Proceedings of the 2016 3rd International Conference on Materials Engineering, Manufacturing Technology and Control

Session: Computer Science and Engineering

161 articles
Proceedings Article

The Bloggers' Personality Traits Categorizing Algorithm Based on Text Features Analysis

Guohua Ou, Jingkai Li, Junjia Guo, Zhaoquan Cai, Mengping Lu
Nowadays, researches of blogs mining mainly concentrate on opinion mining, community mining, blogs recommendation system and so on, with little concentration on personalities mining. How to mine bloggers' personality accurately and effectively from the tremendous non-structural blog texts becomes a difficulty...
Proceedings Article

Farmland WSN Incremental Deployment Strategy Based on Signal Attenuation Model

Dayong Liu, Chunjiang Zhao, Huarui Wu, Feifei Li
This article discusses the partition node incremental deployment method in the wireless sensor network, which is divided into partition structure deployment, incremental deployment nodes and node position adjustment. It suggests how the partition node incremental deployment method might influence the...
Proceedings Article

Anti-addiction System Development Based on Android Smartphone

Xiafu Pan
Although the smartphone brings people more convenience and entertainment, many troubles are also caused, such as smartphone addiction problem. The smartphone gives rise to severe impacts on the life, study and work of users with poor self-control ability. Especially for those under age, smartphone addiction...
Proceedings Article

Application of Genetic Algorithms in Graph Theory and Optimization

Qiaoyan Yang, Qinghong Zeng
There will be a lot of NP- complete problems in graph theory and optimization process, as the most important problem in scientific engineering computing, now it is generally used genetic algorithm to solve. Therefore, this article will mainly study the basic theory of genetic algorithms and graph theory,...
Proceedings Article

Study on Open Source Software Based on Cloud Computing Platform

Long Zhu
With the constant development of science and technology and social progress, open source software provides the establishment of cloud computing platform for a lot of convenience and provides certain challenges for scientific and reasonable selection of application software. To analyze cloud computing...
Proceedings Article

Study and Application of Big Data Mining Based on Cloud Computing

Jie Shao
With the constant improvement of Chinese economic development level, there have been constantly increasing researches on artificial intelligence and database field and the application of data mining in each field has been increasingly wide. However, with the increase of information quantity and data...
Proceedings Article

Research on Moving Target Tracking and Information Filtering in Complex Building Environment

Xiangyi Bu
An algorithm of target tracking based on information filteringBook and particle filter is proposed in this paper. Accurate foreground region through the fusion of neighbour-information is segmented and features of foreground are extract to build an initial template for particle filter. The experimental...
Proceedings Article

Data Processing Method in the Application of the Mathematical Contest in Modeling

Xiaoling Xu
Mathematical modeling is a process to analyze and solve problems, as training students' mathematical contest in modeling ability of solving practical problems more and more get the attention of the colleges and universities. Numerical processing method is not only applied in the process of the model,...
Proceedings Article

3D Surface Reconstruction of Spinal Ultrasound Images Based on 2D Contour Line

Wang Jiang, Junhua Zhang
Methods of 3D reconstruction of medical images mainly included surface and volume reconstruction at present. In the experiment of 3D ultrasound reconstruction for spine of people, the result using volume reconstruction was unsatisfactory because of the ultrasound images' characteristic. So, we brought...
Proceedings Article

An Analysis of the methods of solving the finite sequence of convolution sum and circular convolution

Huajun Chen, Lina Yuan
The calculation of finite length sequences of convolution sum and circular convolution plays a significant role in the courses of "signal and system" and "digital signal processing".This paper mainly introduces three kinds of the methods of solving the finite sequence of convolution and and circular...
Proceedings Article

Energy Efficiency about Collaborative MIMO Technology

Huajun Chen, Lina Yuan
Main energy consumption of wireless sensor nodes is used to send and receive data. To take measures to reduce sending and receiving energy consumption of nodes plays an important role in decreasing energy consumption of the whole network. Researches show that: under the requirements of the same throughput,...
Proceedings Article

Contour Extraction Based on Deformable Model and Dynamic Programming

Cheng Zhao
In this paper, a new model for extraction of active contours of the quasi-circular targets in a given image which is based on edge detection and dynamic programming(DP) is proposed. In order to guarantee the detected closed contour approximating to the real contour of the target as well as possible,...
Proceedings Article

A hybrid ant colony optimization algorithm based on MapReduce

Ming Cai, Yongan Zuo
The traditional ant colony optimization(ACO) had defects in long searching time and convergence in local optima solution. To solve the problem, a hybrid ant colony optimization algorithm(HACO) was proposed in this paper. Two modes in HACO are defined that are DefaultModel and EliteModel. In order to...
Proceedings Article

A New Kalman Filtering Method to Resist Motion Model Error In Dynamic Positioning

Chengsong Zhou, Jing Peng, Wenxiang Liu, Feixue Wang
Against the disadvantage of traditional kalman filtering which is susceptible to the influence produced by the motion model error, this paper proposes a new kalman filtering method which can resist the motion model error. This new method uses the standardized residuals of the predictive position errors...
Proceedings Article

An Improved Single Sign-On Model: Design and Implementation

Degang Sun, Hui Deng, Rui Mao
The application of single-sign-on is a technology which aims to manage the access control of the internal systems of enterprises. The traditional single-sign-on models cannot simultaneously meet the requirements in implementation, manageability, system pressure, and security. In this paper, based on...
Proceedings Article

An Improved Decoder Motion Estimation Algorithm in Distributed Video Coding

Cunying Chen, Hua Zhang
This paper focuses on the theory of side information generation, and puts forward an improved scheme based on unsupervised learning of motion vector which improves system's performance. The scheme generates and optimizes side information through the introduction of rate control at the encoder and EM...
Proceedings Article

Evolving Fuzzy Classification System by a Quantum Particle Swarm Optimization Algorithm

Yunhui Zhu, Jun Sun
This paper discusses how to construct a fuzzy classification system (FCS) effectively and accurately. In the FCS, the initial fuzzy rules are optimized with a quantum bit which has many unique advantages such as small population size, fast convergence, short training time and strong global search ability....
Proceedings Article

Air Pollutant Source Location based on Zigbee Wireless Network and Optimized Least Square

Chengxiang Yin
This paper proposed an air pollutant source location system with the combination of the wireless sensor network (WSN) technology based on Zigbee wireless network and an optimized least square method. The system, which can realize the coarse location of the possible air pollutant sources, is illustrated...
Proceedings Article

Solar Shadow Positioning Algorithm

Wanqiao Wang
How to confirm the photographing location and the photographing date is an important aspect of video data analysis. Solar shadow positioning technique is a method to confirm the photographing location and date through analysis of solar shadow changes of objects in videos. According to the image-forming...
Proceedings Article

Wireless sensor network node localization algorithm based on chicken swarm optimization and multi-power mobile anchor

Peng Chen, Yongyi Mao
In order to enhance the statistic accuracy, a new algorithm based on chicken swarm optimization(CSO) and mobile anchor was established in WSN. Firstly, the distance measurement information of unknown nodes was acquired based on different power signal, which was launched by anchor moved in target area....
Proceedings Article

Design of Annotation system of Russian Speech Corpus Based on Crowdsourcing

Yanzhou Ma
Transliteration annotation in Russian speech recognition corpus has been always a problem which is difficult to resolve due to its time consuming, low efficiency and difficulty in personnel and quality control. This paper presents a technology based on crowdsourcing, designs the crowdsourcing platform...
Proceedings Article

Telemetry Data Transmission Method Based on Wireless Multi-Hop Network

Zhida Li, Ping Song, Chuangbo Hao
This paper proposes a telemetry data transmission method based on wireless multi-hop network. This method is based on a transmission network constituted by several wireless nodes and adopts modified ZigBee wireless communication protocol. In this method, the telemetry terminal and the gateway will coordinate...
Proceedings Article

A Data Preprocessing Optimization Method based on Sliding Time Window in Communication Alarm Events

Wengang Chen, WenWei Chen, Bing Fan, Runze Wu, Yanru Wang, Junli Fan
In communication fault analysis, mining history alarm data to acquire correlation knowledge has become an inevitable trend. Owing to low efficiency of traditional alarm preprocessing methods, a new preprocessing optimization method is proposed. The quality of alarm sequence partition is evaluated by...
Proceedings Article

Optimal control algorithm of safe Island defense model in distribution network with distributed generation

Qinggang Zhao
With the development of technology and people's awareness of environmental protection, more and more clean energy for power generation, such as wind power, photovoltaic power generation and so on. This type of energy is renewable and pollution-free, but it is intermittent,reliability and stability is...
Proceedings Article

A radar echo signal detection algorithm in low signal-to-noise ratio

Xiangju Li
According to the problem of radar echo signal detection in the low signal-to-noise rate, an improved detection algorithm of fractional Fourier transform detect signal after wavelet filtering is proposed. Because of the low detection performance of fractional Fourier transform in the low signal-to-noise...
Proceedings Article

The AF protocol of cooperative communication system

Lina Yuan, Jing Gong, Huajun Chen, Yiwang Huang
Wireless communication system using cooperative transmission technology, at the receiving node by combining data samples from multiple independent fading channel, can effectively resist the influence of channel fading, obtain diversity gain, and improve the transmission reliability of the system. The...
Proceedings Article

A high-resolution method for estimating the azimuth of infrasound signals

Liang Meng, Xihai Li, Dingxin Chen, Tingting Yang
The work described herein discusses the application of a high-resolution frequency wavenumber method-the Multiple Signal Classification (MUSIC) method which is different from the traditional frequency wavenumber (F-K) method for detecting and estimating the direction of travel (DOT) of infrasound. Synthetic...
Proceedings Article

Clustering Boundary Detecting Algorithm for Each Cluster

Kun Wang, Baozhi Qiu, Xiangdong Shen
Detecting the boundary of each cluster in a data set is a tough problem for many existed boundary detecting algorithms. In order to solve that problem, a clustering boundary detecting algorithm based on KNN and RKNN named CBDEC(Clustering Boundary Detecting Algorithm for Each Cluster: CBDEC) is proposed....
Proceedings Article

Vulnerability chain assessment for multiple vulnerabilities

Deqiang Qiu, Sujuan Qin
The dangers of a single vulnerability can be assessed by the CVSS, but in some cases, comprehensive harm of several vulnerabilities is 1 + 1> 2. So evaluating multiple vulnerabilities that are not just many single vulnerability assessments, but also integrated many complex situations. This paper studies...
Proceedings Article

A Study on Computerized Simulation of difference between CPM and CCPM

Fan Zhang
The constant delays of projects demonstrate that traditional project planning methods may adopt an inefficient way to manage uncertainty. To tackle problems in traditional project system, CCPM (Critical Chain Project Management) was introduced by Goldratt(1997) to identify both task dependence and resource...
Proceedings Article

A Collaborative Filtering Recommendation Algorithm Based On Conditional Entropy Trust Model

Yitao Wu, Xingming Zhang, Xiaofeng Qi, Erning Xiao, Liang Jin
The traditional collaborative recommendation algorithm doesn't take the non-linear dependence between users into consider, which is not accurate enough in prediction. The collaborative filtering algorithm based on entropy can measure the nonlinear characteristics of users, but it can't reasonably describe...
Proceedings Article

Design of high performance firewall based on multi-core network development platform

Wei-wei Zhang, Ming-gang Dong
The rapid development of network applications has brought great challenges to the design of the firewall. In order to improve the processing performance of the firewall, the design method of high performance firewall based on RMI multi-core network development platform is proposed. The hardware design...
Proceedings Article

A task scheduling algorithm based on Qos

Junwei Ge, Qingling Wang, Yiqiu Fang
The key problem of task scheduling is to give optimal matching schemes for tasks and resources. In the scheduling process, users pursue high quality and service providers favor high yields, so the high efficiency must be considered in the process of task scheduling. The author puts forward a task scheduling...
Proceedings Article

Virtual Network Embedding Based on Complex Network Theory

Junwei Ge, Ruizhi Yuan, Yiqiu Fang
How to effectively map the virtual network in the network infrastructure is a huge challenge in network virtualization. In this paper, for the first time, we evaluate the global network node weight according to the betweenness centrality based on random walks, then introduce cluster coefficient theory...
Proceedings Article

An effective solution of TCP Incast problem

Junwei Ge, Zhibin Zhao, Yiqiu Fang
Have sketched the current main mitigation methods for TCP incast problems in cloud computing data center networks,an effective method is put forward simultaneously, and the method is verified by NS2 simulation experiments.Analysis results show that this method can really alleviate the TCP incast problems,...
Proceedings Article

Research on Resource Scheduling based on Improved Mutation Operator in Cloud Computing

Junwei Ge, Fangfang Sun, Yiqiu Fang
With the increasing development of cloud computing,task scheduling problem become a crucial aspect.There are many scholars research on resource scheduling problems,but load balancing and scheduling in how to balance time and cost is still not achieved satisfactory results.Genetic algorithm(GA) has strong...
Proceedings Article

Design and implementation of logistics public information platform

Li Li, Jie Li
Targeting with problems of high total cost of social logistics and low level of modern logistic service in China,this paper develops public logistics information platform. The system structure of logistics public information platform is given. The information service interface, a third party integration...
Proceedings Article

A dynamic searchable encryption CP-ABE scheme in cloud storage

Yi Jiang, Hao Feng
In this paper, we constructed a dynamic searchable encryption CP-ABE scheme (DSE-CP-ABE) which is based on ciphertext index. The scheme combined the existing ciphertext strategy of access control scheme, extended inverted index structure, and introduced the trusted third party, which not only realized...
Proceedings Article

Research on the influencing factors of knowledge sharing in online virtual community

Deyang Yue, Huan Zhang
Knowledge sharing is a new phenomenon which appears with the development of Internet and virtual community, accompanied by members of the community the exchange and communication in the virtual community, knowledge sharing more and more attention. On the social identity theory and social network theory...
Proceedings Article

Privacy-preserving Communication for Vehicular with Multi Receiver Conditionally Anonymous Ring Signcryption

Qian Wang, Mingxing He, Xiao Zheng
In this paper, we propose a privacy preserving protocol based on multi - receiver conditional anonymous ring signcryption. The sender can not only send the same message to the selected multi-receiver and only selected users can correct to decrypt the message, but also receiver reality validate the identity...
Proceedings Article

Diffusion Model Based on Cellular Automata and Its Application

Jiaoyan Ai, Sizhi Wu, Zongming Wei, Haiyang Xu, Gang Liu
We adopt cellular automata, a kind of complex system modeling method which achieves macro-emergence through local transition rules, to build a diffusion model. We realize parallel computation of the model with MATLAB's matrix processing and develop a GUI for model running. Through adjusting the diffusion...
Proceedings Article

Research And Implementation of Iterative MapReduce Based On BP Algorithm

Yu Yang, Longjun Zhang
The Error Back Propagation is iterative, the way of implementing it using the iterative MapReduce framework is presented. To solve the shortage of the traditional MapReduce framework in iterative program, the iterative MapReduce framework has added a transmitting module. Through the simulation of the...
Proceedings Article

Design and Implementation of Office Automation System based on Web Service Framework and Data Mining Techniques

Huang He
Smart mobile devices, the application of the social network media and the information behavior main body of increasingly frequent activity, has produced in these types of equipment, media and behavior diversity, complex structure, a large number of unstructured data and semi-structured data quantity...
Proceedings Article

The Design Of Bluetooth Voice Source Wireless Real-time Voice Encryption System

Hai Hui Huang, Jiu Ran Liu, Yao Deng Wang
The paper proposes a new encryption method named as wireless bluetooth vioce source real-time encryption method which adopts encryption algorithm of improved Logistic mapping, in order to solve wiretapped problems, improve the security of the voice transmission and ensure the integrity of the voice signal.
Proceedings Article

Research on Influence of Tracking by Electromagnetic Wave Delay to pass through Different Transmission Line

Mingxin KOU
This text mainly introduced the TT&C&DDT down signal maximal-ratio combiner and target tracking voltage of angle error, analysis the influence of tracking by electromagnetic wave delay correction in different transmission line, given improvement viewpoint of BPSK signal tracking system by electromagnetic...
Proceedings Article

A test data generation method based on the symbolic execution of the dangerous path

Yongdang Meng
In this paper, the traditional high fuzzing blindness, code coverage is low, low efficiency and other shortcomings of the test case generation process a study by introducing symbolic execution techniques proposed test case generation method based on symbolic execution of the dangerous path, the method...
Proceedings Article

Research on the optimal synchronization parameter of Turbo code

Yonghe Su, Mingxin Kou
When a new monitoring and control system downstream data transmission frame using CCSDS data transmission frame structure, downlink data transmission rate information is less than 8Mbit/s, using Turbo coding, the best studied different synchronous code block lengths, different coding efficiency Turbo...
Proceedings Article

Tracking technology on phase of PN code in spread spectrum communication

Shaoshuai Wang, Zebo Zhu, Gang Fu
Pseudo code phase tracking spread spectrum signal, we studied DLL, pseudo code discriminator algorithms are analyzed, with an emphasis on pseudo-code tracking loop performance analysis and simulation, obtained a series of valuable conclusions , has very important significance for the loop bandwidth settings.
Proceedings Article

Research on a modified carrier capture based on frequency analysis

Yuming Zhu, Gangzhi Wu, Gang Fu
Eliminate the impact of information and data for the hopping carrier spectrum analysis based on parallel acquisition algorithm using trigonometric function transform method using three-point quadratic interpolation to refine the frequency estimate. By this method improved to improve the accuracy of the...
Proceedings Article

A new method of processing high-rate rocket telemetry data

Zebo Zhu, Jian Chen
Aimed at the problem of the ability of high-rate rocket telemetry data process is limited, this article analyses the characteristic of telemetry data process and put forward an architecture of distributed process. And the keys of system are explained which contain telemetry data mapped, data fused and...
Proceedings Article

Construction of information security evaluation index system

Cheng Cheng, Jingpeng Wu, Shuo You, Yanhui Zhou
As we all known, information security has become an important affecting factor about the development of information technology. To efficiently ensure the information security, it is necessary to take regular evaluation for the security situation of information system. However, the basis work of evaluation...
Proceedings Article

Research on Temperature Compensation Algorithm in Torque Sensor of E-bike

Xiadong Zhang, Yunfei Li, Juncheng Jia
When using torque sensor consisting of resistance strain gauge for the torque measurement in the E-bike, there is a nonlinear problem affected by temperature. In order to solve it, the surface fitting algorithm based on least-square method is proposed in this paper. Based on the error analysis of the...
Proceedings Article

Parallel Community Detection on Massive Graphs

Bing Tian
Community detection groups a network into node sets according to their connections. It is an effective way to understanding and analyzing graph-structured data, such as social networks, collaboration networks, and bioinformatic networks. With the flourishing development of social network applications,...
Proceedings Article

A Novel Method for Gaussian Wavelet Approximation

Hongmin Li, Yangdong Wang, Xiong Zeng
For analog VLSI implementation of continuous Gaussian wavelet transform based on CMOS integrator, a novel method for Gaussian wavelet approximation based on swarm optimization algorithm is proposed. Gaussian mother wavelet is approximated by a parameterized class of function. By using a particle swarm...
Proceedings Article

The study of the removal redundant association rules based on Hypergraph in Large data environment

Xin-liang Li, Li-yun Liu
This paper takes the high dimensional data for large data mining technology as the research object, using the adjacency matrix and directed hypergraph detection relationship between association rule items, explores the method, classification based on spanning tree removal algorithm for detection of large...
Proceedings Article

Simulation and analysis of the change of shadow length based on MATLAB for a period of time

Yanbo Wang
We can get the relation of the solar altitude and latitude, the angel of equator and latitude and the solar hour angle according to the knowledge of astronomy. Then establish a mathematical model for the length of the shadow of straight bar, in accordance with the relation of height, the length of shadow...
Proceedings Article

Research on the deficit irrigation scheduling to winter wheat at critical period based on crop modeling method

Ya-xu Wang, Hong-quan Sun, Juan Lv, Zhi-cheng Su
Less water at critical period has significant effect on crop yield. The deficit irrigation scheduling is important especially for the drought-prone area. The crop water production function frequently used for deficit irrigation analysis neither has the disadvantage in mechanism explanation. In this study,...
Proceedings Article

The Simulation Training System design program evaluation of communication equipment

Ping Gong, Xingcun Wu
According to the need to establish simulation training system of communication equipment, the paper proposes using fuzzy comprehensive evaluation method for quantitative evaluation of each alternative design program. Finally put forward the optimal design program.
Proceedings Article

A Tableau Decision Algorithm for Description Logic CATSbqr

Haifeng Liu
The graphical representation of the UML class diagram does not have a clear semantics, so that it is unable to auto detect the semantic errors in the model. To solve this problems, somebody provides a tools called description logic CATSbqr,which can transports the class diagram to CATSbqr knowledge base,...
Proceedings Article

The Optimal Search Region in the Sea

Xiaolei Zhang
The major assumption is that the main body of the crashed plane is complete and don't drift with flow. All the work units are not affected by weather conditions and obey the unified dispatch. The model, Determining search region, is based on the theory that the crashed plane obeys normal distribution...
Proceedings Article

Calculation of First-Level Maintenance Capacity in EMU Depot Based on the EMU Circulation Plan

Jia-nan Tong, Lei Nie, Zhen-huan He
The maintenance capacity of EMU depot(EMUD) not only depends on facilities such as washing tracks and maintenance tracks, but also depends on the EMU circulation plan(ECP). The first-level maintenance of EMU is the most usual one and is almost during night as the special situation of ECP in China, which...
Proceedings Article

Study on the pre-warning system of public opinion based on PCA and PSO-SVM

Xiaohong Hao, Kaicheng Gu, Boyu Meng
In "Internet+" era, how to real-time monitoring and build effective pre-warning systems of the network public opinion crisis has become a required courses for government departments and enterprises. This paper sufficiently considers the development,changes in laws and characteristics of the network public...
Proceedings Article

Detecting DDoS attack based on PSO Clustering algorithm

Xiaohong Hao, Boyu Meng, Kaicheng Gu
First, this article analyzes the Application layer Distributed Denial of Service(DDoS)'s attack principle and characteristic. According to the difference between normal users' browsing patterns and abnormal ones, user sessions are extracted from the web logs of normal users and similarities between different...
Proceedings Article

Information Flowing in Small-world network

Wang Cui
We build a small-world network model to evaluate the impact of information, regarding the participants as nodes, and taking the communication among participants as sides. We then propose the concept of importance degree of information and influence degree of participants to measure the ability of information...
Proceedings Article

Practical Assessment on Water Crisis Based on PSR and DCE

JiaYi Li
In this paper, a model is established to measure the water scarcity stage and the future water source situation. Firstly, a practical measure model is set up to evaluate the risk of water shortage in a certain area. The potential influencing factors are turned into 14 indexes. A serial of equations are...
Proceedings Article

A Resource Allocation Problem Based on GA-PSO Algorithm

Zheyu Guo
This paper proposes a scheme for resource allocation of taxi. Using SOM neural network divides the area into several areas, and calculating taxi transfer number for each area by using a method of dynamic subsidy and GA-PSO algorithm. Before and after comparing with the scheme of the taxi demand matching...
Proceedings Article

Application of VRP Model in the Transport of Water Resources in Henan Province

Ziqiao Wang
Considering the shortage of water resources in Henan Province ,we draw up an intervention program to mitigate water scarcity. The model described in this article is established for researches of transporting water from the Danjiangkou reservoir to Henan Province. The water movement reduces the uneven...
Proceedings Article

Three-dimensional modeling of knowledge space and application in the SWEBOK

Qian Ying, Liu Neng
The proposition of SWEBOK (Software Engineering Body of Knowledge) provides criterion for the organization and effective management of software engineering knowledge. How to use SWEBOK guide the learning of software engineering related professions has become a real question. This essay constructs an...
Proceedings Article

An improved ant colony foraging behavior modeling in the application of robot path planning problem

Jian Peng, Zhiwei Bao
In order to study and apply the ant foraging theory,this paper introduced the modeling method based on agent to construct the ant colony foraging behavior model. Through constructing many effective ant behavior rules,such as the path selection rules ,which was added the function of perceiving information,the...
Proceedings Article

An Effective Way to Process Linear Frequency Modulation Signal

Liangwei Feng, Jun Chen, Hao Wu, Feiyun Guan
WVD is most commonly used to do Signal processing in the time-frequency domain. Hough transform is a commonly used and classic way to do line detection. But in the field of engineering, there are higher demands for the speed of signal processing. Therefore, we could apply the Fast Hough Transform algorithm...
Proceedings Article

FRBR Based Multimedia Digital Library of Popular Multimedia News

Yantao Qiu, Xiaozhu Zou
In this paper, we propose the development of multimedia digital library of popular news based on Functional Requirements for Bibliographic Records. The main motivation of this paper is to study the digitization of popular news, focusing on the conceptual design of a changeable data model the system is...
Proceedings Article

Computer network reliability optimization design based on genetic algorithm

Liping Zhang
With the rapid development of network technology, especially the development of high-speed communication network, the scale of network becomes greater, the link capacity becomes higher and the link becomes more sparse, but network reliability research is also paid more attention by people. Paper introduces...
Proceedings Article

The application of QoS technology based on NGN network

Jinyi Zhou
To analyze the implementation scheme of NGN in QoS, and conclude the key principles and requirements for implementation of NGN network QoS. To put forward a design scheme of NGN dynamic QoS based on mobile agent. And the related principle of the scheme, key points are introduced. The mobile agent technology...
Proceedings Article

A Fast Active Location Detection Schema for Adversary Nodes in Wireless Networks

Siyu Zhan, Ying Wu, Yu Xiang, Guoming Lu
The growing interest in location based service and wireless security necessitates the development of an effective scheme which can actively locate the attackers. In this paper, a novel localization scheme is proposed, called F-ALD, which can actively locate attackers without depending on any signal features....
Proceedings Article

Simulation of Land Use Dynamic Change using selected driving factors based on the method of Feature Selection

Yao-xing Wang, Ting-ting Xu, Xuan Lv, Zhi-gang Zhang
Method of feature selection was used in this paper to select dirving factors before models of land use change carried out simulation.Two different scenarios were set inthe study area- main districts of Chongqing Scenario 1) carried out land use simulation involed all the factors 2)carried out land use...
Proceedings Article

Study on 3D-Micro discretization algorithm of 3D printing

Xuepeng Liu, Dongmei Zhao
The matching points relation of stereo-picture is built by adjacent slices through setting up mark for matching points conforming to three rules: Minimum Distance rule, evenly--Distributed rule and the Similar Figure Topological rule through reconstructing surface of microstructure. Based on the traditional...
Proceedings Article

Research on Regional Water Resources Development Threshold Model based on Rough Sets and the Support Vector Machine

Jianjun Wang
In this manuscript, we conduct research on regional water resources development threshold model based on rough sets and support vector machine. Through the analysis of the coupling system of economic and social interaction between water resources and sustainable development mode for the coupling system,...
Proceedings Article

The rescue strategy of the search for a losing aircraft by planes

An Wang
This paper solves the problem based on the accident of the lost Malaysian flight MH370. Because lacking of the flight data after the plane losing contact, we define an enough big object searching region. According to the search area all the recue planes can search one day and the distribution of the...
Proceedings Article

An Improved Optimization Algorithm for Timed Petri Net Based on Genetic Algorithm

Tingpeng Li, Nantian Wang, Yue Li, Yanling Qian
A variety of theoretical and practical work exists on Petri-net-based optimization algorithm. However, the efficiency of optimization is still the bottleneck of its application, especial for NP problem (e.g., Flexible Manufacturing System (FMS) scheduling problem). In order to improve the optimization...
Proceedings Article

Analysis and simulation on measurement error of costas loop

Yue Feng, Guangzhi Wu, Gang Fu
In receiver design, how to choose the loop phase detector and loop filter carrier tracking loop is critical. Due to the Doppler frequency difference uncertainty exists, the carrier phase direct capture a greater degree of difficulty, and the frequency was able to capture most quickly eliminate the Doppler...
Proceedings Article

Optimization of coherent integration algorithm on uniformly accelerated goal based on B-DCFT

Guiping Zhang, Yunxiang Jia, Gang Fu
Target uniformly accelerated motion, when SNR is almost zero, only using DCFT accumulation method can not achieve the goal of uniformly accelerated motion detection effective accumulation. To solve this problem, derivation and analysis of the echo signal model and the characteristics of the signal model...
Proceedings Article

Research on the internal development human resource management system

Xiao Gao, Xiaoxi Wang, Pin Lv, Ningning Huo, Xiao Xu, Fa Wang
Internal development human resource management system is a system which originated in Japan is considered a high performance human resource management system. A large number of Chinese enterprises, especially the state-owned monopoly enterprise have the typical characteristics of the internal development...
Proceedings Article

Numerical Simulations on Aerodynamic Characteristics of a Guided Rocket Projectile

Jiazhong Peng, Liangyu Zhao, Longyin Jiao
Aerodynamic characteristics of a guided rocket projectile are numerically simulated. Simulations are performed in a range of flight conditions using a commercial CFD software FLUENT, and variations of lift coefficients and drag coefficients with Mach numbers and angles of attack were demonstrated. The...
Proceedings Article

Study on Route Selection System of Heavy-Cargo Highway Transportation based on ArcGIS Engine

Yanei Zhou, Chuanhua Zeng, Fei Xian
In this paper, the route selection system of heavy-cargo highway transportation was the secondary developed based on ArcGIS Engine . The spatial data platform was set up by simulating the actual road network, and combined with quantitative analysis of the influence factors, a route planning model of...
Proceedings Article

Web-based real-time forensics system

Yong Xiong Shi, Tang Hao
With the development of the Internet, the network crimes emerge in an endless stream. In addition, the features of the content on the Internet are complex and changing, which create many serious difficulties for judiciary to gather evidence of network crimes. Based on analysis of the characteristics...
Proceedings Article

Numerical Evaluation of the Impact of Green Wall on the Outdoor Thermal Environment

Ming Jin, Jiying Liu, Linhua Zhang
Green Wall has an important effect on the outdoor thermal environment quality and the thermal comfort of pedestrian. Rational layout and green design can effectively alleviate the negative impact of "Heat Island", reducing the heating and air conditioning energy consumption of the buildings. This paper...
Proceedings Article

Research and Design on Information Service System framework of Performing Arts Equipment Industry

Wei Jiang, Rongjie Shi, Yujiang Jiang, Shaobo Wang
The state council calls for accelerating the development of science and technology service industry. To improve deficient information of existing domestic arts equipment website, this paper describes a system for the analysis of the relevant integrated Information Service System which is basic and essential....
Proceedings Article

The Robustness of Urban Rail Transit Network based on Complex Network Theory

Yiran Gu, Cheng Li
The research object is based on public rail transit network of two cities in China. The robustness analysis is carried out on the rail transit network which is constructed by the transfer stations. On the basis of the existing robustness evaluation indexes, we put forward alpha index and isolated node...
Proceedings Article

Design and Realization of Stored-Value Payment System

Ning Jiang, Xiao Dong Zhu
This paper intends to study and build deposit and payment platform System ,According to the feature of business requirements , The system has been designed on the basis of CORBA midware , Because the system needs to interact with the legacy systems of the telecom with which having different program languages...
Proceedings Article

Data Field-based Support Vector Machine for Image Classification

Yi Lin
In computer vision, object recognition is still a challenge. In this paper, a new method based on data field is proposed for image object classification with color histograms and diffusion distances. Among them, the topological potential is used to select the optimal parameters. The experimental results...
Proceedings Article

Multi-agent coalition in network public opinion monitoring based on cloud cultural algorithm

Sainan Liu
In the new media environment, the marketing strategy can be made better by constructing a cloud platform of network public opinion monitoring that has huge amounts of technologies. It would be cost a lot of time and money to search agent one by one for achieving the best coalition's behalf in such a...
Proceedings Article

B/S Based Design and Implementation of the Regulation Information System of Villages and Towns' Construction Lands' Market

Yingqiang Zhong, Yueming Hu, Ximing Li, Kai Lv
Based on the extensive investigations and using intelligent analysis, we have constructed an important index system, which demonstrates basic information, operation and types of supplements, situations of development and exploiting of lands, price of market trading and benefits of land investments of...
Proceedings Article

An Improved Uneven Multilayer Cluster Routing Algorithm for Homogeneous WSNs Based on Cooperative Relaying

Siran Wang, Yanxia Wang, Yunjian Tang
Aiming to alleviate the drawbacks of the existing power-aware routing algorithms caused by the hotspot problem and Near-Far problem, this paper propose an improved uneven clustering routing algorithm , named as Multilayer Cluster Routing based on Cooperative Relaying (MCRCR). This new algorithm protocol...
Proceedings Article

Clustering Nodes Selection Mechanism in Energy Heterogeneous Farmland Wireless Sensor Networks

Dayong Liu, Chunjiang Zhao, Huarui Wu, Feifei Li
Solar-powered nodes have been employed in farmland wireless sensor networks to prolong the lifetime, which can increase the cost at the same time. The energy acquisition mode of solar-powered node is intermittent and nonlinear, because it is easy to be influenced by the external factors. In this paper,...
Proceedings Article

A frequency estimation algorithm based on carrier detection scheme and MUSIC algorithm for DS/BPSK signals

Biwen Wang, Peng Liu, Jiyan Huang, Bo Wu, Guocai Mu
This paper presents a frequency estimator based on carrier detection scheme and MUSIC algorithm which can be used for a BPSK direct sequences spread spectrum signals systems . Under non-cooperative circumstance, the nonlinear carrier detection method is used to detect the presence of DS signal, and it...
Proceedings Article

A Scaling Method for Video Images Based on Nonlinear Curve

Shexiang Ma, Sibo Wang
When Digital Video image transformation from general screen (i.e., 4:3, etc.) to widescreen (i.e., 16:9, etc.), the source image aspect ratio will change, image resolution adjustment and format conversion is difficult. In this paper, a method of nonlinear scaling is proposed, aim to overcome the image...
Proceedings Article

Extracting Semantic-preserved Ontology from Relational Database

Songqing Wang, Zhuang Miao, Yingpeng Du, Yang Li, Jiabao Wang
To solve the problems that ontology is lack of semantic information in ontology extraction, the advantages and disadvantages of methods that building ontology from database are analyzed and we find that the maximum semantic ability of ER model is ALUIN. On the base of our research, a method of extracting...
Proceedings Article

Cost-Benefit Model and Benefit Distribution Mode of Critical-Peak Pricing

Bin Yang, Wenjun Ruan, Chu Chen, Yusun Luo, Jiaqi Hu
In this paper, the cost and benefit of different participants in critical-peak pricing project are analyzed. Cost-benefit models of power generation company, power grid company, power consumers and government departments are established. Furthermore, benefit distribution modes of different stages in...
Proceedings Article

The whole Process of Quality Supervision and Management to Scientific Research Project of Armored Equipment

Di Wang, He Cui
Armored equipment is an important component of the army, armored equipment scientific research is the main way for equipment support. Modern war with the advanced nature of the armored equipment, reliability, security and protection are also put forward higher requirements, improve the quality of armored...
Proceedings Article

Continuous Molecular Communication in one dimensional situation

Pengfei Lu, Zhenqiang Wu
Molecular Communication as the most potential methods to solve the communication in nano scale, for its derived from nature, and it becomes more and more prevalent. Though molecular communication happens in three dimensional situation, there are also some situation that are in the one dimensional situation,...
Proceedings Article

Application of Improved Fuzzy C-means Clustering Analysis Method of Load Characteristics Stats

Lin Li, Dong Liu, Ying Du, Junli Liu
Power load is the active part of safe and stable operation of the entire power system. Establishing realistic dynamic load model is important meaning for power system planning and operation. In this paper practical load modeling idea is adopted for clustering analysis of the data of load characteristics...
Proceedings Article

A new Boosting algorithm used in intrusion detection

Zhixin Cai, Xiufen Fu
At this stage, the high dimension and large variety of network data have increased the difficulty of intrusion detection. In this paper, we discuss the advantages and disadvantages of the MDBoost algorithm. Subsequently to optimize it, we add a slack variable in the objective function, so that the algorithm...
Proceedings Article

On Application Of A New Ant Colony Algorithm Model In Technology Foresight

Zhao Liu, Mei Zhang, Xia Xu
With the pace of development of science and technology continue to accelerate, the traditional technology foresight has been often limited by it's long cycle period and large expend. This paper presents a new model in a traditional method acting that --- Ant Colony Algorithm. Facing the basis problem,...
Proceedings Article

A Novel Quantum-Inspired Approximate Dynamic Programming Algorithm for Unit Commitment Problems

Hua Qin
A novel quantum-inspired approximate dynamic programming algorithm (ADP) is proposed for solving unit commitment (UC) problems. The quantum computing theory is applied to tackle some new issues rising from ADP. In details, the unit states in UC problems are expressed by the quantum superposition. Then,...
Proceedings Article

Event Handling Mechanism based on Active Rule for Internet of Things

Biao Dong, Jinhui Chen
This paper presents an approach, called IECA, for modeling and implementing the architecture of Internet of Things(IoT) applications using an active rule-based model. Considering the effective collaboration and the quick response which are necessary for IoT information sharing and service provisioning,...
Proceedings Article

Application of Risk Factor Analysis Method in Bid Quotation

Ji-feng Zuo, Xue-chang Wang, Xuefei Li
In this paper, a new method of weight determination and fuzzy mathematics is introduced, and the characteristics of risk factors of project bidding quotation are introduced, and a quantitative method for the risk analysis of bidding quotation is put forward.
Proceedings Article

Related Discussion on Agent-oriented Programming

Yan Hou
With the continuous development of computer technology in recent years, Agent system is considered to be a new and effective technology in the complex system development process, which is supportive in open environment. Therefore, much attention has been paid to Agent-oriented program design, and AOP...
Proceedings Article

Construction of Supply Chain of Fresh Agricultural Products of CR Vanguard Supermarket Based on Computer Information Platform

Peng Zhang, Jian Kang
Supermarket chain supermarket fresh agricultural products logistics has always been the main reason for increasing the cost of supermarket, on the basis of information system theory, the modern computer technology is used to build information platform, improve the supply of fresh agricultural products...
Proceedings Article

Optimization of Ex-warehouse and Warehousing for Logistics Park Based on Computer Simulation

Yan-mei Yang, Xin-jun Liu
The logistics industry is regarded as a new product of the new time, and it is quickly covering most of the region. This paper is devoted to simulate the operation process of logistics park, the Arena modeling is used to construct the ex-warehouse and warehousing model of logistics park for its more...
Proceedings Article

Design of One Line Bus Monitoring System Mine Stratum Freezing Based on Database

Xin-jun Liu, Dong-ling Wu
The observation of the frozen wall cannot be directly monitored, and it is needed to take an effective monitoring system to monitor. This paper presents the application of the one line bus technology to develop the mine ground freezing monitoring system, and the system is introduced in detail. By combining...
Proceedings Article

Reliability Allocation Method of Production Line Based on Fuzzy Comprehensive Evaluation

Guofa Li, Chao Hou, Guofei Liu, Yuhui Jia, Chang Liu, Jinghua Dong
A fuzzy comprehensive evaluation model was built to allocate the reliability of production line combined with the actual case studies. The production rate was converted to inherent availability in the calculation. Considering the buffer, we corrected the allocation index. Combined the opinion of relevant...
Proceedings Article

The Effective Application of Cloud Computing Technology in Large Data User Behavior Engine Design

Wenmeng He
With the constant development of socialist modernization construction in our country, our country's computer information technology has made effective progress, and makes the world into an information age. People's production and life style experience a series of change. However, with the emergence of...
Proceedings Article

The Influence Factors Research of Music Therapy and Information Technology in High Blood Pressure Patients' Bad Emotions and Cognition

Yan Liu, Yafen Wu, Li-li Wan
This paper's objective is to study the influence of music therapy and information technology on bad feelings and cognition of high blood pressure patients. The method adopted is to make a retrospective analysis of 100 cases medical records of patients with high blood pressure admitted in a hospital....
Proceedings Article

Data Fusion for Free-form Surfaces in Reverse Engineering

Peng-xin Liu, Hai-li Jia, Zhao Wei
Reverse engineering is a design process going from a physical or clay model to a digital model. The first step in reverse engineering is part digitization, and its precision and efficiency all will influence the reconstructed surface qualify. In this paper a date fusion method for free-form surfaces...
Proceedings Article

Robust Optimization Model of Project Scheduling Problem Based on Genetic Algorithm

Dayong Wang, Xiangyang Li, Bingxiu Fang, Jinling Chou
A robust optimization model of resource-constrained critical chain project scheduling problem is introduced. Stochastic programming method is used to describe the uncertainty of activity duration. Based on the traditional critical chain project scheduling mode, a genetic algorithm is introduced, and...
Proceedings Article

Research on Algorithm Based on Secure Computer Network Defense

Jifeng Tian
In order to solve the problems that the network security defense measures are independent, passive and lagging, and anomaly detection needs an effective training set, a scalable dynamic compound virtual network framework and strategy for active defense is designed and realized in this paper, a classification...
Proceedings Article

The Application Research of Ant Colony Algorithm in Search Engine

Jian Lan Liu, Li Zhu
The Internet will produce large amounts of information every day. How to effectively manage the information resources has become the key to improve the level of network application. Search engine is a software system applied in the web, which is an important tool for retrieving network information. It...
Proceedings Article

Simulation of big data balanced scheduling model in cloud computing environment

Jinyi Zhou
in the process of the research on the modeling method of big data balanced scheduling, using the current algorithm to establish a big data balanced scheduling model, the data scheduling is easy to fall into local optimal solution, and there is a problem of big modeling error. To this end, a big data...
Proceedings Article

The researching of the airport intelligent information network construction and power control which based on 4G technology

Xun Wang, Lei Chen, Yingjie Du, Jiale Cai
According to the needs of intelligent and information management of modern airport , planning and implementation of the information platform of intelligent network system of Airport in southwest China. The backbone of this network structure using fiber ring network, wireless access network using TD-LTE...
Proceedings Article

Extracting Clinical entities and their assertions from Chinese Electronic Medical Records Based on Machine Learning

Jianhong Wang, Yousong Peng, Bin Liu, Zhiqiang Wu, Lizong Deng, Taijiao Jiang
With the rapid growth of electronic medical records (EMRs) in China, large amounts of clinical data have been accumulated. However, limited work for extracting information from EMRs in Chinese has been conducted. In this work, using manually annotated dataset of EMRs in Chinese, we investigated the clinical...
Proceedings Article

Rain fall predict and comparing research based on Arcgis and BP neural network

Zimo Guan, Ziyu Tian, Yushi Xu, Han Dai
Based on the data of the rainfall from 24 base stations on the area of Chao River Basin in the near 54 years(range from 1958 to 2012) , the estimation is carried out by using Arcgis kriging interpolation and BP algorithms. And try to do the error analysis and the consequences comparing of these two results...
Proceedings Article

Travel Plan Design Based on Graph Theory and Multiple Linear Regression Equation Model

Yifeng Dou, Hailing Xiong
Different families have different needs for tours. In order to solve the problem, this paper firstly creates a table which takes all determining varieties into consideration. By adopting principal component for analyzing and filtrating the main factors, the conclusion is as follow: the first principal...
Proceedings Article

A New Method for Knot Placement of B-Spline Curve Approximation and Interpolation

Wei Wang, Fazhong Shi, Gang Zhao, Xiaoxiao Du
A new knot placement method for B-Spline curve fitting to a set of ordered points is presented in this paper. It is a unified explicit formula that applies to both approximation and interpolation. The experiments designed by authors show that this method is effective and it has the advantage of keeping...
Proceedings Article

A friend recommendation algorithm based on the user relationship

Qi Shen, Sibo Wang, Ran Wang, Ke Cao
In recent years, the micro blog in the social networks in China is becoming more and more important, people use micro blog more frequent, people can follow to the people they want to know, and people who have common interests. Based on the analysis and research of the existing micro blog friend recommendation...
Proceedings Article

Feedback-based Dynamically Weighted BoF for Image Retrieval

Yanyan Gao, Yingqian Jia, Ning Li, Li Li
Bag of Features (BoF) has been successfully exploited in content-based image retrieval for several years. Due to its performance and popularity, several extensions have been proposed that involve feature description, dictionary building, feature encoding and post-query process, etc. This paper proposes...
Proceedings Article

A Group of Design Principles and Testing Methods for Improving Software Quality

Yaqi Zhang, Zhiping Jiang, Yan Lin
This paper raises a group of software principles, which have higher operability and can improve the robustness, reliability, maintainability, etc, of software, as well, the article gives specific advice on testing method for each principle.
Proceedings Article

Study on evaluation method of machine translation quality based on questionnaires and data analysis

Yiqun Sun, Minkang Zhou
In order to do a global evaluation of translation software and compare their differences within specific indicators, the study applied Euclidean distance and cosine similarity to evaluate 4 commonly used translation software tools, based on the analysis of the data from the questionnaire. The results...
Proceedings Article

Research and Implementation of mobile context-aware music playlist recommendation system

Qi Shen, Ran Wang
Music recommendation system helps users to find the music they like quickly. This paper proposed a new way to recommend music playlist combined with the user's context and their similar user's music favor. Then research the technology of the mobile context-aware playlist recommendation system in detail...
Proceedings Article

Image Registration Method Based On Edge Phase Correlation Algorithm

Qing Zhou, Cheng Yang, Lingyun Wan, Ying Zhang, Xiaolong Zhou, Xin Wan, Jiayu Xu, Huaiyuan Liu, Hong Hu
In this paper, a new algorithm being put forward can handle multiple targets identification and location respectively in reference image, with an ability of resistance to rotation, being able to perform angle estimation, and subpixel accuracy location. This paper uses optimized edge phase correlation...
Proceedings Article

Design and Implementation of Tourist Landmarks Recommending System

Shengfu Zou, Chuan Guo, Kaixuan Ji, Yang Gao, Hongwei Zhao
This paper presents the design and implementation of a tourist landmarks recommending system, which adopts the content-based image retrieval technology. The traditional text-based image retrieval technology has been hardly satisfying the users' requirements. To lower the cost, this system uses B/S architecture,...
Proceedings Article

A vehicle detection algorithm based on the multi-sensors fusion and multi-vision-features

Lu Jin, Xiao Kang, Yue Wu
With the importance of drive assistant system in intelligent vehicle, the vehicle detection fusing multi-sensors and multi-vision features is provided. The vehicle detection algorithm is composed of two steps. Firstly, the vision sensor and millimeter wave radar sensor are used, and with space transform...
Proceedings Article

Research and Implementation on the credibility of user behavior Based on behavior declaration

Xuejun Yu, Haigeng Lv
In today's Internet era, as the Web site was attacked continuously, the credibility of the software shows more important. The credibility of the software mainly refers to the behavior of software at run time is consistent with the expected behavior, which is a special form of software quality. This paper...
Proceedings Article

Research on satellite communication network based on PCC architecture

Xiao Yu, Jinfeng Zhao, Lai Wei, Ruiyu Guo
In the conventional satellite communication networking process, face with many problems, such as resource utilization is not high, QoS is weak, lack of real-time dynamic adjustment to link. PCC architecture-based satellite communications network model through a secure channel to receive channel real-time...
Proceedings Article

DCFF: a container forensics framework based on Docker

Jiang Du, Sheng Wu
As a lightweight and flexible virtualization technology, container virtualization has been adopted by more and more platform as a service (PaaS) system. With the popularity of container virtualization and PaaS, cloud forensics need to find a way of extracting integrate and reliable data from containers....
Proceedings Article

Image splicing detection method based on particle swarm optimization (PSO) algorithm

Ling Gan, Xiao Liu, Kuanzhong Zou
Splicing is copy-move operation on different image, and it is one of the most commonly used operations of image tampering. Aiming at the poor performance on detection, a kind of image splicing detection method based on particle swarm algorithm is proposed. First, we extracted two different image features:...
Proceedings Article

Research on Fault-Tolerant Routing Mechanism of NoC

Guowei Hou, Lixin Yu, Liguo Song, Heping Peng, Wei Zhuang
With reducing feature size of transistors and increasing of cores on a single chip, to overcome poor scalability and bandwidth limitation on a single bus, Network-on-Chip (NoC) has been proposed. However, reliability of Multiprocessor system based on Network-on-Chip (NoC) has become a significant challenge...
Proceedings Article

Measuring and Modeling the Bidirectional Reflection Distribution Function of Space Object's Surface Material

Peng LI, Zhi LI, Can XU
Bidirectional reflection distribution function (BRDF) is broadly used in many fields, such as physics, remote sensing, computer graphics and scattering in optical band and microwave band. The BRDF measurement instrument used to obtain raw measurement data is presented firstly. The BRDF data of two typical...
Proceedings Article

The minimum distance diagram and diameter of undirected double-loop networks

Ying Li, Yebin Chen, Weipeng Tai, Renwei Wang
This thesis proposes a minimum distance diagram of undirected double-loop, which makes use of the cyclic graph's excellent properties on the node number and path length to achieve high performance. Main issues include the method to build the minimum distance diagram of undirected double-loop networks,...
Proceedings Article

A Novel Data Mining Algorithm based on BP Neural Network and Its Applications on Stock Price Prediction

Shu Zhan, Weihao Li, Xuan Zhuang
As an indispensable part in financial industry, stock investment has gradually become more and more important in people's life. The major fluctuation in stock market directly affects the stability of financial markets and the healthy development of the economy. The successful stock price and trend prediction...
Proceedings Article

A locating method based on the Anselin elocal spatial autocorrelation model which researches in the heavy metal pollution source

Jinming Fu, Yuanfan Li
Based on the given data of As content in the soil ,using Log transformation, the Box-Cox transformation to exclude outlier for preprocessing data to meet the normal distribution.Using Anselin elocal spatial autocorrelation model to carry on local spatial clustering in order to cluster the similar attribute...
Proceedings Article

Security Analysis of Cloud Computing in the Mobile Internet Environment

Mingwan Luo
In order to improve the benefits of the mobile cloud computing network and the quality of the security service of the mobile cloud computing, this paper aims to make a design of the control framework of the cloud computing resources of the cloud computing security service among its service domains, and...
Proceedings Article

The Use of Persona in Recommendation System and Privacy Protection

Suduo Li, Kaiying Deng, Jingwei Deng, Yingxing Li
Aimed at the contradiction between personalized recommendation and privacy protection, this paper puts forward the basic idea of persona, a digitalized user model. The method uses browser to analyze user's access behavior, gets a comprehensive and accurate user model, so as to help realize the personalized...
Proceedings Article

Design and Implementation of the Evaluation System of the Theatre

Wei Jiang, Xiru Guan, Yujian Jiang, Shaobo Wang
The evaluation system of the theater is based on user data, professional evaluation and audience comments, and we use web technology to build the system. In this paper, the framework, function and technical design of the evaluation system of the theatre are presented. Thebootstrap is used to buildthe...
Proceedings Article

Active Contour Model Based on Nonlocal Means Method For Color Texture Segmentation

Jingge Lu, Guodong Wang, Zhenkuan Pan
Color texture segmentation is a very important subject in the fields of computer vision. In order to segment the color textures, a new method based on active contour model with nonlocal Tikhonov regularization is proposed. In detail, another smoothness item which is the Tikhonov regularization is added...
Proceedings Article

Improvement of Live Migration mechanism for Virtual Machine based on Pre-copy

Yiqiu Fang, Yuyang Chen, Junwei Ge
Pre-copy algorithm based on probability prediction could predict the probability of memory pages becoming dirty and avoid the repeated transfer a large number of dirty pages. However, when the dirty pages increase dramatically, prediction of probability will fail. To solve this problem, an Adaptive Bandwidth...
Proceedings Article

Application of Dynamic Database in the DPSA of Equipment System

Xin Ren
To compare with the traditional PSA, the DPSA (dynamic PSA) can well solve the problems containing dynamic factors of time, process variables personnel operating behavior. The reliability data is the basis of DPSA, and the quality of DPSA largely depends on the quality of input data. The system composition,...
Proceedings Article

Nursing Home Integrated Management System Based on ZigBee Technology

KaiYuan Meng, XuanYu Zhang, QingNian Cao
In recent years, with the degree of the aged phenomenon becoming more serious, the nursing homes are developing rapidly, the scale is expanding and the management also tends to intelligent gradually. For the care and management requirement, a location-help system for the elderly based on ZigBee is designed...
Proceedings Article

An Improved Optimization Algorithm Combined Model Parameterization and Sequential Quadratic Programming

Weiwei Bian, Zhenfang Xin
According to the nonlinear problem of the trajectory optimization problem of rocket projectile, an improved optimization algorithm combined the direct model parameterization method and the sequential quadratic programming method was proposed. The direct numerical method was presented to converts the...
Proceedings Article

Private Cloud Computing Platform Design Research Based on Network Virtualization Technology

Shihong Zhang
In order to increase the hardware resource utilization of the distributed cluster system, this paper, in combination with network virtualization technology, will put forward a private cloud platform implementation scheme based on a variety of flamework techniques. The scheme can focus the underlying...
Proceedings Article

Research of the Rule Engine based on XML

Ni Zhao, Lifang Bai
As Studying of the current rule engine implementation mechanism, An XML format rules is put forward for the poor ability in the predicate expansion and the rule reuse of the traditional rule description, which can describe of the detail interface information called by entity class in rules, and the improved...
Proceedings Article

Predictions on Seaports Freight Throughput based on the Extreme Learning Machine Neural Network

Nan Yao
The researches and predictions on seaports freight throughput in China have become increasingly important as the fast growth of Chinese economy and the development of "the Silk Road Economic Belt and the 21st-Century Maritime Silk Road". Extreme Learning Machine, a relatively new neural network algorithm...
Proceedings Article

Research on College English Video Learning System Based on Streaming Media Technology

Dan Liu
Streaming media is a, downloading while playing, immediately streaming technology that used in the continuous time base media streaming transmission technology to transmit data stream. This article is based on streaming media technology research, provide a new research scheme for the video of college...
Proceedings Article

Development on Construction Project Cost System Based on Spring

Nannan Zhang, Wanqing Yang
Spring is to solve the common problem in many J2EE development, and can replace strong lightweight framework in the EJB technology. Based on Spring development construction project cost system, to improve the competitiveness of building enterprise and information technology services. First of all, based...
Proceedings Article

Database Design on Construction Project Cost System

Nannan Zhang, Wenfeng Song
Construction project cost management is an important part of the construction project management, for the problem existed in the traditional construction project cost management developing construction project cost system to improve the level of management and information. Based on the DB2 database management...
Proceedings Article

Design on Japanese Multimedia Listening System Based on VB.NET

Hao Zhuo
Multimedia technology is to point to by computer to text, data, graphics, images, animation, sound and other media information integrated processing, the user can through a variety of sensory real-time information interaction with the computer technology. Japanese multimedia hearing system is designed...
Proceedings Article

Research on the Architecture of Urban Emergency System Based on GIS

Zhe Li, Xiang Teng
Architecture technology is development model based on some sort of application, offers a wide range of software reuse to provide a unified software development kit for developers and model architecture. First, research the infrastructure consists of Core layer, organization layer, communication layer,...
Proceedings Article

An Independent Component Recovery Approach for Intrusion Tolerance

Jianhua Huang, Yang Liu, Yi Jin, Shalin Huang
An independent component recovery approach for intrusion tolerance is proposed in this paper. Virtual Machines (VMs) are used to provide each online replica with an independent backup replica. The recovery of each component depends on the actual service state. A strict execution order is not needed to...
Proceedings Article

Design and Implementation of Higher Vocational English Writing and Training Testing System

Liang LI
English writing is the main tool for testing vocational colleges students' English ability to learn and use English, which is also an important reference index to test students' English practical application ability. In order to enhance the level of higher vocational college students' English writing...
Proceedings Article

Design and Application of Computer-aided English Online Examination System

DeChang Nong
With the popularization of computer, computer-aided examination by has becoming the hot topic of studies. In English teaching and testing, using the computer aided test system to test the English ability of students has been a trend. In this paper, computer aided English exam system both at home and...
Proceedings Article

Study of Key Technologies of Insurance Claims Based on Data Mining

Wei Su
As people's income level rises and the changes of consumer consciousness, the number of insurance product is increasing, the public enthusiasm for buying insurance is higher and higher, as a result the insurance industry is developing rapidly. At the same time, policymakers should notice when gaining...
Proceedings Article

Financial Information Fusion and service Platform Based on Cloud Computing

Wei Su
Cloud computing is the important form of information service infrastructure and application model in the age of the Internet, is a new generation of information technology intensive development inevitable trend, its resource aggregation and virtualization, application services, and flexible specialization,...