Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016)

+ Advanced search
186 articles
Proceedings Article

Real-time Transaction Scheduling Method for Distributed Database

Qiao Sun, Shaowei Zhang, Lanmei Fu, Jiasong Sun
The existing distributed database is mainly based on the limited scale network environment. Many systems implement algorithms are difficult to apply when it needs to be expanded or involved into the field of distributed query processing, distributed transaction processing and data replication. In this...
Proceedings Article

The Design of Navigation System Detector for a Certain Self-propelled Anti-aircraft Gun

Yi Huang, Xiusheng Duan, Hailong Zhang, Yingjie Dai
Navigation system for self-propelled anti-aircraft gun is to provide location, course and vehicle posture angle to support independent operation and good shooting ability while vehicle moving. So its overall performance testing and fault diagnosis is crucial important. In this paper, based on some related...
Proceedings Article

Detecting communities from signed network based on local search

Xueyan Liu, Bo Yang, Xuehua Zhao, Yi Yang
Many researchers have begun to study signed networks which are widely existed in real world. In the signed network, the links are labeled the positive or negative sign to represent the active or passive relation between individuals, such as trusted or distrusted relation in social networks. Communities...
Proceedings Article

Mutation Based SQL Injection Test Cases Generation for the Web Based Application Vulnerability Testing

Ilies Benikhlef, Chenghong Wang, Sangirov Gulomjon
Security testing is the process of detecting the exploited defects which conduct attacks. Since SQL Injection vulnerabilities are one of the most common threats of a web-based application, testing still the most important technique in order to gain confidence that an articraft behaves as expected. This...
Proceedings Article

Spatial geographic information variance analysis in Anhui Province

Jie Zhu, Zhanqiang Chang, Xiaomeng Liu, Wen Yu, Wei Wang
Regional industry competition is a momentous aspect of regional geographic information engineering. It is quite vital to investigate industrial competitiveness in both theoretical and practical fields. In this paper, the principle and procedure of principal component analysis (PCA) were respectively...
Proceedings Article

GPU Based Real-time Floating Object Detection System

Jie Yang, Jian-min Meng
A GPU-based floating object detection scheme is presented in this paper which is designed for floating mine Detection tasks. This system uses contrast and motion information to eliminate as many false positives as possible while avoiding false negatives. The GPU computation platform is deployed to allow...
Proceedings Article

Research on Integrity management system based on corrosion risk online monitoring (CROM)

HaiTao Lai, FaGuo Tian, ZaiShun Li, Shuzhen Yu, Bin Yang
This paper is proposed based on the risk of corrosion online monitoring (CROM) of oil and gas field station key equipment integrity management system, the key for the key equipment of oil and gas field station (industrial pipeline and equipment), through on-line monitoring technology on corrosion and...
Proceedings Article

Research on temporal and spatial variation information of urban land: A case study of Taiyuan City

Wen Yu, Zhanqiang Chang, Xiaomeng Liu, Wei Wang, Jie Zhu
The temporal and spatial variation information of the land use illustrates a city's development tendency. In this paper, we obtained three land use maps by interpreting and classifying the remote sensing images of different periods in Taiyuan. Then, the area of different land use types was calculated...
Proceedings Article

Fuzzy Time Series Forecasting Model Based on DRDDR and Application

Ming Liu, Hongxu Wang, Youming Li, Xuebing Huang
A fuzzy time series forecasting model-DRDDR was proposed based on difference and deifference in difference in paper. Prportion of tourism revenue in tertiary industry during 2015-2018 in Hainan province. Results of DRDDR would provide useful help for the development and planning of tourism in some departments...
Proceedings Article

Research on the Ultimate Value of Compound Function in Higher Mathematics

Long Wang, Zhe Wang
The problem of ultimate value of compound function is very complex, especially the research on judging whether the existence of ultimate value of compound function under the given conditions and how is the exact conditions that can affect the existence of ultimate value is not enough, but this is the...
Proceedings Article

Digital Forensic Investigation of Cloud Storage Client in Android

Huixiang Zhang, Yanan Wang, Chunlei Chen
Cloud storage services sometimes descend into criminal tools. It is very necessary to investigate on digital Forensic of cloud storage services to obtain sworn evidence. The digital forensic investigation of the OneDrive Android client application is conducted in this paper. By imitating users' behavior,...
Proceedings Article

The Application Research of Social Networks Community Detection with Correlation Coefficients

Fuqiang Zhao, Guijun Yang, Enjun Xing, Li He
In complex network graph, cut model based on edge centrality doesn't apply to overlapping community detection by minimizing the algebraic connectivity of complex networks. The problem can be resolved by calculating node Correlation coefficients. It cuts one edge at one time, which is the fastest decline...
Proceedings Article

Image recognition algorithm based on Parameter Optimization of gravitational search

LEI Hu
Image characteristic value extracted by gravitational search algorithm improves the image retrieval accuracy. The distance between the image characteristic values is as the input value, accuracy of image recognition is calculated by pulse coupled network variates optimized of Gravitational search algorithm....
Proceedings Article

A privacy protection algorithm based on hierarchical multiple sensitive attributes allowed by least mean square criterion

Tao Cui, Jijia Yang, Nan Meng, Wei Xie
Based on L-diversity multiple sensitive modules, a hierarchical multiple sensitive attributes algorithm is proposed according to least mean square criterion --- L-LMSU (L-Least Mean Square Uniqueness). The algorithm makes a hierarchical strategy according to the frequencies of the whole attributes firstly....
Proceedings Article

Optimization Study for Excitation System Simulation Model with Limit Function

Qian Cheng, Junfeng Zhang, Cong Fu
In power system analysis software the simulation model of generator excitation system is not perfect, actual characteristics of the generator cannot be simulated accurately under some certain faults. Thus, an improved excitation simulation model with excitation limit is presented in this paper. The model...
Proceedings Article

Study on the Strategy of Path Optimization on the Process of Air Handling Based on Genetic Algorithm

Jiwan Hu, Jianjian Li, Wude Xie, Qiang Peng
With its great ability on controlling air parameters, combined air-conditioning unit is playing an increasingly important role in civilian life, industrial production and even military fields. Because of the variety of varied path, while the environment changed, the optimal varied path can't be got,...
Proceedings Article

Research on Inter-harmonic Detection Method Based on EEMD

Jie Sun, Shuyi Tao, Chao Han, Gang Li, Chenghao Lan, Qidong Zhao, Yuanlin Song, Jiatong Sun
A comparative analysis of the existing inter-harmonic detection methods are carried out for the small content, non-linear and volatility of characteristic. Based on HHT transform theory, a new inter-harmonic detection method based EEMD is presented by combining of the empirical mode decomposition and...
Proceedings Article

On-line Analysis for Agricultural Production Image Data

Ronghua Gao, Huarui Wu
Image plays an important role in agricultural production data. It is a good guidance that some valuable knowledge from that images by online analysis. As a crucial procedure in which images are divided into distinct non-overlapping regions and the interested objects are extracted in the process of image...
Proceedings Article

Research on the precision information service for agricultural technology extension based on situational awareness

Xiang Sun, Huarui Wu, Qingxue Li, Peng Hao
Scenario aware computing is an important technology to realize precise information service in agricultural technology extension. This paper constructs a scene data fusion user perception of precision agricultural extension service. This paper established user classification model and multi situational...
Proceedings Article

Telemetry Vibration Signal Trend Extraction Based on Multi-scale Least Square Algorithm

Feng Guo
A new trend extraction method based on multi-scale least square algorithm combined with EMD was proposed for telemetry vibration signal. The observed signal is decomposed by EMD to obtain a series of IMF, based on which the least square algorithm is adopted to complete trend extraction with different...
Proceedings Article

Realization of face image recognition system based on histogram

Yurong Zhang
In this paper, the face image recognition in the application of MATLAB to preprocess the image, application the toolbox classic image processing of the image, through the example to apply MATLAB image processing function, of a given face image processing, and applied to the face recognition system. In...
Proceedings Article

A Parallel Computing Method for Entity Recognition based on MapReduce

Yushui Geng, Peng Li, Jing Zhao
With the rapid development of industrial automation, there are huge amounts of duplicate data refer to the same entity in the data sets have brought enormous challenges in data analysis. To accommodate the entity recognition of huge amounts of data, this paper presents a parallel computing method for...
Proceedings Article

Facial Standardization Method in Video Face Recognition System

Kaiyu Wang, Zongmin Yu, Menglin Sheng, Peng Sun
In order to the practical face recognition system using in an uncontrolled environment exist many outside interference factors. In this paper, it is proposed that a novel facial standardization method to extract the core region of face samples, furthermore, simultaneously adjust the facial posture and...
Proceedings Article

Application analysis of information equipment in the education science

Xin Ren, Li Ma
With the rapid development of high-tech, information technology education equipment has a rapid development and application and the modern educational information technology infrastructure has aslo gradually flourished. This paper will explore the theory of information education equipment, the construction...
Proceedings Article

Production Scheduling and Worker Assignment Problems in Assembly Job Shop with Deterioration Effect

Tianhua Jiang
This paper focuses on the production scheduling and worker assignment problem of an assembly job shop in static manufacturing environment. In the workshop, the processing time of each job depends on its starting time and the number of workers assigned to process it. The objective is to find the optimal...
Proceedings Article

Research on penetration test of the SQL injection based on the formalization model

Ping Chen
To solve the problem of generating adequate test cases to reduce omissive report of the SQL injection vulnerability in penetration testing, this paper proposes a model-driven penetration test case generation method, which can describe the regularity of current SQL injection attacks. The experiment shows...
Proceedings Article

Analysis of the E-commerce website-Lianliangou

Wenrong Jiang
This paper mainly linked Lianliangou website as a case, simply introduces Lianliangou website platform and its subordinate Hangzhou huantuo Trading Co. Ltd, to the actual data, analyzes the operation model, profit model, Lianliangou website marketing strategy, management pattern, and on the basis of...
Proceedings Article

Research on Gas-Insulated Switchgear flashover fault location system

Shuang Xie, Jialin Zhu, Shilong Zhu
This paper introduces the detection principle of Gas-Insulated Switchgear(GIS) ultrasonic testing method for the fault location of flashover.We designed the GIS flashover fault location monitoring system, which solved the problem of low precision and time-consuming for the detection of GIS.We designed...
Proceedings Article

Research on the joint fault location and cross impact analysis method of information communication network

Wenting Zhou, Xuemei Li, Limin Cui, Hongfei Xu, Qingsu He, Xin Shi
The operation monitoring and alarm disposition of Information networks and Communication networks rely on two systems. Different networks will cause different fault alarms when a fault occurs. However, the networks could only recognize its own fault and alarm respectively. They can't feed the alarm information...
Proceedings Article

Launch Vehicle Software System Reliability Prediction based Architecture and Information Chain

Tinggui Yan, Xiaoqian Chen, Jian Bai, Li Ma, Zhifang Yang
Launch Vehicle software is the important factor in the Launch Vehicle system. Thus, a well-designed Launch Vehicle software is an important factor for Space system quality while the reliability of Launch Vehicle software is a relatively difficult research field. Existing software reliability assessment...
Proceedings Article

Modeling and Simulation of a Fuzzy PID Controller for Heat Exchanger Systems in District Heating

Chunxiao Wang, Riliang Liu
Heating exchange in district heating network is a complex process with great inertia and longtime delay, it is hard to control the temperature of secondary supplying water effectively with traditional PID controllers. This paper studies the fuzzy PID method and models the heat exchanger system through...
Proceedings Article

Welfare analysis based on the frequency resource allocation

Chengyuan Dong
The paper proposed the welfare analysis based on the frequency resource allocation by analyzing the basic framework of the frequency resource allocation policy evaluation. And analyzed the changes of social welfare caused by the extraneous variable of the Cournot model, which built contains frequency...
Proceedings Article

A Reliability Measure and Model Method of Space Station

Qiaoli Xia, Yongqing Hou, Chuanfeng Wei
On-orbit maintenance is important means to sustain the reliability of space station. Reliability block diagram and static fault tree analysis are usually applied to measure the system reliability of space station. The results are too conservative due to the disregard of maintenance. Markov method can...
Proceedings Article

Layout planning and evaluation of X Company manufacturing workshop based on linear system theory (MSLP)

Yanhua Ma, Tian rong Bai, Lingyu Li, Wenbing Zeng
To China's accession to WTO, the process of reform and opening up has made an unprecedented breakthrough in the context of economic globalization. To meet the challenges, China's manufacturing enterprises to start first from the enterprise itself. This one crucial point is the production plant layout...
Proceedings Article

Research on Node Importance Evaluation of the Directed Weighted Complex Network

Wei Xia, Xinxue Liu, Shaofei Meng, Jinlong Fan
Aiming at the problem is neither objective nor thorough to simulate and analyze the real-world by the non-directed weighted network model, this paper not only defined a new evaluation metric for vital node importance called Directed Weighted Node Ranks(DWNR) possessing the local and entire link characteristics,...
Proceedings Article

Machine Learning Algorithm For Efficiency Management Of Oil Well

Shi-qi Bao, Zhi-jie Ding, Yun-yun Wu, Yue-ting Shi
on machine learning technique and oil well efficiency project practical problem, to the complicated circumstance of oil well efficiency, non-linear machine learning support vector machines ( SVM ) shows a better analysis results than the classified prediction result of linear machine learning logistics...
Proceedings Article

Remote monitoring system based on C/S and B/S mixed mode

Kaibing Song, Yinsong Wang, Dandan Shang
With the rapid development of Internet technology, computer and communication technology and control technology, it provides a favorable technical condition for the remote monitoring of control system. In this paper, the working principle and structural characteristics of C/S mode and B/S mode were analyzed....
Proceedings Article

Equilibrium assignment model of road network for traffic flow in open pit

Xiao-yu Sun, Song-song Zhao, Heng Liu, Hang Zhang
In order to further improve the truck dispatching theory of open pit mine, an open pit mine truck dispatching equilibrium distribution model based on traffic flow planning was put forward. The distribution model is based on the principle of Wardrop, and the distribution of the road resistance is used...
Proceedings Article

Positive solutions of the fourth-order boundary value problem with dependence on the first order derivative

YuanJian Lin, Fei Yang
In this paper, By the use of a new fixed point theorem and the Green function. The existence of at least one positive solutions for the fourth-order boundary value problem with the first order derivative
Proceedings Article

Connectedness of approximate weak efficient sets for the set-vector equilibrium problem

Yunxuan Xiong
In this paper, a scalarization result of approximate weak efficient solution for a set-vector equilibrium problem (SVEP) is given. With this scalarization result, the connectedness of -weak efficient sets for the SVEP is proved under some suitable conditions in real Hausdorff topological vector spaces....
Proceedings Article

A Prediction Recommendation Algorithm Research Toward to the Latest Published Article

Tao Liu, Zuo Liu
with the development of the Internet, people have entered an era of information explosion. A good user experience system which to screen and filter massive informationcan and to show the most interesting information in front of the readers greatly save the user's time.This paper presents a new algorithm...
Proceedings Article

Photo Cleaning: An automatic Redundant Object Removal Tool

Jianwei Hu, Wei Fang
This paper proposes a novel technique which removes redundant objects from digital photos. The technique is fully automatic without user interaction. The proposed method is composed of three steps: image registration, color harmonization and redundant object removal. Redundant object removal algorithm...
Proceedings Article

A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence

Tao Liu, Da Zhang
With the rapid development of network technology, network attack tools are becoming more and more specialized, hence network intrusion detection becoming greatly difficult, and computational intelligence with its unique advantages in intrusion detection plays more and more important role. On the basis...
Proceedings Article

Events Influence Computation on Social Media

Yu Zhang, Min Yu, Yueying He, Zhonghua Zhao, Yang Qiao, Hua-Ping Zhang, Jianyun Shang
Up to now, as the most popular and widely used domestic social media mobile application with the most registered users, Sina Weibo has become the main platform of growing numbers of hot events occurring and spreading. This paper aims at the demand for analyzing specific events on Sina Weibo for public...
Proceedings Article

Complex Dynamics of a Calcium Oscillation Model in Non-excitable Cells

Wei Fang, Jianwei Hu
In order to explain the mechanism of the calcium oscillations induced by the calcium-induced calcium release in non-excitable cells, the Kummer-Olsen calcium oscillation model was proposed. In this paper, by using the qualitative theory, bifurcation theorem and the center manifold theory, the nonlinear...
Proceedings Article

Rolling Force Prediction Algorithm Based on Bayesian Regularization Neural Network

Xiaodan Zhang, Lu Yao, Zhenxiong Zhou
For obtaining relative accurate rolling-mill model is difficulty by the simple mathematical method, due to the complexity of the actual production scene and the non-linear relationship between variables, this paper firstly proposes an improved Bayesian regularization neural network model according to...
Proceedings Article

Expert Knowledge Presentation: Using concept map as a new method

Pei Pei, Lin Zhang
Expert knowledge is very important and necessary in any field. It generally refers to the empirical experts and determine knowledge which expert used to solve problem. We can acquire unique and effective methods and knowledge systems from experts formed during their long term learning and working, so...
Proceedings Article

Website Fingerprinting Attack on SSH with Random Forests Classifier

Yong-Jun Wei, Su-Juan Qin
In this paper, we implement a special websites fingerprinting attack based on SSH anonymous communication system with random decision forests classifier. When users access to the Internet through anonymous communication network, website fingerprinting attack can listen in the client passively to determine...
Proceedings Article

Monocular pose measurement method based on circle and line features

Cai Meng, Hongchao Sun
In this paper, a new method based on circle and linear projection is proposed. In a straight line and a circle on the target space as the main object recognition. In the case of knowing the radius of the space circle and coordinate of a point on the space line: First of all, we can use the space circle...
Proceedings Article

The Application of Data Mining in Sports Events

Yu-ping Jiao, Xia Li
In recent years, data mining has played a more and more important role in all fields and had an increasingly greater influence. By using association analysis of data mining and classification algorithm, this paper analyzes the result data of volleyball games, which were held in a university's volleyball...
Proceedings Article

A hybrid approach for anomaly detection using K-means and PSO

Ke-Wei Wang, Su-Juan Qin
The network intrusion detection systems which based on anomaly detection techniques plays an important role in protection network and systems from harmful attacks. With increasing in attacks and the new security challenges, The lower accuracy of anomaly detection method based on cluster analysis network...
Proceedings Article

A stable feature selection approach for optimizing traffic classification based on adaptive threshold

Wenbei Duan, Yuanli Wang
In recent years, machine learning algorithm has been widely studied in the field of traffic classification. However, most studies focus on performance improvement of classifier, pro-phase work of traffic classification - feature selection is ignored. Therefore, WSU is regarded as metric, an ATFS algorithm...
Proceedings Article

Research on Superficial Area Measurement Method of Irregular Object Based on Image Processing

Yu Yi
every field needs to face with problem on superficial area measurement of irregular object, how to quickly, effectively and accurately measure the superficial area of irregular object has appositive effect on increasing economic benefit, so it attracts universal attention. With the development and application...
Proceedings Article

Assembly system based on computer vision and virtual reality technology

Bo Huang
Digital image processing is the key of the vision system, in the virtual instrument system, which is realized by computer software. At home and abroad with the most widely used virtual instrument development platform is Ni's LabVIEW and Lab Windows / CVI, and based on the two software IMAQ Vision is...
Proceedings Article

A Fault Diagnostic Method of 24-Pulse Uncontrolled Diode Rectifier Based on the Voltage Waveform Analysis

Wei Zhu, Weiming Ma, Xidang Yang, Huan Xiao
A fault diagnostic method of 24-pulse uncontrolled diode rectifiers based on the voltage waveform analysis was proposed. The voltage waveform analytic expressions of individual diode running under normal and fault conditions were derived in detail. The analytic results are consistent with the simulation...
Proceedings Article

Design and Implementation of Emotional Virtual Experiment User Model Based on VRP

Linlin Gao
With the development of science and technology as well as educational technology, people are paying more and more attention to the positive influence of emotional, humanistic, aesthetic and other elements of virtual experiment on the cognitive psychology of learners. The emotional design of virtual experiment...
Proceedings Article

A Cloud Data Center Operation and Maintenance Management Process for the Research Institution based on Improved ITIL

Libin Zhang
The concept of ITIL management process is introduced in this paper. According to actual practices in the scientific research institutions and role-based access control theory, an improved model of ITIL is designed. When used in scientific research institutions, cloud data center operation and maintenance...
Proceedings Article

A Text Instantiation Method for Knowledge Extraction from Scientific Research Texts

Shiliang Wan
Text instantiation is the key step in the research of text knowledge extraction. This paper has compared the rule method with the statistical method. Based on the method of rules, the basic framework of processes instructing research text instantiation is established, the problems that are needed to...
Proceedings Article

A Design of Knowledge Extraction and Consistency Checking System for Scientific Research Texts

Feng Gao Gao
This paper addresses the practical problems involved in the process of knowledge extraction and consistency checking system for scientific research texts. Based on the theoretical research on knowledge extraction and reasoning for scientific research texts, this paper presents a design of knowledge extraction...
Proceedings Article

The sports performance based on variable weight and support vector machine

Qingbin Wang, Ling Jia
as sports performance is affected by many factors, it's crucial to choose effective divisors. A sports performance prediction model based on weight-SVM is proposed for factor selection and evaluation. Firstly, support vector machine is used to eliminate some invalid factors by use of cross validation...
Proceedings Article

Multi dimension query of sports video for cloud service environment

Kun Lv, Qingbin Wang
A kind of sports video classification method (D-S PT-LSSVM) combined with least squares support vector machine (LSSVM) and evidence theory has been proposed for the shortages of low accuracy rate and weak stability etc. of sports video with single features. First, four kinds of features of color, texture,...
Proceedings Article

A Multidimentional Study on Entrepreneurial Opportunity Recognition of College Students under the Era of Internet Plus

Xiong Liu
To encourage university students' innovative undertaking is an important way to ease the employment pressure. For this, university students should at first be provided with the capability to recognize entrepreneurial opportunity. To train students for this capability, it is vital for universities and...
Proceedings Article

Applied research on virtual reality technology in digital display design

Junzhu Zhang, Bo Yin, Yufu Chen
Based on the theory of neural network, this paper evaluates the simulation and observability of the virtual reality technology in the digital display design. Meanwhile, through a large number of questionnaire surveys, this paper collects the relevant data and establishes an applied evaluation model of...
Proceedings Article

Application of Neural Network Technology in Computer Communication

Hai Hu, Xiao-ling Li
The article combines with license plate recognition system, which states the application of computer communication based on the analysis of license plate recognition system based on neural network positioning system for analysis, based on related classification method and the work flow of neural network...
Proceedings Article

The Simulation Study Of Transport System For Earth Work Allocation Of Rock-fill Dam

Xiaohang Ma, Ke Li
Based on the analysis of the traffic and transportation system in rock-fill dam, the method of modeling and simulation for the system with computer is proposed. For this, some technologies are applied, for example, the theory of the discrete event system simulation, object-oriented technology, the method...
Proceedings Article

Internal Control of Accounting Information System based on Network Environment

Biao Liu
With the development and progress of modern computer networks, internal accounting information systems in a network environment with a corresponding change of control. Accounting Information System under the network environment is a more complex data processing system for the analysis and processing...
Proceedings Article

Study of Project Development based on UC/OS- Embedded System

Weipeng Yao
With the world's first microcomputer from the date of birth, the embryonic development of embedded systems will have until today has been almost everywhere. Embedded systems development projects have a lot of paper on the concept and development status of embedded systems for a simple narrative, and...
Proceedings Article

Study on Library Service Mode of Teaching and Research University under Big Data Era

Guishan Zhang
Big Data in Teaching Research University Library Management and Service to make teaching and research university library resources and services, service content, service environment, service methods and service models have had a profound change. Analysis of large data waiting for extended service mode...
Proceedings Article

Motivation and Research Concept of University Library Embedded Service

Guishan Zhang
Currently, the emphasis on user-centric embedded user environment to provide personalized design and organization of resources and services for embedded service subject of growing concern. Back in the nineties librarians should be made out of the library, and actively integrate into the user environment,...
Proceedings Article

Research of Database System under Network Environment

Jiangang Zhang
Research and Implementation of the network environment the target spatial database application system is to achieve its goal of digital management applications. In this paper, the relevant scientific research on the theory and technology under the network environment the target spatial database application...
Proceedings Article

Study on Comprehensive Evaluation Model of E-commerce Platform based on Fuzzy Theory

Tingting Zhang
The advantage of e-commerce is that it is connected directly to the producers and consumers goods to consumers directly from the manufacturers. It not only greatly reduce the cost of middlemen in the traditional sales model, and allow users to stay at home can be a variety of consumer shopping. Clearly,...
Proceedings Article

Study on Database Programming and Its Statistics

Wenting Yu
Database programming refers to the database side to complete the application business logic, database monitoring as well as their implementation and use of triggers, stored procedures and stored functions. The main triggers are used to achieve the strengthening of table constraint, table synchronization,...
Proceedings Article

Analysis of Application of Computer Technology on Electronic Information Control and Processing

Na Liao
Electronic information technology is the most promising technologies, including microelectronics, computer technology, network technology, communication technology, and display technology. Based on the current situation and development of the basic characteristics of electronic information technology...
Proceedings Article

Prediction Method of Railway Freight Volume Based on Improved Neural Network

Zhida Guo, Jingyuan Fu
Railway freight transportation is an important part of national economy. Accurate forecast of railway freight volume is significant to the planning, construction, operation and decision-making of railways. After analyzing the application status of general regression neural network (GRNN) in prediction...
Proceedings Article

Design for fishery water environment monitoring system based on IOT

Shue Liu
This paper designs such a fishery water environment monitoring system based on the technology of the internet of things, it can monitor the dissolved oxygen, temperature, turbidity and ionization degree etc in real time. It also analyzes and designs the turbidity sensor, dissolved oxygen sensor, and...
Proceedings Article

Part-of-Speech Tagging with Both Character and Word Information

You Zhou, Fangzhou Liu
Part-of-speech tagging is to determine an appropriate grammatical category for each word in a sentence, which is one of the basic tasks of natural language processing. The former part-of-speech tagging methods mostly study the co-occurrence probability of the adjacent parts of speech at the word level,...
Proceedings Article

Research on Control of Move-in-mud Robot Based on Q Learning

Yunming Du, Bingbing Yan, Yongcheng Jiang
In order to improve the behavior self-control ability of move-in-mud robot in unknown environment, this paper proposes a behavior control algorithm based on radial basis function neural network Q learning. The algorithm enhances the interaction between robot and environment and improves self-learning...
Proceedings Article

Study on the Monitoring and Intervention of Network Public Opinions of Food Safety

Chaomin Li, Linke Li
In recent years, with the development of internet, regulations of food safety network public opinions have gradually attracted the attention of government departments. This paper first interprets the connotation of monitoring of food safety network public opinions, and then puts forward three key emphases...
Proceedings Article

Research on an Improved Power Factor Correction Method Based on Single-Cycle Control

Wenwen Zhang, Zilong Liu, Jidong Xia
Analysis the conventional topology of Boost power factor corrector and input equivalent circuit and point out that conventional topology of Boost power factor corrector exists with improvement of converter power and the switching frequency. The efficiency of system is greatly reduced. The paper proposes...
Proceedings Article

Research on Computer Translation Software Technology for Network Client

Zheng Zhao
With the development of society and the fast pace of technology, computer-aided translation technology has been used as an important adjunct widely used in software localization and technical translation work. This reality needs to also stimulate the translation of teaching the importance of computer-assisted...
Proceedings Article

Analyzing Customer Site UI Design Experience under the Network Environment Development Perspective

Shuang Li
With the rapid development of HTML5 and CSS3 technology in the network environment, which will undoubtedly bring more fresh design to the site interactive experience. For the success of the website, to attract customers, customers can more comfortable to use and consumption is the ultimate goal. From...
Proceedings Article

Study on the Status of Network Lending Platform Development of Lujinsuo

Yunlei Huo
In recent years P2P network lending emerging as a credit model. This mode is selected by the Internet credit lending platform completed both lending financial transactions, signing a contract, information sharing and other related operations. With financial innovation, P2P network lending industry has...
Proceedings Article

Design and Implementation of Remote Medical Monitoring System for Homecare

Juan Zhong, Hua Liao
With the development of computer and communication technology, the rapid development of telemedicine technology has been realized. Patients can communicate with the doctors in the hospital in time via the remote medical monitoring system. Based on the background, this paper presents the design and implementation...
Proceedings Article

Classification Precision Analysis on Different Fusion Algorithm for ETM + Remote Sensing Image

Huoqian Luo
With ETM+ data (Nantai Island Fuzhou), several fusion algorithms (PCA, MLT, Brovey Transform, HIS) have been applied in image fusion. After image fusion, some criterions (Spectral fidelity, High spatial frequency information gain, and Classification accuracy, Etc.) have been utilized to evaluate the...
Proceedings Article

Research on New Development of Hand-drawn Animation in New Media Era

Qian Wang
The new media leads to the rapid progress of the animation industry, and brings about the new development of the traditional hand-drawn animation. This paper firstly introduces the concept of new media era and the hand-drawn Animation, and then expounds the new development of hand-drawn Animation made...
Proceedings Article

Research and Practice on the Construction of Hackerspace in Libraries

Jinyu Lv
In response to the many drastic changes happening in information consumption and user expectations, forward-thinking librarians are devising groundbreaking ways to remain relevant. The paper expounds the hakerspace systematically from its conception, origin, development and significance, etc. Based on...