Proceedings of the 2016 4th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2016)
242 articles
Proceedings Article
Research of ROP attack and defense technology based on ARM architecture
Qi Cai, Jingbo Guo
In recent years, with the development of mobile technology,almost all the smart phones and panel personal computers using the ARM architecture, and security issues on this platform arealso getting more and more attention from researchers. Attack of malicious tampering program flow control is one of the...
Proceedings Article
Research on the security of information system integration based on percolation test
Jingbo Guo, Qi Cai
This paper analyzed thesafety problem of integrated system from hardware integration, data integration, interface integration and other aspects by using the method of percolation test. It focuses on security issues which newly created in the process of information system integration,namely the use of...
Proceedings Article
A Study on the Optimization of Enterprise Financial Management Model under ERP Environment
Shiqi Song
As a new modern management method, the core idea of ERP(Enterprise Resource Planning) can integrate the logistic, capital flow and information flow. Based on the author's work experience, this paper first analyzed the new characteristics of the ERP strategies in the financial management system, then...
Proceedings Article
Defect detection based on two different algorithms of analysis and comparison
Xiaowei Zhang, Xiujuan Fan
Fabric defect detection has been an active area of research since a long time and still a robust system is needed which can fulfill industrial requirements. A robust automatic fabric defect detection system (FDDS) would results in quality products and more revenues. Many different approaches and method...
Proceedings Article
De-noising the Speech Signal With FIR Filter Based on Matlab
Yanxin Wei, Xiujuan Fan
With the advent of the information age, signal transmission has been involving many kinds of fields. During the process of voice signal transmission, there would be inevitably doped with some noise signal, but which would not happen if the very designed filter has been used. In this paper, the window...
Proceedings Article
Interactive Research on WeChat Public Platform and Mobile Library Application in Colleges and Universities
Yu Liang
With the continuous development of modern information technology, college reading platform model is also in constant change. From the perspective of the existing application software, system application measures and application survey structure of the whole service status quo and problems both need to...
Proceedings Article
Study on Innovation of Smart Library Service Model in the Era of Big Data
Jian Ruan, Sheng-Bin Wang
Big data opens a new era of library transformation. Intelligent services of the smart library built by the big data are the innovation orientation of library service model. In the era of big data, the library should take a rational perspective to the maintenance and development of the library system,...
Proceedings Article
Dynamic Analysis of Squeeze Piezo Printhead Using Reduced Frequency Model
Mingming Yang, Yanen Wang, Qinghua Wei, Xinpei Li, Weihong Chai, Shengmin Wei
The dynamic characteristics of squeeze piezo printhead are studied using reduced frequency model for inks with different viscosity. While piezo inkjet mainly applies in paper printing and graphic output, many new applications have emerged in the last few years. These new applications involve inks with...
Proceedings Article
Research and Development on Hybrid Simulation Model of Modular Power System
Feng Fan Yang
with the increase in power demand, maximally guaranteeing normal and stable operation of power system has become the key point. HVDC and FACTS contains plenty of high-power electronics, and it has important effect on stable and transient operation of power system. As the member of multilevel converter,...
Proceedings Article
ECO State Machine and Its Applications
Xie-Qiu Zhao
This paper introduces ECO model-driven technology and analyzes the functions architecture execution sequence and components of State Machine of ECO. By the case design, including the making of static model and dynamic model, it illustrates that ECO logic model ensures the consistency of the data, using...
Proceedings Article
Econometric Study of Technology Innovation Performance in China
Miaoxu Han
This paper adopts modern metering methods such as spatial statistics, spatial econometrics, spatial filtering, random leading edge model with heterogeneity, quantile regression, panel unit root, panel co-integration, and so on, to complete the research on the direct performance of regional technological...
Proceedings Article
Time-frequency analysis in pick cutting coal seam with small fault
Chenxu Luo, Shuangxi Jing, Xiaoyu Yang, Jinle Yuan, Changlong Du
Based on the study of cutting theory of shearer pick-shaped cutter used in thin seams, cutting tests under different fault conditions were done by using pick on the Cutting Test Bed of the Coal and Rock. The results show that: picking Cutting Torque in the coal seam and small fault interface increases...
Proceedings Article
Design of Handheld Oscilloscope Based on FPGA and Dual A/D
Hu Yang, Yuduo Wang
Handheld oscilloscope because of its portability, wide application range and other characteristics, has drawn more and more attention in the engineering practice. Anolog-to-digital conversion circuit plays an important role in the design of digital oscilloscope. It directly determines the maximum frequency...
Proceedings Article
Optimization Design of Printed Circuit Board Structure Based on Modal Analysis
Weifen Zhang, Yongmei Li, Ru Qian
According to the problems of the vibration reliability of pcb in practical, a finite element model was established according to PCB actual parameters,and their first 4-order natural frequencies and modal modes are obtained by modal analysis,and the finite element model which is also helpful for the structural...
Proceedings Article
The Security Model of Electronic Cash under Abnormal Situations
Liping Zeng, Lina Zhao, Xuefei Yan
As the development of social economy and information technology, electronic cash has appeared on the social stage. E-cash is not only a new kind of electronic currency, but also an innovative and modem payment device. E-cash payment systems are the heart of electronic commerce. How to achieve safe electronic...
Proceedings Article
Electric signal detection system based on dynamic programming location residual error repair control
Yubo Chen
Accurate measurement of flow has been used in energy saving, consumption reduction, economic calculation, automatic control and other aspects. In micro flow measurement, measurement method of floater flow plays a very important role. A kind of flow measurement system which is applicable to detection...
Proceedings Article
High fidelity audio signal reconstruction method based on multi channel negative sequence current
Yubo Chen
Signal processing method is one of important technological bases in the existing fault diagnosis of mechanical equipment, and the degree of accuracy of analysis results is the key factor for whether the diagnosis is successful. Research on spectral analysis is one of the existing main development directions....
Proceedings Article
Image segmentation algorithm based on the second clustering and level set method
Jie Hai, Li Wu, Haiyan Wu, Hailong Du
Improve the level set algorithm by Lagrangian particle enhanced replanting algorithm and increase the reduced segmentation accuracy brought about by the algorithm for uneven image pixel for medical CT image. Based on Literature [4], the combination of Lagrangian particle enhanced replanting algorithm...
Proceedings Article
Field modeling code generation technique for automatic parallelization mutation system
Yichun Li, Ningkang Jiang
Unlike common imperative program language (such as java, C or ADA), compiler maintains model-based code generator, and generated component has no established method in spite of progress achieved in the field of formal verification. Several test methods are dominant in engineering practice. The paper...
Proceedings Article
Parallel computation method for incremental cloud services based on Hadoop
Yonghong Li, Na Zhou, Guofeng Zhao
Performance of Hadoop platform is closely related to the task scheduler. Based on the analysis of the existing Hadoop platform's job scheduling algorithm, I propose a multi-queue job scheduling optimization algorithm in the paper. Based on the actual test and analysis of Hadoop platform, it can be seen...
Proceedings Article
Supplier's commodity pricing model based on non-cooperative game theory
Mao Yang
With the application of conditional free shipping policy becoming more and more extensive, there are more and more research theories for it. How to confirm free shipping conditions and shipping cost is becoming an important problem faced by e-commerce enterprises. Make example analysis for a series of...
Proceedings Article
Study on Development and Application of Big Data Mobile Terminal on Grid Maintenance
WenYong Yang, ZhanFeng Cheng, Bo Xia, LeLe Pang
With the continuous development of power business, customer needs continue to increase, how to improve the efficiency of power supply enterprises, improve service quality and customer satisfaction, has become the power supply enterprises must be addressed. On electrical repairs, how to optimize the customer...
Proceedings Article
Research of Network System based on Routing Exchange Platform
Peng Xiao
Traditional single information network scalability and relative stability can not adapt to the dynamic development of the next generation network services. To solve this problem, the concept of reconfigurable network is put forward and the network can be constructed to support a plurality of different...
Proceedings Article
The Critical Exponent for A Class Non-Autonomous Parabolic Equation in the K-Times Halved Space
Youhua Peng, Xianfeng Huang
This paper investigates the parabolic equation , ( ) with nonnegative initial date, where , , and extend the classical result of Fujita and more recent results of Levine and Meier. We demonstrate that as its critical exponent, which means that problem ( ) exhibited the following behavior: if , then every...
Proceedings Article
The Sufficient Condition for the Original Function of the No Zero Entire Function is Infinite
Hesong Yang
This paper proves that under certain conditions, so that there is an infinite number of zeros for .
Proceedings Article
Python Network Source Automatic Evaluation System
Guogang Zhang, Xiaoping Li
With the rapid development of Internet and computer technology, the network information is exploding combined with the network capture technology and text analysis technology to achieve the evaluation of content resources has become hot research fields. The use of this method is significant to the resources...
Proceedings Article
Analysis of the Application of Big Data in Intelligent Tourism Mode
Wanchun Zhu
With the sustained growth of China's national economy, tourism has become a "spice" of national life. The annual tourism revenue to a new high more than 4 trillion yuan in 2015 of our national, according to the National Tourism Administration issued the "China Tourism Development Report (2016)" data...
Proceedings Article
Establishment of GPS Receiver Test/Calibration Baseline Network in Chongqing
Wenjuan Bai
In order to ensure a long-term use of GPS receiver and stable data, the GPS receiver is important to regularly test. GPS receiver test/calibration baseline network in Chongqing Vocational Institute of Engineering is the first completed and passed the acceptance by Surveying and Mapping Management Office....
Proceedings Article
Research of the Main Risk in Computer Network Security and Its Management Measures
Qing Yang
With the popularization and application of Internet technology, it has brought great opportunities, challenges and has a significant change to various industries, which entered the Internet age. Computer network is double-edged sword, bringing convenience to people at the same time there are some security...
Proceedings Article
Study of Position-Based Routing Protocols in Vehicular Ad Hoc Networks
Guanqi Wen, Zhong Wang, Shaolei Zhang, Jing Wang
In high-speed driving, vehicles can communicate with each other or with roadside infrastructure and direct communication times, resulting in the existing road network dynamically and rapidly build a self-organizing, distributed control vehicle communication network. In the mountain environment, due to...
Proceedings Article
Research on Computer Science and Artificial Intelligence
Qi Wang, Xinyang Wang
Since the first digital computer generated, artificial intelligence has been 50 years of development history. But AI did not stop and on the contrary, it has rapid development as always. AI takes computer as the core. The popularity and the expanding of the application range of the computer are changing...
Proceedings Article
Study on Logistics Center Location Decision Model Based on Improved Genetic Algorithm
Shujing Liu
In terms of analysis and design of logistics system, location logistics centers often need to be supported by modeling or quantitative methods. There are many ways to solve this problem, but when the scale of the problem is relatively large, these traditional methods will encounter difficulties to some...
Proceedings Article
Application Analysis of Electrical Automation in Building Intelligent Systems Development
Shuangxi Zhang
Building intelligent systems is the automated control systems of construction equipment. Currently electrical automation technology gets more and more applications in modern buildings. The applications of electrical automation systems in intelligent building includes providing basic survival with plenty...
Proceedings Article
Comparative Study of Internet Recommendation Strategies
Kun Li
With the rise of the internet industry, basic necessities of life can now be settled by a phone or computer, an increasing number of transactions from the line into the line, Internet + has penetrated into every aspect of people's lives, people's quality of life has improved. At the same time, the Internet...
Proceedings Article
Research of Development Status and the Trend of Optical Fiber Communication Technology
Rongrong Wang
Not only can be used in optical fiber communications trunk lines of communication, optical fiber can also play a role in power communication control system, industrial monitoring & control, and now the military has been widely applied, the growing demand for information in various fields based on optical...
Proceedings Article
Research on the Application of Stratification Technology in Computer Software Development
Weiguo Zou
With the development of network technology, computer software is developing from the two story structure model to a multi-layer structure. In the multilayer structure, middleware is the key layer of application layer, application software development has become a new technology, and with databases, operating...
Proceedings Article
Study of Digital Technology in Publishing Work
Xiaodi Xia
Technical support for the digital publishing industry is not only a model for the development of cultural industries and cultural integration of science and technology, they are also two sessions this year hot word "Internet +" in the traditional publishing industry and reflects the application. Digital...
Proceedings Article
Parallel Simulation of Laser Propagation Based on Component Modeling
Xiaogang Xie, Jianzhu Zhang, Yufang Yue, Jianzhu An, Feizhou Zhang
Due to the large computation quantity of laser propagation simulation in complicated laser systems, the traditional serial simulation cannot fulfill the requirement. In this paper, the laser propagation algorithms of coherent light source and noncoherent light source were introduced, two parallel computing...
Proceedings Article
An Optimal Digital Watermarking Algorithm in Curvelet Domain
Moyan Xiao, Zhibiao He
An optimal digital image watermarking algorithm in Curvelet domain based on singular value decomposition (SVD) and genetic algorithm (GA) is proposed in this paper. The watermark is firstly encrypted by Arnold transform. Then, the low frequency part in Curvelet domain of the host image is divided into...
Proceedings Article
An approach to evaluate network security risk based on attack graph
Xiaoyun Hu, Yang Yu, Chunhe Xia
Facing with plethora network security events, network security risk evaluation is an effective method to prevent and respond to these security problems. Ignoring possible changes maybe occurred, traditional network security risk evaluation only emphasizes the preventive management in advance. This article...
Proceedings Article
A Multi-Agent Based Approach to Monitoring IaaS Security SLA
Jiajin Cao, Chunhe Xia, Xiaochen Liu
Security SLA in cloud service is of great importance for user confidence, but there is little research on it. In this paper, we analyze the important security requirements in IaaS cloud, bring up a native scalable monitoring framework for security SLA in IaaS cloud and raise monitoring methods for important...
Proceedings Article
Segmentation of high resolution remote sensing images by combining hidden Markov random field model and fuzzy c-means at the region level
Xu Song, Guoying Liu
In high spatial resolution remote-sensing images, complex landscapes are usually accompanied with macro texture patterns, which often adversely affect segmentation accuracy, mainly due to their high spatial and spectral heterogeneity. To address this problem, this study develops an image segmentation...