSec VPN throughput of the network, which is unstable. o though IPSec...

Research on the Wireless sensor Network Data Fusion Technology

Ya-qin Fan, Yu Ding, Mei-lin Liu, Xin Zhang
Wireless sensor network ( WSN ) is a kind of energy constrained network, by using data fusion technology, the elimination of redundant data, can save energy, prolong the network life purpose. Data fusion in wireless sensor network can realize different protocol layers, Based on the introduction of wireless...

Research on K-Anonymity Algorithm in Privacy Protection

Chen Wang, Lianzhong Liu, Lijie Gao
Nowadays, people pay great attention to the privacy protection, therefore the technology of anonymization has been widely used. However, most of current methods strictly depend on the predefined ordering relation on the generalization layer or attribute domain, making the anonymous result is a high degree...

An Efficient Routing Algorithm for Opportunistic Networks based on Network Coding

Yukun Yao, Zhihu Liu, Zhi Ren, Yadi Wen
To address the problems in Opportunistic Networks that nodes employing routing algorithms based on epidemic mechanism can’t sense their neighboring nodes timely and many redundant data packets permeate through the network, an efficient routing algorithm based on XOR network coding was proposed (Xor Network...

Research of the Transient Temperature Field and Friction Properties on Disc Brakes

Jian Zhang, Changgao Xia
According to the real dimension of the braking disc, the finite element modeling for three-dimensional transient cyclic symmetry during the long downhill braking is established. The distribution of the transient temperature field of the brake disc during the braking are analyzed. The variation of the...

On Transformation from The Thesaurus into Domain Ontology

Ping Li, Yong Li
In order to reduce the workload of constructing domain ontology, this paper proposes a transformation method from thesaurus into domain ontology. We can take building the cereal crops’ domain ontology as an example to detail narrative of the process of the transformation and to prove the effectiveness...