Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)

+ Advanced search
794 articles
Proceedings Article

Fault Diagnosis of Roller Bearing Using Dual-Tree Complex Wavelet Transform, Rough Set and Neural Network

Zhixin Chen, Lixin Gao
In a complex field environment for modern mechanical equipment, how to identify all kinds of operational status of the rolling element bearings fastly and accurately is very important and necessary. A novel approach to automated diagnosis is introduced, which is based on feature extraction with the Dual-Tree...
Proceedings Article

Adaptive Blind source Separation with Dynamical Changing Source Number

Donghui Xu, DongDong Yang, HongGuang Ma, Wenpu Guo, Hui Li
Analyzed the reason why the overdetermined blind signal separation of natural gradient algorithm ultimate not stably converge, constructed an adaptive blind separation algorithm suitable for dynamically changing source number. The new algorithm not only overcomes the shortcoming of eventually not stable...
Proceedings Article

Force Control of Electrical Load System Based on Single Neuron PID Adaptive and Repetitive Control

Zhiqiang Wei, Guanghua Zong, Hongchong Wu
In view of the surplus torque and complexity of controlled plant in passive electrical load system, a novel approach based on single neuron PID adaptive control and repetitive control for repetitive periodic load control system is proposed. Radial basis function (RBF) neural network is used to identify...
Proceedings Article

A Improved Infrard And Visible Light Image Fusion Algorithm

Zhong-jie Xiao
On the basis of Nonsubsampled Contourlet Transform (NSCT) research, this paper proposed an improved image fusion algorithm based on the infrared and visible light image fusion. First of all, the NSCT was used to decompose the infrared image and the visible light image. Then the pixel feature energy weighted...
Proceedings Article

Image Fusion Algorithm Based on Wavelet Sparse Represented Compressed Sensing

Shan-shan Liu, Xiao-he Zhang, Ai Zheng
On the basis of the compressed sensing theory, this study proposed an improved wavelet sparse represented compressed sensing based image fusion algorithm. This algorithm firstly got the wavelet sparse domain linear measurement values of the original images by the dual radial sampling mode. Then a simple...
Proceedings Article

Research on Large Space Building Fire Positioning Technology Using Video Surveillance Images

Ying Lu, Hui-qin Wang, Zhen-Bo Bi, Fei XU
The large space building fire source locating technology is an important link to automatic fire detection and extinguishing. This paper introduces a method that determines fire source location using three-dimensional reconstruction techniques based on accurate fire detection. The process includes: feature...
Proceedings Article

A Brief Analysis on the Measurement of Network Sniffer

Hao Zhang, Lin Zhang
The network wiretap biggest challenge to the network safety. Chaperonage network technique of continuously development, make ether net safety problem research more and more importance, involve a network safety the realm have many safety technique, but these technique of realization all demand depend...
Proceedings Article

The Application Mode in Urban Transportation Management Based on Internet of Things

Linna Huang, Chunli Liu
The concept of intelligent transportation has been accepted by the community and has also been widely used. Meanwhile, the problems of intelligent transportation systems have revealed. Then, the internet of things provides a new way for the development of intelligent transportation. This paper firstly...
Proceedings Article

Study of Compression Mechanism for Reducing the Data Redundancy of Sensor

Huafeng Sun
Data acquisition is the most fundamental task of the wireless sensor network. This sensor data to reduce redundancy of the compression mechanism, compression module is given a concrete realization of the cost of the LTC algorithm itself. Compression mechanism of the design decisions were discussed motives,...
Proceedings Article

A Parallel Shortest Path Algorithm Based on Relaxed Heap for VLSI Wiring

Xiaoyang Lian, Zhenzhou Ji, Xiong Su
Buffer insertion is an efficient technique in inter-connect optimization. By inserting numbers of buffers, a wire can be turned into several nodes, so the total delay can be reduced. Buffer insertion has become a hot area of research in recent years. By constructing the optimal buffer insertion model,...
Proceedings Article

A New Probabilistic Model for Bayes Document Classification

Ya-Shu Liu, Han-Bing Yan
In this paper, we propose a new probabilistic model of naïve Bayes method which can be used in text classification. This method not only takes account of the frequency of feature words, but also considers those important words do not appear in the test document, which overcomes the shortcoming of the...
Proceedings Article

Processing of spectrophotometric array signals using an artificial intelligence method

Ling Gao, Shouxin Ren
This paper addresses processing of spectrophotometric array signals based on genetic algorithms (GA) least square support vector machines (LS-SVM) regression to provide a powerful model for machine learning and data mining. The key to complete LS-SVM regression is to choose its optimal parameters. Due...
Proceedings Article

The Campus Digital-Book Reading and Communication Platform Based on Wifi and Android

Xinning Hui, Yuli LIU
In recent years the Android mobile terminal is popular in campus, at the same time the software of entertainment and making friends emerged one after another. However, there are only few platforms to study and communication for Android user in the numerous software. To solve the problem, we initiate...
Proceedings Article

Quaternion model of video quality assessment based on structural similarity and inter-frame-different

Gang LI, Ye-Ming He, Xiao-Bo XU, Jun-Li LI
Recently, video quality evaluation method based on structure similarity (SSIM) has been widespread concerned. Compares with other traditional methods, it has a better performance and is simple to calculate. In this paper, we follow a new simple calculate metrics method in quaternion model, by introducing...
Proceedings Article

Research and Design of the DSRC device Measuring Instrument

Xinyou Li, Zebin Xu, Jinxu Guo
Along with an increasingly wide utilization in the fields of ETC application, it becomes more and more important to measuring quickly and accurately on the key equipment of ETC system, such as OBU and RSU . This article is based on the measuring requirement of ETC system and propose a new design proposal...
Proceedings Article

An Energy Balancing Approach for MANETs Based on Non-cooperative Game

Xin LI, Huyin Zhang, Di Wu, Jing Wang
In a mobile Ad Hoc network, the energy imbalance of mobile nodes may lead to energy depletion of some nodes, network partitioning and degradation of network lifespan. Therefore, we propose an energy balancing approach called Energy Balancing Approach Based on Non-cooperative Game (EBNG) which can be...
Proceedings Article

A New ABS Control Strategy Designed for Electric Vehicle Independently Driven by Four Wheel Motors

Yu Yang, Shiyou Yang, Lijie Yang, Yang Liu
In this paper, first, a hypothesis that ABS(Anti-Brake System) regulation of EV(Electric Vehicle) could be realized only by wheel motor was put up, then based on the logic threshold method, an ABS control strategy was designed to test this hypothesis. Furthermore, the four wheel motors directly drive...
Proceedings Article

Study of Control Strategies for Voltage-Source PWM Rectifier

Hui Wang, Hui Qi
The paper first analyzes the mathematical model of three-phase voltage-source PWM rectifier and then introduces double closed-loop control of voltage and current system, in which the active and reactive power can be controlled independently. PWM rectifier control system is built based on the DSP2812...
Proceedings Article

Design and Application of Large Torque Electrical Load Simulator for Positive and Reverse Operation

Zhiqiang Wei, Guanghua Zong, Guochen Niu, Xiaolei Zhang
In order to meet the testing requirement of positive and reverse operation large torque load for new rudder, an electrical load simulator is designed. The realization principle of system is given according to the system index, and the stability and so on. The system mathematical model is established...
Proceedings Article

A Parallel Shuffled Frog Leaping Algorithm Based on Stem Regions Combinatorial Optimization for RNA Secondary Structure Prediction

Chunlei Liu, Zhenzhou Ji, Yingsen Hong
RNA Secondary Structure Prediction is an important part of the biological computing. RNA secondary structure prediction algorithms tend to have higher time and space complexity. Some swarm intelligence algorithms can also be applied to RNA secondary structure prediction on the basis of stem regions combinatorial...
Proceedings Article

A Parallel AC Algorithm Based on SPMD for Intrusion Detection System

Xiong Su, Zhenzhou Ji, Xiaoyang Lian
AC algorithm, as a multi-pattern matching algorithm, plays an important role in the intrusion detection system. The efficiency of the pattern matching algorithm directly affects the overall efficiency of the intrusion detection system. But the number of the growing intrusion features and demanding for...
Proceedings Article

Feasibility Study of Application of PRT at a Tourism Island

Mingming Dong, Pengjun Zheng
This paper deals with public transportation in tourism areas. A survey was carried out in Putuoshan, a famous scenic area in Zhejiang Province. By carefully analyzing the current transportation situations using the data collected, a new public transport---PRT, was proposed and feasibility of application...
Proceedings Article

MIMO-OFDM NLOS Identification Algorithm Based on Hypothesis Test

Weibo Zhao, You Zhou, Hanying Hu
A NLOS identification algorithm based on rician K-factor hypothesis test was proposed to mitigate position location bias caused by NLOS propagation in MIMO-OFDM system. A multi-antenna rician K-factor estimation method was derived from the correlation difference of deterministic and diffuse component...
Proceedings Article

L1-norm-based (2D)2PCA

Fujin Zhong
Traditional bidirectional two-dimension (2D) principal component analysis ((2D)2PCA-L2) is sensitive to outliers because its objective function is the least squares criterion based on L2-norm. This paper proposes a simple but effective L1-norm-based bidirectional 2D principal component analysis ((2D)2PCA-L1),...
Proceedings Article

Sensor Fusion in Analogue Circuit Fault Diagnosis Using Transferable Belief Model

Youhui Chen, Dong Cheng, Yimin Yang, Zan Xiao
In fault diagnosis of circuit fault diagnosis system using multi-sensor data fusion may not give reliable fault diagnosis result in cases when processing on inconsistent data carry inconsistent. In order to deal with such problems, This paper has developed an analog-circuit fault diagnostic system based...
Proceedings Article

The Research and Implementation of a Personalized Intelligent Tutoring System

Saidong Lv, Guohua Tang, Yaowen Xia, Yu Sun
Personalized intelligent tutoring system is an effective approach to achieve the personalized teaching. In this paper, it discusses the connotation and learning styles of personalized intelligent tutoring system. After research the knowledge model and the student model. Finally, it achieves a personalized...
Proceedings Article

The parameter’s MCMC estimation of HMMs with transition density function

Chengwen Zhu, Yu Ge, Lina Lu, Zhang Tian, Chuizhen Zeng
The parameter estimation of HMM is critical to all its applications. The classic B-W algorithm is not flexible with the initial parameters and is easy to fall into the local optimal solution. Bayes estimation of it makes posterior risk minimization, and make full use of the experience, history information...
Proceedings Article

Design and Implementation of the CNC Monitoring System Based on Internet of Things

Yilin Zheng, Hu Lin, Qingxu Deng, Xianli Su
Aiming at the shortcomings of the traditional CNC sensor network such as the difficult cable laying and long-distance communication signal attenuation, this paper designs the CNC monitoring system based on Internet of Things technology. The design reduces the power consumption of wireless sensor nodes...
Proceedings Article

Mobile Robots Path Planning Based on Evolutionary Artificial Potential Fields Approach

Feilong Li, Yujun Wang, Yan Tan, Gengyu Ge
This paper presents a new way for mobile robots’ path planning which is based on the Evolutionary Artificial Potential Fields(EAPF) approach. The APF theory is a traditional method to plan path for a robot. The Evolutionary APF aims at helping a robot jump out of the local minimum point. Using a virtual...
Proceedings Article

Optimum Structure of multi-layer silver superlenses for optical lithography

Junxian Ma, Kuangying Yuan
Multilayer silver superlenses had been shown to having sub-wavelength performance. In this paper, we investigate the effects on imaging performance of different multilayer imaging structures comprising alternately layered metal and dielectric films. We first compare and analyze transmission coefficients...
Proceedings Article

Construction of Collaborative Learning Environment Supported by Cloud-computing

Linna Huang, Chunli Liu
In the field of education, cloud computing, as a basic environment and platform for the future network learning, will bring positive effect on construction of the learners' personal learning environment, on construction of school resources, on development of the educational information system. Based...
Proceedings Article

A Two Factor User Authentication Scheme for Medical Registration Platform

Di Liu, Zhi-Jiang Zhang, Ni Zhang
This paper proposes a two factors user authentication scheme for Beijing medical registration platform, in order to protect user personal information on the platform. This scheme overcomes the shortcoming that there is no authentication process during user log on the platform. The reason that builds...
Proceedings Article

A Theoretical Study of the HO2 + HN2 Reaction

Tiancheng Xiang, Hongyan Si, Yanru Zhao
The mechanism of the HO2 + HN2 reaction has been investigated at the B3LYP/6-311++G (3df, 3pd) level. The single-point energy calculations are performed at the high-level CCSD (T) / 6-311++G (3df, 3pd) for more accurate energy values. For the HO2 + HN2 reaction, DFT calculations show the dissociation...
Proceedings Article

A proactive system reliability analysis framework of electric vehicles

Xiaopin Zhong, Wenwen Zeng, Li Qiu
System reliability analysis (SRA) is a core support technique of many applications in the entire product lifecycle of electric vehicle (EV). However, the large-scale industrialization needs an accurate SRA due to the features of complexity, coupling and unknown noise of an EV. Besides component failure,...
Proceedings Article

Just-in-time Kernel Classifier for Online Process Diagnosis

Yi Liu, Wenlu Chen
A novel just-in-time kernel modeling method is proposed to online fault detection and diagnosis for chemical processes. The model parameters can be suitably selected using a fast cross-validation strategy. For a query sample, an online kernel classifier is constructed adaptively in a just-in-time manner...
Proceedings Article

The network data storage model based on the HTML

Lei Li, Jianping Zhou, Runhua Wang, Yi Tang
in this paper, the mass oriented HTML data refers to those large enough for HTML data, that can no longer use traditional methods of treatment. In the past, has been the Web search engine creators have to face this problem be the first to bear the brunt. Today, various social networks, mobile applications...
Proceedings Article

The routing of wireless sensor path query optimization research

Lei Li, Runhua Wang, Jianping Zhou, Yi Tang
the wireless sensor network and its characteristics of the study concluded, that the wireless sensor network (WSN) and sensor network and ad hoc network. And the key problems need to be solved. On several of today's popular WSN hierarchical routing protocols are analyzed and summarized. On whether the...
Proceedings Article

Based Fractional Lower-Order Statistics Detection of Envelop Modulation for Underwater Acoustic

An-qing Zhang, Qing-hua WU
Traditional underwater target noise signal modulation spectrum analysis methods is based on the second-order statistics characteristics in the Gaussian noise environment, but in most cases underwater acoustic signals, such as ship-radiated noise and marine environment noise, have pulse characteristic...
Proceedings Article

Research of Parallel Artificial Bee Colony Algorithm Based on MPI

Yingsen Hong, Zhenzhou Ji, Chunlei Liu
Artificial bee colony algorithm is a smart optimization algorithm based on the bees acquisition model. A long time for the search of the artificial bee colony algorithm, in this paper we propose a parallel algorithm of artificial bee colony algorithm (MPI-ABC), with an application of a parallel programming...
Proceedings Article

Interaction Between Object Detection and Multi-Target Tracking

Zhiming Wang, Hong Bao
Object detection and target tracking are two basic tasks in video analysis and understanding. Though both of them were studied widely and deeply, interaction between them worth more efforts. We give an interaction framework between PNN based object detection and meanshift target tracking. Detection results...
Proceedings Article

Research of Cloud Security Communication Firewall Based on Android Platform

Miao Cai, Qinsheng Hou, Fangfang Jing, Qiao Ding
To solve communications security problems of smartphones, this paper analyzes today's firewall models’ lopsided and mechanized characteristic and points out their defects and limitations. Then this paper proposes a new communications firewall model based on the Android platform innovatively with combination...
Proceedings Article

Semi-Supervised Possibilistic Fuzzy c-Means Clustering Algorithm on Maximized Central Distance

Li Liu, Xiao-Jun Wu
Abandoning the constraint conditions of memberships in traditional fuzzy clustering algorithms, such as Fuzzy C-Means (FCM), Possibilistic Fuzzy c-Means (PCM) is more robust in dealing with noise and outliers. A small amount of labeled patterns guiding the clustering process are easy to be obtained in...
Proceedings Article

Low-speed wind tunnel testing control systems research

Jinbo Yao, Qingyu Yang, Yueming Yang, Xiujuan Liu
The wind tunnel test control is the key to the wind tunnel tests. This article Studied 0.75m × 0.75m With backflow wind tunnel measurement and control technology, through the transformation of the wind tunnel motor to improve the stability and uniformity of the airflow and reduce turbulence degree; through...
Proceedings Article

Colored helium bubble flow visualization control technology

Qingyu Yang, Yueming Yang, Jinbo Yao, Dun Jin
In this paper, the basic understanding of the principles of flow visualization 0.75m × 0.75m backflow wind tunnel in the self-study colored helium bubble flow control device, observe the liquidity situation of the aircraft model in the low-speed state, and achieved good effect.
Proceedings Article

Light sheet flow control technology research

Yueming Yang, Jinbo Yao, Qingyu Yang, Xuewei Liu
This article by the understanding of the basic principles of flow visualization 0.75m × 0.75m backflow wind tunnel since the inquiry light sheet flow display device Observe the liquidity situation of the aircraft model in the low-speed state achieved good results.
Proceedings Article

An Automatic Testing Framework Used in Agile Software Development

Fei Wang, Xiao-yong Wu, Yu-wei Wang, Jian-kun Li, Wei Sun
automatic testing is very important for agile software development. There are some testing tasks can be finished by automatic tools, but most of them can not meet the actual needs of enterprises which is the direct reason of building an agile automatic testing framework named as Agilework. The structure,...
Proceedings Article

The Anti-Jamming Design Based on DSP System

Yun-feng Peng, Chang SHU, Wei ZHANG, Quan-zhi ZHOU
This paper describes the sources of interference in the DSP system and its harm. The designs of both the hardware and the software anti-jamming technology are given respectively, and the purpose of the DSP system anti-jamming is realized.
Proceedings Article

The Application of Queuing Theory—Reasonable Arrangements of Ophthalmic Beds

Dongbing Liu, Wenbin Liu
The utilization of hospital bed is critical to hospitals. A reasonable evaluation of hospital bed utilization helps hospital administrators to strengthen hospital management in allocating sickbeds to improve efficiency in the use of hospital beds. Therefore, through establishing model to analyze bed...
Proceedings Article

Design of A Power Quality Monitoring System Based on MSP430

Qiang Wang, Zhaolong Pang, Jianlin Ma, Yingjie Liu
A power quality monitoring system based on MSP430 is proposed in this paper. The monitoring system uses the high accuracy electronic energy measurement integrated circuit ATT7022E and low power consumption microcontroller. The monitoring system can monitor voltage, current, active power, reactive power,...
Proceedings Article

Research and Implementation of smooth transition strategies --- IPv6 tunnel technology

YaFang Lou, YongBing Xu, ZhiJun Yuan
IPv6 has a massive address ,multicast ,neighbor discovery, auto-configuration, service quality, removable and many other new features, as the core technology of the next generation IP( Internet Protocol). IPv4 to IPv6 transition is imperative. This paper discusses how to achieve a smooth transition from...
Proceedings Article

Investigating Semantic Formalization from the Computational Perspective

Huangfu Wei
Senses are the extensions of language and interrelations between word meanings within language and the basis of flexible language use. Computers are basically made to process symbols. Computational linguistics is to simulate part of, if not all of, the natural language competence. From the perspective...
Proceedings Article

Fuzzy Control for Two-degree of Freedom Point Light Source Tracking System Based on Digital Signal Processor

Hongke Xu, Peichao Dong, Hao Chen, Hang Yan, Shan Lin
In order to improve the efficiency of solar panels this paper designs a DSP-based two-degree of freedom point light source fuzzy tracking system which is based on the fuzzy reasoning technology and digital signal processor technology. It designs a photodiode based light source detection unit and uses...
Proceedings Article

A Survey of Face Recognition Methods

Xianwei Li, Haiyang Zhang
Face recognition has received much attention because of its theoretical challenges as well as applications in user identification, surveillance and human–computer interaction. As a result, numerous methods have been developed for face recognition in the last few decades. Some universally used methods...
Proceedings Article

The computer virtual reality technology in the application of sports training

Yanjun Chang
Virtual reality technology with the help of computer hardware and software resources to create and experience the virtual world integration technology can realize the dynamic simulation of the real world,and the dynamic environment to the user’s attitude and language command could make a real-time response,...
Proceedings Article

Multi-path Decision Tree

Huaping Guo, Ming Fan
Decision trees are well-known and established models for classification and regression. In this paper, we propose multi-path decision tree algorithm (MPDT). Different from traditional decision tree where the path of each record is deterministic and exclusive, a record can trace several paths simultaneously...
Proceedings Article

Research on Initial Filter Criteria of IP Multimedia Subsystem

Yafang WANG, Xiaozhe ZHENG, Leilei KANG, Bingyang CHENG
IMS offers a unified service trigger mechanism, whose core is triggering the service to the corresponding SIP application server which based on initial filter criteria. Then the exclusive SIP application servers provide various value-added multimedia services for the users. This paper researches how...
Proceedings Article

Research on the effectiveness evaluation method of VLF Communication Jamming

Guangming Li, Guangyou Cai, Cuihua Liu
This paper introduces the communication jamming suppressing zone to evaluate the vlf communication jamming effectiveness, and proposes to make use of the jamming equation to set up the mathematical model of calculating the jamming suppressing zone .The calculation of jamming suppressing zone will provide...
Proceedings Article

A performance-optimized firewall rules matching algorithm

Zhong Li, Xiao Li
The algorithm of firewall rules matching designed in this paper is based on the idea of divide-and-conquer the rules set. The rules set are divided into multiple sub-sets in accordance with the protocol type. Then, accordance with the relationship between two rules, each sub-set is divided into two groups:...
Proceedings Article

A Traffic Sign Detection Method with High Accuracy and Efficiency

Gangyi Wang, Guanghui Ren, Taifan Quan
Traffic sign recognition is a challenging computer vision problem for its high requirement of reliability and efficiency. In this paper, we propose a prohibitory traffic sign detection method. The method first extracts a red bitmap from the input image and then detects circles in the red bitmap. To detect...
Proceedings Article

A Class of Nonconvex Nonsmooth Approximate Potential Functions for Nonconvex Nonsmooth Image Restoration

Xiao-Guang Liu, Xing-Bao Gao
Nonconvex nonsmooth potential functions have superior restoration performance for the images with neat boundaries. However, several difficulties emerge from the numerical computation. Thus the graduated nonconvex (GNC) method is suggested to deal with these problems. To improve the performance of the...
Proceedings Article

A Source-Filter Model-Based Unvoiced Speech Detector for Speech Coding

Qian Wang, Xin Du, Weikang Gu
A novel and easy to realize approach for Voice Activity Detection (VAD) is proposed based on the source-filter speech model in the application of Linear-Prediction-structure speech coding. Generalized Likelihood Ratio Test (GLRT) is adopted to formulate the voice activity detector which contains an unvoiced...
Proceedings Article

Backing up your DNS Cache

Xuebiao YUCHI, Likun ZHANG, Liming WANG, Anlei HU, Xiaodong LEE
Traditional ways to implement Domain Name System (DNS) cache backup are to dump the full DNS cache to some document/database periodically, which can bring great negative impact on DNS cache’s performance. In this paper, based on a newly redesigned DNS cache architecture, we suggest an optimized DNS cache...
Proceedings Article

A New Way to Describe Spatiotemporal Data

Mingli Song
Data analysis especially dealing with spatiotemporal data in a human-centric way becomes essential in modern engineering and science fields. In this study, we present a granular way of data analysis where the data are described by information granules defined in spatial and temporal domain. We show that...
Proceedings Article

Research of improved particle swarm algorithm based on apparel intelligent marker making

Can-yi HUANG
The intelligent algorithm of apparel marker making is the core technology of apparel marker making, this paper brings forward an improved particle swarm algorithm at the base of analyzing the merit and demerit of genetic algorithm, simulated annealing algorithm and particle swarm optimization algorithm,...
Proceedings Article

Location based services for mobile users: a scenario based implementation account

Alberto Faro, Concetto Spampinato
Many Location Based Services (LBSs) have been proposed, but they are developed mainly with a proprietary approach, i.e., they are specialized for managing specific tasks and are not able to make available the collected information to the services offered by other providers, thus limiting the potential...
Proceedings Article

THE RESEARCH OF KNN AND SVM CLASSIFICATION PERFORMANCE ON TWO KINDS OF UNBALANCED DATA SET

Juan DU, Li-li JIANG
For Unbalanced Data Set, the KNN (K - the nearest neighbor) and SVM (support vector machine) classification algorithm’s prediction result would tend to most class; the misclassification rate of the minority class was big. This paper analyzed in detail the influence of unbalanced data set to KNN and SVM...
Proceedings Article

Design and Application of Basketball Tactics Analysis Based on the Database and Data Mining Technology

Li-gang Tian, Fu-shun Wang
Database and data mining technology was applied in basketball tactics analysis , after pretreatment to the database, used classification and association rules of data mining technology, applied Apriori algorithm , solved the less stored data, statistical method crude, the single analysis results and...
Proceedings Article

A low complexity uplink multiuser MIMO detecting algorithm based on BQRD

Jun MA, Da-ming WANG
In multiuser MIMO uplink communications, it is necessary to design linear schemes that are able to suppress co-channel interferences(CCIs). Block diagonalization(BD), which can achieve good CCIs suppression, has been extensively studied to solve the issue. However, with the scheme we cannot obtain extra...
Proceedings Article

Mining components of micro-blogging user Influence and their correlations

Dong Liu, Quanyuan Wu, Weihong Han
Measuring micro-blogging user influence is very important both in economic and social fields. In this paper, we detailedly discuss the components of user influence. Considering the time affect, TAC(time-effectiveness attenuation coefficient) is proposed when generating user influence which consists of...
Proceedings Article

Mining micro-blogging users’ interest features via fingerprint generation

Dong Liu, Quanyuan Wu, Weihong Han
Nowadays, micro-blogging is widely used as a communication and information sharing social network service, therefore mining micro-blogging users’ behavior features is very important both in the economic and social fields. A framework for the analysis of user’s interest features is proposed in this paper....
Proceedings Article

Design of Reliable Communication Protocol Based on Emergency Satellite Communications Ground Station

Leilei KANG, Xiangyang XU, Xiaozhe ZHENG, Bingyang CHENG
According to the characteristics of satellite emergency communication, combined with the UDP protocol and the TCP protocol of the advantages and disadvantages, the article puts forward an improved expanded with reissue of double reliable D - RCUDP protocol. This paper mainly introduces the improved D-RCUDP...
Proceedings Article

Design and Realization of Industrial Control System Serial Communication Based onVB and Mitsubishi Programming Interface Protocol

Xiao-hua Sun, Fu-shun Wang
By analyzing the current serial communication, used in a popular monitor system composed of PC, GOT and PLC, introduced a new design and implementation plan of serial communication based on Vb and Programming Interface Protocol. System achieved the efficient, stable and reliable communication under simple...
Proceedings Article

Using GPS data to monitor road traffic flows in a metropolitan area: methodology and case study

Alfio Costanzo
Currently, few traffic management departments offer traffic monitoring services in real time due to the high cost of such car traffic monitoring system. Aim of the paper is the one of proposing a low cost system based on the GPS signals coming from the smart phones of the drivers to build a colored traffic...
Proceedings Article

Design of a dual-core Holter Systerm Based on STM32 and FPGA

Shaohua ZHANG, Yide MA, Le TIAN
ECG (electrocardiogram) currently is the most effective way to detect the heart condition. Previously people have to do the ECG recording in hospital. But the ECG abnormal situation is unsustainable, because the symptoms usually disappear when the patient is sent to the hospital. This may lead to losing...
Proceedings Article

Overview of Survey on Security of Wireless Sensor Network

Wei Wang, Xiang Yang
As a product of the combination of wireless communication technology, intelligent sensor technology and network technology, wireless sensor network has broad development prospects and more and more scholars have been attracted to that study. Moreover, in the military field, national defense field and...
Proceedings Article

Computation of Trust Value Based on Influence

XinYu Mao
The research of trust management has become a key field as a valid solution to ensure the security and application in p2p networks. The accurate measure of trust is a hard and very important problem in trust management. People’s final opinion has been formed based on his own initial opinion with influence...
Proceedings Article

Clock Network Power Saving Using Multi-Bit Flip-Flops in Multiple Voltage Island Design

Jhen-Hong He, Li-Wei Huang, Jui-Hung Hung, Yu-Cheng Lin, Guo-syuan Liou, Tsai-Ming Hsieh
Power consumption is an important issue in modern high-frequency and low power design. Multi-bit flip-flops are used to reduce the clock system power. The scaling with multiple supply voltage is an effective way to minimize the dynamic power consumption. In this paper, we propose an effective multi-bit...
Proceedings Article

Dominating Global Best Selection for Multi-objective Particle Swarm Optimization

Heming Xu, Yinglin Wang, Xin Xu
For multi-objective particle swarm optimization, the selection of the global best becomes an interesting topic, because it balances convergence and diversity. But the global best selected by the existing strategies has a high probability of not dominating the particle. The flight towards the global best...
Proceedings Article

Numerical Simulation of the Reactive Two-Phase Solid Rocket Motor Exhaust Plume

Zheng Li, Hongjun Xiang
This study is focused on numerical simulation of the reactive two-phase flow from the end of the motor combustion chamber to the exhaust plume. The NASA computer program CEA (Chemical Equilibrium with Applications) has been used to calculate the equilibrium composition of AP/HTPB/Al composite propellant...
Proceedings Article

An Intelligent Test Paper Generating Algorithm Based on Maximum Coverage of Knowledge Points

Man Yang, Yinhuang Le, Hui Zhang, Min Wu, Nie Er
In order to keep up with the requirements of College English Diagnostic Test System developed by our team, after analyzing the pros and cons of current test paper generating algorithms, the MCKP algorithm, which is based on maximum coverage of knowledge points (MCKP), is proposed. In this paper, the...
Proceedings Article

De-noising Algorithm of Modified Thresholding Function Based On the Best Basis of Wavelet Packet

Lin Chen, Wei Wang, Zengli Liu, Hui Tang
This paper is about on denosing by modified thresholding function based on wavelet packet transform. First, there is a summary of the necessary conditions to construct the thresholding function on the basis of previous studies. And a new function for this method is put forward for wavelet packet denoising.Then,through...
Proceedings Article

The Selection Of Wavelet Function In Singular Signal Detection

Zaiyu Chen, Yang Liu, Zengli Liu, Hui Tang
In the research of singular signal detection, the selection of wavelet function is the first issue to be considered. How to choose the wavelet function for singular signal detection is emphasized in this paper. It’s based on the fact that the wavelet function can be perfectly selected by comprehensive...
Proceedings Article

A Low Complexity Packet Loss Recovery Method for Audio Transmission

Xuming Lu, Huijian He, Hongzhou Tan
A packet loss recovery technique based on interleaving is proposed for uncompressed high-fidelity audio transmission. The audio samples are interleaved for transmission to avoid burst errors. The lost samples in the receiver are estimated by using quadratic fit interpolation (QFI). Finally a low pass...
Proceedings Article

A Global Route Planning Method for Intelligent Vehicles

Xin Jia, Kedi Li, Hsin Guan
A global route planning method for intelligent vehicle is presented here based on the comparison, selection and development of classic figure search algorithms. In addition, the effects of traffic signs in road network are also be considered in the method, so to insure that any traffic laws such as steering...
Proceedings Article

SIBR: A Routing Protocol for Delay Tolerant Networks

Yuan Chen, Neng Wang
Delay tolerant networks (DTNs) may lack continuous network connectivity. Routing in DTNs is thus challenging since it must handle network partitioning, long delays, and dynamic topology in such networks. Most routing protocols for delay tolerant networks resort to the sufficient state information, including...
Proceedings Article

Evaluation Method of Jamming Effect on ISAR Based on Target Recognition Characters

Rui Cui, Jifei Pan, Yinyong Han, Aiguo Sheng
Some methods used to evaluate the jamming effect of common radar are unsuitable to the inverse synthetic aperture radar (ISAR). By comparing the change of target recognition characters, a novel evaluation method of jamming effect on ISAR is presented in the paper. Two typical noise barrage jamming modes,...
Proceedings Article

Data Mining of the Association Rules Based on the Cloud Database

Tianxiang Zhu, Shuhui Sun, Dan Zhang, Xin Liu
Cloud computing is the latest trend in IT technical development, the importance of cloud databases has been widely acknowledged. There are numerous data in the cloud database and among these data, much potential and valuable knowledge are implicit. The key point is to discover and pick up the useful...
Proceedings Article

A Dynamic Responding Characteristic Non-linear Analyzing Method of Cryogenic Valve

Yongtao Qin, Hui Zhang, Wenqing Cao, Zhengbing Li
To reduce the dynamic responding time of cryogenic valve, and improve the reliability and security of cryogenic valve, depending on the operation principle of cryogenic valve, a dynamic responding transferring non-linear function and dynamic responding model of cryogenic valve were built based on kinetics...
Proceedings Article

Machine Vision Based Information Collection of Mobile Manipulator for Moving Object Grasping

Naijian CHEN, Fangzheng SONG, Guoping LI, Honghua ZHAO
To solve the problem of reliability and real time in visual perception of the mobile manipulator, a visual based information collection system integrated edge detection algorithm and tracking algorithm is proposed. In the vision system, an adaptable threshold edge detection algorithm based on the small...
Proceedings Article

Eutrophication Evaluation Model and Application for Reservoir Based on Fuzzy Pattern Theory

Yuan Cheng, Jinbao LIU
According to the objective fact that eutrophication degree of water body belongs to fuzzy concept, an eutrophication evaluation model is explored and is applied in this paper based on fuzzy pattern recognition model proposed by Chen Shouyu. The evaluation model considers total phosphorus (TP), total...
Proceedings Article

Comparison of Commonly Used Image Interpolation Methods

Dianyuan Han
Image magnification algorithms directly affect the quality of image magnification. In this paper, based on the image interpolation algorithm principle, features of the nearest neighbor interpolation, bilinear interpolation, bicubic interpolation and cubic B spline interpolation were analyzed. At the...
Proceedings Article

Image Mosaics Algorithm Based on SIFT Feature Point Matching and Transformation Parameters Automatically Recognizing

Pengrui Qiu, Ying Liang, Hui Rong
A mosaic algorithm of different scale image registration and adaptive is proposed in this thesis, against to the large amount of calculation and poor robustness, as well as cannot well solve the problem of image mosaic of images who are in different scales in the traditional image mosaic method. The...
Proceedings Article

Research On Some Relevant Problems in Computer Forensics

Yongquan Wang, Henry C. Lee
In order to effectively combat and control the cybercrime, the crucial precondition to solve those problems is to study how to quickly and efficiently collect evidences which can be accorded with legal requirements. From the features of computer forensics and Based on the thought, theory and method of...
Proceedings Article

Research on the Parallelization of LLL Algorithm

Xianghui Liu, Zheng Wang, Jianxiao Quan
Lattice basis reduction algorithms are important tools in the area of cryptanalysis. LLL algorithm is one the most famous algorithms and the parallelization of LLL algorithm has been received increasing attentions. In this paper, the traditional block-based LLL algorithm is implemented in a parallel...
Proceedings Article

Constructing Smart Campus Based on the Cloud Computing Platform and the Internet of Things

Xiao Nie
With the development and application of the cloud computing and Internet of Things, constructing smart campus as the key components of education information has been a focus of research. In this article we first introduce the application of the internet of things and the cloud computing in education....
Proceedings Article

A Review of Checkpointing Strategies for Mobile Networks

Anjin Xiong, Guoqiong Liao, Guoqiang Di, Jiali Xia
Checkpoints are used to store the specific states of processes in stable storage. When distributed systems fail, the systems can recover to a global consistency state from specific checkpoints rather than the beginning states of all involved processes. There are many kinds of checkpointing strategies...
Proceedings Article

Complex Networks Theory Based Vulnerability Analysis of Power Grid with Distributed Generation

Yougang Zhang, Shunjin Chen
Vulnerability of power grids with distributed generation (DG) is investigated in this paper. Some vulnerability assessment indices suitable for assessment of vulnerability of complex power grids with DG are given and some special attack strategies are designed to facilitate the investigation. Simulation...
Proceedings Article

Equivalent Modeling of Wind Farm Based on Fuzzy Clustering

Liyang Liu, Junji Wu, Shaoliang Meng
Modeling of wind farm has become the focus research in the field of wind energy. In this paper, the wind generators are clustered through fuzzy clustering, every cluster contains certain number of generators. Each cluster can represent an equivalent generator; correspondingly the total power of wind...
Proceedings Article

Pedestrian Detection Using Self-Organizing Map Neutral Network

Yong-biao Shi, Feng Guo, Xiang Long
This paper presents a method of detecting pedestrian’s side in video frames of cluttered scenes. This detection technique is based on the novel idea of wavelet template and SOM neutral network. In order to make detection results more accurate and reduce computation cost, we process video frames for interpolation...
Proceedings Article

Application of Weighted cetroid location algorithm in Forest Fire Monitring

Chunliang Zhou, Zhengqiu Lu, Weiqing Qu, Qi Zhang
In the internet of things for forest data monitoring, the horizontal and vertical coordinates of a fire point could be calculated by the weight of the sensor node. By introducing the concept of weighted centroid localization, the fire point can be quickly positioned. The algorithm provides a strong basis...