Proceedings of the 2013 International Conference on Information, Business and Education Technology (ICIBET 2013)

Session: Information Technology and Computer Science

49 articles
Proceedings Article

The optimization design of Hall compo-nent array based on genetic algorithm

Weiwei Zhai, Wenzhu Gao, Yu Zhang, Ke Bi, Tianyue Xu, Tieqiang Zhang
It can greatly shorten the design period and make optimization more reasonable that use genetic algorithm for the Hall component array optimization design. The method is to set up the optimized platform based on ANSYS and MATLAB software. MATLAB software is used to realize the program design of genetic...
Proceedings Article

Risk assessment method for marine net-work security base on fuzzy-gray system theory

Guoliang Zou, Jie Wu, Yueying Jing
This paper constructs a marine network risk assessment model based on fuzzy-gray system theory, combining fuzzy mathematics with gray system theory. According to some special characters of the Marine Network, we screened the score results and normalized on the index weight with expert scoring. Whereafter,...
Proceedings Article

OpenCV Detection of Athletes in Long Jumping Videos

Ailing Song, Kai Chen
The precise analysis of long jumper’s technical videos can provide the im-portant information for the coaches to formulate the training program. To real-ize the analysis of technical videos, we must firstly detect and track the long jumpers in the video. OpenCV technique (open source computer vision...
Proceedings Article

An Algorithm to Find Cycles of Biochemical Systems

Desheng Zheng, Guowu Yang, Xiaoyu Li, Zhicai Wang
Genetic regulatory systems, self-organized systems and other living systems can be modeled as synchronous Boolean networks with stable states which are also called cycles. This paper devises two algorithms based on BDD to compute all the cycles in synchronous Boolean networks and enumerate all states...
Proceedings Article

Local distributed mutual exclusion al-gorithm

Zhong-hao ZHANG
A distributed mutual exclusion algorithm has been proposed for large-scale distrib-uted systems in the Internet environment. The algorithm combines the advantages of centralized algorithm and distributed algorithm, and taking into account the system fault tolerance, while message complexity is decreased...
Proceedings Article

The Perception Layer Information Secu-rity Scheme for Internet of Things based on Lightweight Cryptography

XiangYi Hu, LiPing Du, Ying Li
This paper uses the lightweight (simple cryptography, high security and fast speed single-key cryptographic algo-rithms such as: RC4, RC5, SMS4 etc.) cryptography, and a security single-key management technology to solve the key update management problems of light-weight cryptography. In smart chip of...
Proceedings Article

Research on the design of a scalable hardware platform for data management

Fei ZHANG, GuangMing LIU
Data management system includes hard-ware platform and management software. Under the circumstance of explosive growth of data, scalability and processing speed are two important indicators of measurement of hardware platform. Design a highly scalable data management hardware platform, and solve the...
Proceedings Article

An Error Resilient Video Coding Algo-rithm Combining FEC and WZ Technol-ogy over Error-prone Channel

Tianqing Wang, Zhengguang Xie, Hongkui Li
Reliable video delivery has become one of the crucial issues in wireless video communications. Based on different error resilient property of forward error correction (FEC and Wyner-Ziv (WZ), we propose a scheme which combines these two technologies. Experimental results demonstrate the scheme can possess...
Proceedings Article

Mining Users for Organizations on Mi-cro-blogs

Zhenhua Zhang, Ruifang Liu, WeiRan Xu
This paper focuses on detecting relevant real-world users of organizations in mi-cro-blogs. Many organizations and indi-viduals choose to publish posts on micro-blogs. As the virtual social network may possibly be influenced by accounts’ real world social ties, it’s feasible to detect the user groups...
Proceedings Article

Design and Implementation of anti-cheating programming Examination system

Yiju Wei, Hong Han, Jianyua Jiang, Yong Liao
Programming oriented on-machine examination (POME) faces some new cheating challenges. They exploit the fea-tures of third-party programming tools used in POME. Traditional methods, such as screen taking over, packet filtering, used in traditional on-machine examina-tion system could not prevent cheating...
Proceedings Article

Constructing Time-Varying Gene Regulatory Networks

Xiaohong Ni, Yingfei Sun
Discovered gene regulation networks are very helpful to understand biological mechanisms and predict unknown gene functions. Little literature has been done toward estimating time-varying networks from time series data. In this paper, we develop a new method to discover the dynamic, and delay interactions...
Proceedings Article

Multi-touch GIS Based on Optical and Computer Vision

Bo Wan, Dongxue Zhao, Xiu Wen, Gengdai Liu
This paper describes a multi-touch GIS(Geography Information System) based on optical and computer vision. In the system, user can operates map direct-ly through gesture. A series of image pro-cessing and computation of video frames is used to get data and trajectory of touch point according to the character-istics...
Proceedings Article

Research and Implementation of ROHC for PoC Service Based on TD-SCDMA Network

Haiwen Li, Wei Huang, Lifu Li, Gang Yu
PoC is a half-duplex PTT service using VoIP technology based on cellular net-work packet domain carrying. ROHC is used to implement the header compres-sion in PS domain, which can improve the transmission efficiency of the air in-terface. This paper describes the working principle and the modes of operation...
Proceedings Article

Performance evaluation study of strate-gic nuclear deterrent

Tiejian YANG, Minle WANG, Song TIAN, Baoshun ZHOU, Lan LI
To build a nuclear deterrent effectiveness evaluation model. Essentially based on nuclear deterrence, nuclear deterrence factors are analyzed and strategic nuclear deterrent performance system model is built. Based on Agent, nuclear deterrence performance assessment analysis model is constructed, the...
Proceedings Article

Applications of GRNN Based on Particle swarm algorithm Forecasting Stock Prices

Jinna Lu, Yanping Bai
Generalized regression neural network (GRNN) has very good effect on making nonlinear forecasting model with large number of stock data. Particle swarm optimization (PSO) has simple operation analysis and is easy to implement. We use PSO algorithm to optimize the GRNN in order for optimal smoothing factor...
Proceedings Article

A Hybrid Assessment Method for Evaluating the Performance of Starting Pitchers in a Professional Baseball Team

ChihCheng Chen, YungTan Lee, ChungMing Tsai
The performance assessment of professional baseball starting pitchers is considered a multi-attribute decision-making (MADM) problem. This study develops an evaluation model based on the analytic hierarchy process (AHP) and grey relational analysis (GRA) to evaluate starting pitcher performance for teams...
Proceedings Article

Superpixels Based Interactive Image Segmentation Algorithm

Jianwu LONG, Xuanjing SHEN, ZANG Hui, Haipeng CHEN
A superpixels based interactive image segmentation algorithm is proposed in this paper. Firstly the initial segmentation is obtained by MeanShift algorithm, and then a graph is built using pre-segmented regions as nodes, finally min-cut/max-flow algorithm is implemented for global solution. In this process,...
Proceedings Article

Adaptive Image Thresholding by Background Subtraction

Jianwu LONG, Xuanjing SHEN, Hui ZANG, Haipeng CHEN
In this paper, an adaptive image thresholding algorithm is proposed for thresholding images with uneven illumination. Firstly, a Gaussian scale space, which is produced from the convolution of a two-dimensional Gaussian function with an input image, is used to estimate the background image. Followed...
Proceedings Article

Study of the denoising and feature extraction based on eyes-closed EEG signal

Nianqiang Li, Yongling Wang
The electroencephalogram (EEG) is a kind of biological signal that represents the activity of the brain which plays a key role in the diagnosis of brain. EEG signal was de-noised using butterworth filter in this paper. Based on analysis of methods of EEG signal processing, we propose to use wavelet transform...
Proceedings Article

EEG feature extraction for imagery movement based on improved WICA method

Nianqiang Li, Yongling Wang
Mu rhythm is produced in motor sensory cortex of human brain, a region associat-ed with voluntary movement. Feature extraction for imagery movement related to in this paper is based on mu rhythm. The result of the new method we put forward showed that we can separate EEG signal from power frequency noise....
Proceedings Article

Wireless Feature Extraction System for Cloud-Dust Based Intelligent System by Using Embedded Wavelet Packet Method

ChungChi Huang, CongHui Huang, ChungLin Huang, ChungJui Wu, ShengFone Yang
In the paper, a wireless feature extraction system for cloud-dust based intelligent system using embedded wavelet packet method is developed. In order to decrease the massive transmission data form re-ceivers and transmitters of wireless sen-sors network, we reduce the data dimen-sions of sensors using...
Proceedings Article

Analysis about Performance of Multiclass SVM Applying in IDS

Gang Zhao, Jianhao Song, Junyi Song
This paper presents a novel network in-trusion detection approach with the Sup-port Vector Machine embedded in and K-fold cross-validation method compound-ed for optimizing the attributes and SVM model. Compared with some representa-tive machine learning method, online data experimental results show...
Proceedings Article

A Smart Blacklist Filter for the Android System

TaiFu Yu, JuiChung Hung
In this paper, we present an efficient blacklist filter to address fraudulent calls on an Android system. In general, fraudulent calls are almost never included in blacklist databases of smartphones. Therefore, we combined blacklist databases and adaptive neuro-fuzzy inference systems (ANFIS) to reduce...
Proceedings Article

An approach of demonstrating network structure

Liehuang Zhu, Zhichao Zhou, Zhansheng Ma
In network management, computer-aided technology is introduced to fit the large network. Demonstrating the network topologic structure to managers vividly will help greatly. However, the network graphic demonstration is very difficult. Much as it costs, it lacks me-thods to form an efficient solution...
Proceedings Article

An Improved Impulse Noise Detection and Removal Method

Dangeen Xie, Zhili Zhang
This paper proposed an improved denoising method for removing the im-pulse noise. Firstly, analyze the each pixel of the corrupted image on eight di-rections, to determine whether the pixel is an impulse noise point. Then, create a noise identification matrix which has the same size of the original image,...
Proceedings Article

Application Research of Information Recommendation Based on Association Rules in Agricultural Information Net-work

RuPeng Luan, Qian Zhang, JunFeng Zhang, Feng Yu, Xin Liu
In this paper, we used association recom-mendation to achieve page recommen-ded for Beijing 12396 agricultural infor-mation networks, and improved accuracy, algorithm performance and execution efficiency of the recommendation. The contrast experiments proved that these improve-ments optimized the effect...
Proceedings Article

Study Intelligent Circuit Breaker with synchronous Closing Function Based on DSP

Shenghui Xu
An intelligent circuit breaker with syn-chronous closing function based on DSP is presented in this paper. By which, the filtering algorithm based on Fourier algo-rithm is adopted in order to estimate the optimal reclosing angle so as to weaken the instantaneous current during reclosing circuit. Based...
Proceedings Article

FPGA-Based Research on The Hardware Design of CAVLC Encoder

Jin Xu, Jianhua Mao
H.264/AVC video coding standard adopt CAVLC (Context-based Adaptive Varia-ble Length Coding) in Baseline profile and Extended profile, this paper briefly introduces the principle of CAVLC en-coding; In the hardware design, the Ping-Pong operation and structure of parallel processing are adopted in order...
Proceedings Article

A Robust Authentication Protocol for Multi-Server Architecture without Smart Cards

HanCheng Hsiang
With rapid growth of Internet technolo-gies, more and more servers provide dif-ferent resources to be accessed over the open network. For most of the resources provided by remote servers, users must pass an authentication procedure in order to access data. But most conventional password authentication...
Proceedings Article

The Research on Mutual authentication Protocol for RFID System Based on Combined Symmetric Key

Jiya Jiang, Tong Liu, Yanqing Shi, Jianwei Guo
This paper analyzed the security problem existed in the low cost RFID system, and proposed a new security authentication protocol for RFID system by use the Combined Symmetric Key and SMS4 algorithm, then the management of large-scale keys can be simplified to the man-agement of small-scale key seeds....
Proceedings Article

Application of Neural Network in Atmospheric Refractivity Profile at Makurdi

G.A Agbo, G. F Ibeh, D.U Onah, A.E Umahi, E Nnaji, F.C Ugwuonah
The refractivity profile variation in tropo-sphere is one of the aspects that influ-ences long-distance terrestrial electro-magnetic wave propagation and perfor-mance of communication systems. This study is aimed at calculating and estimat-ing radio refractivity at Makurdi with tropospheric parameters...
Proceedings Article

Implementation of a fault-tolerant system for solving cases of numerical computation

Cyril Dumont, Fabrice Mourlin
We have realized MCA framework (for Mobile Computing Architecture), allow-ing the resolution of cases of numerical calculation in a heterogeneous distributed environment. Its features are adaptability and reactivity. The first facet is to achieve the end of the calculation even if computing resources...
Proceedings Article

SPID-based Method of Trojan Horse Detection

Xunyi Ren, Guibing Qian
The Trojans have become a hidden threat to computer security, how to identify various Trojan efficiently and accurately is a current research focus. In this paper, based on the research of SPID's attribute meters, we proposed a method to detect and identify Trojan that based on the SPID feature optimization....
Proceedings Article

Denoising of Hyperspectral Remote Sensing Image using Multiple Linear Regression and Wavelet Shrinkage

Dong Xu, Lei Sun, Jianshu Luo
Hyperspectral remote sensing image is easily contaminated by noise, which will affect the application of hyperspectral image, such as target detection, classification and segmentation, etc. Therefore, a denoising method of hyperspectral remote sensing image based on multiple linear regression (MLR) and...
Proceedings Article

Web2.0-based Blended Learning in College English Teaching

Siyang Liu
In Web2.0 environment, college English blended learning has been applied since it can combine the advantages of conventional classroom teaching and online learning. This paper briefly introduces the essence of Blended Learning, gives the overview of Web2.0, generalizes the characteristics of Web2.0-based...
Proceedings Article

A type of the travelling wave solutions of higher-order Camassa-Holm equations

Fenggang Xue, Danping Ding
This paper researches the wave equation of higher-order Camassa-Holm equations, the general expression of a type of travelling wave solutions is obtained.
Proceedings Article

Off-line handwritten Chinese character recognition based on GA optimization BP neural network

Huan Chen, Xiangnian Huang, Ping Cheng, Yan Xu
For the shortcomings of traditional BP neural network, which are easy to fall into local extreme and slow convergence, but the genetic algorithm has the characteristics of global optimization. We combine the two to form an optimized BP neural network algorithm. This method combines the advantages of...
Proceedings Article

Hybrid Library: The New Trend of the Traditional Library and It’s Modern Development

Bochao Meng
Traditional Library and Digital Library as a public information service agencies have a lot in common, they have different characteristics in information storage, Mode of transmission and technical conditions. Traditional libraries are the basis of the digital li-brary, the development of digital library...
Proceedings Article

Patent Analysis on Mobile Operating System

Xu Yang, Xiaohai Du, Yang Peng
In recent years, with the contribution of Apple Inc., Google and Microsoft, mobile operating systems have made mobile phones much more useful and interesting than ever. Main mobile manufacturers tend to share the technology on mobile operating system to gain competition power, so are the telecom operators....
Proceedings Article

The Design and Application of Mobile Media System

Changqing Bai, Min Ju, Yao Wei
The Mobile Media System is proposed in the article, it relies on Fixed-line broad-band, 3G/GPRS, wireless LAN commu-nication network, which can conduct re-mote configuration and unified manage-ment for the different types of mobile media terminal, implementing timing, orientation, scheduled content publishing...
Proceedings Article

A chaotic time series prediction algorithm using asymmetric functions

Yun Bu, Wan Xin Kang, Yong Qiang Chen
To connect prediction functions with physical phenomena, we designed two shape-variable functions to improve the adaptability of a prediction algorithm for asymmetric distributed chaotic signals. An adjustable parameter controls the shape of the presented functions. In simulation, we proved that if the...
Proceedings Article

Design and Simulation of MAC Protocol for Vehicular Ad Hoc Network based on TDMA

Li An, Xuemei Ye, Qinggang Fan, Hongmei Zhang
This paper proposes a new TDMA proto-col—CL protocol to solve the problem of real-time data in 802.11 protocol cluster. It has a brand new frame structure and adopts the basis of carrier sense and backoff algorithm, which can solve the congestion problem. As can be verified by the final simulation modeling,...
Proceedings Article

Exploration of time-based data pretreat-ment technology

Jing Wei, Wenqiang Yu
Among all the data processed by associ-ated rules in this article, part of them is time data and it is also the key point of the analysis. To facilitate the concept hi-erarchy of the time data, this research brings out the (0, 1) standardized tech-nology for time data normalization and use it to convert...
Proceedings Article

Research on the Model of Intelligent Passenger Information Service System based on Multi-Agent

Chunjie Xu, Tianyun Shi
With the improvement of people’s living, the requirement of railway facilities and the service quality is much more than be-fore. Considering to the problems of the existing RPISS, the multi agents-based system design method is adopted, and a model of intelligent passenger infor-mation service system...
Proceedings Article

Predicting Software Damage Rate from Cognitive Bias in Software Design Process

Noptanit Chotisarn, Nakornthip Prompoon
Software design process is one of the crit-ical processes in software development life cycle since it delivers a software de-sign specification basically used for im-plementation in order to deliver software meets user expectation. There are many tasks required different skills of design team members....
Proceedings Article

Mirror Assembly Controller Based on S7-200 PLC

Qiangqiang RONG, Jinhua DING, Xiaojing LEI, Yujun HU, Weifu WANG, Wenjing LI
Aimed at features of mirror assembly process, a mirror assembly controller with servo motor as actuators was developed, based on S7-200 PLC and position control module EM253. According to the working principle of mirror assembly, the mirror positioning, mirror frame orientation and manipulator working...
Proceedings Article

The Application of Cloud Computing Technology in the Construction of Cam-pus Network

Yongmei Zhang
As a trend of network development, cloud computing will play a major role in the construction and the application of campus network in the future. With regard to the problems in the campus network, such as the data storage, resource integration and data security, an in-depth analysis concerning the role...
Proceedings Article

BP Neural Networks Algorithm Applied in Electric Load Prediction

Ping Duan
After analyzing the meaning and ways of electric system load prediction, this essay illustrates the general theory of the BP neural networks and study the load pre-diction methods based on BP neural net-works. It analyzes the neural networks sample value methods, performs encum-brance for historical...
Proceedings Article

Research and Analysis on DM6446 Da Vinci Platform-based Face Recognition System

Xiaoqing Luo, Rong Hu
This paper mainly apply Da Vinci digital media processor DM6446 designed by TI Company as Central Processing Unit, which internally integrated dual-core, namely, ARM and DSP, it utilizes the high-speed data processing capacity of DSP for the operational processing of face recognition algorithm and performs...