Proceedings of the 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering 2015

Session: Session 4: Computer Sciences and Technology

241 articles
Proceedings Article

Research on Logistic Distribution Routing Based on Improved Ant Colony Algorithm

Jun Zheng
Logistic distribution is one the most important parts in logistic industry, its core is to get the shortest transportation route of car. This paper makes mathematical modeling on distribution route of logistic car, constructs target function and constraint condition. It makes analysis on realization...
Proceedings Article

Overview of Quantum Key Distribution

Yun-ting Zhou, Feng-zhu Ji, Mao-lin Deng, Xiao-gang He, Qi-jie Tang
QKD (quantum key distribution) is core of quantum communication, it is not only the most extensive range of applications, and can also be served as a basis for other branches. In this paper, the theoretical basis and the basic idea of quantum key distribution has been described. Focus on several quantum...
Proceedings Article

Service name resolution in Service-oriented network based on Kademlia algorithm

Ziyan Xu, Jianya Chen
Today’s Internet remains its original design that dates back more than three decades. In spite of tremendous heterogeneous networks and large scale of mobility devices, it still provides a single, basic, unreliable service offering. While this legacy architecture seemed so hard to support the requirements...
Proceedings Article

A new automatic test data generation algorithm based on PSO-ACO

Xiaomin Zhao, Yiting Wang, Xiaoming Ding
In view of the shortcomings of the test data generation algorithm including particle swarm optimization algorithm and ant colony algorithm, a new algorithm is proposed, which is based on the combination of particle swarm algorithm and parameter adjustment. This algorithm can dynamically adjust its search...
Proceedings Article

Accurate Network Resource Allocation in SDN according to Traffic Demand

Hongyan Cui, Chenhang Ma, Wei Lai, Lili Zheng, Yunjie Liu
The services carried by the Internet have undergone tremendous change over the past decades, along with the emergence of multimedia services and cloud computing, etc. However, there is little change in the framework of network designed primarily for reliable end-to-end communication, which is not suitable...
Proceedings Article

Mining Users’ Mobility Patterns Based On Apriori

Hongyan Cui, Xiaolong Yin
Mobility pattern of users is decided by people themselves. However, in the daily life, mobile users often repeat regular routes in certain periods. To effectively mine the mobile rules of users and allocate the resource among mobile telecommunication operators and Internet Service Providers (ISP), grasping...
Proceedings Article

The development and trend of wireless body area networks in the smart clothing field

Dou Tan, Yi Liu
With the advent of the smart clothing, wireless body area network(WBAN) has became particularly important as the information perception stage of smart clothing. Firstly, we introduced the conception of the smart clothing and the wireless body area network briefly. And then we analyzed many traits about...
Proceedings Article

Research on Parallel Design Algorithm of Digital Image

Li Zhao
In this article, a new method is proposed for the parallel of digital image processing algorithms. The method will transplant parallel the image matching algorithm based on cross correlation to the digital image processing platform.
Proceedings Article

BCC A Novel Block Combination Coding Mechanism

Hai Fu, Wanrong Yu, Chunqing Wu, Baokang Zhao
To transmit data reliably and effectively in deep space network, a protocol called NCSTP was proposed, introducing network coding mechanism into space communication. However, the NCSTP cannot make an effective response to the burst packet loss characteristic in InterPlaNetary (IPN) network. Therefore,...
Proceedings Article

Design of College Discrete Mathematics Based on Particle Swarm Optimization

Jiedong Chen
Aiming at exploration and development capacity, it is usually hard to achieve effective utilization and balance by using just one algorithm, which will influence the solving accuracy and efficiency of the algorithm accordingly. This thesis applies particle swarm optimization (PSO) to discrete multi-objective...
Proceedings Article

The Design and Implementation Colleges and Universities Cadres Management System based on J2EE

Ping Chen
On the basis of cadre management business requirements analysis in colleges and universities, this paper designed and developed one colleges and universities cadres management system with a set of user management, cadres management, cadres ability evaluation and system management based on J2EE platform...
Proceedings Article

The Design and Implementation based on IOS Pocket Closet

Ruiying Zheng
Pocket closet is mobile application software developed based on Objective - C language, which can help users manage a wardrobe. When users don't know how to match clothes, the software recommends collocation through user testing results; Users don't have to dig out tie-in dress, but through the software...
Proceedings Article

Enterprise Network Virus Protection Research

Yanjie Zhou, Li Ma, Min Wen
Enterprise network virus protection system directly affects the interests of the enterprise. A large number of external and internal network security problem data show that enterprises improve the requirements of network security in order to protect network resources of the enterprises. This article...
Proceedings Article

Campus Second-hand Trading Market Application System

Li Zhu, Lan Bai
The emergence of the Internet led to a period, also brought a lot of convenience to people's life, and the wave of Internet online shopping has gradually become another mainstream network service. School students now do not have a very good handling for second-hand resources, which not only wastes the...
Proceedings Article

Research on Time Randomization based on soft interrupt Against DPA Attack

Lin Chen, Xingyuan Chen, Jinfu Xu, Moran Li
In this paper, a software interruption-based method is proposed so as to improve ECC processor’s capability against DPA attack. Firstly, we analyze the principium of DPA-resilient time-randomizing. Secondly, combined with operational characteristics of ECC processor, a time-randomizing circuit is put...
Proceedings Article

Achieving Agile C2 by Applying the Model Driven Architecture to C2 System Development

Zhu-yun Duanmu
In order to meet the requirement of agility in Command and Control system, a concept model and a development pattern of agile C2 system are proposed. The core characters of agile C2 system are operations mission driven and the cooperative structure adjusting of the system resources. A building method...
Proceedings Article

Cloud Computing: Concepts, Architecture and Applied Research

Yingjie Wang
Since cloud computing could be understood only by specialists, it is necessary to write a clear but not complex description regarding knowledge to promote common people understanding this technology. This paper refined three essential characteristics of cloud computing, analyzed both software and hardware,...
Proceedings Article

Development and Application of Artificial Intelligence

Yingjie Wang
Since the successes of the Artificial Intelligence might increasingly impact on multiple subjects in new millennium, it is necessary to write a summary of the recent development of this technology. This paper refined four essential and important aspects of the Artificial Intelligence, summarized both...
Proceedings Article

Test Case Prioritization Based on Clustering Analysis

Yi-fan Xue, Yu-guang Mao
With regard to the existing test case priority algorithm rarely focusing on the static covering condition of test case and other design information, as well as the testing person need to online collect relevant information about each statement in the procedure, and a higher dependence on code information,...
Proceedings Article

Research on Zigbee Indoor Position Algorithm Based on Particle Filter

Wenhao Wu
In an indoor environment, such outdoor positioning technology as GPS may have the phenomena of weak signal strength and poor availability due to construction blocking. As a result, the application of Zigbee wireless sensor network becomes a hotspot of the indoor position research at present. Specifically,...
Proceedings Article

Design of Digital Campus Network Portal Platform Based on Portal

Haiyun Xiang, Xiao Fu
The campus information portal based on Liferay is the entry point of the entire digital campus. It integrates the functions of the identity authentication and the user interface. The system can be integrated in the campus, so that users can easily publish and share information. Provides the service with...
Proceedings Article

Use Case Set Optimization in Android Mobile Platform Considering Energy Consumption

Peixing Yang, Di Zhou
Along with the increasingly mature computer technology, various computer systems with complex structures and strong functions have been widely applied to such key safety fields as aerospace, communication & transportation, medical treatment & public health and nuclear power energy. In case of system...
Proceedings Article

Research on Memory Leakage Monitoring Based on Android Mobile Platform

Di Zhou, Peixing Yang
An excellent Android application shall not only have perfect function, but also have good user experience. Actually, performance is an important factor influencing user experience. Memory leakage is a common performance problem in Android development, and DDMS with a good memory monitoring tool Heap...
Proceedings Article

The application of k-means algorithm based on 2-SVM in Intrusion System

Shizhen Zhao, Qiang Yu, Yu Fu, Wei Song
After analyzing the superiority and the deficiency of K-means clustering algorithm, the author put forwards the IDS based on the 2-SVM, according to the research achievement on SVM in the field of IDS. The result shows that this algorithm can avoid the problem of decreasing detection rate by local optimum...
Proceedings Article

Collaborative Filtering Recommendation Algorithm Based on Improved Similarity Computing

Aili Liu, Baoan Li
At presently the most widely used algorithm is collaborative filtering in the Personalized Recommendation Systems for E-Commerce. Aiming at the problem that the recommendation is not accurate due to the data sparsity, a collaborative filtering algorithm based on user characteristics and item attributes...
Proceedings Article

The application of Virtualization technology in Grid Computing

Cheng Zhang, Dan He, Jianlian Xiao, Yang Li
In this paper, the author discussed the current popular the grid computation technique and the virtualization technology, analyzed and concluded characteristic of two technologies. Then, VNET has been proposed, which can add the virtual machine to the network efficiently. It can dynamically modify its...
Proceedings Article

Three-dimensional Model of Maritime Search

Chun Zhang, Cheng Wang
This paper establishes a three-dimensional maritime search and rescue plan by integrating a differential equation model, a global optimal model and an area partition algorithm. Based on the data of flight data and the loss time of communication for MAS MH370, we establish a differential equation model...
Proceedings Article

Research on Key Technology for Processing Images from Infrared Trigger Cameras

Jian Li, Lei Zhang, BaoPing Yan
In recent years, infrared trigger cameras are widely employed in the fields of wildlife monitoring and protection as they can collect massive image data. It is of great realistic significance about how to conduct automatic processing of these image data and extract key information. This paper has a detailed...
Proceedings Article

A Keyword-based Similarity Content Search in Named Data Networking

Minbin Luo
Named Data Networking is a future Internet architecture which enables content retrieve and access by its name. Different from the current network, Named Data Networking is more like a distributed network. Nevertheless, users do not know name of the content. In this paper, we present a Keyword-based NDN...
Proceedings Article

A Kind of De-noising and Segmentation Method for CAPTCHA with Colored Interference Lines

Wang Zhao, Zitong Cheng
The research of CAPTCHA recognition can discover the security vulnerabilities of CAPTCHA in time. It has great significance in improving the CAPTCHA design method and promoting the design level of CAPTCHA. Text-based CAPTCHA recognition mostly uses the method of characters segmentation and recognition....
Proceedings Article

Image Enhancement Algorithm Based on Dual Tree Complex Wavelet Transform

Rong Chen
Image processing is widely used in many fields,in image enhancement processing,traditional image enhancement method,such as histogram equalization, wavelet coefficient enhancement,and so on.Although these methods achieved good image enhancement performance,however,noise is amplified during image enhancement...
Proceedings Article

Analysis and Simulation for State of Traffic Data based on VANET

Chunran Zou, Zehan Chen, Weihua Ma, Yanlin Liu
Because of fast moving of VANETs node and dynamic topology structure, the traditional wireless self-organized routing protocol is difficult to be directly applied in VANETs. Therefore, the routing protocol of hybrid traffic information perception is proposed. Through the collection of real-time traffic...
Proceedings Article

A Personalized Collaborative Recommendation Algorithm Based on Hybrid Information

Dejia Zhang
Personalized recommendation systems can help people to find interesting things and they are widely used with the development of electronic commerce. Many recommendation systems employ the collaborative filtering technology, which has been proved to be one of the most successful techniques in recommender...
Proceedings Article

Software Adaptive Mechanism Based on Software Architecture in Software Running Time

Haiyun Xiang, Xiao Fu, Xu Li
In the Internet environment, software gradually moves from closed, static and controllable status towards open, dynamic and unpredictable state. How to propose suitable software theory for such adaptive software has become the challenging issue facing the computer science and technology. Applicable formal...
Proceedings Article

Test case prioritization based on clustering analysis

Yifan Xue, Yuguang Mao
With regard to the existing test case priority algorithm rarely focusing on the static covering condition of test case and other design information, as well as the testing person need to online collect relevant information about each statement in the procedure, and a higher dependence on code information,...
Proceedings Article

Design and Implementation of Scenic Area Information Service System based on Semantic IoT

Hai-Chao Yang, Rui Guo, Jun Li
Aiming at characteristics of wisdom scenic, based on semantics Internet of things technology, we have realized a kind of scenic intelligent information service system which integrates various functions including scenic guide, environmental information perception, etc in one, designed system architecture...
Proceedings Article

Design and Implementation of Supermarket Management System

Yongchang Ren, MengYao Chen
This supermarket management system has realized the transmission and control of large goods, so as to facilitate the management and decision of sales, and reduce a big burden for supermarkets and supermarket managers. It also can help to improve the work efficiency of supermarket. Its requirements is...
Proceedings Article

Construction of SSI Framework Based on MVC Software Design Model

Yongchang Ren, Yongzhe Ma
Good development framework can improve quality of software development. This paper makes research based on the MVC software design model, after thorough analysis of the current mainstream of three technical framework, combining with their characteristics and advantages to construct SSI fusion framework...
Proceedings Article

Design on Textbook Subscription System Based on JavaEE

Jun Yang
With the continuous expansion of universities and increase of school scale, workload of textbook management staff in college become more and more heavy. Using the traditional manual record has been unable to meet the demand, this paper study the design of college textbook subscription system based on...
Proceedings Article

Athletic Performance Prediction Model Design Based on Grey BP Neural Network

Ling Jia, Qing-bin Wang
The best annual performances of the world women’s pentathlons during 2005~2013 are statistically collected in this article, and the prediction of the best performance of the world women’s heptathlon in 2013 is taken as the research object. According to the best annual performances of the world women’s...
Proceedings Article

A Security Policy Description Language for Distributed Policy Self-management

Zengbang Ma, Yingjie Yang, Yutong Wang
The existing security policy description languages can’t support distributed policy self-management and have some problems in the aspect of describing capability, extensibility, portability and other issues. Against these problems, this paper proposes a security policy description language SPDL for distributed...
Proceedings Article

Optimal Research of Equipment Maintenance Interval Based on Monte-Carlo Simulation

Xianghui Meng, Shaohua Wang
The optimization of maintenance interval of new equipment by simulation is brought forward according to related maintenance requirement and reality. According to the features of equipment, the basic hypothesis that failure rate increase linearly, deteriorate coefficient is opted to adjust failure rate...
Proceedings Article

Study of Vulnerability Parameters in a Class of Network

Hong Bian, Haizheng Yu
A communication network can be modeled by a graph, whose vertices represent the nodes and edges represent the links between sites of the network. Therefore, various problems in networks can be studied by graph theoretical methods. The vertex integrity, the edge-integrity not only give the minimum cost...
Proceedings Article

Study on Operation Risk Assessment of Electric Power Enterprise based on Fuzzy Analytic Hierarchy Process

Fusen Zhong, Chuanliang Jia, Shiming Liu, Jiali Tan
Power Enterprise Operational risk is a major issue for the power companies. Based on the study of operational risk index system of domestic and international power companies, using the Delphi method to determine the power of operations risk assessment index, then using AHP and fuzzy set theory to determine...
Proceedings Article

Algorithm on Top-k Keyword Search of Uncertain XML

Li-Yong Zhou, Xiao-Lin Zhang
Currently, the Top-k keyword search of uncertain XML returns only the top k probability value of the root node. We need further processing to constructed the sub-tree that it meet some certain conditions. To solve this problem, this paper defines a new Top-k query semantics SRRT-Top-k that based on the...
Proceedings Article

An Event-Based Method of Construction of Cyberspace Models

Youjun Wang, Hongqi Zhang, Tianwei Che, Chuanfu Zhang, YunTian Zhao, Chao Yang
Cyberspace has become an important domain the same as the land, sea, air and space. Many cyberspace models were proposed to explain such a high coupled complex domain, but lack of practical method of construction these models make them hard to function. This paper proposes an event based method of construction...
Proceedings Article

Parallel-Based Error Metric For Large-Scale Terrain Rendering Method

Zihou Ge, Xianyu Zhang
This paper presents a terrain rendering technique for large, textured terrain, which uses Parallel-based error metric. In a preprocess, the domain was first tiled and computed into a nested geometric space error map based on geographic theory, taking the advantage to save displaying memory with terrain...
Proceedings Article

The Drawback of Image Resizing Based on Seam Carving

Zijuan Zhang
Lots of image resizing algorithms that based on seam carving belong to the discrete resizing methods. Seam-carving algorithms refer to delete or insert pixel lines in order to resize image’s size. Pixel lines horizontally or vertically pass through the whole image, deleting the pixel line to make the...
Proceedings Article

Information system of the rare endangered plants in Poyang Lake watershed

Wenli He, XingZhao Dai, Xinghua Le, Yu Fang, Bangyou Yan, Haiou Bao
According to original environment destroy of the precious endangered plants, the information system need be built to monitor the endangered plants. Here, using C++, combined with Arcobject soft to establish the management platform system. The main design is data bank design and user interface design....
Proceedings Article

Design and Implementation of Personalized Network Teaching Management System Based On the JSP

Guangyu Wang, Jing Zhang, Dan Han
Along with the development of information technology, the network education is rising and the online courses are innovating. But the information of network resources is so huge, that it is too difficult to distinguish between good and bad. The students spend a lot of time to find the information they...
Proceedings Article

An Eliminating Brightness Differences Algorithm for Lunar Surface Image

Ying Hou, Guicai Wang
For solving effect and real-time performance problems of lunar surface image, the paper proposed an eliminating brightness differences algorithm of lunar surface image by correlation of color components fitting gray level map function. Feature points were obtained by matching in process image, which...
Proceedings Article

Design and implementation of participating teaching quality information feedback system

Qingru Sui
With the reform and development of teaching, teaching quality has become the main focus of the various colleges and universities teaching problems. To improve the teaching quality of teachers, improve the teaching ways and methods, this paper studied, by means of participating in teachers' information...
Proceedings Article

Discussion on Strengthening Information Technology and Basic Education In-depth Integration Method

Shuping Li
Information technology penetrates into education field continuously with development of information technology. Information technology is playing an increasingly important role in education. Information technology has changed traditional mode of education, and created a brand-new learning environment...
Proceedings Article

Implementation of effective Methods of Modeling Tools in technical Education

Sedivy Josef
Development didactics engineering subjects based on the results and conclusions research studies focused on the use of didactic potential of the technology deployed in industrial environments. The possibility of good careers in the field of construction and technical preparation of engineering companies...
Proceedings Article

Research on Land Utilization Based on DEA-BP Neural Network Model

Bihe Fang, Tingyi Zhao
This paper comes up with a DEA-BP Neural Network Model which demands little on the input data and owns a good ability to foresight. The writer use the data from Project named The Evaluation on Development Land Utilization to test DEA-BP Neural Network Mode. The result indicates that the model performs...
Proceedings Article

Research on the ontology-based collaborative description model of IoT resources

Jiaqi Dong, Zhiping Zhou
Researches of collaboration of the internet of things (IoT) resources so far have been limited to a certain aspect. This paper describes the features of similar IoT resources and relationships of different IoT resources to reflect synchronous and sequential relations of the collaborative system. An ontology...
Proceedings Article

Research of decisional behavior on miners’ emergency response based on ERPs

Hongxia Li, Yongbin Fan, Lin Shi
This study using the event related potential (ERP) experiment means, researches the coal mine production emergency scenario miners in emergency response electrical experiments, and designs experiment of miners’ emergency information decision response. According to possible accidents and disasters in...
Proceedings Article

A market comparison method evaluation model based on set pair analysis

Xiuli Wang, Jun Lei, Jie Bai, Hengkai Li
Appraisal model of estate market comparison approach existed uncertain problem, so a new appraisal model integration of GIS and set pair analysis was built. Firstly, using the GIS spatial analysis method quantified the real estate price impact factors. Then, its weights were calculated by entropy weight...
Proceedings Article

A parallel algorithm of non-linear high-order boundary condition problem using form initial condition problem

Zhao Chen, Shesheng Zhang, Yuguang Li
The non-linear high-order boundary condition problem is transformed into form initial condition problem with few parameters, and the steps of calculating the non-linear parameter is constructed. The boundary condition problem is solved using parallel computer. Comparing with the result of boundary condition...
Proceedings Article

A parallel algorithm of non-linear high-order dissipative system

Zhao Chen, Shesheng Zhang, Hualing Zhao
A parallel computation model is provided of dynamics and dissipative tunneling in a symmetric quartic double well potential. The numerical parallel solution for the position autocorrelation function obtained through the Wigner–Fokker–Planck equation is compared well with numerically exact results.
Proceedings Article

Map Building Method Based On Improved D-S Evidence Theory For Mobile Robot

Lei Zhu, Jiang Guo, Jinsong Yang, Mingdong Shao, Jiming Sun, Dapeng Gong, Hongyu QI
Focusing on the uncertainty of the environment, a grid map building method based on the multi ultrasonic sensors is provided. Firstly, the single ultrasonic sensor grid model is constructed by dividing the detected area into three regions. Then the evidences which are needed to fuse are self-adaptively...
Proceedings Article

The Application of Intelligent Voice Analysis Technology in the Customer Call Center of Telecom Operators

Kai Zhang, Jin He, Jinzhou Yang, Xiao Zhang, Zhijun Wang
Call center is one of the most important means for telecom operators to provide after-sales service for customers. Every day, call center can produce a large number of voice data. But these data do not bring significant value to the enterprise. Recent years, the development of intelligent voice technology...
Proceedings Article

A Topology Model with Energy- and Location-awareness based on the Laws of Internal Evolution of the Wireless Sensor Network

Dengchao Huang, Jing Fan, Junhua Chen
In this paper, based on complex network theory, a topology model was proposed which is more accord with the nature of wireless sensor network. Actually, each node's actual location is crucial, in addition, the node energy consumption and communication distances between nodes are inseparable, so we tried...
Proceedings Article

An Optimal Bandwidth Resource Utilization Scheme in IEEE 802.16m Based Networks

Hanwu Wang, Beibei Yang, Liang An
The IEEE 802.16m based broadband wireless access is a brand-new technology to provide high speed and wide range communications for wireless users. However, how to exploit the optimal utilization of the radio frequency bands resource in such networks is a big challenging issue as it covers the radio channel...
Proceedings Article

A Method of Text Dimension Reduction Based on CHI and TF-IDF

HaiBo Tang, Lei Zhou, Xu Chengjie, Quanyin Zhu
In order to improve the result of text dimension extraction, a text dimension reduction method which is based on CHI and TF-IDF is designed and realized. News websites on the Internet provide news articles, through the page analysis based on SVM and application method designed based on CHI and TF-IDF,...
Proceedings Article

Video Shot segmentation algorithm based on SURF

Shujing Pan, Shutao Sun, Lifang Yang, Fengfeng Duan
Video Shot segmentation is the key technology in content-based video retrieval and browsing, and which will directly affect the results of video retrieval. In view of the problems that the traditional shot segmentation algorithm is complex, the feature of video frame is not ideal, and the segmentation...
Proceedings Article

Research on the Regularity of Distance Distribution between Adjacent Mines

Xiang-wen Leng, Xu Zhang, Lin Shao
based upon the influence of mine position distribution error, adjacent mine space cannot fulfill the task of actual combat. this paper builds the model of adjacent mine space distribution regularity under two conditions of the same voyage and different voyages. In combination of examples, a series of...
Proceedings Article

Study on Gallop Early-warning System of Transmission Line Based on Real-time Weather Information

Junjie Huang, Ling RUAN
Through the analysis on the cases of the transmission line gallop over the years, the meteorological condition and the geographical location have a dramatic effect on the gallop phenomenon. And the conductor gallop can be evaluated by the thresholds of the weather factors and the degree of the terrain...
Proceedings Article

The Application of the Optimal GM (1, 1) Model for Heating Load Forecasting

Guojuan Fan, Bo Li, Wanquan Mu, Cun Ji
Heating load forecasting of municipal steam heating system is an important part of the smart city. According to the forecast results, heating companies can arrange production reasonably and provide heating uniform and stable to improve energy efficiency. For the features of the time series of heating...
Proceedings Article

Research on Hamilton Graph Determining Algorithm

Hai Liu, Ying Ai Tian, Fang Feng HU, Jiong Xing Jin
This Paper sums up the necessary conditions to discriminate undirected Hamilton graph based on the in-depth research into the graph. The heuristic search strategy corresponding to the new necessary conditions is designed to quickly solve the problem of "determination of undirected Hamilton graph". The...
Proceedings Article

Research on Modeling and Simulating of Harmonic Load Based on APF

Pu Xie, Jin-cheng Zhao, Zheng-chun Liu
With the development of power electronic technology, harmonic load is one of the main reasons for damage to the power quality of the limited capacity power system. Firstly, the functional requirements of harmonic load model in the three-phase four-wire isolated power supply system are carried out according...
Proceedings Article

A Gray Level Image Detection and Segmentation Algorithm Based on Average Intensity Project and Shift Gaussian Model

Fuchun Zhang, Yanzhong Hao
A gray level image segmentation algorithm is proposed based on Average Intensity Project (AIP) and shift Gaussian model for gray level images with connection between thread and area with similar gray level. The evaluation is performed on 30 gray level images, and the results show area overlap measure...
Proceedings Article

Application of adaptive Sage-Husa and AUKF filtering algorithm In Initial Alignment of SINS

Wan-xin Su
When the system model and noise statistical characteristics are known, the conventional Kalman filtering algorithm is suitable. When the noise statistics are unknown and large initial misalignment angles results in system nonlinear, the application of liner error model and Kalman filtering algorithm...
Proceedings Article

Research on Method to Determine the Business Function of Logistic Support Informational System for Equipment

Xing Jin, Ruyi Zhang, Xiao Guo, Zhaoyang Zeng
To improve the development of informational support of equipment, constructed the logistic support informational system is one of the choice. In order to establish informational system which adapt to the requirement of equipment, how to confirm the business function of logistic support informational...
Proceedings Article

A New HRRP Reconstruction Method based on Joint Sparse Model

Ming Zhou, Mingjiu Lv
At present, most of the high resolution range profile reconstruction methods are based on a single echo signal, without considering the relationship between all the echo signals. In this paper, we consider the sparse feature of echo signal, and propose a method of high resolution range profile reconstruction...
Proceedings Article

Research on data mining of MOOC platform based on large data environment

Qiuping Wang
The vigorous development of the Chinese MOOC platform has brought the huge amounts of data. How to tap the value of these data is the current research problems to be solved. This paper puts forward the data mining framework through analyzing the data features of user data in MOOC platform under the large...
Proceedings Article

Label Propagation Algorithm for Haplotype Assembly Problem

Yuying Zhao, Jinshan Li
This template explains Haplotype assembly problem is one of the most important problems in molecular biology and life sciences. Computationally, the key work for this problem is to divide the aligned sequence fragments into two disjoint clusters and then to reconstruct the corresponding haplotypes from...
Proceedings Article

Quickly Identifying FFSN Domain and CDN Domain with Little Dataset

Youshuai Zhao, Zhengping Jin
Fast-flux net has been adopted by more and more attackers to build up bot-net, which consists of many proxy-hosts that are changing fast. With this technology, tracing and locating the C&C (control and command) host is more complex and difficult, so that how to identify whether a domain belongs to a...
Proceedings Article

Verifying Outsourced Decryption of CP-ABE with Signature

Hongwei Liu, Xueyuan Wang, Peng Zhang
Attribute-based encryption enables users to encrypt and decrypt messages based on user attributes. The computational complexities of decryption are very high. By Outsourcing decryption to the third party, it can address the problem. But the verifiability of results returned from the third party has yet...
Proceedings Article

The application of LM-BP Neural Network in the Circulating Fluidized Bed Unit

Mengjie Hu, Hujun Ling, Dongxu Liu
Circulating fluidized bed technology is one of the developing direction of clean coal technology which is more reality, and one of the effective ways to solve the thermal power to meet the increasingly stringent environmental requirements. Due to the dynamic process of circulating fluidized bed boiler...
Proceedings Article

When Coordination and Exploration are matched: A Simulation Research on Multi-Agents Governance mode

Cunying Chen, Hua Zhang
Engaging in exploring multi-agent collaboration requires determining how to govern the shared activities. We examine the performance implications of selecting alternate modes of governance in multi-agent alliance relationships. A core set of results in this study relates to the ways in which governance...
Proceedings Article

Real-time Calculating Over Self-Health Data Using Storm

Jiangyong Cai, Zhengping Jin
With the continuous development and popularity of smart wearable devices, more and more people tend to use the devices to record their health indicators and exercise indicators. Thus a larger amount of indicators called self-health Data is generated all the time. Obviously, it is necessary to process...
Proceedings Article

Analysis of sedimentary facies of the Chang 7 reservoir in Binchang area, Ordos Basin

Lifang Cheng, Yanchun Wang, Xueqing Liu
The sedimentary facies characteristics has been investigated based on the core examination, logging facies analysis and seismic interpretation, Eight types of microfacies grouped into three subfacies associations are recognized in the Chang 7 reservoir. Braided delta front subfacies is rich-sand deposits...
Proceedings Article

A New Model of Adaptive Container Image Preprocessing

Yajie Zhu, Qikun Zhang, Weiming Zeng
The preprocessing of container image is the key to the whole container code intelligent identification system, and the result of treatment directly affects the accuracy of the code area positioning, the character segmentation and recognition. Based on some features of container images such as the color,...
Proceedings Article

Rough set theory in discretization method based on genetic algorithm

Lei Huang
The rough set theory is a theory method. It is about incomplete research, uncertain expression of knowledge and data, knowledge and data discovery. It has been widely used in artificial intelligence, knowledge and data discovery, pattern recognition and classification, analysis and reasoning of imprecise...
Proceedings Article

MPPT Algorithm Based on the Perturbation and Observation with Variable Metric

Yishuang Hu, Zimu Zhang, Dong Zhao, Yue Deng, Jingyi Lu
The output of photovoltaic array under uniform light is nonlinear with single peaks. Among the MPPT strategies, The P&O Maximum Power Point Tracking algorithm is mostly used, due to its ease of implementation. However, its main drawbacks are the waste of energy in steady conditions, when the working...
Proceedings Article

Hybrid laser information improved PSO-RBPF algorithm

Haibo Lin, Jingjing Ke, Yi Zhang
To solve the estimator’s inconsistency in calculating the proposal distribution and the particles degeneracy phenomenon of the Rao-Blackwellized particle filter (RBPF), an improved method of RBPF based on fusing Precision laser pre-observation information particle swarm optimization (PSO) is proposed...
Proceedings Article

Study on Term Weight Calculation Based on Information Gain and Entropy

Ying Hong, Chao Lv
This paper first analyzes the advantages and disadvantages of TF-IDF, which is a traditional algorithm of term weight calculation. Then to overcome the disadvantages of the algorithm, this paper proposes a new method of term weight calculation based on information gain and information entropy, which...
Proceedings Article

Reconstruction of missing data in social network Based on Affinity Propagation

Rongxin Liu, Qun Liu
With the appearance of data explosion, important data in incomplete network could be missed caused by some factors. To address the problem, we present a reconstruction framework based on Hawkes process with self-exciting and TAP (Topical affinity propagation) to effectively and efficiently reconstruct...
Proceedings Article

A realization of load balancing based on distributed real-time database isomerism cluster

Jia Wu, Dan Su, Huanyuan Li, Lei Yan, Xianhui Li, ShengPeng Ji, Jingbo Li
This paper briefly introduced the technical features of real-time database and distributed database. This paper also introduced real-time database platform based on CORBA component technology, and real-time database isomerism cluster which is the core part of real-time database platform. Based on the...
Proceedings Article

Research on real-time data processing technology for Internet of things

Jia Wu, Dan Su, Chao Liu, Bing Lv, ShengPeng Ji, Xianhui Li, Gang Li
In the age of internet of things, the storage and real-time processing requirements of massive amounts of real-time data generated by sensors, so that the traditional database or data processing architecture has been unable to deal with. Analyzing the processing characteristics of the real-time data...
Proceedings Article

A text classification model constructed by Latent Dirichlet Allocation and Deep Learning

Yu Liu, Zhengping Jin
In this paper, we proposed a mixed model of text classification constructed by latent dirichlet allocation and deep learning. The model present that a text will be represent as a vector computing by latent dirichlet allocation algorithm, and this vector is probabilistic vector of corresponding topic...
Proceedings Article

A comparison about the paddy fields applicability of two water stress index model by infrared automatic monitoring the canopy temperature of rice

Mingchao Gao, Shijie Gao, Xiaohui Li, Jiping Gao, Jihong Li, Wenzhong Zhang, Yingshan Dong
The canopy temperatures of rice were observed by the infrared temperature measuring equipment under different irrigation conditions in this experiment, and also it applied the CWSI empirical model and theoretical model to measure whether the crop were suffered from water stress or not. Meanwhile, in...
Proceedings Article

A Background Modeling Approach Based on Visual Background Extractor

Taotao Liu, Lin Qi, Guichi Liu
Moving objects detection is an important research content in computer vision field and it plays a very important role in many vision applications such as smart video surveillance, intelligent transportation, and human-computer interaction, traffic control, activity recognition, object tracking and behavior...
Proceedings Article

Research on Performance Degradation Modeling for Machine Gun’s Barrel Based on FOAGRNN

Yanfeng Cao, Cheng Xu
A method to establish performance degradation model for barrel based on general regression neural network with fruit fly optimization algorithm (FOAGRNN) was proposed. It took the muzzle velocity reduction as performance degradation feature with the increase in the number of shooting ammunition quantity...
Proceedings Article

Video In The Shadow Of An Object To Determine When And Where Of The Video

Qianwen An
Shadows of the sun position techniques can determine the place and date of the video. First, use Matlab to extract video files, extract n pictures at such intervals, after reading the picture get n sets of the shadow length l changes with time t. Known date from capture date calculate solar declination,...
Proceedings Article

Research on DNA Computing Methods of Optimization Problems on Weighted Graph

Jieyu Liu
The paper researched the DNA computing method of classical optimization problems on weighted graph, improved the method of Weight-coding that belongs to the original model of DNA, raised some new methods of DNA encoding and DNA computing. Generally speaking, through the Relative length graph design that...
Proceedings Article

Fuzzy Set Based Web Opinion Text Clustering Algorithm

Hongxin Wan, Yun Peng
With the development of social media, people like to express their views on the Web. Because people express their views casually, which makes the opinion text contain a lot of uncertain and unstructured contents, and it is difficult to cluster the text by normal classification methods. An algorithm of...
Proceedings Article

Opinion Text Features Finding and Evaluation Algorithm Based on Rough Set

Hongxin Wan, Yun Peng
Follow the development of Internet, more and more opinion texts are written on social media web by people, and it is very difficult to find the features in these texts because of the texts scale. We propose an algorithm to find features from key words by words reduction method, which considers the correlation...
Proceedings Article

Mini-batch Quasi-Newton optimization for Large Scale Linear Support Vector Regression

Xin Xie, Chao Chen, Zhijian Chen
Linear support vector regression (SVR) is a popular machine learning algorithm. However, as the amount of data increases, the learning procedure of SVR becomes time consuming. In this paper, we propose a mini-batch quasi-Newton optimization algorithm to speed up the training process of linear SVR. The...
Proceedings Article

Research on Earning Warning of Railway Freight Based on Support Vector Regression (SVR)

Lingyan Cheng, Shiwei He, Weichuan Yin
The traditional railway freight early warning adopted independent indicator thresholds discrimination. But it would lead to inaccurate results warnings, it may alarms when abnormal events occur instead of early warning. This paper proposes a railway freight early warning model, which apply support vector...
Proceedings Article

Dis-Dyn Crawler:A Distributed Crawler for Dynamic Web Page

Jianfu Cai, Hua Zhang
Nowadays, it has became a widespread approach for achieving rich information in modern web applications using AJAX ,which cause two serious problems for web crawler. One is the incomplete information getting from web page due to the inability to parse dynamic web page. Another is the efficiency of the...
Proceedings Article

Analysis of Blended-mode DoS Attack

Xin Yang Ou, Hua Zhang
Most techniques of DoS attack are single-model, which have the disadvantages of low attack efficiency and weak adaptability. This paper presents a blended-mode DoS attack mode and we focus on the analysis of the efficiency of this mode. In this mode, we combine different DoS attack modes to attack the...
Proceedings Article

Cloud Computing Real-time Task Scheduling Optimization Based on Genetic Algorithm and the Perception of Resources

Jian Dong, Su-Juan Qin
Current real-time task scheduling algorithm only focus on the user tasks’ real-time demand, and these algorithms are not flexible enough to adapt for real-time change in heterogeneous systems. In this paper, by means of the characteristics of global optimization searching of genetic algorithm, from the...
Proceedings Article

The allocation of taxi resources in the “Internet +” Era

Yang Liu
First, each company's taxi subsidy scheme is mainly to improve fuel costs when oil prices rise subsidies, paid holidays, extreme weather subsidies. However, these subsidies with respect to the money and high fuel costs, but inadequate. In heavy traffic roads, peak demand periods, there are still many...
Proceedings Article

Application of maximum likelihood classification Based on minimal risk in crop interpretation

Yubin Song, Xiufeng Yang, Yancang Wang, Zihui Zhao, Xuhong Ren, Longfang Duan
In crop interpretation by remote sensing, Gray distribution of crop is overlapped in some intervals. The non-target crops fall into the target crop, which would greatly increase the workload in post classification. To reduce these classification errors, and improve accuracy of clarification, maximum...
Proceedings Article

Online Traffic Congestion Prediction Based on Random Forest

Xiao Han, Yijie Shi
In recent years, distinction and prediction of urban traffic congestion has become an important part of Intelligent Transportation System (ITS), hence attracting more and more attentions. Road congestion can be predicted by analyzing traffic flow data collected by various data acquisition equipment primarily....
Proceedings Article

An Android Malware Detection Method Based on Feature Codes

Yiran Li, Zhengping Jin
The Linux-based android operation system is now exposed to high risks of security since the malware of smart phone explodes. For the purpose of effectively detecting the malware on the android platform, an android malware detection method based on feature codes is described in this paper. By using the...
Proceedings Article

An Improved Graph-based Recommender System for Finding Novel Recommendations among Relevant Items

Ranran Liu, Zhengping Jin
Recommender system has been extensively studied to provide the most relevant data to users in this era of information explosion. Among all kinds of recommendation algorithms, collaborative filtering (CF) algorithm is one of the most famous ones because of its high accuracy and simple implementation....
Proceedings Article

The Research of Wi-Fi Indoor Positioning Algorithm based on Position Fingerprint

Yujie Liu, Meng Wu
To improve the positioning accuracy and robustness of indoor positioning technology, a fingerprint positioning method is proposed based on the Kalman filter and the probability weighted Bayes algorithm. Firstly, the optimal estimation of signal strength is calculated using the prediction and correction...
Proceedings Article

Daily Solar Irradiance Fluctuation Assessment Method Based on Correlation Analysis

Honglu Zhu, Xu Li, Qiao Sun, Ling Nie, Jianxi Yao, Gang Zhao
A method to evaluate fluctuation characteristics of daily solar irradiance was introduced based on theoretical solar irradiance. Process feature of daily solar irradiance were analyzed. Observed daily solar irradiance of 10 days in Beijing was tested to demonstrate the effectiveness of this method. Result...
Proceedings Article

Implementation of Computer Graphics Algorithm Platform Based on Autodesk Maya

Qi Zhang, Zhanpeng Huang
Building a visualization algorithm platform is the first step and very important part of computer graphics research. In this paper, we describe a new method to implement computer graphics algorithm based on Autodesk Maya. By creating the node is to be integrated directly into the Dependency Graph, we...
Proceedings Article

Digital Display Design of Ethnic Clothing of Nanling

Shiyong Zheng, Weili Guan, Biqing Li
This paper conducts a research about digital display of “ Nanling minority costumes” of Hezhou University Museum. Sufficient basis for the work in the feasibility study and needs analysis, a digital display design is proposed. This design refers to clothing patterns design process, user interface design...
Proceedings Article

A software for optimizing the thermal power plant operation under environmental Constraints

Chunxiu Zhang
On the basis of the historical data of unit operation, consider the environmental cost, and KWH cost into the evaluation system, in order to developing guiding optimal operation of the thermal power units to run the software optimization . Through correlation analysis of the unit operation parameters,...
Proceedings Article

A Hierarchical Resource Allocation Algorithm for Satellite Networks Based on MF-TDMA

Huijun Feng, Yuanan Liu, Hefei Hu, Dongming Yuan, Jing Ran
Satellite communication networks would become one of the most prevalent communication system for the increasing demand for high-speed multimedia services and the underutilization of scarce satellite spectral resource. Considering resource optimization under multi-priority services and various link states...
Proceedings Article

SCM instance computer disruptions concept Lecture Application

KunLiang Xu, YanLin Tao
In this paper, the microcontroller interrupt control technology, designed a simple microcontroller to control the LED lights off simulation system, the system was applied to the lectures can be intuitive so that students understand the process of computer disruptions, achieve a multiplier effect of teaching.
Proceedings Article

Chinese Spam Filter under Adversarial Impact

Yaqing Zhao, Yan Xu, Xiaodan Zhao
Machining learning techniques have achieved great success in anti-spam area. But because of the limitations of these techniques, classifiers derived from them often get attacked by spam senders thus posing a threat to the whole Spam filtering system. This article briefly describes the type of attacks...
Proceedings Article

The applications of computer simulation technology in tennis serve technique

Guo-dong Wu, Xing-jian Jiang, Li-jun Lin
This article made Computer Simulation Technique to analysis the relationship of the different heights of hit tennis and serve’s effect in the course of tennis serve. The results show that with the increase height of hit tennis the effective area of tennis serve also increased significantly; the success...
Proceedings Article

A Mining Algorithm of Frequent Items in Data Streams Based on Apache Storm

Weihua Hu, Ziang Guo, Mingzhong Chen
Frequent items in data streams refer to log items appeared in numerous data streams that are over specified thresholds. Under data stream model, data streams are continuous, and the algorithm can only scan data once. Furthermore, data streams are unlimited, while the available storage space is limited....
Proceedings Article

New Method for Accident Causation Analysis of Complex Socio-technical Systems

Jianwei Feng, Song Wang
With the increasing structural complexity of complex socio-technical systems, which becomes also increasingly difficult to predict the catastrophic accident, the reason should be the existing accident causation theory incapable of modern complex systems accident analysis, spurned the system physical...
Proceedings Article

Research of Ship Maintenance Management Platform Based on Cloud Computing

Xin Liu, Qiang Zhang, Shouba Wang, Xiangxin Cheng, Junjie Tang
The digital management of shipping business information is an inevitable trend.Compared with traditional management mode, it’s more convenient, efficient and traceable. The maintenance management platform based on Cloud Computing manage the business information, providing platform service for other systems...
Proceedings Article

Detection of Sensitive Behavior on Android with static taint analysis based on classification

Yayun Chen, Hua Zhang
This paper devotes to the APK sensitive behavior was studied by classification, and quantifies the APK sensitive behavior, finally after a quantitative APK sensitive behavior can be measured on the basis of the APK sensitive value, through the unique static detection method based on classification show...
Proceedings Article

Vulnerability Analysis on the Cloud Network Topology

Ke Chen, Hua Zhang
In recent years, cloud computing is developping rapidly, and many companies put much effort to set up their own private cloud or public cloud. However, structures of cloud network topology are not of the same quality, and many network builders are tend to ignore the vulnerability of network topology...
Proceedings Article

The Design of Electronic Data Evidence Collection System Based on C/S Structure

Honghui Gong, Yanwei Xu, Ting Zhang
In the computer network crime and network security means defense technology escalating the situation, a growing number of technical and legal experts come to realize, is completely dependent on network security technology to combat computer-related crime can not be very effective, it must apply the law...
Proceedings Article

The Key Technology of Electronic Evidence Collection Research Based on Cloud Computing

Yanwei Xu, Honghui Gong, Ting Zhang
A computer system for the new types of objects and tools of criminal activity gradually spread, combat and prevent computer crime has become the public security of the judiciary need to be solved. In this case, the digital forensics have come into being. Digital forensics collected electronic data is...
Proceedings Article

Computer-assisted Three-Dimensional Sports Training System Analysis and Design Research

Li Zhou
sports simulation helps sports training, the transition from primarily based on the human eye's method to the traditional method based on anthropometric high-definition video capture and analysis; from experience-based training methods to the stylized sports science shift analysis method, leading to...
Proceedings Article

The Research on Wisdom City‘s Informatization System Design Based on Cloud Computing

Wei Tang
The information system construction has become the focus of the wisdom of urban construction. Multiple applications of information technology has formed the traditional property management, e-government. But between these systems independent of each other to form a plurality of data silos, resulting...
Proceedings Article

The design and implementation of UML-based students’ information management system

Min Huang
Based on the background of the development of colleges and universities students’ information management system, this paper discussed the application problems of UML in this system modeling. The unified modeling language (UML) is adopted to carry on the modelling for the framework relation of students’...
Proceedings Article

Research on the urban management monitoring and command center

Yunli Cheng, Huili Xue
In order to improve the level and efficiency of urban management in Heze, Shandong province, office of Heze urban management committee and the city construction information center want to build an urban management command center, to enhance the comprehensive law enforcement efficiency and the level of...
Proceedings Article

A new Bayesian classification algorithm based on attribute reduction

Hongmei Nie, Jiaqing Zhou
Naive Bayesian classifier is a simple and efficient classification method. However, the assumption of the independence of its attributes is difficult to be satisfied, which influences the classification performance. In this paper, a new classification algorithm is proposed, which is based on the attribute...
Proceedings Article

Diagnosing reasons of packet loss in 802.11 networks

Yiming Wang, Zaixue Wei, Hongwen Yang
Packet loss in the 802.11 network can be attributed to many reasons. Detecting what causes packet loss is important for network optimization and is still a tough question. In recent years, various models have been proposed in literature to deal with this problem. In this paper, we introduce and compare...
Proceedings Article

Simulation Research on Logic Rule Control of Vehicle AFS

Dirui Wu
Adaptive Front-lighting System (AFS) can adjust front light angle in real time based on speed, steering wheel angle and dip angle of vehicle. The safety of night driving can be improved in the active safety technology. Based on the mathematical model of AFS system, logic rule control method is adopted...
Proceedings Article

The research on the technique of geospatial information service component

Yuanyuan Zhang, Yong Guo, Qingshan Wang
Geographical Spatial Information; Service Components; Spatial Database; Service-oriented; Comprehensive Query
Proceedings Article

Semi-supervised learning combining transductive support vector machine with active learning

Boli Lu, Xibin Wang
In typical data mining applications, labeling the large amounts of data is difficult, expensive, and time consuming, if annotated manually.To avoid manual labeling, semi-supervised learninguses unlabeled data along withthe labeled data in the training process. Transductive support vector machine (TSVM)...
Proceedings Article

Chinese Text Classification Based on Ant Colony Optimization

Xin Luo
It's significance for us to study Chinese Text Classification, when we face so much dynamic information. The development of Text Classification has a close connection with Pattern Recognition. However, some peculiarity of Chinese Text Classification, such as it has many classes, much noise, and excessive...
Proceedings Article

Research status and development trend of Urea-SCR technology

Zhanfeng Qi, Shusen Li, Xiuli Guo, Wuqiang Long
Stringent emissions regulations require further reducing NOx emissions, selective catalytic reduction (SCR) technology is the mainstream technology to remove NOx at euro V and euro VI stage. First This article introduces the chemical reaction mechanism of Urea-SCR technology that could reduce NOx emissions...
Proceedings Article

Image Fusion Algorithm based on Sparse Features and Pulse Coupled Neural Networks in Wavelet Transform Domain

YunXiang Tian, XiaoLin Tian
Multi-focus image fusion has become an advanced research topic in image processing field. The traditionalmethods that are commonly used wavelet transform, principal component analysis (PCA),pulse coupled neural networks (PCNN), which got some results, but they are not effective enough for focused regions....
Proceedings Article

Remote Sensing Data Feature Analysis Using Spatial Linear Embedding (SLE)

Lifang Xue, Xiushuang Yi, Xiumei Liu, Jie Li
Dimensionality reduction has been used to reduce the complexity of the representation of remote sensing data. In this paper, a novel remote sensing data feature analysis method is proposed based on an improved manifold learning algorithm--spatial linear embedding. The purpose of feature extraction is...
Proceedings Article

The Research on Security Reinforcement of Android Applications

Xiaorong Feng, Jun Lin, Shizhun Jia
Along with the rapid progress and widely used of mobile application, security protection to software application has become an important issue. The lack of binary protections makes it important to implement packing services. By analyzing traditional features of software reinforcement technology, the...
Proceedings Article

A Reasoning System about Bi-Agent Knowledge Sharing

Jinsheng Gao, Changle Zhou
Dynamic epistemic logic; Common knowledge; Knowledge sharing
Proceedings Article

Correlation of Alzheimer's Disease with Wnt Signaling Pathway and Neural Stem Cells

Hongbo Yao, Lihui Sun, Jie Lian, Meng Zhang, Danyang Liu
Recent studies have shown that Wnt signaling molecules and the occurrence and development of Alzheimer's disease are closely related. Wnt protein secretion by autocrine or located next to the cell membrane receptor binding, activation of intracellular signaling pathways to regulate expression of target...
Proceedings Article

Analysis on the Optical Fiber Transmission Maintenance and Management in Communication Engineering

Chuan He
The emergence of the optical fiber communication technology, it is injected fresh blood to this new era. Because it has a long transmission distance, large capacity of communication, the advantages of strong anti-interference ability, in the field of radio, telephone and computer networks and other have...
Proceedings Article

The Study on the Effect Factors of Single-mode Fiber Optical Signal Transmission Time Delay

Chuan He
With the rapid development of communication technology, various communication means and applications emerge in endlessly, the use of the communication system environment is increasingly complex, thus, these systems in complex signal environment simulation and the experiment of the assessment is put forward...
Proceedings Article

The Study on the Application of EPON Technology in Optical Fiber to the Home Broadband Access Network Design

Chuan He
At present, the individual users use ADSL dial-up Internet access methods, but due to the copper price too high, broadband couldn't be more improved, the copper is bound to be abandoned by the society. Some new network providers and operators provide active optical fiber to the community. Due to the...
Proceedings Article

The Study on the Digital Optical Fiber Communication Access Network Technology and its Application

Chuan He
Through the optical fiber transmission technology to realize the network access, it is a kind of communication transmission to optical fiber network for transmission medium means of advanced technology; it is the embodiment of the essence of the optical fiber access. It is large capacity, light weight,...
Proceedings Article

Some Methods of Evaluating Eigenvalues of Symmetric Matrix

Yao Ding
This article introduces some methods to evaluate eigenvalues of the real symmetric matrix, especially for real symmetric triangle matrix. For these methods, we give concrete steps. Finally, by comparing these methods, we study advantages of various methods.
Proceedings Article

Research on the Information Construction of the University Archives Management

Rili Cong, Tao Feng
The information construction of the university archives management, is an essential part in the university management. This paper Through the analysis of its connotation, according to the problems, and then the corresponding solutions are put forward to improve the management of archives management in...
Proceedings Article

Study on Computer Technology and Information Management Based on Integration Perspective

Zhangkui Liu
In current era when mobile internet and computer information technology prevail, every individual is information communicator and receiver in society. In the face of rapid social development and huge scale of information communication, human beings depend on computer information management technology...
Proceedings Article

Tentative Analysis of the Function of Applying Computer Database Technology in Information Management

Peng Xie
With the development of information technology and the progress of science and technology, information management has been widely used in computer data technology, and continuously improve the level of information management .This paper mainly analyzes the application status of computer database technology...
Proceedings Article

Computational Analysis on Electromagnetic Field Reversal based on Global Optimization Algorithm

Yanfeng Liu
With continuous development of computer technology and extensive research on electromagnetic field reversal, calculation of electromagnetic field has already become a research hotspot at present. Based on global optimization algorithm, the author discusses calculation of electromagnetic field reversal...
Proceedings Article

Research on Collaborative Filtering Recommendation Algorithm Based on Matrix Decomposition Method

Juan Li
In order to realize the personalized recommendation of internet mass data, according to the characteristics of internet mining data set and combined with mathematical algorithms, this paper proposes a new forecasting and computing model of adding the regularization constraint and least square method...
Proceedings Article

A Research of Guangyuan Qianfoya Grotto Statuary Digitization 3D Model Manifestation

Kai Luo, Dengming Gao
Guangyuan Qianfoya Grotto is one of the most valuable natural resources in China. It is an important constituent of Chinese material cultural resources and is a kind of people’s direct expression of beautiful life, art appreciation and religious belief in history. It remains an important project about...
Proceedings Article

Discussion on the harm of computer virus and its prevention

Jinwei Fu, Rui Li, Zhijin Yang
Transmission and spread of computer network virus seriously endanger the normal use of the computer system and the security of private information, the spread of the virus has great influence and destructive. Invasion of the virus usually causes the system to appear bugs, and produce a lot of information...
Proceedings Article

Design and Implementation of Data Analysis System Based on Mobile Internet

Yanling Xu
This paper designed and partly implemented a mobile Internet data analysis system. The system includes user registration module, the user login module, the user password reset module, user management module, data receiving and statistics module, report generation and display module, real time acquisition...
Proceedings Article

The Design and Implementation of Network Video Surveillance System based on ASP.NET

Hongjun Jin
In this paper, the author describe the application and developing trend of the video surveillance system ,analyze and compare the different frameworks, make out the design of Network Video Surveillance based on ASP.NET Framework. Then give the design and implementation of media server module, alarm server...
Proceedings Article

Research on Decision Model of Building Energy Efficiency

Zhifen Yuan
Following the overall building energy-saving situation in China and reflecting the rationality and flexibility, the paper aims to investigate the decision methods of existing building energy efficiency retrofitting (EBEER) projects under uncertainty to facilitate comprehensive and objective assessment...
Proceedings Article

The design and research of logistics structure system based on computer network

Jinlian He
It is an important content of the logistics enterprises to standardize the management of logistics enterprises. Through the research on the logistics enterprise logistics system, the information management system can be effectively solved.
Proceedings Article

Information retrieval and data mining based on open network knowledge

Ruren Deng, Yinghuan Wu
With the progress of science and technology, Internet technology is also developing, changing people's life, but also a huge database. The information in the database contains a complicated and varied information. The construction of the open network information database is an effective means to obtain...
Proceedings Article

Research on the application of computer technology in university administrative supervision

Yihui Pan, Guangqing Wang, Keqing Tu
With the continuous deepening of the reform of higher education in China and the continuous expansion of the scale of higher education, the number of administrative departments in Colleges and universities has greatly increased. In order to improve the working enthusiasm and working efficiency of the...
Proceedings Article

Research on a Resource Scheduling Scheme of Cloud Compute Source Load Balancing Based on Genetic Algorithm

BaoLi Yuan
The schedule of resources and tasks in cloud computing have an important impact on the overall performance and operating of cloud computing. To solve the prone uneven load node when the cloud perform massively parallel tasks, which led to the entire cloud computing system performance degradation and...
Proceedings Article

Research on Comprehensive Evaluation System of Network Security Management Based on Multi Dimensional Extension Fuzzy Technology

Aiyue Xia
Objective: to improve the network security management. Method: using multi dimension extension fuzzy technology. Process: build a multi dimensional model to comprehensive evaluation of network security management level. From network security management systems, human input, technology effect three aspects,...
Proceedings Article

Analysis and Research on the Big Data Security Based on Cloud Platform

Bo Yang
Objective: The purpose of this paper is to build a large data security encryption model in the cloud, which can make users to upload and download data more reliable. Model: This paper uses the data security storage model to analyze the security model of the cloud big data. Process: We used the mathematical...
Proceedings Article

Research on the application of automatic goods sorting system

Qi Li, Xiaohong Cheng
Sorting control system plays a very important role in the advanced manufacturing field. Is an important part of modern logistics and industrial control system, implementation of materials at the same time sorting over continuous multilayer. In various industries such as: logistics and distribution center,...
Proceedings Article

A kind of crane loading and unloading simulation based on finite-state Machine

Guang Hong, Weibing Bai, Xin Yu
Aiming at the insufficiency of the actual crane, finite state machine technology was adopted for setting up an emulational training system. The system implemented a kind of crane loading and unloading operation. Therefor a sort of finite-state machine for the crane was set up. By the dynamics analysis...
Proceedings Article

Analysis on Energy Conservation and Emission Reduction for Electricity Consumers Based on Principal Component Analysis

Xiaohui Xu, Jinsong Liu, Yirong Su, Yangyang Xi, Shuanghu Wang
With the increasing concerns on energy shortage and environment protection, the energy conservation and emission reduction is becoming a more of concern for electricity consumers. In this paper, typical indexes are selected for reflecting electricity consumers’ statues of energy shortage and environment...
Proceedings Article

Space Complexity Analysis of Sieving in the Number Field Sieve Integer Factorization

Qi Wang, Hongyan Zang, Xiubin Fan, Yu Wang
The general number sieve is the most efficient algorithm known integer factorization, it consists of polynomial selection, sieving, solving equations and finding square roots. In this paper, the evaluation provided by each root and the expected value are given, then we get the space complexity of sieving...
Proceedings Article

Nonlinear Transform CMA for Underwater Acoustic Channel under Impulsive Noise Environment

Ying Xiao, Yuhua Dong, Chunjie Li
The traditional constant modulus algorithm (CMA) can’t ensure robust convergence performance under impulsive noise environment, hereby a blind equalization by CMA with nonlinear transformation carrying on the received signal was proposed. The impulsive noise can be suppressed effectively by sine transform,...
Proceedings Article

Research on the Behavior Data Collection based on Mobile Location

He Zhang, Lanxin Hu, Zhaoming Zheng, Yi Tang, Zun Wang
With the popularity of mobile terminals and the mobile phone, Collecting individual, the collective spatio-temporal data have a lot of new technology. Corresponding also produced many terminal application of location-based services, they are constantly changing our lives, provide convenience for our...
Proceedings Article

Automatic Heart Sound Segmentation Method Based on Cyclostationarity and Clustering

Ting Li
Segmenting heart sounds accurately is significant to determine the types and the severity of heart diseases. Using cyclostationary property of heart sounds and clustering method, the paper proposed an effective automatic segmentation algorithm of heart sound signals. This algorithm can segment normal...
Proceedings Article

Certificate-based Signature Scheme Based on Cubic Residues

Xuedong Dong, Xinxin Liu
In order to improve the efficiency of certificate-based signature scheme, a new certificate-based signature scheme based on cubic residue is proposed. The scheme does not need any bilinear pairing computation which is known to be difficult to computation. The scheme is secure against existing forgery...
Proceedings Article

Design and implementation of lock function in Android application

Hao Tang, Yongchao Wang
For the protection of user’s privacy information, when the mobile phone is lost in the hands of others or when others use their own mobile phones, while do not want their own privacy or security information is opened by others, this paper studies and implements an application lock function. Through managing...
Proceedings Article

A Retrieval System for Searching 3D Models from Web

Liu Yang, Jiale Wang, Xiang Li
As there are an increasing number of 3D models available on web, it is necessary to develop a system to help people find and get them. In this paper, we propose a system for content-based retrieval of 3D models on web. Users can submit an example 3D model to the retrieval system, and it will return a...
Proceedings Article

Ultrasound Image Denoising via Dictionary Learning and Total Variation Regularization

Shuai Li, Ximei Zhao
The restoration of images corrupted by speckle noise is a key issue in medical images. In this paper, a novel sparse model is presented for speckle reduction in ultrasound (US) images. This model contains three terms: a patch-based sparse representation prior over dictionary learning, a pixel-based total...
Proceedings Article

Supply-Demand Relation and Resource Allocation Model of Taxis in Internet Plus Era

Hailun Sun
This paper mainly studies how much effect those various subsidy schemes from taxi-hailing app companies can have on easing the difficulty in taking a taxi in the Internet plus era. First, two concepts are introduced. One is the concept of supply and demand matching index, quantifying supply and demand...
Proceedings Article

Robust stability analysis for BAM neural networks of neutral type with time-varying delays and linear fractional uncertainties

Yunxi Zhang, Jia Liu, Yongxin Li
This paper investigates the problem of robust stability for bidirectional associative memory (BAM) neural networks of neutral type with time-varying delays and linear fractional uncertainties. By employing integral equality and constructing a new Lyapunov-Krasovskii functional, a sufficient criterion...
Proceedings Article

The Improvement of Mean - Shift Algorithm and Kalman Filter of Tracking Moving Targets in the video of Robotic Fish

Jingying Wu, Xiang Wei
Several defects have been found in the former experiments of basic Mean shift algorithm, such as the erroneous judgments when target blocked by a large proportion of barrier. Thus, a fast target tracking algorithm based on Mean shift combined Kalman filter is proposed for the theoretical defect of basic...
Proceedings Article

Document Sentiment Classification based on the Word Embedding

Yanping Yin, Zhong Jin
N-gram feature is commonly used to represent document, however, it often leads to the curse of dimensionality. Sentiment classification based on word embedding and SVM is proposed. The method uses word embedding to represent document, which can make the final representation of the document consistent...
Proceedings Article

Artificial Bee Colony algorithm for Traveling Salesman Problem

Hongwei Jiang
Travelling salesman problem (TSP) is a fundamental combinatorial optimization model studied in the operations research community for nearly half a century. It belongs to the class of NP-Complete problems. It has been proved that evolutionary algorithms are effective and efficient, with respect to the...
Proceedings Article

The Passive Blast Protection Valve Flow Field Numerical Simulation and Movement Analysis

Caiyou MO, Xiangwei Zeng, Kefeng Xiang
For the accurate analysis of flow field inside the blast protection valve occurred after blasting and the valve core movement situation, it is concluded that more accurate dynamic characteristics of flow field, using the method of computational fluid dynamics (CFD), with the aid of software Fluent6.2,...
Proceedings Article

The Estimating Method of Military Aircraft R&D Cost Based on Hierarchical Partial Least Squares Regression

Shuai Shao, Jilian Guo, Anwei Shen, Zhuojian Wang, Wentong Jia
The requirements of using modern aircraft have been increased constantly, which results in different influencing factors of aircraft R&D and procurement costs. And the original model in the predication for R&D costs appears accretion of estimation especially for the extensive using of advanced avionics...
Proceedings Article

Efficient Three-point Iterative Methods for Solving Nonlinear Equations

Xiaofeng Wang
In this paper, we present a new family of three-point Newton type iterative methods for solving nonlinear equations. The order of convergence of the new family without memory is eight requiring the evaluations of three functions and one first-order derivative in per full iteration. Numerical examples...
Proceedings Article

A Novel Radon Transform and AR Model in Crack Detection

Siming Yang, Peng Xue, Ao Hong, Zhou Bo, Haicheng Liu, Mingri Cong
Aiming at the peak extraction problem in the radon space, a peak extraction method based on AR model is proposed to detect component crack value. A profile analysis technique is used to take profile in Radon space and reconstruct profile with AR model to get a sharp and prominent peak for crack value...
Proceedings Article

Thangka Image Retrieval Method Based on Sub-block Dominant Color

Wanpin Gao, Wentao Shen, Weilan Wang
In the light of the problem of lacking spatial knowledge of global color histogram and the characteristics of Thangka images, a method based on overlapping partition dominant color is presented. Translating color space from RGB to HSV, it designs overlapped sub-block to get the dominant color in each...
Proceedings Article

Secondary Reduction Algorithm Based on Grid and Curvature Method

Shigang Wang, Yong Yan, Shufeng Jiang
In reverse engineering, the point cloud data processing is the key, it will directly affect the quality and efficiency of the subsequent reconstruction of the surface. However, the amount of data obtained by three-dimensional laser scanning is often larger and redundant, which will increase the difficulty...
Proceedings Article

Function of Ant Colony Algorithm in Path Optimization of Urban Fire Truck

Shigang Wang, Yuchao Jiang, Fengjuan Wang
When the city burst fire, the city fire truck can reach the fire scene in the shortest time to carry out the fire is to reduce the loss of the core. Therefore, this paper introduces ant colony algorithm to solve the core problem, by building the model, using the grid environment information, search for...
Proceedings Article

A Survey of Maneuvering Target Tracking Using Kalman Filter

Zhongmin Li, Haochen Wu
Maneuvering target tracking technology is widely used in both military and civilian fields. Kalman filtering technique is the key technology for maneuvering target tracking. However, due to the uncertainty of the environment and the diversity of the sensors, the defects of traditional Kalman filter are...
Proceedings Article

Parallel Interference Cancellation for MIMO Radar Receiver

Ying-Hua Tian, Song Chen, Sheng Wang, Xin-Peng Chen
MIMO radar systems transmit different waveforms simultaneously to obtain multiple observation channels towards target, which also brings in interference between those signals. This paper introduces the communication technique denoted as parallel interference cancellation (PIC) into MIMO radar receiver....
Proceedings Article

Analysis of the effect of Propeller Slip Flow on Flight

Xiujuan Liu, Chunguang Wang, Song Li, Yuankai Li, Luofeng Lin
In view of the negative effects caused by propeller slip flow on flight, this paper used momentum theory combined with finite cubage to find the solution to N-S equation and numerical analogue and also analized propeller procession and disturbance of propeller slip flow to the flow field. Finally the...
Proceedings Article

Numerical Investigation on Chemical Equilibrium Slip Flow of High Altitude and Large Mach Number

Limin Song, Changdong Li, Kai Luo, Song Li, Yuankai Li
In the flight of hypersonic near space vehicle from 60km up to 100km high, the influence of real gas effect, rarefied gas effect, and Mach number effect cannot be simulated completely by the ground test. In this paper, the selection of computational model is introduced, and then carried out the numerical...
Proceedings Article

Numerical Simulation of Winglet to Optimization Design

Xiaolei Liu, Limin Song, Dun Jin, Tieyu Hu, Song Li
Test flight results show that, the induced drag reduces 15% that the plane tototal resistance will decrease 6.5% and the range will increase 7.5%. At present, new research and development aircraft, such as the Boeing787 "dream" aircraft and some airliners are in operation (Airbus A330, A340, Boeing737-800ER)...
Proceedings Article

The calculation and analysis of the trailing vortex influence in the flight of aircraft

Dun Jin, Shuqiang Wang, Tieyu Hu, Xiujuan Liu, Lei Yuan
In the flight, trailing vortex will be produced behind the aircraft. Because it is invisible and intensity is bigger, it would produce certain influence to flight safety. In this article, the composition of trailing vortex and the trailing vortex strength would be calculated, and the dynamic characteristics...
Proceedings Article

Study on Anomaly Detection in Crowd Scene

Jun Zhang, Yunxia Chu
Anomaly detection technology in crowd scene is very important in public place. Crowd detection differs from pedestrian detection which we assume no individual pedestrian can be properly segmented in the image. We propose a scheme which the scen can be treated the crowd motion patterns as the spatial-temporal...
Proceedings Article

Brain network for Chinese character processing and brain computer interface

Xiujun Li, Jingjing Yang, Qiyong Guo, Jinglong Wu
In this study, we used a 3T fMRI to investigate brain activations in processing characters and figures using visual discrimination tasks in which 13 Chinese subjects were shown two Chinese characters (36 pairs) or two figures (36 pairs). The control task (two figures) was used to eliminate the non-linguistic...
Proceedings Article

A Security Strategy Based on Multi-Dimension Location for Hierarchical Wireless Heterogeneous Sensor Networks

Yuquan Zhang, Lei Wei
A key management scheme based on multi-dimension location is presented for heterogeneous wireless hierarchical sensor networks. The wireless sensor networks consist of some nodes that have greater power and transmission capability than other sensor nodes. All kinds of nodes are deployed evenly in sensing...
Proceedings Article

The application research of cloud computing on mobile communication

Zhiming Yang, Fang Yin
Cloud computing is a platform based on the Internet, which can provide application service of a new calculation model for customers, and socialize computing service. Cloud computing will have a positive impact on the development of mobile communication due to its safe and reliable data storage and powerful...
Proceedings Article

Application of Synchronization Status Message Based on the Self-healing Ring Network with Synchronous Digital Hierarchy

Shuhua Yin, Hu Lei, Lu Tian
This paper studies how to avoid timing loop in the self-healing ring (SHR) network with synchronous digital hierarchy (SDH) and analyzes the generation and mechanism of timing loop in SDH local ring network as well as the harmfulness of timing loop to the network. Based on these results, a new method...
Proceedings Article

Computer Applications to Exact solutions of AKNS Hierarchy with Variable Coefficients

Sheng Zhang, Bin Cai
It is well known that computer has been widely used in almost all fields. In this paper, Hirota’s bilinear method with computer symbolic computation is extended to a new AKNS hierarchy with variable coefficients. As a result, one-soliton solutions and two-soliton solutions are obtained. Through the analysis...
Proceedings Article

Application of Improved Hybrid Compression Algorithm in GPS Data Compression

Xuebing She, Xin Zheng
In the paper we introduce a hybrid compression algorithm, which is the co- mbination of Huffman algorithm and RLE algorithm, for compressing the GPS data. This algorithm acquires statistical characteristics of GPS data according to the NMEA0183 protocol, mixes Huffman algorithm and RLE algorithm to compress...
Proceedings Article

Fast Recovery from Link Failure in Software De ned Survivable Network

Guoqiang Yan, Ming Lei, Jieyong Zhang
As the Internet becomes increasingly important to all aspects of society, it is critical to increase the survivability of the networks. A fast recovery algorithm was proposed by employing a centralized survivable controller to detect and recovery from link failures. A greedy strategy was used by relaying...
Proceedings Article

Caution on causality analysis of ERP data

Jikan Xue, Sanqing Hu, Jianhai Zhang, Wanzeng Kong
The event-related potential (ERP) technique is one of the most widely used methods in cognitive neuroscience research to study the physiological correlates of sensory, perceptual and cognitive activity associated with processing information [1,2]. An ERP eeg segment data usually involves three subsegments:...
Proceedings Article

SVH : A Lightweight Stream Cipher Based on Dual Pseudo-Random Transformation and OFB

Xuejun Dai, Yuhua Huang, Lu Chen, Tingting Lu, Sheng Zhao
A new lightweight stream cipher, SVH, is proposed. The design targets hardware environments where gate count, power consumption and memory is very limited. It is based on dual pseudo-random transformation and output feedback. The block of key size is 64 bits and SVH can achieve sufficient security margin...
Proceedings Article

Online K-Means Algorithm for Background Subtraction

Peng Chen, Beibei Jin, Xiangbing Zhu, Mingxing Fang
Background subtraction is an important step in video processing. GMM algorithm uses Gaussian mixture model to identify moving objects and efficient equations have been derived to update GMM parameters. In order to compute parameters more accurately while maintain constant computing time per frame, we...
Proceedings Article

Design of the Experiment System for Intelligent Low Oxygen Culture Box

Xingshan Li, Yuanshen Guo
System design is mainly used to detect the oxygen concentration in the incubator, display and control the test data, set oxygen concentration of the box. Through the management software to realize the historical data display and detection. The instrument measuring circuit is universal and can be realized...
Proceedings Article

The research and design of orthodontic platform framework

Weiguo Zhang, Sudong Cui
In view of the data sharing in orthodontic industry is not timely, correction case can not be shared, data dispersion problem, combined with MVC design pattern, software hierarchical structure, taking use of container framework Spring, integrated SpringMVC[1][2], Mybatis[3] framework, designed the dental...
Proceedings Article

A Design of Privacy Data Encryption and Decryption System for Data Security in Clouds

Wenjuan Cheng, Bing Tong, Miaomiao Zhou
With the rapid development of the IT technology, users increasingly rely on data. While cloud storage and other online service platform make user's privacy data protection become an important issue. In this paper, we have designed an encryption and decryption system for user's privacy data files, it...
Proceedings Article

Radon Transform Wave field separation and MATLAB implementation

Weiguo Zhang, Xinjie Zha
In order to offer a more effective method to separate wave field, this article studies linear and high resolution nonlinear Radon transform respectively, and discusses Radon transform from continuation and discrete. The program compiled by MATLAB can achieve linear and nonlinear Radon transform. The...
Proceedings Article

CloudTCast: A Video Distribution Solution Based on Cloud and Tree-based ALM

Weidong Gu, Lu Wang, Bin Gong, Huiling Shi
This paper studies a novel data distribution solution, named CloudTCast, for video multicast group. CloudTCast combines the advantages of cloud and tree-based application layer multicast (ALM). On the one hand, it uses the tree-based ALM to break the cloud's bandwidth limitation in delivering the video...
Proceedings Article

3D Video Conversion Method Based on the Depth of the Image Description

Huiyu Nie
In this paper, the method of "depth map" is used to convert 2D video to 3D video, and the method of depth map is studied. A method of creating a red and Blue 3D image based on depth image rendering (DIBR) is proposed for the problem of hole in the left view. According to the parallax information of red...
Proceedings Article

A cube model approach for Data warehouse

Zuyi Chen, Taixiang Zhao
The grain preservation feature guarantees that the translated multidimensional model will maintain cohesive granularity among the entities. Many data warehouse systems have been developed recently, yet data warehouse practice is not sufficiently sophisticated for practical usage. Most data warehouse...
Proceedings Article

A new web information fusion tool for web mining

Zuyi Chen, Taixiang Zhao
Most data warehouse systems have some limitations in terms of flexibility, efficiency, and scalability.In particular, the sizes of these data warehouses are forever growing and becoming overloaded with data, a scenario that leads to difficulties in data maintenance and data analysis.this reserch introduce...
Proceedings Article

Improbable Differential Attacks on Reduced FOX64

Chong Zhang, Zhiyi Qu, Zhendong Yu
FOX is a family of block ciphers designed by Junod and Vaudenay in 2004, which is the result of a joint project with the company MediaCrypt AG in Switzerland. Several attacks on reduced FOX have been proposed. In this paper we present an improbable differential cryptanalysis on the reduced-round FOX....
Proceedings Article

Design on Algorithm and Mechanism of Smog Image Sharpening Procession

Li Zhao
this paper makes simulation and analysis on several kinds of algorithms such as global, SSR, MSR, MSRCR etc in Retinex algorithm, it summarizes the advantages of MSR algorithm and makes improvement on it, it also puts forward to combine global, part with Retinex algorithm together, meanwhile it makes...
Proceedings Article

The Application of Joint Optimization Method using GA for Load Forecasting

Junsong Qin, Dongxiao Niu, Jinpeng Qiu, Ling Ji
Since load forecasting plays an important role in the planning and operation of power industry, substantial efforts are made in improving the accuracy and reliability of load forecasting. In this paper, we develop a novel hybrid approach based on phase space reconstruction and least square support vector...
Proceedings Article

Anti-submarine Patrol Aircraft’s Responding-antisubmarine Effectiveness Model Research by Using Magnetic Finder

Yaoqing Zhang, Guangyuan Wang
According to the characteristic of responding-antisubmarine, this paper analyzes submarine maneuvering model and anti-submarine patrol route model combining anti-submarine patrol aircraft and using the method of magnetic finder searching under the condition of responding-antisubmarine, establishes the...
Proceedings Article

Design and Realization of Process Control System based on VB Configuration Software

Bei Sun, Yan Bai
Taking VB as a developing platform,the thesis constructs a real-time,interactive and extending virtual laboratory system.This system can make full use of network resource,reduce hard ware investing,which makes it a low-cost,high profit information-based foundation with prodigious practical signification.
Proceedings Article

Numerical Study of Radical Reaction in Kerosene Auto-ignition

Lan Li, Qi-sheng Chen
Spontaneous emission signal had different curves of kerosene’s auto-ignition in shock tube under different temperature conditions, and OH* radicals concentration time history was numerically investigated. Two component surrogate fuel model (n-decane+trimethylbenzene) was used to validate consistency...
Proceedings Article

Research on LSSVM based on analytic selection and simulate anneal arithmetic

Dan Yang, Lie Zang, Lu Gan
In view of the existing situation of artificial parameter selection in the fitting process which using the LSSVM software reliability model, the combination method of analytic selection (AS) and simulate anneal arithmetic (SA) is proposed for parameter selection, then obtain the improved software reliability...
Proceedings Article

Near Point Algorithm and Approximate Beam Method for Solving Variational Inclusion Problem

Ji-feng Zuo, Xue-chang Wang
It is well known that the variational inclusions are equivalent to the fixed point problems. A hybrid proximal point algorithm is considered for solving the general variational inclusions. And convergence analysis for this algorithm is explored along with some results on the resolvent operator corresponding...
Proceedings Article

A Modified Identity-based Signature Scheme Based on Cubic Residues

Xuedong Dong, Xinxin Liu
Wang et al. [Z.Wang, L.Wang, S.Zheng, Y.Yang and Z.Hu, International Journal of Network Security, 14(2012)33-38] proposed an identity-based signature scheme based on cubic residues. But the scheme is insecure because it cannot withstand a conspiracy attack by users. To overcome this security vulnerability,...
Proceedings Article

The Quality Evaluation Method Research on Cloud Cover Image Based on Statistical Analysis

Yanjie Wang, Jianjun Zhou, Li Jia
Cloud cover is a key factor which affects the quality of aerial and remote sensing image. In order to precisely evaluate the impact which brought by cloud cover, article constructs a cloud detection algorithm which suits for aerial image according to cloud statistical characters; analyzing the cloud...
Proceedings Article

Static Analysis of Memory Leak in Android Applications

Di Zhou, Zhengyu Fu
The popularity of Android applications have grown dramatically in the last few years. Android applications run on mobile devices that have limited memory resources. Although Android has its own memory manager with garbage collection support, many applications currently suffer from memory leak vulnerabilities....
Proceedings Article

Single Machine Schedule Problem with a Fixed Unavailability Interval and Rejection

Xie Xie, Xiangyu Kong, Yongyue Zheng
We investigate a single machine scheduling problem with a fixed unavailability interval on machine and rejection job. The objective is to minimize the sum of the flow-time of the accepted jobs and penalties of rejected jobs. For the demonstrated NP-hard problem, we first propose a dynamic programming...
Proceedings Article

A Light Weight Energy Profiling Approach on Android Devices

Peixing Yang, Di Zhou
In recent years, the popularity of smartphones increases rapidly. Although the smartphone market is a sharp increase, its utility is still limited to the battery life. Therefore, much research effort has been made in order to understand the power consumption of the application to run on mobile devices....
Proceedings Article

Multi-image Evaluation of Product Color Design based on Grey Relational Analysis

Zhi-xue Sun, Le Zhang, Chen Chen
To realize multi-image scheme selection of product color design, the grey relational analysis method was introduced into product color evaluation process. Through multi-image acquisition of product color design, users were asked to give their scores of each color scheme according to target multi-image,...
Proceedings Article

Applications of Push Technology in Mobile Social Network Development

Suduo Li, Kaiying Deng, Jingwei Deng, Yingxing Li
With the rapid popularization of smart devices, the traditional social network based on PC is gradually transferred to the mobile Internet. For the problems of mobile devices such as small screen, low power, bad browse experience, etc. using information push technology to publish and access real-time...
Proceedings Article

Analysis of the information management level optimization of the information security in E-commerce

Qiumei Hu
In the rapid lead of the economy and information technology, electronic commerce has been developed rapidly. It is triggered a new round of the information security problem of e-commerce, information security is the platform of fundamental business can run smoothly. This article elaborates mainly the...
Proceedings Article

Screening Method Research on Main Water Polluters of Liao River in Fushun

YongYong Wang, Xiang He, Runlei Cai, Fan Wang
The water polluters of Liao river basin in Fushun is elected preliminarily basing on the basin of the key water polluters of Fushun city, combining with the principle of polluters screening and the computing method of equal standard pollution load, optimizing and assessing the indexes which involves...
Proceedings Article

Data mining and analysis based on online teaching platform

Wanjiang Han, YiZhen Wang, Yi Yang
With the rapid development of the network and multimedia technology. students no longer simply rely on the teacher's teaching to obtain knowledge. This paper takes Beijing University of Posts and Telecommunications as an example to introduce the online course platform, which provides a wealth of teaching...
Proceedings Article

Real-time and Accurate Acoustic Indoor Localization With a Smartphone

Xiangji Wen, Danjie Huang, Wenhao Fang, Feng Lin, Yifan Huang, Zhi Wang
The requirement for specific indoor location is more and more pressing. However, traditional approaches can only achieve a low accuracy. In this paper, we put forward a new approach to evaluate the target position with the acoustical Linear Frequency Modulation Signal(LFM). Comparing with other acoustical...
Proceedings Article

Research of Augmented Reality based on Unity3D

Jiahui Du, Pengkai Xu, Tingyu Hong, Yadong You, Fei Guo
At present, the development of the game is more and more quickly, in order to meet the demand of mass on the reality of the game interface, this paper introduces the technology of augmented reality and Unity3D respective characteristics and specific content, and then the analysis of augmented reality...
Proceedings Article

Degradation sensitivity of the image quality of UAV remote sensing based on CCD array Motion

Weixin Yang, Chuanrong Li, Guangyu Liu
Due to the CCD array and scenery relative motion, the image quality would be degraded. In order to get the relationship between the CCD array move quantity and the image quality, the corresponding degraded images are achieved by changing the CCD array velocity, pitch, roll and yaw variation. Then, the...
Proceedings Article

The research on software project schedule prediction and controlling

Boru Xu, Aihua Ren, Sidou Dong, Xin Wang
The control of software project schedule has been the emphasis and difficulty of software project management. Many software companies are focus on qualitative predicting and controlling of project schedule. Lacking of quantitative prediction of project schedule, it is difficult to quantitatively manage...
Proceedings Article

A network traffic classification method based on quintuple feature and regular expression matching

Shujuan Qiao, Yi Zhou, Leiyue Zhou, Liancheng Zheng
A traffic classification method, based on quintuple feature and regular expression matching, is presented for the requirement of instantaneity and accuracy in the process of network traffic classification. First of all, the method proposed uses quintuple information recognition technology to classify...
Proceedings Article

Music Recommendation System Design Based on Gaussian Mixture Model

Yang Lu, Xuemei Bai, Feng Wang
The paper establishes a double-layer classifier based on Gaussian Mixture Model and the Thayer model to divide the music style into several categories. On the basis of effective verification of experiments, the music listening experience is added into the model to analyze and normalize two-dimensional...
Proceedings Article

The Modification and Implementation of Campus Network Client

Lingfang Huang
In this paper, the campus network client certification mechanism is analyzed, replacement client is rewritten, the stability is greatly improved and the sharing function of WiFi is strengthened.
Proceedings Article

A Modeling method for Reconfigurable Processor Performance Analysis

Minhui Hu, Guanwu Wang, Kongfei Du, Sikun Li
Coarse grained reconfigurable architecture (CGRA) has become an important solution for high performance computing because of its high speed up ratio for computation intensive applications, fast configuration, good adaptability and low power consumption. However, the traditional performance analysis method...
Proceedings Article

Log System Based on Software Testing System Design And Implementation

Yan Liu, Dahai Jin, Dalin Zhang
Defect testing system is developed in recent years, which is a source code static analysis technology, mainly used in automatic or semi-automatic software defect detection and prevention, this kind of defect testing tools due to the characteristics of high efficiency and easy to use, has been widely...
Proceedings Article

College Teachers' Physical Health Medical Evaluation Research Based on Linear Regression

Fanfei Ge, Shujian Kao
According to current situation of college teachers’ physique health, with the help of college teachers' physical examination data, on the basis of physical health evaluation system, using multiple linear regression method, established college teachers' physical health data model, designs and realizes...
Proceedings Article

Numerical simulation of natural convection in square cavities with power function temperature wall by lattice Boltzmann method

Xin Tian, Zhengwei Shui, Chiyuan Ren
In this study, a thermal lattice Boltzmann model is employed to investigate the natural convection in square cavities with power function temperature boundary. The horizontal wall of cavities is adiabatic, and the temperature at the west and east wall is set to constant or a power function. Four cases...
Proceedings Article

Improved retinex image enhancement algorithm based on bilateral filtering

Ya’nan Yang, Zhaohui Jiang, Chunhe Yang, Zhiqiang Xia, Feng Liu
In view of such problems as halo and color distortion for the traditional Retinex enhancement algorithm, an improved Retinex image enhancement algorithm based on bilateral filtering was proposed. In the HSI color space, firstly, the gamma correction was utilized to adjust the brightness of the image....
Proceedings Article

A Modified Method On The Point Spread Function Of Motion Blur Image

Zewei Duan, Lei Qin
In order to effectively restore the motion blurred images, this paper analyzes the point spread function (PSF) under the uniform linear motion module and simplifies the PSF into binary function constituted of blur extent and blur direction. The paper adopts the direction of differential operator based...