Proceedings of the 4th International Conference on Information Technology and Management Innovation

Session: Computer science and technology

32 articles
Proceedings Article

TD-LTE Private Network Performance Analysis in Smart Grid

Ying Sun, Xuanni Lin, Yuqing Zhong
Smart Grid applications require an efficient, reliable and robust private communication network to achieve the ubiquitous and mutual transmission of power grid data such as distribution automation, smart metering and video surveillance. This paper investigates the wide-spread deployment of TD-LTE private...
Proceedings Article

Investigating the Energy Efficiency of TD-LTE Private Network

Ying Sun, Yuqing Zhong, Xuanni Lin
TD-LTE private network is embracing unprecedented popularity due to its support of broadband services and ease deployment. However, due to the limited applications of power industry and the more urgent bandwidth requirements of telecommunication industries, the availabe bandwidth TD-LTE private network...
Proceedings Article

Research on Wireless-Based Intrusion Detection in Mesh Network Security System

Kaifeng Wen
There are many issues concerning security in existing MESH network. In response to this phenomenon, this paper presents a research on wireless-based intrusion detection in mesh network security system. By combining the characteristics of intrusion detection, it rearranged the system architecture and...
Proceedings Article

Research and Application of Smart Operation Supporting System Based on Centralized Operation and Maintenance

Yang Bai, Yan-Sheng Lang, Yin Zhang, Ying Xing, Qiang Li, Cheng-Zhi Zhu, Cheng-Long Dou, Feng Han
The development and application of the SG-OSS (the Smart Grid Operation Supporting System) puts forward higher requirements towards the system operation and maintenance, and the operation model of SG-OSS has changed from traditional decentralized operation and maintenance mode to the centralized operation...
Proceedings Article

Dynamic change of the Yellow River Delta Using Historical Data and Remote Sensing Imagery

X.Y. Yu, W.J. Zhao, T.T. Yan
Historical data since 1855 and Landsat remote sensing images for the year 2006, 2009 and 2013 were selected as the main data sources and RS/GIS spatial analysis tools were combined to investigate the mouth channel change of Yellow River and monitor the dynamic change of Yellow River Delta. The results...
Proceedings Article

Orderly power utilization oriented twice clustering load data analysis

X. Chen, K. Shi, G.J. Xu, D.Z. Li, P. Xu, H. Ye
As the requirement of smart grid increasing, a twice clustering algorithm is proposed here to extract the characteristic of load data curve. In addition, the calculating algorithm of load performance is also provided to analyze the curves, including seasonal maximum load curve, seasonal safe load curve,...
Proceedings Article

Research on Object Detection based on Mathematical Morphology

S. Qian, G.R. Weng
An approach for object detection based on mathematical morphology is proposed in this paper. The features of objects are extracted through the analysis of images, and structuring elements with different shapes and sizes are selected according to the aim of experiments. After the image preprocessing,...
Proceedings Article

Solution of Automatic Control System Based on PLC in Decentralized Wastewater Treatment

Yang Wang, Yumin Shi, Jianlong Zhu, Yilin Fan
Decentralized wastewater increasingly serious, remote control of small scale wastewater treatment station operation has become urgent technology problems. This paper mainly introduces the component and function of automation system used in decentralized wastewater treatment and how to use PLC to achieve...
Proceedings Article

A study on the performance of PV/T system based on windows

X.P. Huan, S.G. Zhu, H.L. Zhang, X.Z. Liu, A.Z. Sun
A PV/T system based on windows is designed and fabricated to investigate the performance of PV/T system and the influence on the energy saving effect in Nanjing. A water-cooling device is installed behind the PV cells to improve the power generation efficiency and its cooling effect is better than air-cooling....
Proceedings Article

The Research of Online Analysis Computing Mode Considering the Integrated and Cooperative Multi-Level Dispatching Systems

Jing Li, Yadi Luo, Yansheng Lang, Qiang Li, Jinghuan Lin, Zhengping Chen
According to the wide distribution and regional stratification features of China's power dispatching automated system, this paper presents a framework and its application processes of online distributed computing in integrated and cooperative multi-level dispatching systems, which is based on the smart...
Proceedings Article

Discussion on the application of network technology in Construction Engineering Management

Zhi.Neng Tong
Network planning method has been widely used in engineering construction, it is in accordance with the engineering construction management requirements, especially for the project implemen-tation process organization and management. At present, the application of project management, especially the supervision...
Proceedings Article

WiFi Management for Dense Area

Xinyan Guo
WiFi is every where now. In many places such as: home, office and public areas, the user could easily access the network, surf the internet, view the online video clips, and download big data through WiFi. However, in current WiFi infrastructure, the devices within the vicinity have to share the channel...
Proceedings Article

An Complex Field Network Coding Scheme in Wireless Communication

Xiang Gao, Liming Wang
Complex field network coding (CFNC) is a new network coding approach proposed to improve network throughput and achieve full diversity gain in wireless networks. In this paper, a novel complex-field network coding scheme is developed based on cooperative communication. Different from traditional network...
Proceedings Article

The Design of OA System Border Security Architecture Based on Security Isolation and Information Exchange Technology

Jun Ji, Fei-Fei Xing, Yu-Qing Zang
According to the characteristics of OA system, the paper designs the protective system of network application boundary security isolation based on OA. The advanced security isolation exchange technology is applied to the OA system to protect the internal network security, and form full protection system...
Proceedings Article

An intelligent transportation system for hazardous materials based on the Internet of Things

Liming Cai, Wu Xia, Peng Li, Long Zhang, Jing Liu
Aiming at the lack of supervision and effective techniques in hazardous materials (Hazmat) transportation, in this paper, we use wireless sensor network (WSN), radio frequency identification (RFID), global positioning system (GPS), global system for mobile communication (GSM), geographic information...
Proceedings Article

The Design of Enterprise Network Information Sharing Scheme Based on Security Technology

Jun Ji, Fei-Fei Xing, Yu-Qing Zang
According to the characteristics of enterprise network system, the paper designs the network information protection system of security technology and divides network system. All kinds of safety equipments are applied to system, which forms full protection system architecture.
Proceedings Article

The Power Communication Access Application of Radio Over PON

Pengfei Yu, Xiaojian Zhang
This paper describes the demand of wireless communication technology from the perspective of development trend of electric power communication construction. And then this paper describes the advantages and disadvantages of micro base station and macro base station. At last, this paper put forward the...
Proceedings Article

Application of computer technology in medical image processing

Jinguo Wang, Na Wang, Haichun Ma
The computer application is becoming more and more widely. It has been applied in many aspects, such as scientific computing, information processing, artificial intelligence and computer communication. In recent years, the application of computer technology in medicine has become a hot research field,...
Proceedings Article

Implementation of Clock Network Based on Clock Mesh

Xin He, Xu Huang, Yujing Li
Clock network synthesis is an important part of digital integrate circuit design. For the purpose of further reducing the effect of clock skew and On-chip Variation, this paper realized a clock mesh structure by using Encounter EDI tool basing on traditional clock tree synthesis. Experiment results validated...
Proceedings Article

Research on the application of real time rendering technology in Chinese meticulous painting style

Yan Zhang, Aijin Li
The research of real sense graphics has made great progress in recent years.Not only the game screen has been able to achieve a very real effect in other fields such as virtual reality, 3D animation film and other fields have been fully applied with this technique.The development of non real sense graphics...
Proceedings Article

Get Network’s Disjoint MPs Based on Discrete Events Simulation

Jian Tang, Tao Han, Jianhu Yuan, Faming Shao
From the point of message transmission and processing, this paper puts forward a new disjoint Minimal Path sets (MPs) algorithm to get the disjoint MPs of networks and trys to realize it by means of Discrete Events Simulation (DES). In the new method, the arcs of CoA network are regarded as processing...
Proceedings Article

Design and application of Ad Hoc network system based on WIFI

Yueming Ming, Ze Zhang
This paper outlines the concept of Ad hoc networks and analysis of this type of network and application prospects of further development of today's society. The main starting point for the study and analyze routing protocols AODV routing protocol from its operational mechanism. With the Eclipse development...
Proceedings Article

Research on Technology of DRDS Distributed Database

Fang Wang, Guoyun Zhong
The full name of DRDS is Distributed Relational Data Service. It uses mysql protocol to interact with external system and it compatible with the most function of mysql. It looks like a mysql database service system, but it has favorable linear expansion and mass-data processing capacity. Furthermore...
Proceedings Article

Spectrum Allocation for Hyper-Dense Small Cell Networks: A Partially-Distributed Approach

Junfei Qiu, Zhiyong Du, Youming Sun, Ducheng Wu
In this paper, we investigate the problem of spectrum allocation for small cell networks with dense deployment of access points in large quantities. Since the formulated problem is intractable in the context of large-scale networks, finding the optimal solution is very complex. To tackle this issue,...
Proceedings Article

HG-MAC: A Energy-Efficient Protocol for M2M Network

Chang Xu, Cong Wang, Lingya Liu, Ning Li
The machine-to-machine network has become a leading solution in many important fields, such as battlefield surveillance, transport systems, industrial and agricultural automation. Typically, a M2M network consist of a large number of battery powered, concurrently access devices. Simplex MAC protocols...
Proceedings Article

The Technique of GIS Desktop Secondary Development

Mingkun Xu, Shiyun Zhou, Cheng Shuo
GIS is the abbreviation of Geographic Information System. GIS desktop is the GIS software platform running on the local computer. It is the core part of GIS product series. Secondary development of general desktop platform is the main approach to develop user specific GIS desktop. The secondary development...
Proceedings Article

Research on the security technology of big data information

Hong Zhu, Zheng Xu, Yingzhen Huang
The arrival of the era of big data, which is very important for building a good big data security system and improve the system of extreme defense measures. This paper presents six major issues of information security in the era of big data. It introduces the security technology of big data system, including...
Proceedings Article

Virtual Network Embedding in Elastic Optical Data Center Network

Aidong Su, Yongyi Zhang
The booming internet services urge the research on the cloud computing and the network resource utilization. The combination of elastic optical network and data center can solve the network resources deficient problem and the computing resources unbalanced problem. Virtual optical network embedding provides...
Proceedings Article

Research on dynamic management technology of mining products safety approval and certification based on UHF

Hongyao Wang, Jie Tian, Xin Cheng, Kehu Yang, Guodong Zhai
With the development of mine automation technology, more and more electronic products are installed in coal mine. In order to strengthen the safety management of the mine products, research on dynamic management technology of mining products safety approval and certification based on UHF is proposed...
Proceedings Article

Opportunistic Network Coding and Signal Combining ARQ for Two-Way DF Relay Network

Fei Wang, Dongmei Zhang, Kui Xu, Jingzhou Yang, Yang Liu
For the purpose of improving the throughput and reliability of the two way decode-and-forward (DF) relay networks, we propose an opportunistic network coding and signal combining (ONCSC) based automatic repeat request (ARQ) protocol. We assume that the relay node (RN) has a buffer which can store the...
Proceedings Article

A 3-D indoor AOA localization system based on geographic information database

Ze Zheng, Zhanliang Zhang, Guoru Ding
Angle-of-arrival (AOA) method is one of the popular methods for indoor localization, which plays well in the direct path case. However, the indoor environment is more complex, which means in most cases the direct path does not exist in most cases. To tackle this issue, in this paper, we propose a 3-D...
Proceedings Article

Enabling Smart Home Networks with ZigBee Technology

Siquan Hu, He Zhou, Chundong She
ZigBee technology is a short range, low-cost, low power-consumption and low data rate wireless sensor network technology, which makes it a suitable technology for smart home networks. In this paper we present a systematic method to construct smart home networks with ZigBee chip. Both hardware design...