Proceedings of the 2016 4th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2016)

+ Advanced search
242 articles
Proceedings Article

Research of ROP attack and defense technology based on ARM architecture

Qi Cai, Jingbo Guo
In recent years, with the development of mobile technology,almost all the smart phones and panel personal computers using the ARM architecture, and security issues on this platform arealso getting more and more attention from researchers. Attack of malicious tampering program flow control is one of the...
Proceedings Article

Research on the security of information system integration based on percolation test

Jingbo Guo, Qi Cai
This paper analyzed thesafety problem of integrated system from hardware integration, data integration, interface integration and other aspects by using the method of percolation test. It focuses on security issues which newly created in the process of information system integration,namely the use of...
Proceedings Article

A Study on the Optimization of Enterprise Financial Management Model under ERP Environment

Shiqi Song
As a new modern management method, the core idea of ERP(Enterprise Resource Planning) can integrate the logistic, capital flow and information flow. Based on the author's work experience, this paper first analyzed the new characteristics of the ERP strategies in the financial management system, then...
Proceedings Article

Defect detection based on two different algorithms of analysis and comparison

Xiaowei Zhang, Xiujuan Fan
Fabric defect detection has been an active area of research since a long time and still a robust system is needed which can fulfill industrial requirements. A robust automatic fabric defect detection system (FDDS) would results in quality products and more revenues. Many different approaches and method...
Proceedings Article

De-noising the Speech Signal With FIR Filter Based on Matlab

Yanxin Wei, Xiujuan Fan
With the advent of the information age, signal transmission has been involving many kinds of fields. During the process of voice signal transmission, there would be inevitably doped with some noise signal, but which would not happen if the very designed filter has been used. In this paper, the window...
Proceedings Article

Interactive Research on WeChat Public Platform and Mobile Library Application in Colleges and Universities

Yu Liang
With the continuous development of modern information technology, college reading platform model is also in constant change. From the perspective of the existing application software, system application measures and application survey structure of the whole service status quo and problems both need to...
Proceedings Article

Study on Innovation of Smart Library Service Model in the Era of Big Data

Jian Ruan, Sheng-Bin Wang
Big data opens a new era of library transformation. Intelligent services of the smart library built by the big data are the innovation orientation of library service model. In the era of big data, the library should take a rational perspective to the maintenance and development of the library system,...
Proceedings Article

Dynamic Analysis of Squeeze Piezo Printhead Using Reduced Frequency Model

Mingming Yang, Yanen Wang, Qinghua Wei, Xinpei Li, Weihong Chai, Shengmin Wei
The dynamic characteristics of squeeze piezo printhead are studied using reduced frequency model for inks with different viscosity. While piezo inkjet mainly applies in paper printing and graphic output, many new applications have emerged in the last few years. These new applications involve inks with...
Proceedings Article

Research and Development on Hybrid Simulation Model of Modular Power System

Feng Fan Yang
with the increase in power demand, maximally guaranteeing normal and stable operation of power system has become the key point. HVDC and FACTS contains plenty of high-power electronics, and it has important effect on stable and transient operation of power system. As the member of multilevel converter,...
Proceedings Article

ECO State Machine and Its Applications

Xie-Qiu Zhao
This paper introduces ECO model-driven technology and analyzes the functions architecture execution sequence and components of State Machine of ECO. By the case design, including the making of static model and dynamic model, it illustrates that ECO logic model ensures the consistency of the data, using...
Proceedings Article

Econometric Study of Technology Innovation Performance in China

Miaoxu Han
This paper adopts modern metering methods such as spatial statistics, spatial econometrics, spatial filtering, random leading edge model with heterogeneity, quantile regression, panel unit root, panel co-integration, and so on, to complete the research on the direct performance of regional technological...
Proceedings Article

Time-frequency analysis in pick cutting coal seam with small fault

Chenxu Luo, Shuangxi Jing, Xiaoyu Yang, Jinle Yuan, Changlong Du
Based on the study of cutting theory of shearer pick-shaped cutter used in thin seams, cutting tests under different fault conditions were done by using pick on the Cutting Test Bed of the Coal and Rock. The results show that: picking Cutting Torque in the coal seam and small fault interface increases...
Proceedings Article

Design of Handheld Oscilloscope Based on FPGA and Dual A/D

Hu Yang, Yuduo Wang
Handheld oscilloscope because of its portability, wide application range and other characteristics, has drawn more and more attention in the engineering practice. Anolog-to-digital conversion circuit plays an important role in the design of digital oscilloscope. It directly determines the maximum frequency...
Proceedings Article

Optimization Design of Printed Circuit Board Structure Based on Modal Analysis

Weifen Zhang, Yongmei Li, Ru Qian
According to the problems of the vibration reliability of pcb in practical, a finite element model was established according to PCB actual parameters,and their first 4-order natural frequencies and modal modes are obtained by modal analysis,and the finite element model which is also helpful for the structural...
Proceedings Article

The Security Model of Electronic Cash under Abnormal Situations

Liping Zeng, Lina Zhao, Xuefei Yan
As the development of social economy and information technology, electronic cash has appeared on the social stage. E-cash is not only a new kind of electronic currency, but also an innovative and modem payment device. E-cash payment systems are the heart of electronic commerce. How to achieve safe electronic...
Proceedings Article

Electric signal detection system based on dynamic programming location residual error repair control

Yubo Chen
Accurate measurement of flow has been used in energy saving, consumption reduction, economic calculation, automatic control and other aspects. In micro flow measurement, measurement method of floater flow plays a very important role. A kind of flow measurement system which is applicable to detection...
Proceedings Article

High fidelity audio signal reconstruction method based on multi channel negative sequence current

Yubo Chen
Signal processing method is one of important technological bases in the existing fault diagnosis of mechanical equipment, and the degree of accuracy of analysis results is the key factor for whether the diagnosis is successful. Research on spectral analysis is one of the existing main development directions....
Proceedings Article

Image segmentation algorithm based on the second clustering and level set method

Jie Hai, Li Wu, Haiyan Wu, Hailong Du
Improve the level set algorithm by Lagrangian particle enhanced replanting algorithm and increase the reduced segmentation accuracy brought about by the algorithm for uneven image pixel for medical CT image. Based on Literature [4], the combination of Lagrangian particle enhanced replanting algorithm...
Proceedings Article

Field modeling code generation technique for automatic parallelization mutation system

Yichun Li, Ningkang Jiang
Unlike common imperative program language (such as java, C or ADA), compiler maintains model-based code generator, and generated component has no established method in spite of progress achieved in the field of formal verification. Several test methods are dominant in engineering practice. The paper...
Proceedings Article

Parallel computation method for incremental cloud services based on Hadoop

Yonghong Li, Na Zhou, Guofeng Zhao
Performance of Hadoop platform is closely related to the task scheduler. Based on the analysis of the existing Hadoop platform's job scheduling algorithm, I propose a multi-queue job scheduling optimization algorithm in the paper. Based on the actual test and analysis of Hadoop platform, it can be seen...
Proceedings Article

Supplier's commodity pricing model based on non-cooperative game theory

Mao Yang
With the application of conditional free shipping policy becoming more and more extensive, there are more and more research theories for it. How to confirm free shipping conditions and shipping cost is becoming an important problem faced by e-commerce enterprises. Make example analysis for a series of...
Proceedings Article

Study on Development and Application of Big Data Mobile Terminal on Grid Maintenance

WenYong Yang, ZhanFeng Cheng, Bo Xia, LeLe Pang
With the continuous development of power business, customer needs continue to increase, how to improve the efficiency of power supply enterprises, improve service quality and customer satisfaction, has become the power supply enterprises must be addressed. On electrical repairs, how to optimize the customer...
Proceedings Article

Research of Network System based on Routing Exchange Platform

Peng Xiao
Traditional single information network scalability and relative stability can not adapt to the dynamic development of the next generation network services. To solve this problem, the concept of reconfigurable network is put forward and the network can be constructed to support a plurality of different...
Proceedings Article

The Critical Exponent for A Class Non-Autonomous Parabolic Equation in the K-Times Halved Space

Youhua Peng, Xianfeng Huang
This paper investigates the parabolic equation , ( ) with nonnegative initial date, where , , and extend the classical result of Fujita and more recent results of Levine and Meier. We demonstrate that as its critical exponent, which means that problem ( ) exhibited the following behavior: if , then every...
Proceedings Article

The Sufficient Condition for the Original Function of the No Zero Entire Function is Infinite

Hesong Yang
This paper proves that under certain conditions, so that there is an infinite number of zeros for .
Proceedings Article

Python Network Source Automatic Evaluation System

Guogang Zhang, Xiaoping Li
With the rapid development of Internet and computer technology, the network information is exploding combined with the network capture technology and text analysis technology to achieve the evaluation of content resources has become hot research fields. The use of this method is significant to the resources...
Proceedings Article

Analysis of the Application of Big Data in Intelligent Tourism Mode

Wanchun Zhu
With the sustained growth of China's national economy, tourism has become a "spice" of national life. The annual tourism revenue to a new high more than 4 trillion yuan in 2015 of our national, according to the National Tourism Administration issued the "China Tourism Development Report (2016)" data...
Proceedings Article

Establishment of GPS Receiver Test/Calibration Baseline Network in Chongqing

Wenjuan Bai
In order to ensure a long-term use of GPS receiver and stable data, the GPS receiver is important to regularly test. GPS receiver test/calibration baseline network in Chongqing Vocational Institute of Engineering is the first completed and passed the acceptance by Surveying and Mapping Management Office....
Proceedings Article

Research of the Main Risk in Computer Network Security and Its Management Measures

Qing Yang
With the popularization and application of Internet technology, it has brought great opportunities, challenges and has a significant change to various industries, which entered the Internet age. Computer network is double-edged sword, bringing convenience to people at the same time there are some security...
Proceedings Article

Study of Position-Based Routing Protocols in Vehicular Ad Hoc Networks

Guanqi Wen, Zhong Wang, Shaolei Zhang, Jing Wang
In high-speed driving, vehicles can communicate with each other or with roadside infrastructure and direct communication times, resulting in the existing road network dynamically and rapidly build a self-organizing, distributed control vehicle communication network. In the mountain environment, due to...
Proceedings Article

Research on Computer Science and Artificial Intelligence

Qi Wang, Xinyang Wang
Since the first digital computer generated, artificial intelligence has been 50 years of development history. But AI did not stop and on the contrary, it has rapid development as always. AI takes computer as the core. The popularity and the expanding of the application range of the computer are changing...
Proceedings Article

Study on Logistics Center Location Decision Model Based on Improved Genetic Algorithm

Shujing Liu
In terms of analysis and design of logistics system, location logistics centers often need to be supported by modeling or quantitative methods. There are many ways to solve this problem, but when the scale of the problem is relatively large, these traditional methods will encounter difficulties to some...
Proceedings Article

Application Analysis of Electrical Automation in Building Intelligent Systems Development

Shuangxi Zhang
Building intelligent systems is the automated control systems of construction equipment. Currently electrical automation technology gets more and more applications in modern buildings. The applications of electrical automation systems in intelligent building includes providing basic survival with plenty...
Proceedings Article

Comparative Study of Internet Recommendation Strategies

Kun Li
With the rise of the internet industry, basic necessities of life can now be settled by a phone or computer, an increasing number of transactions from the line into the line, Internet + has penetrated into every aspect of people's lives, people's quality of life has improved. At the same time, the Internet...
Proceedings Article

Research of Development Status and the Trend of Optical Fiber Communication Technology

Rongrong Wang
Not only can be used in optical fiber communications trunk lines of communication, optical fiber can also play a role in power communication control system, industrial monitoring & control, and now the military has been widely applied, the growing demand for information in various fields based on optical...
Proceedings Article

Research on the Application of Stratification Technology in Computer Software Development

Weiguo Zou
With the development of network technology, computer software is developing from the two story structure model to a multi-layer structure. In the multilayer structure, middleware is the key layer of application layer, application software development has become a new technology, and with databases, operating...
Proceedings Article

Study of Digital Technology in Publishing Work

Xiaodi Xia
Technical support for the digital publishing industry is not only a model for the development of cultural industries and cultural integration of science and technology, they are also two sessions this year hot word "Internet +" in the traditional publishing industry and reflects the application. Digital...
Proceedings Article

Parallel Simulation of Laser Propagation Based on Component Modeling

Xiaogang Xie, Jianzhu Zhang, Yufang Yue, Jianzhu An, Feizhou Zhang
Due to the large computation quantity of laser propagation simulation in complicated laser systems, the traditional serial simulation cannot fulfill the requirement. In this paper, the laser propagation algorithms of coherent light source and noncoherent light source were introduced, two parallel computing...
Proceedings Article

An Optimal Digital Watermarking Algorithm in Curvelet Domain

Moyan Xiao, Zhibiao He
An optimal digital image watermarking algorithm in Curvelet domain based on singular value decomposition (SVD) and genetic algorithm (GA) is proposed in this paper. The watermark is firstly encrypted by Arnold transform. Then, the low frequency part in Curvelet domain of the host image is divided into...
Proceedings Article

An approach to evaluate network security risk based on attack graph

Xiaoyun Hu, Yang Yu, Chunhe Xia
Facing with plethora network security events, network security risk evaluation is an effective method to prevent and respond to these security problems. Ignoring possible changes maybe occurred, traditional network security risk evaluation only emphasizes the preventive management in advance. This article...
Proceedings Article

A Multi-Agent Based Approach to Monitoring IaaS Security SLA

Jiajin Cao, Chunhe Xia, Xiaochen Liu
Security SLA in cloud service is of great importance for user confidence, but there is little research on it. In this paper, we analyze the important security requirements in IaaS cloud, bring up a native scalable monitoring framework for security SLA in IaaS cloud and raise monitoring methods for important...
Proceedings Article

Segmentation of high resolution remote sensing images by combining hidden Markov random field model and fuzzy c-means at the region level

Xu Song, Guoying Liu
In high spatial resolution remote-sensing images, complex landscapes are usually accompanied with macro texture patterns, which often adversely affect segmentation accuracy, mainly due to their high spatial and spectral heterogeneity. To address this problem, this study develops an image segmentation...