Proceedings of the 2015 5th International Conference on Computer Sciences and Automation Engineering

Session: Session 1: Computer Science and Engineering

100 articles
Proceedings Article

Research on the Security Management Method of Cloud Computing Authorized User Based on Anonymous OTP

Baoli Yuan
For the information security issues of cloud computing, this paper studys the security management methods of cloud computing authorized user, analyzes the vulnerabilities of OTP and proposed security authentication scheme based on OTP authentication.This authentication enables two-way authentication...
Proceedings Article

The Bus Line Supporting System Based On Learning Neural Network Model Applied In GIS

Jun Song, Shengwei Quan
With the rapid increase of urban population and rapidly widening scope of the city, the newly built residential areas emerging or leading to the existing bus lines could not meet the needs of the people’s activities. The phenomenon of the traffic congestion is becoming more and more serious. [1] According...
Proceedings Article

The design of data analysis system for user

Jiawei Shen, Yawen Dai, Zhencai Li
In communications engineering, we often encounter some problems of the data analysis and processing aspects, therefore analysis of engineering data throughout the project has become a crucial part. LabVIEW is a program development environment, it is developed by National Instruments (NI) company developed,...
Proceedings Article

Research on the Application of Computer Network Technology in University Archives Management

Liying Cui, Haiyan Zhou, Qun Li
Computer network technology has been popularized in social development, and it plays an important role in various fields. In order to adapt to and promote the development of colleges and universities, it is necessary to improve the efficiency of university archives management. It is necessary to adopt...
Proceedings Article

The Application of Information Technology in the Library Knowledge Management

Zongying Shu
This paper provides comprehensive coverage of the theories research connected with the provision and management of electronic resources in libraries to show us with comprehensive coverage of the core topics related to electronic resource methods. Digital library is an extension of traditional library...
Proceedings Article

Power analysis for testing two independent groups of likert-type data

Zun-xiong Liu, Hao Chen
In the one-sample location problem, it is tested whether the center of the whole is equal to a known value, otherwise whether there are significant differences between two samples is in consideration on pratical situation. In practical problems, there are many simulations where two general parameters...
Proceedings Article

An Optimal Preventive Maintenance Scheduling Model

XiaoLi Zou
A generalized model for determining minimum-cost preventive maintenance schedules of a maintained reliability system is presented. Through balancing the cost of system failure during operation against the cost of planned maintenance, an optimal policy is established which minimizes the expected cost...
Proceedings Article

An Algorithm of Mining Closed Frequent Itemsets

Haifeng Li
Closed frequent itemset is a perfect representation of frequent itemset. This paper tries to find an efficient solution to mine the closed frequent itemsets over databases by sampling technique. We employ the SCFI tree to record the data synopsis of the frequent itemsets, and propose an efficient algorithm...
Proceedings Article

The Study of the Springback Control Algorithm Based on Improved Fast Fourier Transform

Wenjuan Liu, Qinghua Zhou, HuiZhang Zhang
This paper proposed a mould modification algorithm based on improved Fast Fourier Transform. The wavelet transform and Fourier transform are used to solve the shape transfer function of the springback closed-loop control system. Through the shape transfer function to predict the mould surface shape corresponding...
Proceedings Article

iSPmA: A Novel IOT Security Event Perception Model based on Autonomic Computing

Ruijuan Zheng, Tenghao Li, Mingchuan Zhang, Qingtao Wu, Zhengchao Ma, Wangyang Wei, Chunlei Yang
According to the high dimension of security event feature and the difficulty of security event autonomic perception in the age of big data, a novel Internet of Things ( IOT , for short) security event perception model based on Autonomic Computing and Principal Component Analysis (PCA, for short) is proposed,...
Proceedings Article

Brief analysis on“HeYuanTong” Campus Mobile Phone APP Design

Shiyong Zheng, Hongyan Zhang, Lu Jiang, Biqing Li
With the enhancement of the intelligence on mobile phone, various mobile phone APPs targeted at college digital campus have also risen in response. Based on the current situation of the digital campus of Hezhou College, the development of the college campus mobile phone APP“HeYuanTong”has been taken...
Proceedings Article

Electricity Market Long-term Equilibrium Modeling Based on System Dynamics under Uncertain Conditions

Daoxin Liu
Recent years, with changes in energy security, climate crisis, environmental protection and other social environment, investment and construction of the electricity market must be improved on the basis of the original design on the market to adapt to the new trend of social development. Based on a series...
Proceedings Article

An Interrupt Scheduling Mechanism of Virtual Network Interface Card for Xen-Based System

Liuzheng Lu, Runze Wan, Jinrong He
As one of typical paravirtualization hypervisors, Xen has received widespread attentions especially its scaling capability under some kinds of workload. In this paper, we focus on the problem that the most CPU resources are occupied by frequent interrupt from the NIC(Network Interface Card) and it will...
Proceedings Article

Application of BP neural network models and mind evolutionary algorithm in predicting stock composite indexes on Shanghai Stock Exchange

Guohao Lu, Changping Xie, Yingshu Zhang, Shaomei Fang
Stock composite indexes prediction is an important issue in the financial world. A back propagation neural network (BPNN) with mind evolutionary algorithm (MEA) developed for the prediction of prices on Shanghai Stock Exchange is presented. The optimum weights and threshold values of BPNN are determined...
Proceedings Article

A hybrid method using FAHP and TOPSIS for project selection

Xuan Li, Jiang Jiang, Su Deng
Like any other forms of decision analysis that involve multiple criteria, project selection is an unstructured, complex decision problem with lots of aspects that must be taken into consideration. A hybrid method combining fuzzy analytic hierarchy process (FAHP) and the technique for preference by similarity...
Proceedings Article

Research on The Realization and The Correction Method of Velocity Interpolation Algorithm for The Quadratic Curve

Chi Tang, Ying Li
Aiming at the problem of low efficiency and low accuracy of traditional interpolation algorithms, a new numerical control interpolation method—velocity interpolation, is presented in this paper. The realization steps of the quadratic curve in the numerical control system are described. Through the analysis...
Proceedings Article

One Bayesian Network Construction Algorithm Based On Dimensionality Reduction

Shuo Quan, Pengfei Sun, Guoshi Wu, Jie Hu
Bayesian network is a common probabilistic graphical model. It often can achieve good result in expression of uncertainty for knowledge and regular as well as in data classification. Since Bayesian network construction is a relatively complex problem, we propose a Bayesian network construction dimensionality...
Proceedings Article

Research on Dynamic Replication Routing Protocols for Opportunistic Networks

Jiayang Tian, Yifei Sun
Opportunistic network is a self-organization network using the meeting opportunity of nodes movement to achieve network communication. There is no complete path between the source node and the destination node in this kind of network. A lot of routing algorithms are proposed based on this network, which...
Proceedings Article

Research on a Specific Harmonic Elimination Technique for Step Wave of Cascade Type H Bridge Converters

Anqi Li
With the rapid development of power electronic technology, power electronic equipments with inverter devices as the main circuit structure are widely used, producing numerous harmonics and having a harmful effect on power grids and electricity equipments. This paper uses the improved genetic algorithm...
Proceedings Article

Mathematical Modeling for the Transmission of Ebola Virus

Anqi Li
The goal of this model is to optimize the eradication of Ebola, which has been increasingly severe since 2014, causing more than 8966 deaths. Without effective control, human society will face a serious threat. This paper primarily addresses the problem by predicting the trend of Ebola transmission using...
Proceedings Article

Research on the Structure of Computer Interaction Hash Algorithm for Mining

Zhu Zhao
The association rule mining is one of the main technical data mining, the existing association rule mining algorithms based on support - confidence framework, there are many issues of double counting and traversing the database when the user adjusts the threshold. The paper maintains support for the...
Proceedings Article

A Dynamic Differential Evolution Algorithm for Dynamic Hybrid Flow Shop Scheduling Problem

Yue Zhao, Wanlei Wang, Jingping Yang, Shikuan Zhou
In most real-world industries, scheduling is processed in a stochastic and dynamic environment, it is necessary to generate a schedule which is suitable for the current system states. Dynamic scheduling solves unimplemented jobs and updates an existing schedule based on the real-time information with...
Proceedings Article

Numerical Prediction of Resistance of Planning Vessel with RANS Method

YuCheng Wang
In order to get the accurate resistance of planning vessel at high speed, we should consider the hull gesture variation during voyage. Based on CFD, coupling solves RANS and ship motion equation to capture the ship navigation attitude and resistance. The numerical calculation gets the resistance and...
Proceedings Article

Research of Intelligent recommendation system based on the user and association rules mining for books

Wei Ji, Shi Liu, Yannan Song, Ji Qi
The increasing number of colleges and universities library books makes users' difficulty of choosing interested books becoming much higher. This paper proposed the research of Intelligent recommendation system based on the user and association rules mining for books. The model integrates the advantages...
Proceedings Article

Average life prediction of existing residential buildings based on Logistic function model

Xuyang Meng
On the energy saving of existing buildings must be used in the preparatory work, planning is the priority among priorities, analysis of what period of residential buildings for energy saving in the economy is reasonable is an important task for the planning stage, the key to the transformation of the...
Proceedings Article

A Memetic Algorithm for Single-orbit Image Scheduling of Agile Satellite

Dengyi Zhang, Lei Guo
This article analyzes the complex time constraints such as time window visibility and attitude transition time of the single-orbit image scheduling problem for agile satellite, establishes a constrained optimization model and proposes a memetic algorithm to tackle this NP-hard problem. In our algorithm,...
Proceedings Article

Research on Tobacco Logistics Delivery Costs Optimization Under the Environment of Information Technology

Wenlong Zheng, Shiqing Zhang, Linkai Zhang
In recent years, there is more and more debate about adherence and improve the system of tobacco monopoly or abolish tobacco monopoly system. With the increasing competition in the international tobacco market, it makes China's tobacco industry have received the unprecedented challenge. In the face of...
Proceedings Article

The Application and Research of Web Log Mining in Network Resources of Ceramic Information

Fang Wan
this article does research on the application web log mining technology in network resources of ceramic information. Through the analysis and pretreatment of the raw log data, and then relevance analysis of the information in WebPages, the structure of ceramic enterprise website is optimized and the...
Proceedings Article

Single-phase-to-ground fault line selection in distribution networks based on similarity of wavelet energy spectrum

Zhong Mingjun, Zhu Qiang, Gong Liang, Leng Fangliang
In order to solve the problems of ground fault line selection in distribution network, the article presents a fault line selection method based on the similarity of the wavelet packet energy spectrum. After extracting a certain data of transient fault zero-sequence current by the wavelet packet decomposition,...
Proceedings Article

Model for mode control in mode-division multiplexing system

Xiaohui Shang, Li Gao, Mingying Lan
In the paper, a feasible mode control model based on Fourier Optical analysis is proposed to increase the transmission capacity of optical fiber communication. Our model combines fresnel diffraction and 4f system to implement mode control, where the phase-only spatial light modulator is employed as a...
Proceedings Article

An Efficient Object Tracking Algorithm of Sports Video

Hongyuan Guo
This paper studies the moving object tracking technology for sports video and puts forward an optimized hybrid tracking method. First, particle filter algorithm is adopted to predict the position of moving target, and then compute comparability between object model and object on the estimated position,...
Proceedings Article

Research on the trend forecasting model of power communication network operation

Jian Shi, Hai-yang Wu
This paper deeply studied the performance data of the power transmission network, selected indicators parameter in the characterization of the running state of the network. By analyzing the factors that affect the time series, a trend forecasting algorithm of network performance based on time series...
Proceedings Article

Research and Implementation of WebRTC Signaling via WebSocket-based for Real-time Multimedia Communications

Jian Cui, Zhuying Lin
WebRTC (Web real-time communication) achieves a peer-to-peer real-time multimedia communication on web. This paper researched and analyzed the core architecture and related technologies of WebRTC, including video input and output, multimedia transmission, the process of peer-to-peer connection establishment...
Proceedings Article

Study on Graphic Database & Visual Query System of Ecological Development of Dianchi Lake Basin

Jie Song, Xingyuan Chen
It is rather difficult to store and manage the diverse data source of ecological development of Dianchi Lake basin through traditional RDBMS due to their various types, massive data, complex relationship as well as their dynamic changes. We established graphics database and visual query system to analyse...
Proceedings Article

Multi Angle Analysis of The Existing Clustering Algorithms

Jinzhen Ping, Qian Wang, Lili Yu, XueFang Wu
Data mining clustering is a broad research field. It is used to partition the data set of clusters. Different clustering methods use different similarity definition and technology. Several popular clustering algorithms are analyzed from three different perspectives: the clustering criterion, clustering...
Proceedings Article

Research on social media information security questions in the big data era

Xiaoxing Ma
Recent years social media swept the world, changed people's consumption behavior and lifestyle, and become a mainstream Internet applications. At the same time social media generate a lot of user data, let us be more realistic and comprehensive understanding of the structure, the personal information...
Proceedings Article

Improved Parallel Data Mining Policy for Cloud Computing Environments

Lili Yu, Jinzhen Ping, Qian Wang, Weifeng Wang
Cloud computing is a business model. It distributes computing tasks in a large number of computer resource pool configuration. It can provide on-demand for the user computing power, storage capacity and application services capabilities. Cloud computing offers a cheap and efficient solution for storing...
Proceedings Article

RESEACH ON ASP.NET AJAX FRAMEWORK AND ITS APPLICATION IN WEB DEVELOPMENT

Qian Wang, Lili Yu, Jinzhen Ping
Web page requests is the common way for applications to implement human-computer interaction, but full page refreshing of the page reduces the effects of users ‘experience, increases the pressure of servers and slows down the speed of program response. Partial update pages with AJAX asynchronous transfer...
Proceedings Article

Sentimental Analysis on Big Data – On case of Financial Document Text Mining to Predict Sub-Index Trend

Johannes K. Chiang, Chun-Cheng Chen
This research analyzed the potential emotion by sentimental analysis in large volume of financial text documents about Taiwan electronic industry to predict the stock trend. In recent researches about sentimental analysis, supervised method was proven to be able to reach high accuracy, but the training...
Proceedings Article

PSO Algorithm for Block Sequencing Problem in Open Pit Mining

Wenbo Liu, Hongyi Zhang
Iron ore is the main raw material of the production in iron and steel enterprises in China. It is a non-renewable resource and with limited reserves. In this paper, in combination with the practical situation of the mine, an integer linear programming model of a strip mining block scheduling problem...
Proceedings Article

A novel underwater dam crack detection algorithm based on sonar images

Pengfei Shi, Xinnan Fan, Gengren Wang
As underwater environments are complex and time-varying, and the target is randomness and diversity. Underwater dam crack detection based on autonomous underwater vehicle (AUV) equipped with sonar is a challenging task. In this paper, a novel crack block tree (BT) algorithm utilized in sonar images is...
Proceedings Article

China's Forest Coverage Rate Forecasting Model Based on Gray System Theory

Zhuoshi Li, Wenqian Wang, Lizong Cao, Zhengwei Liu
In this paper,according to China in 1973-2013 in eight forest inventory published forest cover of statistical data.Using gray system theory GM (1,1) prediction model for China's forest coverage rate forecast. Then, the use of residues correction method for the prediction model is optimized to ensure...
Proceedings Article

Design and Development of Visualization System for Marine Early Warning Products based on GIS

Aifen Zhong, Yonghua Sun, Zhenjun Cai, Cankun Yang
General marine environmental early warning data have not formed a unified standard, due to the different angles and dimensions in expression of marine environment. General formats of these data are text type, binary type, and mixed type. These data types cannot be read and processed by the GIS platform,...
Proceedings Article

Development of the platform for Marine Early Warning Products Service based on Online ArcGIS

Yixin Huang, Yonghua Sun, Hao Wu, Cankun Yang
The Clue of this paper is the data of marine environmental early warning service platform, and our research basis includes data classification, database index table, structure design and data consistence. The normalized data which is realized by ETL is ported in automatic drawing template, and use the...
Proceedings Article

Design and research of fishing boat accident case library base on spatial database

Yuling Xia, Yonghua Sun, Wenbin Li, Libin Qi, Cankun Yang
The paper builds a model of marine fishing vessel early-warning based on principle of Negative selection algorithm of artificial immune system and Fishing Boat Accident Case Library. Firstly, the index weight of model was calculated by using BP neural network algorithm. Then, the model of fishing vessel...
Proceedings Article

Research and Application of Moving Tracking of Stewart Based on Multi-innovation EKF Algorithm

Sujian Sheng, Bo Yang, Pinle Qin, Xiaoqing Chen
Because of the low estimation accuracy of normal extended Kalman Filter in strong nonlinear system, an improved extended Kalman Filter (MI-EKF) is presented to solve the problem, and the filtering accuracy is greatly improved. In this paper, multi-innovation theory is applied to EKF, and the multi-innovation...
Proceedings Article

Dynamic Analyses of Six Degree Freedom Platform Based on Improvement PID Neural Networks

Sujian Sheng, Bo Yang, Pinle Qin, Xiaoqing Chen
In this paper, traditional PID neural network (PIDNN) control theory was introduced and the characteristics and disadvantages of the algorithm was been analysis. An improvement PIDNN method based on multi-innovation theory was proposed. Then the steward tracking control system was simulated, some planning...
Proceedings Article

A Defense Model against SQL Injection Based on Parameterized Queries

Kuan Song, Hua Zhang
The SQL injection attack is one of the topmost threats for web applications. Most previously proposed methods for detecting SQL injection attacks suffer from false positives and false negatives. This paper describes a defense model against SQL injection based on parameterized queries. Results show that...
Proceedings Article

A fast discrete small-world optimization algorithm

Zhipeng Tian, Haiping Zhu, Xinyu Shao
The application of complex networks in optimization field has received increasing attention recently. This paper proposes a discrete small-world optimization algorithm (DSWOA) based on the small-world network theory and Six Degrees of Separation principle in sociology. The DSWOA model is composed of...
Proceedings Article

Energy Efficiency of Massive-MIMO Heterogeneous Network

Hui Bao, Pengbo Fang
Massive massive multiple-input multiple-output(MIMO) and heterogeneous networks are two Potential technologies in the 5G. The application of Massive-MIMO to heterogeneous network can effectively eliminate the interference and improve energy efficiency.In this paper, the network is optimized by using...
Proceedings Article

Path planning for mobile robot using the novel repulsive force algorithm

Yunwei Jia, Guoqiang Yin, Lianyu Zhao, Xueping Li, Siyue Sun
Artificial potential field; local minimum; goal unreachable; mobile robot.
Retraction

RETRACTION: Controlling SMPs Using Metamorphic Symmetries

Bing Li, Li Chen, Lianyong Zhou
In April 2020, Atlantis Press was alerted to fake proceedings articles hosted on our platform. These articles, mostly in computer science and engineering, were generated by the SCIgen computer program and were all published between 2006-2018. Immediately after receiving the alert, Atlantis Press initiated...
Proceedings Article

The Spatial and Temporal Characteristics of Potential Evapotran- spiration in Sources Regions of Yangtze River Over the Past 55 Years

Chunmin Zhang, Xunjian Long, Chuan Liang
Potential evapotranspiration is important to energy balance calculation and hydraulic cycle. And the value impacts water-heat balance obviously. Based on the theory of FAO Penman-Montieh equation, this manuscript taken the sources region of Yangtze River as a study case. For the calculation of Potential...
Proceedings Article

An adaptive weight value-based multi-scale retinex algorithm for color image enhancement

Qianshun Liu, Jian Bai, Feihong Yu
There are limited dynamic range problems when real world scenes are captured from a digital camera and displayed on monitors. Retinex is one of the most popular theories for dynamic range compression, color constancy and color rendition. However, there still exist some problems, such as hue shift and...
Proceedings Article

Research on the Design of Food Safety Supervision Information System in Beijing

Jiaji Yu, Li Wang, Xiaoyi Wang, Jiping Xu, Huiyan Zhang, Jiabin Yu
Currently, there are still many problems in food safety supervision of Beijing, more than 80% of the foods are depending on the outer supply which has increased difficulty in the effective control from the source of food safety. The planning levels of food safety management are still in need, the food...
Proceedings Article

Intelligent control system of seed cotton pretreatment based on knowledge base

Haopeng Wang, Hui Li, Xianying Feng
In order to improve the automation level of our country cotton processing and reduce reliance on operators production experience, this paper presented the seed cotton pretreatment of intelligent control strategy based on knowledge base and constructed the related control system. The system can detect...
Proceedings Article

The Design and Implementation of Personal Finance Management System Based on Android

Yu Xie
With the rapid development of the Android mobile applications, people's daily life is more and more mobile applications. The system is based on the Android mobile application platform for personal financial management system, the system can easily make a record of personal real-time consumption, convenient...
Proceedings Article

The Novel Computer Assisted Film and Television Animation Design Pattern based on Computer Graphics Theory and Three-Dimensional Modeling Structure Optimization

Kangliang Xiao
In this paper, we conduct theoretical analysis on the novel computer assisted film and the television animation design pattern based on the computer graphics theory and three-dimensional modeling structure optimization. Computer graphics rely on itself, the visualization technology of the data and graphics...
Proceedings Article

Research on Human Skin Condition Evaluation based on Neural Network

Chang Liu, Li Wang, Xiaoyi Wang, Jiping Xu, Huiyan Zhang, Yinmou Dong
With the continuous development of peoples’ life, the skin-care is attracting more attention. There are so many factors affecting the skin condition, and there is nonlinear correlation between factors. However, the current research always use single index to evaluate skin condition which would not be...
Proceedings Article

The Land Desertification Dynamic Monitoring and Driving Factors Analysis in YLN Region of Tibet

Guoqiang Zheng, Yanyan Li
.In this paper, we study the land desertification status and distribution in YLN region of Tibet and analyzed the driving factors using Landsat satellite image of 2000-2009 and some observational materials. The result show that, in 2009, total desertified land area is 4253km2 which included 1388km2 sandy...
Proceedings Article

Implementation and Application of NFC Based on Android

Aobo Zhang
Near Field Communication (NFC) is a simple and contactless communication technology, and it’s very popular in consuming electronic filed. Android is one of the most popular mobile operating system, and it’s combined with NFC which can greatly promote the development of both sides. We mainly pay attention...
Proceedings Article

Infrared Image Segmentation Algorithm Using Histogram-Based Self-adaptive K-means Clustering

Zhiqiang Zhao, Xin Ling, Jian Wu, Xiaoyong Rui
For the problem that the different parameters of infrared imaging equipment and the environment around the target cause the poor robustness of threshold value automatic acquisition method in infrared human target segmentation algorithm, starting from the principle of infrared imagery and connecting with...
Proceedings Article

Robust visual tracking based on Informative random fern

Hao Dong, Rui Wang
In this paper, a novel visual tracking algorithm named as Informative random fern - Tracking Learning Detection (IRF-TLD) has been proposed. Instead of a binary comparison in the standard random fern of TLD, we use the real value feature and Gaussian random projection to acquire the advantages of high...
Proceedings Article

Adaptive algorithm research based on micro displacement driving mirror

Yan Zhang
Acquisition, tracking and pointing(ATP)system is the core of high speed and large capacity of laser communication in atmosphere, spot jitter generated by the disturbances among long distance laser communication has seriously affected the precise alignment between laser communication terminals, and greatly...
Proceedings Article

An Optimization Method for Train Flow Adjustment between Parallel Routes on Railway Network

Boliang Lin, Jianping Wu, Siqi Liu, Jiaxi Wang, Chang Liu
This paper focuses on the train flow adjustment between parallel routes on railway network. We firstly analyze the classical arc-path models based on the multi-commodity flow. According to the analysis of the mathematical model, we propose a practical method, namely the damping coefficient adjustment...
Proceedings Article

The New Remote Alarm System for Household Door and Window Intrusion Based on ZigBee

Yulong Hao, Jiaoyu Liu, Qiang Wen
In view of high-cost and low real-time of traditional alarm system for home intrusion ,this paper proposes and implements the one new remote alarm system for household doors and windows intrusion based on ZigBee and WIFI, GPRS model , this system uses magnetic sensor on household doors and windows to...
Proceedings Article

Moving Object Detection Based on Adaptive Background Updating Algorithm

Zhiyong Tang, Zhenji Yang, Kun Liu, Zhongcai Pei
Background modeling and subtraction method is an important part in motion detection. In this paper, we propose a novel moving object detection method based on four frame difference arithmetic of adaptive background updating algorithm to build the background model. The method employs dynamic threshold...
Proceedings Article

Research on the incremental updating algorithm of the association rules with the timing decision

Min Zhang, Yice Zhang
In order to deal with the frequently updating of data in practice, association rules incremental updating algorithm combining with the timing decision begun to be widely studied. Ding Hu gave an association rule difference degree judgment method based on the completely frequent itemsets. This method...
Proceedings Article

A Research on SDN–based Virtual Fast Transmitting Network Technology

Changbiao Xu, Zhaonan Lu
This paper presents a novel chain-like fast transmitting network which is based on the Software Defined Networking(SDN) virtualization technology to deal with the problems that the current mechanism of reducing packets delay is complicated and there is quite a high Processing delay during matching flowtable...
Proceedings Article

Research on Detection Robotic Visual Signal Remote Transmission and Control

Si Zhang
with the development of robotics, robots will play a great role in the complicated conditions and extreme environments. Robots are used in data collection and complete the task of detecting robot developed for disaster relief in the future, in particular, guarantee the security of aid workers is of great...
Proceedings Article

The study on the landscape architectural design based on the Virtual Reality technology

Long Yan, Rongke Jin, Hong Xu
The virtual reality technology is based on 3D graphics technology, combined the technology of multimedia, the main body of visual and sensor technology to create an immersive virtual world. The paper is based on the landscape architectural design technology of virtual reality, and builds the landscape...
Proceedings Article

Design of Ship Course Controller Based on Fuzzy – PID Algorithm

Mengqiang An, Peng Zhou, ZhongXing Zheng
In order to meet the high-performance and self-adaption requirements of ship course control at present, fuzzy – PID control design is adopted for the ship course control system in this paper. Such control design has attracted various advantages of PID control, so the complex nonlinear system of ship...
Proceedings Article

Firmware Design of the USB3.0 Data Transfer Interface

Jie Liu, Weihua Chen, Jietao Diao, Zhaolin Sun
USB (Universal Serial Bus) as a computer peripheral bus standards, is a flexible and efficient bus interface. The new version of USB3.0 theoretical transfer speed is up to 5.0Gbit/s, which greatly increases the data transfer bandwidth while retaining its inherent advantages. It’s very suitable for high-speed...
Proceedings Article

The Geological Disaster Monitoring Method Based on GNSS

Qi Cai, Jian Jiang, Wei Chen
In recent years, the frequent occurrence of geological disasters such as landslides, debris flow and so on causes huge losses to the lives and property of the people. To solve this problem, this paper proposes a geological disaster monitoring method based on GNSS (Global Navigation Satellite System),...
Proceedings Article

Design of low-power and changeable-frequency underwater data acquisition system

ZhuoJing Yang, Jianwei Zhang, Fan Jiang, Wenjie Hao
The conception and characteristics of underwater blast shock wave and gas bubble pulsation theory are explained in this paper, based on which the measuring principle and sampling parameters of the overpressure measuring system of underwater blast shock wave are figured out. The underwater blast pressure...
Proceedings Article

Research and implementation of The service for Batch data with directory import into PLM system

Yanyan Tang, Hong Ji, Jia Gao, Dexiong Xu
In order to better support application of PLM, the demand that the batch of unstructured data which according to the defined directory structure to store to PLM is increasing.In the process of execution, there are many problems such as the large amount of data, the complicated storage directory structure...
Proceedings Article

Research and implementation of network fault reduction based on Virtual platform

Zhenhua Chai
With the continuous development of the state grid, the application of information technology has been strengthened. And the application of data network is more and more complex. In this paper, it will combine the practical work experience with the fault location and the exclusion of the state grid data...
Proceedings Article

The Study of Smartphone APP Interface Design

Rui Dong
As the popularity of the smartphone, APP for smartphone has been an important industry of Mobile Internet. In this condition, users of this phone concerned much more about the experience of APP’s interface. In this paper, the author based on lots of survey, summarize a serial of useful theoretical basis...
Proceedings Article

Application of DNS in the regulation of link traffic flow in multi-outlet networks

Gengsheng Deng, Zhihui Yan, Weiping Zou, JingJing Zhou
Multi-outlet link has been widely used in the campus network. Based on the actual case, this paper introduces how to use DNS to adjust the inbound and outbound traffic of multi-outlet network, the users do not need to modify the client.According to the actual use of the outlet link, we can take the precedence...
Proceedings Article

A Trust Algorithm based on the Latent Trust from Users to Items

Meiyu Fang, Zhongkai Hu
Trust relationship plays an important role in helping customers arrive at a trade decision in e-commerce. Numerous models and prediction algorithms have been proposed to calculate trust value. However, these models and algorithms are impractical in e-commerce transaction. In this paper, customer-to-customer...
Proceedings Article

Effectiveness Evaluation of Air and Missile Defense System Based on Parametric Diagrams

Fa Lu, Wenhu Sun
Under the complex operational environment of the antimissile operation, the application of Systems Modeling Language (SysML) parametric model in weapon system effectiveness evaluation is explored. The function of parametric graph model, the construction process of the model and the optimization method...
Proceedings Article

Frequent Itemset Mining Algorithm based on Sampling Method

Haifeng Li, Ning Zhang, YueJin Zhang
Frequent itemset mining is an important technique in data mining. This paper employ the sampling method to improve the performance. An in-memory index is presented to store the data information, which is maintained by our proposed algorithm FIMS. We conduct the experiments over two datasets and find...
Proceedings Article

Qt-Based Cross-platform Design of Management System for Distributed Real-time Simulation Platform

Xibao Wang, Ge Li, Peng Wang
At present, with the development of cross-platform software technology and the cross-platform application gaining more and more attention, there emerged many multi-platform support, superior performance, cross-platform software development tools and integrated development environments, such as Qt Creator....
Proceedings Article

Fragments Extraction and Segmentation Based on Three Frames Difference and Modified Otsu

Zeqing Liu, Yurong Zhang, Jianxin Zhao
This paper present a method for the extraction and segmentation of small targets in image sequence captured in static explosion test, whose background is complex with numerous interference. Three frames difference method is adopted to process the original image sequence to obtain the foreground image....
Proceedings Article

The Analysis and Calculation of Artillery Breech Force Based on MATLAB

Zhaoqiang Gu, Changchun Di
At present, the analysis and calculation of artillery breech force based on the classical interior ballistic theory describe the transformation law of interior ballistic parameters and optimize the related parameters to correct the error due to interior ballistic model processing, which leads to a larger...
Proceedings Article

Accurate and Robust Pupil Positioning Algorithm Using Adaboost Cascade Detector and Improved Starburst Model

Bing Liu, Zhiyi Qu, Yueqing Ren, Ruicheng Wang
With the rapid development of human-computer interaction systems, eye tracking algorithm has become a very popular research field. As the most important part in eye tracking, pupil positioning algorithm is still facing many challenges, especially in processing non-ideal eye images. In this paper we propose...
Proceedings Article

Optimal Wavelet Threshold De-noising Algorithm of Power Quality Based on Improved Particle Swarm Optimization

Bo Sang, Hongwen Liu
For the issues of local optimum and difficult convergence based on traditional Particle Swarm Optimization (PSO), this paper is proposed a new inertia weight which applies to denoise the harmonic of power quality and enhance the precision when selecting threshold in harmonic signal de-noising, and the...
Proceedings Article

Pattern-matching scheme for HEVC screen content coding

Yawei Xu, Jianxin Song
Screen Content refers to image/video generated by electronic devices, like cartoons, 3-D games or captures of computer screens or video with text overlay etc. The existing video coding techniques don’t perform well on screen content. In this paper, the characteristics of screen content and coding efficiency...
Proceedings Article

Research on Parallel Particle Filtering Target Tracking Algorithm Based on Hadoop

Fu Sun, JianXin Song
In order to achieve high efficiency and low cost moving target tracking in video sequences, we proposed parallel particle filtering target tracking algorithm based on Hadoop cloud platform, the algorithm using the open source calculation model to realize the parallel calculation of all particles in the...
Proceedings Article

The research of improved ray casting algorithm on VTK

Hongtao Wei, Jin Li
In the medical image visualization, ray-casting algorithm is a common algorithm. However, traditional ray-casting algorithm is not efficient for real-time volume rendering because of the excessive calculation and the high redundancy .In this paper, the resampling process by skipping the empty voxel is...
Proceedings Article

Blind Image Quality Assessment Bases On Natural Scene Statistics And Deep Learning

De Ge, Jianxin Song
Measurement of the image and video quality is crucial for many aspects,such as transmission, compression, perception.The most of traditional methods learning-based image quality assessment(IQA) build the mapping function of the distortion and mass fraction. However,the mapping function is hard to built,and...
Proceedings Article

A Review of High Dynamic Carrier Tracking Algorithms Without External Aided Data

Youmu Shi, Di Yan
The traditional PLL (Phase-locked loop) is used to track the GPS signal carrier. However, an unavoidable contradiction between the bandwidth of PLL and the measurement accuracy occurs when PLL works in a high dynamic situation. Consequently some solutions have been studied since 1980s, which can be divided...
Proceedings Article

Worsted spinning process parameters inversion based on a mixed population genetic-ANN algorithm

Jian-Guo Yang, Jing-wei Xiong, Lan Xu
Demand diversity and individuation, make the textile production process is complicated. To solve the problem of worsted spinning process parameters inversion accuracy, the hybrid population genetic neural network algorithm is presented in this paper(mixed population based - artificial neural network,...
Proceedings Article

Research on Document Clustering from Internet Public Opinions

Ximei Wang
Generally, in the traditional multilingual topic discovery, it is the multilingual text for a single goal of the conversion and then clustering. On this basis, we have constructed a custom dictionary for the people with the highest percentage of Chinese, Japanese and English in this paper. At the same...
Proceedings Article

ATM Retentate Detection Model of Texture Distinguish Optimization of HOG Operator

Zhen Xu, JianWei Lin, Fan Wu, ZiBin Xu, Hanjie Gu
For the accuracy of traditional HOG feature detection operator in the application of ATM retentate detection is not high, this paper proposes a distinguish between optimization based on texture HOG feature detection operator ATM retentate detection model. First eliminate background of the original image...
Proceedings Article

Urban Traffic Jam Simulation and Prediction

Changbo Wang, Yan Jiang, Na Liu
As the rapid increase of traffic flow around the world, the development of the city is increasingly becoming saturated. The traffic flow theory that can guide and schedule traffic is needed. Traffic flow model based on cellular automata which is used to describe the freeway traffic flow model has been...
Proceedings Article

Exploring Swarm Optimization of Traffic flow in Cities

Changbo Wang, Yan Jiang, Na Liu
With the acceleration of industrialization and urbanization in China, the development of the city is increasingly becoming saturated. There is no doubt that the city's economic development and people's travel life have brought a lot of pressure on the urban road traffic. Many research focus on the optimization...
Proceedings Article

Research on Data Security and Protection Technology under Cloud Environment

Qi Xu, Yuangen Xu, Yong Li
With the rapid and bursting development of computational science and data engineering related techniques, the transmission and protection of data is crucial in the computer science community. Cloud computing is becoming increasingly important for provision of services and storage of data in the Internet....
Proceedings Article

Research on the Key Technology of the Cloud Platform Data Security

Xuefeng Jiang, Zhengmin Wang, Huiliang Dong, Xuan Du
Since the establishment of the relationship of trust exists between transparency, cloud computing services platform providers and data users, the integrity of the cloud computing service provider platform to the data stored in the user data information to prove, at the time of data information sharing...
Proceedings Article

The Exploring Research on Resource Mapping Method for Virtual Network Deployment

Jie Qian, Hanxi Li, Yanping Wang
virtualization technology is an important means to achieve the current cloud computing environments to maximize resources utilization, how to effectively use technology in virtual networks within the data center is based on the key challenges of virtual network resource allocation problem faced. In this...