Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016)

+ Advanced search
186 articles

Research on the Disposal of Space Debris

Huaihui Liu, Zhijie Sun, Tong Nie, Furong Wang, Hongpeng Pan
Since human launched the first man-made earth satellite, we have made more and more great achievements in this field. Accompanied with the rapid development, however, there are left multitudes of debris in the space. And the growth of space debris has a strong impact on the normal human space activities....

The exit times for the diffusion risk model with constant interest

Jingmin He, Wei Zhang
This paper investigates the diffusion risk model with constant interest. The Laplace-Stieltjes transforms (LST) of some exit times of the risk process are obtained.

Chinese Dependency Parsing Based on An Improved Model of MST

Qi Sun, Yang Xiang, Xiao Tu
In this paper, a Chinese dependency parsing method was presented based on improved Maximum Spanning Tree algorithm. Within this method, Conditional Random Field (CRF) is adopted to establish sequence labeling model. Recognizing POS of head node is employed to modify the weights of directed edges in the...

A Scale Adaptive Hierarchical Clustered Routing Protocol for WSNs

Lipeng Lu, Jiugen Shi, Huiliang Xu
Due to technique advances, wireless sensor networks (WSNs) are widely used in both military and civil scenarios. A vast amount of data is transmitted to the base station through resource-restrained nodes, which are powered by batteries with limited energy. An energy saving routing protocol is fundamental...

A Vehicle Path Planning Method

Yong Sun, Wenwei Li, Tiezheng Liu, Guangyun Li
Based on some assuming and definition, this paper propose a method of calculate a hidden area, and path is planned based on the hidden area and vehicle forward movements type in case of hidden area exist or not, this method is easy and practicality, it can used in people's path planning also.

A Framework of Video Network Measurement Based on Utility Optimization

Yu Zhao, Bo Fu, Kai Cao
In recent years, the packet level measurement is widely used to evaluate the packet loss and delay performance in broadband networks. The samples of packet loss and delay are provided by probe packet in active probe, from these samples can calculate the overall performance of the communication. However,...

The Security and Protection Strategy Study of Computer Network Information

Junyan Shi, Juanjuan Li
With the rapid development of science and technology, computer network technology has spread to all areas of production and life. However, because of the network has connectivity and openness characteristics, that resulting in network security problems are more prominent, network data theft, hacker attack,...

Mobile Internet Preference Recommendation Based on Scene Model

Yongguo Ren, Long Pang
The current domestic online music providers, such as QQ music, KuGou music, Baidu Music, etc., most of which support keywords retrieval of users to search songs, listen online, download songs, and other functions. Few manufacturers provides functions as 'songs may conform to your taste', 'songs of similar...

The Two Phase of the Bayes Statistical Model of Accelerated Test Censoring

Siquan Wang
In the Bayes method, the unknown parameters are given proper prior distribution, and the data are obtained. According to the Bayes theorem, the posterior distribution of the parameters is updated according to the data. In this paper we use Bayesian analysis and get the help of a priori information so...

Research on the design of The Intelligent Transportation Cycling System based on the Internet of Things technology simulating

Xinyue Xu
Currently, China's Internet of Things (IoT) industry has developed rapidly. In order to advocate green travel and energy saving, the Intelligent Transportation Cycling System (ITCS) provides strongly favorable conditions for the development of public bicycle. This article introduces the concept of the...

The planning and the design of The Wisdom Campus based on the Internet of Things technology

Xinyue Xu
The rapid development of Internet of Things (IoT) technology leads the third wave of development of information industry around the world. The development of IoT technology integrates into the campus which arouses a discussion of the wisdom of the campus. Firstly, the article introduces the concept and...

The Analysis and Research on the Internet of Things Security Issues

Xinyue Xu
Nowadays, the Internet of Things technology has become a global hot topic. With the widespread applications of the Internet of Things, security issues attract people's attention. Firstly, the article introduces the concept, three layers and functions of the Internet of Things. Secondly, the article analyze...

Research on CBTC Function of Train Control System

Jiateng Shi
Recent years, with increasing urban population, urban traffic's pressure is increasing. Urban mass transition is in the period of rapid development. The new generation of train control system-CBTC(Communication Based Train Control)is applied to the constructions of urban mass transition. In CBTC system,...

The Design and Application of Intelligent Network Cabling System for Building

Hong Mao
The development of Internet has changed people's life, science and technology promote the economic development. In modern building network cabling system, whole buildings or buildings at first were mainly reflected the comprehensive cabling. Integrated cabling system is mainly used for building in network...

Intelligent Alarm System of Remote Monitoring Based on Image Processing

Xiaoyu Zhang
This paper makes discussion on reasonable application of modern image processing technology to improve remote monitoring system of intelligent alarm in the intelligent alarm remote monitoring system, it maximally realizes organic combination of civil air defense, physical protection, technical protection...

Design and Implementation of College Students Information System Based on Internet

Guangyu Peng
This paper focuses on the characteristics of Internet and explores the influence and countermeasures of Internet on the values of our university students. The Internet as an important invention in twentieth century, is affecting everyone's life, especially have an important impact on how to deal with...

Study on Security and Protection Strategy of Computer Network Information

Chenxiang Zhang
In this paper of computer network information security, network strategy were reviewed in this article, on the basis of all kinds of network safety measures, and the technology to carry on the analysis to Banding mechanical electronic technical computer network as an example, introduces the computer...

Design of the seam tracking system based on wireless network environment

Guorui Wu
The automatic, intelligent and networking of welding process is the trend of the development of the welding. With improvement of welding equipment, to achieve the process of seam tracking wireless WiFi network control and data sharing, this paper employ the embedded connection between the microcontroller...

Study on the Technology of Equipment State Monitoring and Intelligent Evaluation

Xiangcai Zhu, Jian Xu
This paper studies the key technology of the equipment monitoring and intelligent evaluation: the anomaly detection equipment status, the data are processed with Grab J; the transmission of high-definition images and video mode to realize the state matching, using radial basis function neural network...

Discussion on applications of computer network technology in electronics and information engineering

Ruxin Tan
With the rapid development of the era, Internet information technology has found extensive applications, thus playing an important role in improving people's living standards. This paper conducts a basic analysis of applications of computer network technology in electronics and information engineering.

Discussion on applications of Internet of Things techniques to information engineering safety supervision

Ruxin Tan
Development of the information era has made "Internet of Things" a popular phrase. Its connotation has been gradually clarified, meaning connection between things via the Internet. Nowadays, the category of "things" keeps enriching. Development of Internet of Things has bred many new-and high-technologies....

A Dual Tabu Search Algorithm for Vehicle Routing Problem

Tao Wang
In this paper, vehicle routing problem as the background, the traditional tabu search algorithm is proposed based on a set of methods to build the initial solution and its integration to achieve the dual tabu search algorithm for vehicle routing problem. A new algorithm to avoid the shortcomings of the...

Security Hidden Danger and Protection Measure of Digital Campus Network

Yunhao Zhang
With the development of science and technology progress, electronic information technology has been accepted by the public, the network information popularization, Internet plus has also become a hot topic, the campus network has become the standard configuration of daily life and study, application...

Routing Analysis of Wireless Ad Hoc Network Based on Mobile Node Technology

Chun Wei, Ming Li, Zhigang Liu
It leads to the uncertainty of the network topology that the random mobility of nodes in mobile Ad hoc networks. In order to accurately predict network topology performance, and effectively detect ad hoc network efficiency, capacity and stability, it has proposed in ad hoc network mobile node optimization...

Design of Coal Mine Power Supply Monitoring System

Lei Shi, Guo Jin, Jun Xu
According to the characteristics and the management pattern of coal enterprises production and supply, this paper designs a kind of mine power supply monitoring system. The system can carry out real-time monitoring, measurement, protection and control for mine power equipment, the realization of underground...

Analysis and Simulation on the Kinematics of Robot Dexterous Hand

Guo Jin, Jiangnan Ni
"Dexterity" is an important index to measure the technical level of the robot dexterous hand, which demonstrates the ability to work in any position with the target shape. This study is based on the Shadow dexterous hand, and the mechanical structure characteristics of Shadow dexterous hand are studied....

Research on Vehicle Dynamic Location Algorithm Based on Interactive Multi Model

Guotong Zhang, Lei Shi, Jun Xu
The vehicle positioning accuracy directly related to the dynamic model. For a single dynamic model, it is difficult to describe the state change of the vehicle movement precisely, so this paper proposes a composite model of GPS dynamic positioning system, and this paper designs a vehicle location and...

The Short Term Load Forecasting of RBF Neural Network Power System Based on Fuzzy Control

Jiangnan Ni, Guo Jin
This paper presents a kind of power system short-term load prediction algorithm based on fuzzy control and RBF neural network, to solve the problems of th traditional RBF neural network in electric power system short-term load forecast errors. Through the example verification, this method can improve...

Study and Application Analysis of HTML5 Core Technology Based on Mobile Browser

Cuiyu Fu
as internet application develops rapidly, application requirements of internet web becomes increasingly strict. As uses' demand improves, the standard and technology of web browser are changing continuously. HTML5 standard proposed by World Wide Web Consortium (WWWC) offers a new opportunity for internet...

Analysis on Application of Big Data in Intelligent Tourism

Gangzhi Guo
Big data, Internet of Things and cloud computing technology develop like a raging fire. Each industry is looking for the strategy to apply big data in industrial development. Traditional tourism industry also pays attention to application of big data technology in the process of intelligent tourism transformation....

Study on J2EE-based Software Supporting Platform Component Technology

Lili Fan
This paper studies large software component recognition mapping, component testing and component evaluation, proposes a set of development platform and key structure supporting twin-engine software, and discusses mutual relations among software functions. Besides, this paper takes e-commerce trading...

Application of Neural Network Model Combined with Fuzzy Theory in Computer Network Security

Xiaotian Liu
With continuous development of science and technology, actual data integration and operating path also change greatly. To better improve transmission accuracy of overall data information, and guarantee optimal establishment of computer network security system, accuracy of overall system can improve fundamentally...

On Development and Application Prospect of Mobile E-commerce

Huili Wang
In the development of wireless mobile technology, the mobile e-commerce begins to get favour from people, which better broadens the running space of our e-commerce industry, allowing for a wider range of e-commerce. Combination of mobile e-commerce and enterprise e-commerce platforms, and connection...

Analysis on future development trend of computer science and technology

Mingyang Zhao, Xiaoni Yang
with the continuous progress of Chinese economic society, the science and technology has presented a booming developmental trend. Computer has been widely used in different domain of social life and become an indispensable part of people's social life. This article aims at briefly introducing the historical...

Exploration of Web front-end development technology and optimization direction

Cuiyu Fu
under the background of rapid development of network technology, network field gains certain expansion. Thus, more and more people seriously depend on network in life and work. Meanwhile, most projects or jobs also enhance the degree of network dependence. It thus can be seen that network technology...

Study on Application of Smartphone in Mobile Learning of College English under "Internet +" Background

Qian Zhang
"internet+" is an inevitable product when knowledge society era develops. It beings new mode and new idea for current economic and social development. In short, "internet+" refers to "internet + each traditional industry". It is not just simple combination, but also further improves knowledge, technology,...

On Computer Network Security Management and Technical Measures

Enfeng Zhou
As the development level of economy and society improves and technology changes quickly, human society informatization degree also deepens continuously. A distinguishing feature of information age is gradual promotion of internet and computer. Meanwhile, internet technology and computer technology also...

Discussion of GPON technology application in communication engineering

Zhongbo Feng
GPON technology is a new generation broadband access technology which is more efficient and convenient in actual application and has low requirement on technologies and richer overall interfaces. It is a new technology means which has great influence on communication engineering construction in line...

Study on a Supervisory System for Military Hardware Operation in Low Light Conditions

Jun Yang, Shicong Lin
Aimed at the issue of the operation training on military hardware, designed a set of supervisory system for military hardware operation in low light conditions. Put forward an image de-noising algorithm which united mathematics morphology and modified average filtering method, put forward an image enhancement...

A Boundary Collocation Method for Wave Propagation through Obstacle

Xueling Cao, Yang Liu, Zan Huang, Rui Li, Junjie Tong
The interaction between wave and the obstacle in water is a common problem in ocean engineering. The article use a new numerical method, Boundary Collocation Method (BCM) based on Eigenfunction Expansion Method (EEM), to solve the two-dimensional wave problems between wave and obstacle. The obstacle...

The Feasibility Analysis of Cucumber Disease Prediction with Virtual Reality Technique

Tianchi Zhao, Peng Yuan
In order to find out the high correlative factors of the crop disease from the images, and to predict the disease process, the author analyze the digital images of cucumber leaf which collected in the process of normal and disease by computer image processing technology. By comparing the nine parameters...

Study on fisheye image correction algorithm

Leng Xue
For serious cases fisheye lens distortion, we use fisheye images captured image get a lot of information presented fisheye correction method using Matlab image processing software, the successful implementation of correcting the image distortion. And experiments show the feasibility of the method.

Performance Test of Future Network OpenFlow Soft Switch

Peizhang Xie, Jungui Zhou, Jingyu Wang
SDN (Software Defined Network) is the important part of Future Network, and the OpenFlow soft switch which separates the control plane from the data plane is the key instrument. While there is less research on the performance model of SDN, and also less research on experimental methods of performance...

Fault location system of belt conveyor based on CANopen protocol

Shi-biao Shao, Ming Zong
In order to resolve these problems of the long belt conveyor that the fault is not easy to locate, the location efficiency is low, the maintenance cost is high and so on, a design scheme of the fault location system of belt conveyor based on CANopen protocol was proposed. The basic model of CANopen device...

Temperature Prediction Model of Cement Rotary Kiln Based on MPGA-LSSVM

Hui Zhao, Yu Wang, Hongjun Wang, Youjun Yue
The burning zone temperature (BZT) in cement rotary kiln is a mostly important index which affects the quality of produced cement. In rotary kiln, the bilateral movements of air and complex chemical reactions take place. Thus, traditional modeling methods can not predict the BZT effectively. In order...

Research of Key Technologies of Agricultural Products Traceability System

Fang Liu, Lian Xue
With the application of RFID technology in the Internet of things in agriculture, realize the agricultural products traceability safety, mainly to realize the design of Agricultural Internet of things sensing layer, network layer, application layer. Through RFID label record collection of agricultural...

Analysis on the current study about personalized learning system within domestic research- Based on the content analysis of the research literature from 2002 to 2015

Jiachun Li, Shuguang Chen
The article uses content analysis method, using CNKI database as a search tool to retrieve the relevant papers published during the period of 2002-2015.By comparing, analyzing and integrating the research history, research types, research topics, research content and so on ,we think the further development...

An algorithm for assembly job shop scheduling problem

XiaoQin Wan, HongSen Yan
The problem of assembly job shop scheduling (AJSS) is studied with the objective of minimizing the weighted sum of earliness and tardiness penalties. An insertion search algorithm is proposed to solve the problem. The operations of job with tardiness or earliness are shifted left or right to optimize...

The Review About Method of Ultrasonic Detection of Concrete Damage

Guojun Liu, Zeyou Hu, Dahuan Wang
This paper points out the basic principle of ultrasonic measuring damage, expounding the development and the research status of ultrasonic detection of concrete damage. It also summarizes the development trend of the method and makes suggestions to the further study of the technology. So it is referable...

Application of the Rain-flow Counting Method in Fatigue

Guojun Liu, Dahuan Wang, Zeyou Hu
In the statistics of stress-strain cyclic response involved with cyclic-loading, rain-flow counting method has always been thought the most reasonable way to proceed cycle counting, based on which researchers could conduct fatigue test or calculate the damage extent according to N(or S N) curve. That...