Proceedings of the 2016 4th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2016)

+ Advanced search
242 articles

Segmentation of high resolution remote sensing images by combining hidden Markov random field model and fuzzy c-means at the region level

Xu Song, Guoying Liu
In high spatial resolution remote-sensing images, complex landscapes are usually accompanied with macro texture patterns, which often adversely affect segmentation accuracy, mainly due to their high spatial and spectral heterogeneity. To address this problem, this study develops an image segmentation...

The Critical Exponent for A Class Non-Autonomous Parabolic Equation in the K-Times Halved Space

Youhua Peng, Xianfeng Huang
This paper investigates the parabolic equation , ( ) with nonnegative initial date, where , , and extend the classical result of Fujita and more recent results of Levine and Meier. We demonstrate that as its critical exponent, which means that problem ( ) exhibited the following behavior: if , then every...

Study on Logistics Center Location Decision Model Based on Improved Genetic Algorithm

Shujing Liu
In terms of analysis and design of logistics system, location logistics centers often need to be supported by modeling or quantitative methods. There are many ways to solve this problem, but when the scale of the problem is relatively large, these traditional methods will encounter difficulties to some...

Application Analysis of Electrical Automation in Building Intelligent Systems Development

Shuangxi Zhang
Building intelligent systems is the automated control systems of construction equipment. Currently electrical automation technology gets more and more applications in modern buildings. The applications of electrical automation systems in intelligent building includes providing basic survival with plenty...

An Optimal Digital Watermarking Algorithm in Curvelet Domain

Moyan Xiao, Zhibiao He
An optimal digital image watermarking algorithm in Curvelet domain based on singular value decomposition (SVD) and genetic algorithm (GA) is proposed in this paper. The watermark is firstly encrypted by Arnold transform. Then, the low frequency part in Curvelet domain of the host image is divided into...

An approach to evaluate network security risk based on attack graph

Xiaoyun Hu, Yang Yu, Chunhe Xia
Facing with plethora network security events, network security risk evaluation is an effective method to prevent and respond to these security problems. Ignoring possible changes maybe occurred, traditional network security risk evaluation only emphasizes the preventive management in advance. This article...

A Multi-Agent Based Approach to Monitoring IaaS Security SLA

Jiajin Cao, Chunhe Xia, Xiaochen Liu
Security SLA in cloud service is of great importance for user confidence, but there is little research on it. In this paper, we analyze the important security requirements in IaaS cloud, bring up a native scalable monitoring framework for security SLA in IaaS cloud and raise monitoring methods for important...

Normalizing Chinese Address for Internet Applications

Xiaolin Li, Shuang Huang, Tao Lu, Deng Chen
Many Internet applications take addresses as input. However, addresses on the Internet are always non-normalized, which cannot be used directly. In this paper, we propose an Administrative Divisions Extracting Algorithm to normalize Chinese addresses on the Internet. Our approach proceeds as follows:...

Construction and Optimization of Recycling Logistics Network for Construction Waste

Ning Jiang, Junjie Zhang
Project construction is one of the most important economic activities. How to disposal construction waste is an urgent issue in the management of city. The traditional method is simple landfill, not only occupy the land, causing environmental pollution, but also waste a lot of resources which can be...

Influence Research of Wind Power Generation on Power System

Qiguo Yao, Yuliang Liu
Wind power generation is always weather dependent and has the trend of being integrated to power systems as the form of large-scale wind farms, which influences on power systems. Since the power network was not designed specifically to accommodate this type of generation, there are inevitably some points...

An Information Security Management System Based on "Five-in-one"

Wencui Li, Xinjian Shu, Xiong Li, Hui Gao, Bo Liu, Chunying Wang, Ying Yang
On the basis of "five-in-one" theoretical system, this paper constructs the information security prevention management system which includes responsibility system, standard system, process system, assessment system, institutional system. This system realizes the three-dimensional management of information...

An Information Security Prevention Model Based on Fuzzy Simulation

Fangfang Dang, Ying Yang, Shiwen Wang, Lin Mei, Peng Cui, Lei Zhu
Due to the appearance of some new characteristics of the electric power industry such as widely interconnection, high intelligent, the open and interactive, energy internet architecture put forward more new requirements of the electric information network security prevention and the information security...

he Method to Determine Bibliographic Types Based on Decision Tree

Si Geng, Ning Li, Lin Zhao, Ying'ai Tian
The key to normative checking of bibliography is to find out bibliographic types. In order to solve the problem to check the correctness of bibliography in the absence of bibliographic types, a novel method to determine bibliographic types based on decision tree is proposed in this paper. This method...

Research of Structured Data Query in the Equipment Support Management System Based on Cloud Platform

Dong Li, Xinyi Xu, Huqiang Wang
Aiming at deficiencies of current Equipment Support Management System on massive data query and analysis, this article proposed and realized a method of Structured Data Query used by the Cloud Platform based on Hadoop, after analyzing the data source. In the article, we used the tool of Sqoop to import...

SLink: An Efficient Point-to-Point Protocol for Chip-to-Chip Interconnection

Peinan Li, Ping Xue, Chen Lin, Yinping Jiang, Hongyu Meng
Multi-chip architectures have been a focal point not only in high-performance computing but also in the new generation of embedded systems. For point-to-point topology, high latency and low bandwidth are always found in existing chip-to-chip protocols. This prevents the efficiency of information communication...

Research and practice of teaching quality evaluation system based on the method of system engineering

Xianlong Han
Engineering practice teaching quality is related to many factors, through the systematic analysis of the various aspects of engineering practice in the teaching process and by using the system engineering method to establish the engineering teaching quality evaluation model,proved that the evaluation...

Research and Design of RFID-based Equipment Incident Management System for Industry 4.0

Jiqing Cao, Shuhai Zhang
RFID technology is the key technologies in the field of IOT, this paper studies the application scenarios of RFID technology in Industry 4.0 incident management, designs an architecture of the Equipment Incident Management System based on cloud platform, improves the traditional ITIL-based Incident Management...

Switching performance of GaN FETs in terms of turn-off resistance characteristics: an experimental study

Chih-Chiang Wu, Shyr-Long Jeng
This study evaluated the AC parasitic capacitances and turn-off resistance of GaN FETs. Moreover, the study proposes an easily adjustable gate drive circuit appropriate for driving E-mode, cascode, and D-mode GaN FETs in the same driver topology. The proposed gate drive circuit involving only positive...

Relationship between Energy Consumption and Speed of the EMU

Hai-Bo Zhao
This paper analyzed the relationship between the application of EMU and energy consumption ; on the basis of introducing the EMU at home and abroad in detail in this paper, the analysis were done from traction fields and the comparisons of relationship between operation mileage of the EMU , time, speed,...

A Novel Fragile Watermark Algorithm for Detecting Speech Tampering

Xiaoting Zhao, Wenhuan Lu, Jianguo Wei
In this paper, we propose a fragile watermark scheme for detecting the tampering or hostile attack of speech signal. Watermark block is generated by Gaussian Random operation on a null matrix, then the watermark is embedded into the original signal which is processed by DCT (discrete cosine transform)....

Wireless Energy Harvesting in Cognitive AF Network With Relay Selection

Shanyang Han, Wanpei Chen, Maoyou Wu
In this paper, we propose an improved cognitive amplify-and-forward relaying model, in which the multiple secondary users can harvest energy from the primary network, assisting primary user transmission and meanwhile performing secondary transmission in a spectrum-sharing network. One secondary user...

QoS-aware Resource Allocation in Relay-enhanced TD-LTE-A Systems

Yujie Pei, Liqiang Wang, Xuanli Wu
As a result of the introduction of relay technique in the Long Term Evolution Advanced (LTE-A) system, the system performance is improved in network coverage, user (UE) fairness and system throughput. Nevertheless, it is important to support the transmission of multimedia application and meet various...

Matrix Expression of Pan Boolean Algebra PID Control

Jin Chen, Yubiao Xu, Yeheng Hu
By using the semi-tensor product of matrices theory method, this paper studies the Pan Boolean algebra PID control algorithm's conversion problem. It was found that the power computation of n-ary logical structure matrix can be converted into counting its (n+1)-ary structure matrix by its truth table....

Research on the Figure Module Integration Technology in Communication Monitoring

Wencui Li, Xiong Li, Chi Zhang, Lijie Wu, Xinjian Shu, Weixia Tang
Figure module integration technology is the graphics and graphical corresponding data in the database as a whole to face it. The graph model library integrated modeling method was researched in this paper. And by constructing communication network of vertical multi-dimensional comprehensive monitoring...

Mathematical Model for Calculating the Particle Size Distribution Fractal Dimension Based on Image Processing Method and Its Application

Lieshu Lin, Chengbao Wu, Chuansheng Liu, Zhenghua Chen
A mathematical model for calculating the PSDFD based on image processing method was constructed and applied to calculate the PSDFD of hollow glass bead(HGB) filled in the polypropylene(PP) resin. The results shown that the PSDFD of the HGB in the PP resin was 1.370, and the correlation coefficientwas0.9665;...

Sentiment Classification on Weibo Incidents Using CNN-SVM and Repost Tree

Manshu Tu, Shengxiang Gao, Zhe Ji, Yan Zhang, Yonghong Yan
Sentiment classification on weibo has recently attracted wide attention in research community. Most previous works are focused on weibo comments regarding movies or products. Our study, in contrast, is aimed at gusty incidents on weibo. Comments of the incidents are considered either positive or negative...

Reliability analysis of wireless communication based on ZigBee

Lianglu Yin, Yuanliang Huang, Weixiong Chen
On the basis of analyzing the development status of the ZigBee technology, a new method to analyze the wireless communication reliability is proposed by using the signal strength (RSSI), through the formation of a wireless network model by using module CC2530PA, all the packets received in the ZigBee...

Accelerating the Shuffle Phase to Speed up MapReduce Systems

Rujie Yu, Songping Yu, Nong Xiao
The CPU-centric traditional network protocol processing limits the utilization of network bandwidth, even with the high speed network (100Gbps); and the situation is more obvious in big data systems. The high performance network technology-Remote Direct Memory Access(RDMA), has the benefit of directly...

Portable impedance measurement system based on Embedded System

Xiaohui Luo
in this paper, AD5934 and MSP430F169 based on the design of a portable impedance test system, the system uses MSP430F169 as the main control chip, through the I2C control module to complete impedance impedance measurement, and through the buttons to control the operation process and test results through...

Research on Data Mining Algorithm and Its Application in Cloud Environment

Bin Li
In recent years, the rapid development of the Internet and computer-related technologies, including photography, video, e-commerce, etc., so that the data generated around us was the explosive growth, especially after the rise of the smart phone mobile Internet technology as the representative of others...

Computer system design based on modular about clothing

Fengqin Chen
With the continuous development and progress of social economy, people's aesthetic values and the improvement of living standards have been, when the time for costume design also becomes more and more demanding, for clothing computer system based on modular design and mass production brought good opportunities...

Research on Key Technologies of Distributed Storage in Cloud Computing Environment

Tao Liu
As a new commercial computing model which sharing resources, cloud computing is widely used in the field of data storage, it stores massive amounts of data in the data center and provides transparent, secure and reliable computing services and data storage for upper applications and services. It has...

Analysis and Research on Distribution of Ticks and SFTSV and HGA Carried by Ticks in Prevalence Area in South of Henan

Qunzhi Zhang, Xinwei Li, Jialiln Guo, Huadong Zhao, Wei Zhou, Huijuan Dou, Hailan Luo
Objective: To make a study of the distribution features of ticks in south of Henan and the SFTSV and HGA. Methods: From January to December in 2015in Xinyang region of Henan Province the artificial cloth flag method and surface pick tick method were collected field of free ticks insect and animal body...

Study on the Quality Control of Electrical Engineering

Hongwei Zhang
Quality is the life, is to protect the owner's return on investment can be achieved. Quality is not only related to the project functionality and value, but may also be related to the national interest, the safety of people's lives and property. As the State Grid Corporation of power transmission project...

Video Search Technology based on the Motion Characteristics

Yanlin Wang
With the rapid development of computer technology, the emergence of vast amounts of multimedia information on the network, for such a large amount of data, video and other multi-media data has a feature not available - Sports features, so Applied Sport features video search service, for improve the performance...

Design of Handheld Oscilloscope Based on FPGA and Dual A/D

Hu Yang, Yuduo Wang
Handheld oscilloscope because of its portability, wide application range and other characteristics, has drawn more and more attention in the engineering practice. Anolog-to-digital conversion circuit plays an important role in the design of digital oscilloscope. It directly determines the maximum frequency...

Electric signal detection system based on dynamic programming location residual error repair control

Yubo Chen
Accurate measurement of flow has been used in energy saving, consumption reduction, economic calculation, automatic control and other aspects. In micro flow measurement, measurement method of floater flow plays a very important role. A kind of flow measurement system which is applicable to detection...

Field modeling code generation technique for automatic parallelization mutation system

Yichun Li, Ningkang Jiang
Unlike common imperative program language (such as java, C or ADA), compiler maintains model-based code generator, and generated component has no established method in spite of progress achieved in the field of formal verification. Several test methods are dominant in engineering practice. The paper...

Research on Cloud Data Center System Design in Intelligent Community

Tao Liu
With the development of computer technology, communication technology and Web technology, intelligent building has been widely used and accepted for many years. In this paper, the key technology of cloud data center system design is analyzed. At the same time, the realization principle of the system...

Optimal Models of Home Energy Management System

Qingzhu Wan, Yalan Chen, Yuan Bian
Residential sector is a potential field of energy conservation and emission reduction in smart grid. Smart home can reduce electricity cost and carbon emissions by optimal the energy use of household appliances. We bulid day-ahead dispatch schedule models which are minimize electricity cost model and...

Optimization of boiler's convection tubes based on Genetic Algorithm

Tianyu Zhang, Qingfeng Zhang, Zhenning Zhao, Liang Cheng, Gaojun Liu
Genetic Algorithm (GA) is created by Prof. John Holland from Michigan University, deriving from the Darwin's theory of evolution, Weizmann's theory of species selection, and Mendel's theory of inheritance. In present study, the Genetic Algorithm is introduced to optimize the boiler convection tube bank...

Decision-making System of Travel Route Price Comparison Based on Cloud Computing

Peng Cui, Hui Wang
In the context of rapidly growing number of domestic tourists and travel routes provided by travel websites, tourists have run into trouble in choosing the optimal route. Under such circumstance, decision-making system of travel route price comparison based on cloud computing is designed to integrate...

Important Things to Consider In Health Information Exchange (HIE) Process

Yuyun Zhang
As part of Health information technology model, Health information exchange (HIE) seek to improve health information security, integrity and interoperability, thus requires consolidated and extensive standards to guarantee the secure and convenient information storage and exchange. This paper is a literature...

Analysis on Technical Statistic of Basketball Based on Correlation Coefficient

Yue Wang
As a competitive sport, basketball is a remarkable important project of the world's major international sports competitions. The record of technology statistical indicators which is commonly used in the basketball match made the measure of various key factors in basketball match from the qualitative...

Analysis of Electrical Circuit Fault Problems of Electromechanical Equipment

Tao Chen
Under the background of national economic development, the application range of electromechanical equipment becomes wider, and electrification degree also improves. Thus, safety of electrical circuit operation receives much attention. But, in the long operation process of electromechanical equipment,...

The Study of Data Publishing Technology based on the Differential Privacy in Social Networks

Nan Ning, Changlun Zhang, Zhanyong Jin, Zhan Yu
With the increasing prevalence of social network, research on privacy preserving data publishing in the social network has received substantial attention recently, and the recent emergence of differential privacy has shown great promise for rigorous prevention of information publishing. In this paper,...

Fractal Dimension based SAR Image Sparse Degrees Estimation

Hua Bo, Haiyun Gu, Lei Ren, Hong Xie
Compressed sensing is surprisingly predicts that images, which allow a sparse representation by a suitable basis or a frame, can be recovered from what was previously considered highly incomplete linear measurements by using efficient algorithms. It is a novel research area of SAR images processing....

An improved quantum genetic algorithm for the Resource Constrained Project Scheduling

Mingliang Li, Xueyan Song
In this paper, proposes an improved quantum genetic algorithm based on RCPSP. Project implementation process often involves the sharing of resources and conflicts between the different projects, so in the case of how resource-constrained project scheduling resources to meet the requirements of different...

Research on Pulse Laser for Simulating Transient Radiation Effects on MOS Devices

Mo Li, Peng Sun, Linzhe Li, Jie Li, Chunhua Qi, Liyi Xiao
In this paper, the transient radiation effect of MOS devices irradiated by pulse laser is studied using TCAD tool. Firstly, the laser radiation model is built up based on the TCAD tool, and also MOS devices model are created and the I-V characteristics are simulated for proving their correctness. With...

A Review of Research on Traffic Modeling for NoC

Haiyun Gu, Hua Bo, Lei Ren
NoC (Network on Chip), as a promising interconnection infrastructure for MPSoC (Multi-Processor System-on-Chip), has been the research focus since its invention. Accurate traffic models are necessary to deplore the vast design space of NoC. In this paper, we survey the researching works on the traffic...