Proceedings of the 3rd International Conference on Mechatronics and Industrial Informatics
Session: Computer science and technology
24 articles
Proceedings Article
Echo Modeling and Simulation Analysis of Millimeter Wave Proximity Fuze
Jie Zhou, Quanli Ning, Chunsheng Hu
This Start research on the scattering mechanism of ground object target, the scattering of the far zone and the near region is defined, and the scattering characteristics of the target is analyzed.Using the distance-Doppler method to divide the fuze beam radiation area, the fuze echo model is established...
Proceedings Article
Design of spectrometer based on the Internet of things
Longyang Zheng, Jie Sun, Haiqiang Wu
The features, architecture, hardware connection, application software and the transfer protocol about the spectrometer based on the internet of things are presented in this paper. Applying the technology of the internet of things, it can enhance the real-time and remote control ability of spectrometer,...
Proceedings Article
The application of BP neural network in the safety warning of gas stations
Qiao Li, Yu Jin
In this paper, we analyze the current situation of gas filling station, find out the risk factors affecting the safety of gas stations, and propose a new algorithm based on BP neural network model. With the historical monitoring data of gas filling stations, BP neural network model can be used to approximate...
Proceedings Article
Navigation Mode Study of Mobile Application Based On Eye Tracking Technology
Jiuqiang Fu
Instances in this paper summarize six basic interface navigation modes of mobile application interfaces, analyze these six interface navigation modes’ scenarios and features from information display and interactive operation, and most of the mobile phone interface structures base on and derive from them...
Proceedings Article
Improvements on Proxying and Cache Scheme of CoAP Protocol for IPv6-Based Wireless Sensor Networks
Ping Wang, Xin Li, Heng Wang, Na Bao
For the IPv6-based Wireless Sensor Networks (WSN), there exists a difficulty in applying Internet protocol into Internet of Things (IoT) due to the constrained resources. Constrained Application Protocol (CoAP) is a lightweight protocol which is proposed and standardized by Internet Engineering Task...
Proceedings Article
Research on Mutation Parameters of Cloud Evolutionary Strategy
Ziqiang Luo, Peng Cao, Bin Wen, Yu Zhang
The cloud evolutionary strategy is a novel rapid evolutionary algorithm based on the outstanding characteristics of the cloud model on the process of transforming a qualitative concept to a set of quantitative numerical values. The paper conducts the mathematical analysis of cloud distribution with the...
Proceedings Article
Research On A Multi-Missile Distributed Cooperative Guidance Method Based On Dynamic Network
Jiyang Dai, Wenhua Li, Baojian Yang, Junqiang Xiong
To solve the problem of multi-missile cooperative control for dynamic networks, a method of dynamic network analysis based on graph theory is proposed, the multi-missile flight states are analyzed with the connectivity of missile network; the variable time is added to the traditional proportional navigation...
Proceedings Article
Research on Similarity in Software Cost Estimation
Xueli Ren, Yubiao Dai
The collaborative filtering techniques is applied to cost estimation of software projects in the paper, and four methods to calculate similarity in collaborative filtering are introduced which are cosine similarity, Euclidean distance, adjusted cosine similarity and correlation correction similarity....
Proceedings Article
Research on Project Management system of Large Complex Construction Projects Based on cloudDB
Jian-Jun Han, Wen-Xia Li, Cheng Yu
This paper begins with analyzing the characteristics of large and complex project management systems and creatively puts forward constructing a large, complex project management system by usingcloud databases. Afterwards, the structure chart and functional diagram of large and complex project management...
Proceedings Article
The Emergency Rush Repair Handling Design of a Certain Type Special Operation Computer
Junxian Liu, Wei Zhang, Dawei Wang, Xiaofang Lou, Hang Xiao
The stereotype and long-time usage of a special operation computer lead to frequent glitches, great difficulty in troubleshooting and maintenance and support, and so on. Because of its key status and role, it is necessary to make emergency rush repair of it. Therefore, in this paper, based on the study...
Proceedings Article
Analysis of Space-Ground Integrated Information Network Architecture and Protocol
Yong Zhou, Chundong She, Ligang Fei, Kaiming Liu
As the core carrier of information acquisition, distribution, transmission and application in the future, Space-Ground Integrated Information Network SGIIN will play a very important role in the development of national economy and society. Operation environment and the diversity application of SGIIN...
Proceedings Article
Library and University Data Analysis Using Data Detection
Yuqing Shi, Yuelong Zhu
Library data are always hard to analyze because the datasets may be very large, and these data come from unconnected sources. This paper used data detection to identify academic library use patterns and to judge whether students' grade point average correlated to academic library use. All datasets of...
Proceedings Article
Study on Group Decision Support System for Bank Loan Project of Engineering Machinery Enterprise Based on Cloud Model
Xuanhua Xu, Zhijiao Du, Ying Chen
Bank loan is an important way of enterprise financing. With an aim at the characteristics of decision about engineering machinery enterprise bank loan, such as multi-indexes and complexity, a kind of structure of group decision support system for bank loan project of engineering machinery enterprise...
Proceedings Article
PRFC A New Programmable Router Architecture Providing Flexible Customization for Service
Yan Zhang, Jian-Yang Huang
The current routing mechanism is more and more difficult to satisfy the various service demands due to the rigid structure and simple ability. Aimed at this problem, this paper proposes a new programmable router architecture to support diverse applications and emerging communication paradigms—PRFC. PRFC...
Proceedings Article
Service Routing Analysis in Optical Network with Algebraic Decision Diagram
Zhimin Xiang, Yongwei Chen, Jin Liu, Xiaoxiao Wo
The existing research results show that in the network configuration section WC can get close to the performance of the whole wavelength conversion network. The design of optical network backbone should not only satisfy the existing service, but also consider further involved service in the electric...
Proceedings Article
Improvement for IEEE 802.11 PCF Access Mechanism
Ying Huang, Lin Zhou, Xin Li
Nowadays, it is a popular life trend to surf on the Internet, make a phone call and watch video by the portable terminals anytime and anywhere. Especially at the crowded commercial areas, exhibition halls, airports, the number of users are a lot but the wireless access points APs is limited, the traffic...
Proceedings Article
Research on Network Intrusion Detection Technology Based on Data Mining Technology
Lijun Zhou, Hong Lv, Yuan Zhao
In this paper, the technology of network intrusion detection based on data mining technology is studied. As the conventional BP neural network be used to establish the network intrusion detection techniques has some problems, because the BP neural network is easy to fall into minimum value and the accuracy...
Proceedings Article
Local Progressive Iterative Approximation for Triangular Bézier and Rational Triangular Bézier Surfaces
Liping Yan, Desheng Yu
In this paper, a local PIA format for triangular Bézier surface and rational triangular Bézier surface is designed, which adjusts control points of even permutations only. It generates a surface sequence with finer precision and its limit surface interpolates given data points. Examples show that the...
Proceedings Article
Resource and Role Based Access Control Model
Xingdong Li, Zhengping Jin
Cloud computing's multi-tenancy and virtualization features pose unique security and access control challenges due to resource sharing. Traditional access control models can’t meet the needs of the open, network-connected, heterogeneous and highly distributed cloud computing environment. In this paper,...
Proceedings Article
The research of fractional order control system based on surface EMG signal
Changsong Li, Yiqi Zhou, Yanzhao Chen
With the development and integration of the subjects such as rehabilitation medicine, mechanical electronics and control theory, the related theory and technology of rehabilitation robot have important research value in the field of clinical medicine disease diagnosis, rehabilitation medicine, muscle...
Proceedings Article
Combinatorial Optimization of Resolution Level for 3D Scene Based on Regional Weighted Information Entropy
Li Che, Fengju Kang
With respect to the problem that traditional combination of resolution level methods for 3D scene either can easily fall into tedious and repeated experiments for interaction design or fail to provide results that conform to human visual habits. In this paper, an intelligent combination of resolution...
Proceedings Article
Research on the Application and Development of Production Technology of Computer Animation in the New Media Environment
Jinxi Zhang, Jianjun Huang
With the continuous development of science and technology, the application of new media is becoming more and more extensive, which brings convenience to the development of all walks of life, and to promote the development of the industry, especially its application in computer animation production technology,...
Proceedings Article
Research on Quality Measurement and Evaluation Method of the Localization Embedded Real-Time Operating System
Zhijie Gao, Youchun Zhang, Chen Liu, Wen Jiao
Embedded real-time operating system is the basic support environment for all kinds of embedded systems, which directly determines the quality of the embedded application function, the performance index of the range. To the quality of embedded real-time operating system quantitative measurement and evaluation,...
Proceedings Article
Bi-directional Message Mapping for DER and DMS Interoperability
Jian Su, Haitao Liu, Xueyuan Su
The Common Information Model (CIM) is an abstract data model that use in Distribution Management System (DMS) applications. And DER devices use IEC61850 information model. Because DMS and DER systems use different data modal, the bi-directional message mapping method need to study. The article analyzes...