Proceedings of the 2016 4th International Conference on Machinery, Materials and Computing Technology

Session: Session 3: Computer and Computing Technology

176 articles
Proceedings Article

Modeling and Simulation of RLS for Adaptive Noise Cancellation

Zhongyu Hu, Qiang Yue, Weiming Chen
In this paper, an adaptive noise cancellation system based on RLS algorithm is presented, and the principle of noise cancellation system and the steps and processes of RLS algorithm are described. The simulation of adaptive noise cancellation system based on RLS algorithm is obtained by using an example....
Proceedings Article

A Scheme of Multi-path Adaptive Load Balancing in MANETs

Yang Tao, Guochi Lin
The majority of multi-path routing schemes in Mobile Ad-hoc Networks (MANET) does not consider the traffic distribution and load balancing routing performance, increasing network overhead, excessive energy consumption and other issues. We propose a scheme to achieve load balancing when the topology changes...
Proceedings Article

Increasing damping ratio of high speed aircraft by terminal sliding mode method

Guangbin Wu, Guoqiang Liang
A special method to increase damping ration of a kind of high speed vehicle was proposed by constructing a kind of terminal sliding mode surface. As the increase of damping ratio of flying system, the stability and stable margin can be greatly improved which is also a most important point cared by many...
Proceedings Article

Research and Realization of AP Clustering Algorithm Based on Cloud Computing

Qiang Yue, Zhongyu Hu, Xinhua Lei, Xiaoming Li
With the extensive application of network, massive growth in the scale of data through cloud computing has been observed. Cloud computing is a powerful technology to perform complex computing, and applications running on cloud computing with Hadoop architecture are increasing. In this paper, after studying...
Proceedings Article

Research on Routing Choice of Computer Network Based on Improved Quantum Evolutionary Algorithm

Xin Cao, Yana Zhang
According to the problem of poor optimization performance and convergence performance of the current computer network’s optimal routing algorithm, this paper puts forward the improved quantum evolutionary algorithm based on computer network routing. On the basis of traditional quantum evolutionary...
Proceedings Article

Research on Reliability Optimization Calculation of Computer Network Based on Genetic Algorithm

Yana Zhang, Xin Cao
To decrease network link cost is one of the most important paimsrs for computer network reliability optimization design. In order to make the network cost minimum, the network link medium cost, mathematics mode of reliability and resolve algorithm must be considered when it is designed. In the paper,...
Proceedings Article

Research on Solving Timetabling Problem Based on Improved Retrospective Algorithm

Jie Song
The algorithms for timetabling have been widely studied but there are no perfect solutions for it yet. Through investigating and comparing the existing algorithms, it has been found that these algorithms can be classified into two categories designated as constructed algorithms and modern algorithms,...
Proceedings Article

Research on Computer Network Security Assessment Based on Fuzzy Analytic Hierarchy Process

Chun-yuan Li
The hierarchy model of computer network security assessment was constructed in light of the characteristics of computer network and the factors influencing the network security. The fuzzy analytic hierarchy process based on triangular fuzzy number was applied to assess the network security comprehensively...
Proceedings Article

Research of computer image aesthetics’ classification and assessment based on support vector machine

Jian-liang Xiong, Yan-mei Yang
Computer image aesthetics is an interdisciplinary research field, which covering visual arts, psychology, information theory and other disciplines. And it depends on the image processing and computer vision to solve specific problems. This paper will design a comprehensive computer image aesthetic evaluation...
Proceedings Article

Research of computer network security evaluation based on RBF neural network

Yan-ling Zhang, Jian-liang Xiong
Nowadays, computer network is widely used in many areas of daily life. Since the affectation of vulnerabilities and viruses, there will be a variety of security issues in the application process of computer network. In order to provide effective protection for computer network security, computer network...
Proceedings Article

Application of DEA Method in Computer Network Security Evaluation

Yan-mei Yang, Yan-ling Zhang
Since the affectation of vulnerabilities and viruses, there will be a variety of security issues in the application process of computer network. In order to provide effective protection for computer network security, computer network security evaluation system should be established. This article will...
Proceedings Article

Research on Computerized Simulation of Occlusal Contacts for Complete Denture Based on 3D Digitized Modeling

Wei-can Chen
Aiming at solving the problems on dynamic occlusion of complete denture in the field of dental restoration, this paper presents a computerized system from the viewpoint of integration of related disciplines. Firstly the displacement matrix of mandibular movement on Hanau articulator is established by...
Proceedings Article

Research on Estimation for Architectural Project Cost Based on BP Neural Network

Jing Zhao, Li Zhao, Yi-wei Ren
The estimation of project cost affects the rationality of project invitation for bid. According to the principles of construction budget estimate, the main character index is identified as a model example, and the char index is transformed into a numeric character index. At the same time, the BP neural...
Proceedings Article

A kind of packet reordering analysis model in concurrent multipath transmission

Yang Tao, Jiayong Zhang, Xuanrui Xiong
Focus on the problem of packet reordering in concurrent multipath transmission which lead to an unnecessary fast retransmit and increase in network load, reduces the utilization of network resources.This paper put forward a kind of packet reordering analysis model in concurrent multipath transmission...
Proceedings Article

Feature Extraction of ROI on Image

Zhenyu Han, Jihong Wang, Tianshe Yang, QingE Wu
This paper presents an algorithm of image segmentation of region of interest (ROI), extracts the ROI of a palmprint image and studies the composing features of palmprint. This paper constructs a coordinates by making use of characteristic points in the palm geometric contour, improves the algorithm of...
Proceedings Article

The study about the water strategy of America which is based on the data analysis of the MATLAB software

Yilin Li
This article explains and demonstrates the study about the water strategy of American which is based on the data analysis of the MATLAB software. This society is an era which is consisted of data. The formulation of some policies and the reform of some systems need the help of data simulation. In this...
Proceedings Article

A Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network

Shaojun Wu, Liqian Wang, Yueying Zhan, Guangheng Zhao, Jin Wang
In order to meet the requirement of space payload system and the data transmission, a scheme of periodical and concurrent dynamic bandwidth allocation (DBA) of switching FC-AE-1553 network was proposed based on both theoretical analysis and simulation approaches. Compared with traditional solutions,...
Proceedings Article

2D DOA estimation for non-uniform L-shaped array via a successive Capon algorithm

Weihua Lv, Wang Zheng, Qianlin Cheng, Xiaofei Zhang
Capon algorithm is a common algorithm for the estimating of direction of arrival (DOA). As it needs two-dimensional (2D) spectrum peak search which costs a tremendous computational complexity, in this paper, we propose a successive algorithm based on Capon algorithm for non-uniform L-shaped array to...
Proceedings Article

Low complexity 2D-DOA estimation algorithm for non-uniform L-shaped array

Donglin Yang, Qianlin Cheng, Weihua Lv, Wang Zheng, Xiaofei Zhang
In this paper, we discussed the problem of two-dimensional (2D) direction of arrival (DOA) estimation for non-uniform L-shaped array, and for this, a low complexity multiple signal classification (MUSIC) algorithm is proposed. The proposed algorithm uses two one-dimensional searches to achieve the joint...
Proceedings Article

Successive PM–based 2D DOA estimation for non-uniform L-shaped array

Weihua Lv, Qianlin Cheng, Wang Zheng, Xiaofei Zhang
Propagator Method (PM) algorithm is a common method for the estimation of direction of arrival (DOA). As PM algorithm has no eigenvalue decomposition of the covariance matrix which is needed for MUSIC algorithm, it already has a lower computational complexity relatively. In this paper, we proposed a...
Proceedings Article

A Software-Defined Networking Security Controller Architecture

Fengjun Shang, Qiang Fu
With the development of the software-defined networking (SDN), centralized and open network management has brought many security problems. In this paper, we analyzed the security problems in SDN architecture, and then designed a SDN security controller architecture. We verified the feasibility and effectiveness...
Proceedings Article

Research on Pre-coding Technology Analysis of LTE Systems

Zhiyong Ren
As the demand for wireless communications become more sophisticated, the wireless communication system also received an unprecedented flourish. LTE as the evolution of 3G systems, which greatly enhance the spectrum utilization system, it is possible to obtain higher than traditional wireless communication...
Proceedings Article

The Analysis on the Techniques and Skills of the Action Set in the Three-Dimensional Animation Manufacture

Xiao Zhang
With the rapid development of information, 3D animation technology has become the indispensable technical means in the field of video effects, education and scientific research. The three-dimensional animation is a comprehensive art. The action set has been the key step in a three-dimensional animation....
Proceedings Article

Research of the Management Information System Comprehensive Assessment Model Based on BP Neural Network

Zhirong Liang, Qi Xue, Dawang Cheng
In this paper, on the basis of building management information systems (MIS) evaluation index system, we propose neural networks based integrated evaluation method for management information systems. It can simulate evaluation made by experts and avoid subjective mistakes. The results from the simulation...
Proceedings Article

Research on the Access Control and Communications Security Research Based on Hadoop Big Data Processing

Yanhua Hu
Hadoop is an open cloud computing platform. Cloud computing is a new computing model. It derives from distributed computing, grid computing etc, integrating available valid resources and providing computing resources, storage resource for user as service. The object faced by cloud computing could be...
Proceedings Article

Research and Application of Mobile Geographic Information Service Technology Based on JSP

Chengtong Guo, Yan Yao
In this paper, scientific statistical data and geographic location information are combined. A JSP design scheme of mobile geographic information service system is put forward. This system displays statistical data on the map in many ways. Besides, HTML5 technology is also used to achieve a visual, vivid...
Proceedings Article

A Histogram Equalization Algorithm about Second Generation Wavelet Integer Transform

Jianye Peng, Yi Zhang
In view of the traditional processing defects of histogram image, this paper proposes a new histogram equalization algorithm about second generation wavelet integer transform. Firstly, the method of three level lifting was used to improve to the wavelet integer transform and to extract the low frequency...
Proceedings Article

Research on OFDM System Dynamic Allocation of Wireless Resources

Juan Wang
OFDM (Orthogonal Frequency Division Multiplexing) system dynamic resource allocation can be utilized effectively limited system power and spectrum resources, improve system performance and those are widely studied. This article focuses on the resource allocation problem of a single-user, multi-user and...
Proceedings Article

Research of Distributed Systems on Local Area Network

Wenliang Qu, Fumei Liu
Large-scale distributed storage system has the advantage of high scalability, has become a research and development direction of the storage areas and has a wide range of applications in the major internet companies and corporate data centers. Due to complex function of large-scale distributed storage...
Proceedings Article

Study and Application on Security Technology of Computer Information System

Yan Liu
In this paper, the secure policy on application of the computer information system, the secure principle, secure layer, secure service and secure architecture model of the development of computer information system are mainly studyed on this thesis. The developing situation both home and abroad about...
Proceedings Article

Developing Situation and Research Advances of Structural Damage Detection Using BP Network

Jinsheng Fan, Ying Yuan, Xiuling Cao
The basic method, research status and development of structural damage identification technology based on BP network are reviewed and summarized, and then the advantages and problems of various methods in theory and practical application are discussed. The development trend and research direction of...
Proceedings Article

Key Anti-Jamming Technologies and Their Performance Comparison in Frequency Hopping Communication System

Yuan Yuan
Wireless communications have been applied to every aspect of our life with the development of modern communication technologies, which makes the problem of interference more critical. Especially for the frequency hopping (FH) systems, the application scenario of them is very complicated. Developing anti-jamming...
Proceedings Article

Cloud Computing Security Challenges and Critical Technologies of Its Protection

Yuxing Yang
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. With the continuous evolution of global information processes, cloud computing has become a new Internet service model following distributed computing, parallel...
Proceedings Article

The Design and Implementation of Tourist Perception Information Service System based on Web

Yan Liu
This article is based on an in-depth investigation of tourist information system and its current situation. Taking into consideration the requirements of tourist information system by using the computer science, network technique, the database technique and management principles and methods, we designed...
Proceedings Article

Evaluation of Effects and Mechanism of Hedysarum Polybotys Saccharide on Ventricular Remodeling in Mice Model

Bo Liu, Weisi Feng, Qiuyang Yu, Mingcheng Li, Ruowen Zhang
Objective To study the effects and mechanism of Hedysarum Polybotys Saccharide (HPS) on ventricular remodeling induced by isoprenaline (ISO) in the mouse. Methods Ventricular remodeling model was induced by subcutaneous injections of ISO for continuous fourteen days. Mice were randomly divided into control...
Proceedings Article

A Novel Frequency Estimation of Sinusoid by iterative interpolation DFT algorithm

Chao Huang, Jidong Suo, Guiming Shi
The frequency estimation of sinusoidal signal based on discrete fourier transform (DFT) is investigated, which performance is caused to decline due to the error of interpolation direction when the signal frequency is close to quantized frequency of DFT. To solve this problem, a new algorithm without...
Proceedings Article

Ad hoc on-demand Distance Vector Routing Protocol Based on Delay Forwarding

Yunjie Zhu, Yongqiang Li, Qinggang Fan, Yibin Wu
The ad hoc on-demand distance vector routing protocol based on delay forwarding (AODVDF) is proposed aiming at the problem of extend networks lifetime due to the limited energy in nodes. The turbulence phenomena in on-demand route protocol is presented, the delay forwarding technology is introduced in...
Proceedings Article

Research of SNMP-based network topology discovery algorithm in IOT

Minglang Yang, Chuanchang Liu
Due to the rapid development of the IOT, more and more devices in the network need to be connected to the IOT. Device management and device auto-discovery has become increasingly important. Network topology is a way to describe the logical or physical connections between network devices, and it is extremely...
Proceedings Article

The Design and Implementation of Combined System Based on Internet Resource Model

Shuzheng Luo, Chuanchang Liu
For the past few years, more and more applications and services need to interact with information from real world. Therefore, many researchers are focus on theories and techniques about the Internet of Things and more enterprises have already adopted this new-generation information technique marked with...
Proceedings Article

Multi-keyword Ranked Search with Fine-grained Access Control over Encrypted Cloud Data

Jingyu Lei, Jiao Mo
With the development of cloud computing, people have become accustomed to using these cheap and convenient services provided by the cloud server for data storage and processing. For protecting data privacy from leaking information to unauthorized users, probably including the cloud service provider (CSP),...
Proceedings Article

Optimization of Rear Ordnance Depots Supply Business Process Based on GSPN

Jin Chen, Jun Gao, Mi Lei
Rear ordnance depots are important middle tones of our equipment support system.It’s responsible for the campaign tasks of ordnance equipment storage and supply. Utilizing GSPN to analyze rear ordnance depots support business process quantitatively. Describe business process from the three aspects:...
Proceedings Article

HBase based storage system for the Internet of things

Yun Zheng, Chuanchang Liu
Internet of things(Iot) continually produce a large amount of data , need to collect, process, storage, analysis and make use of these data. There are too many nodes in the Internet of things, the data is huge, and it needs a distributed data management system to manage and integrate. For the traditional...
Proceedings Article

Study of Network-Centric Maintenance Intelligent Decision Technology Based SOA

Hongyu Ge, Quan Shi, Wei Xia, Zhifeng You
For the development of modern information technology, take the advanced concepts and new technologies, new methods of foreign maintenance aspects as lessons, adopt a network-centric technology to build SOA-based network maintenance intelligent decision technology. This paper introduces network maintenance...
Proceedings Article

Cosine similarity measures for dual hesitant fuzzy sets

Wei Qiu, Guangchun Zhang, Lei Zhu
The Dual Fuzzy Sets (DHFSs), originated by Zhu and Xu [1], is a useful tool to deal with vagueness and ambiguity. In this paper, we propose one new measure called Cosine similarity measure for dual hesitant fuzzy sets, based on which the corresponding similarity measures can be obtained. We investigate...
Proceedings Article

Reliability Optimal Design of Cylindrical Torsion Spring with MIGA Algorithm

Hongchao Wu, Yueqiang Zhang, Yingsheng Huang, Mingsheng Zhang
Based on the design features of cylindrical torsion spring, this paper established a multi-objective optimization mathematical model for solving the problem of nonlinear constraint, and used MIGA algorithm to optimize the design with the conditions of strength reliability. Compared to the initial design,...
Proceedings Article

Predicting Noisy Data with an Improvement RBF Neural Network for Surrogate Models

Yaping Jiang, Guosong Wei, Xueyan Sun, Yueqiang Zhang
The process of noise data is a significant issue to the application of data. In this paper, we propose a method of processing noisy data based on improvement radial basis function (RBF) neural network to handle noise data. We establish surrogate models for two kinds of standard functions with noise data...
Proceedings Article

The Cloud Computing Load Forecasting Algorithm Based on Kalman Filter and ANFIS

Jian Sun, Yi Zhuang
The load forecasting in the cloud computing is one of the most important technologies to ensure the maximize utilization of the system resource. Under the premise that the load is known in the next stage, the cloud computing center can assign the physical machines in advance, thereby reducing the waiting...
Proceedings Article

Comprehensive Mobility Prediction Based Clustering Algorithm for Ad Hoc UAV Networks

Yunlong Yu, Le Ru, Kun Fang, Xufeng Jia
Clustering is an effective method which can increase the performance of large-scale ad hoc UAV networks. However, the ad hoc UAV networks have the feature of high mobility and quick network topology change, using conventional clustering algorithm will lead to the decrease of link connection lifetime...
Proceedings Article

A Network Intrusion Detection Algorithm Based on FSA Model

Fei Wu, Donghui Wu, Yingen Yang
At present network attack technology is constantly updated,which bring network security workers huge challenges. In view of the fact that the existing intrusion detection technology is difficult to detect multi-step fragmentation attacks, distributed attacks and evading attacks,a network intrusion detection...
Proceedings Article

A Cross-domain Deceptive Opinion Detection by Genetic Algorithm

Qiao-jing Tang, Wei-hua Li, Jing Zhao
With the maturing of the electronic commerce,many people will choose to shop online.At the same time the goods's reviews will influence the decision of people to buy goods,which has led businesses to deliberately write deceptive opinion to improve the sales of goods or undercut rivals .Aiming at the...
Proceedings Article

Research on Decoding Algorithm for(n, 1, m) Convolutional Code

Yamei Zou, Hongqiao Pu, Zhiqiang Xu
This paper takes (2, 1, 5) convolutional codes as example, disscusses the decoding algorithm for (n, 1, m) convolutional codes according to the principle of the reversibility of the modulo 2 operation.We designed the decoder and the syndrome of the (2, 1, 5) convolutional codesbased on its encoder firstly;...
Proceedings Article

Optimization for Manufacturing Process Based on Timed Petri Net and Genetic Algorithm

Tingpeng Li, Yue Li, Yanling Qian, Shuanggui Zeng
In order to improve the optimization efficiency, an optimization approach for Manufacturing Process based the Timed Petri Net (TPN) model and Genetic Algorithm is proposed in this paper. Firstly, the Manufacturing Process is modeled with Timed Petri Net (TPN). Then, an improved Genetic Algorithm (GA)...
Proceedings Article

An Expert System Approach for Analyzing and Evaluating the Testing Results of CTCS-3 On-board Equipment

Yong Zhang, Yuxi Yang
The on-board equipment is an important part of CTCS-3 train control system. In order to verify whether the on-board equipment complies with CTCS-3 system requirements specification, it is necessary to carry out functional testing in laboratory, in which a lot of professional expertise is needed, especially...
Proceedings Article

A Simulation Based Approach for Rationality Verification of Test Sequence for CTCS-3 Train Control System

Yong Zhang, Jingqiang Han
A CTCS-3 train control system is the key equipment for guaranteeing the safety, reliability and efficiency of high speed railway. Test sequence is the important document to guide the testing for train control system. Manual preparation of test sequence is characteristic of low efficiency and high demand...
Proceedings Article

Design of USB3.0 Video Transmission System with UVC Protocol Supported

JiangBo Li, ChunTing Ma, Fan Yang
A USB3.0 video transmission system with UVC protocol supported is designed. CMOS image sensor is used as photoelectric device. As a USB3.0 controller chip, CYUSB3014 acquires and processes data from CMOS image sensor, then converts the data to video that conforms to the UVC protocol. At last the video...
Proceedings Article

A Novel Remote Sensing Image Change Detection Algorithm based on Game Theory Analysis and Hierarchical Fuzzy Clustering

Xinyu Zhang, Xuan Zhuang, Hang Ji
A novel remote sensing image change detection algorithm based on game theory analysis and hierarchical fuzzy clustering is proposed in this paper. This technique integrates the Nash game theory framework and the hierarchical structured clustering approach. Characteristics of the image restoration and...
Proceedings Article

Multi-mode Collaborative Communication Technologies in Wireless Sensor Network

Lina Yuan, Jing Gong, Huajun Chen
For wireless sensor network (WSN), this paper is mainly concerned with how to make the longest lifecycle of the network. Because sensor nodes in WSN are usually used to collaborate on a common goal, it focuses on the optimization of energy consumption of the whole network rather than that of a single...
Proceedings Article

Research on the Present Situation and Development of 3D Reconstruction Software Based on Image

Shenglan Dong, Hongwei Zhang
With the development of 3D reconstruction software based on image, the number of this software is increasing, also they are different in theory. This article makes a brief introduction about 20 kinds of 3D reconstruction software based on image, and made a simple description and division.
Proceedings Article

Microfacies modeling method of seismic inversion constrained

Cong Huang
To enhance the interwell channel sand prediction accuracy of microfacies model, microfacies modeling based on sequential indicator stochastic approach is performed through integrated study and constrained by 3D seismic inversion and vertical fractional curve for sand body distribution and by using two-dimensional...
Proceedings Article

Research Multi-Sensor Data Fusion Algorithm based on the adaptive cubature kalman filter

Xiuguo Zhang
Cubature kalman filter is prone to filtering divergence if the system model is inaccurate or measuring abnormal. In order to solve this problem, the adaptive cubature kalman filter algorithm was proposed in this paper, it constructed a group of noise statistic estimators to estimate the statistical characteristic...
Proceedings Article

Analysis of Earth Gravity Tide Signal Based on EMD and Information Extraction

Dongjun Zhong, Haiyan Quan
Empirical Mode Decomposition (EMD) is a decomposition algorithm which is used to analyze nonlinear and time-varying. Different from the traditional signal analysis method, the decomposition is data-driven and self-adaptive. EMD has been widely used in blind source separation and received attention because...
Proceedings Article

Forestry Software Customization Design Based on Open Source

Huiliang Duan
Set up the framework of the forestry information systems software custom development platform based on open source software. Implements the data, general template, tools coarse-grained components of sharing. At the same time, the framework component coupling, convenient for function extension and modification....
Proceedings Article

The Design and implementation of network based on SDN Technology

Jinyi Zhou
In this paper, we propose a SDN based on the information network architecture to solve the problems existing in the current network, and try to avoid the problems existing in the information network. First the research development on the SDN technology , the information network were detailed introduction...
Proceedings Article

Complexity Analysis of Overall Behavior of Network Based on Topology Structure

Liping Zhang
In this paper, the complexity of the network integrity is analyzed based on the topology structure. The generalized scale free network model is used as the research object, which is defined to describe the complex degree of the overall behavior of the network. In order to understand the influence of...
Proceedings Article

the optimization research of MHD propulsion pipeline of the ship based on the MHD model

Chong Meng
Based on the MHD model of FLUENT software, we do a two dimensional numerical simulation about the MHD propulsion pipeline of the ship in electromagnetic coupling field. Having validated the established results, according to the research object, we make an appropriate simplification and assumption for...
Proceedings Article

The Knowledge Map of Intelligent System

Chunxue Wang, Xiao Suo, Shuran Lv
With the aim of drawing the knowledge map and understanding the research hotspot on intelligent system, the articles published from 2010 to 2015 have been searched with the keyword “intelligent system” based on the Web of Science database. The knowledge map of intelligent system was drawn by utilizing...
Proceedings Article

Research on Numerical Simulation of Profile in Bei 301 Block

Jing Li
By researching the development process and the status quo in Bei 301 block, this paper sets the three-dimensional geological model, fits the actual production data through using numerical simulation software, and determines the distributions of remaining oils ultimately. On this basis, this article designs...
Proceedings Article

A Numerical Method for Time Fractional Diffusion Equation

Guangzhen Song, Weijia Zhao, Jianfei Huang
Use block-by-block method and classic second-order central difference approximation to discretize its temporal direction and spatial direction, respectively. This new scheme can effectively solve a class of time fractional diffusion equations with initial boundary value conditions.
Proceedings Article

Methods Discussing to Improve The Efficiency of Pumping Unit Well System

Bao Zhou
In this paper, combined with the actual oilfield production, based on the well system efficiency of the pumping unit of yushulin oil field is generally low, according to the composition of the system efficiency, its main influencing factors are analyzed.From strengthening daily management work, strengthening...
Proceedings Article

The well pattern optimization of FuYang reservoir of Gaotaizi oilfield

Guan Yu
For low permeability reservoirs, the reasonable well pattern forms mainly depends on crack groups and bearing, Wells and well spacing depends mainly on fracture and the in situ stress field caused by seepage anisotropy, and the crack, the permeability ratio of the matrix;From the geologic features of...
Proceedings Article

Topology Optimization Analysis of the Working Arm in the Slag Pot Carrier Based on Hyperworks

Shihuai Shi, Ruifeng Guo, Yanhe Li
Aiming at the problem of great mass and low material utilization coefficient of the working arm in a certain type of slag pot carrier, the static analysis and topology optimization analysis of the working arm were carried out. The finite element model of the working arm was established by using the pre-processing...
Proceedings Article

Solar Shadow Positioning Algorithm

Wanqiao Wang
How to confirm the photographing location and the photographing date is an important aspect of video data analysis. Solar shadow positioning technique is a method to confirm the photographing location and date through analysis of solar shadow changes of objects in videos. According to the image-forming...
Proceedings Article

Research of Mobile Applications Automated Testing Using Uiautomator

Xiu Ming Wang, Xin Huang, Gui Zhi Li, Cui Ping Miao, Ning Shen
With development of the mobile technology, the quantity of the mobile application is also growing, and how to ensure the quality of the application has become a hot topic. Android is open platform for mobile devices, more and more developers like to develop application based on the Android system, which...
Proceedings Article

The Driving Control Strategy of Pure Electric Vehicle Based on Fuzzy Self-adaptive PID

Shi-wei Xu, Jing Lu, Xuan Zhao
For the problem of pure electric vehicle drive control, a speed-current double closed loop control strategywasproposed by using the fuzzy self-adaptive PID theory, and thevehicle simulation model was established in Matlab/Simscape.The performance of the drive control strategy was verified bystarting...
Proceedings Article

The transient simulation of two-phase flow based on lattice Boltzmann method

Liang Chen, Qin Yao, LuWu He
this work used the improved Shan-Doolen model which is based on Shan-Chen model, Combined of non-equilibrium extrapolation boundary and fully developed boundary treatment, and finally established Two-phase flow model. Applying this model, we firstly simulated the separation of two phase immiscible flow...
Proceedings Article

The Study of the Logistics Management Information System based on Android

Zhihai Liu, Dandan Zhang, Ronghua Zhang, Kaidi Yang
Starting from the actual demand of logistics enterprise information management, vehicle scheduling problem model was established and the solving method of model was found based on the ant colony algorithm. At the same time, based on Android and MySQL database development environment, the paper carried...
Proceedings Article

Visualization and Interaction Research of Digital 3D Heart Model

Xu Yang
The research of this paper can help medical researchers or ordinary people understanding the internal structure of heart and providing anatomic basis for clinicopathologic analysis of heart, heart anatomy teaching, surgical planning and visible simulation surgery of heart. Based on the heart anatomy...
Proceedings Article

Discussion on optimization of flight delays

Ying Dong Wang
Hong Kong South China Morning network according to FlightStats.com of statistics said: China of flights delays most serious, according to this problem, paper proposed has a optimization flights of scheduling optimization algorithm. Taking a certain period of time and a certain airport as the research...
Proceedings Article

Study on Solving Nonlinear Equations of Computers

Jia Hu
this paper provides the process for finding roots of nonlinear equations, and gives four root finding iterative methods, which are respectively the bisection method, Newton method, interpolation method and Aitken iteration method giving their solving algorithms and using an instance of f(x)=x3-3x+1 to...
Proceedings Article

Generation of 3D Sensitivity Map for a Helical ECT Sensor in Annular Space

Wanting Zhou, Yue Jiang, Shi Liu, Jing Liu
Annular space has been applied widely in industrial processes. However, the complexity of thermal process and the variety of influential factors lead to the difficulties. In addition, the sensor installation as well as the weak detection signal due to the barrier increases the detection issues. In order...
Proceedings Article

Attitude solver algorithm based on MUP6050 and HMC5883L

Ji Jin, Hongfei Wang, Donghui Liu, Xue Du
In aircraft control, getting the current aircraft attitude is foundation that we can control the flight of aircraft.In this paper,MUP6050 and HMC5883L sensors are used to measure aircraft attitude.As time goes on,the accumulation of integral error is growing,when the gyroscope is used to solver aircraft...
Proceedings Article

Research on fixed pattern noise de-noising of APS COMS

Tuo Zheng, Haiyang Quan
Star sensor is an important part of the attitude control of a space vehicle. At the time of image acquisition, CMOS sensors will have some fixed pattern noise which will affect the image capture effects. From the practical application, this article apply the average of de-noising algorithm to eliminate...
Proceedings Article

The Research on Image Binarization Based on Automated Line-heating

Hao Li, Jianhua Yang, Wei Lu
In this paper, a thresholding algorithm combining local and global region is proposed in order to perfect the vision of line-heating robot, segment foreground objects and background accurately, eliminate environment effects. The thresholding method combines the advantages of both local and global threshold...
Proceedings Article

Researches on the Way Cloud Media Fuse with Intelligent City

Zhiqiang Xu, Chongkai Shan, Yamei Zou, Haidong Li
With the prosperous development of the next generation Internet technology and the rapid popularization of intelligent ends, cloud media will shift from "one cloud end, multi-screen" to "user-centered" "endless interaction", becoming the next transformation of Internet and serving the world more extensively....
Proceedings Article

Signal-noise Ratio Recognition Algorithm Based on Singular Value Decomposition

Yi Qiao, Qian Cui, Wei Zhang, Yan Liu
Signal-noise ratio is an important parameter in modern wireless communication systems and an important indicator to reflect signal quality. An accuracy signal-noise ratio can provide signal quality information required for power control and channel decoder, etc. This paper proposes a blind signal-noise...
Proceedings Article

Research On Spam Filter Based On Improved Naive Bayes and KNN Algorithm

Biyi Ren, Yuliang Shi
In the field of data mining and pattern recognition, classification is a very important core technology. This paper present two kinds of improved classification algorithm. Using the improved Naive Bayes (NB) and KNN algorithm structure classifier to filter normal mail and spam. Improved NB algorithm...
Proceedings Article

Research on Sonar Fan-shaped image display

Hong Hong Jiao, Wei Dong Wang, Hao Zhou
In the field of underwater acoustic field, a good sonar data real-time display system plays an important role in the whole sonar system. This paper is based on a fact that the sonar scanning an image is formed by a fan-shaped which has a certain angle and the sonar image display is usually realized through...
Proceedings Article

A Distributed Chinese Naive Bayes Classifier Based on Word Embedding

Mengke Feng, Guoshi Wu
The Naive Bayes classifier is built on the assumption of conditional independence between the attributes in a given class. The algorithm has been shown to be successful in text classification. But when calculating the conditional probability these methods take two different words as two different feature,...
Proceedings Article

Quantum Route Selection based on Graph State

Lei Yan, Peng Luo, Hanyu Cui, Ronghua Shi, Ying Guo
Many quantum communication protocols involve multiple participants. With participants increasing, selecting designated legal participants in a nice way becomes more and more significant. In this paper, we develop a quantum route selection approach to the design of participant selection. Graph state is...
Proceedings Article

Analysis of hybrid immunization strategy in complex networks

Bin Liu, Shu Yan, Yumei Xue
In this paper, based on the classic SIR epidemiological model, we consider introducing hybrid immunization strategy including targeted immunization and acquaintance immunization to research on the proportion of infected nodes when the spreading of disease ends and the time steps of disease spreading....
Proceedings Article

Research on Model-based IMA Resources Allocation

Xiao Zhang, Lisong Wang
The ever increasing complexity of avionics system and amount of platform devices makes allocating the IMA resources more error-prone and harder to evaluate. This paper proposes a method of preliminary design of IMA platform based on models. The definition of system and platform respectively bases on...
Proceedings Article

Study on Storage life predicting Method of Missile equipment

Ke Li, Lian-yan Shi, Xin He, Huixia Jinag
In the paper, the mathematical statistical method is adopted to build a storage life prediction model of missile equipment. Data "mutation" and confidence area appeared in the process of the model parameters determining and life predicting are discussed, and several improved decoding algorithms for inefficient...
Proceedings Article

Integration Scheme and Strategy Research of Heterogeneous Database

Bin Chen, Dawei Ma
The integration of heterogeneous database as the important problem of heterogeneous data integration is catching more and more emphasis by the people. This paper will analyze the character of the heterogeneous database, and propose the scheme and strategy to realize integration of heterogeneous database...
Proceedings Article

Study on A System of systems of Life Cycle Quality Monitoring for Land force Strategic Missile System

Ke Li, Huixia Jiang, Shuyi Fan, Yan Li
Quality monitoring is a critical way to ensure quality of missiles and is valid guarantee for capability of missiles. The paper studies the constructive problem of a system of systems of life cycle quality monitoring for land force strategic missile in terms of the characteristics of missile equipment....
Proceedings Article

A Novel Emergency Message Broadcast Game based on Link Quality in Vehicular ad hoc networks

Xi Hu, XingGuo Cheng
In vehicular ad hoc networks, the typical problem broadcast storm always happen when vehicles are usually located quite densely within the range of radio transmission. In the paper, a novel emergency message broadcast game is proposed and the game takes nodes’ density and link quality into account,...
Proceedings Article

Design and Walking Algorithm of a Foot-Pad Omni-directional Locomotion Interface

Yuzhe Lu, Jianfeng Meng, Yunpeng Han, Xiaokang Shen, Jun Zhang
This paper proposes a novel foot-pad omni-directional locomotion interface, establishes planar walking algorithm for it in detail. The proposed locomotion interface allows users walking omni-directionally in a virtual environment, which can improve users’ immersion characteristic significantly. The...
Proceedings Article

A Method of Predicting Software Behavior Risk based on Off-line Runtime Verification

Lei Hu, Guohua Jiang
The current methods of software behavior risk prediction is mainly through the study of the operating rules from the data of the other software of the same type, and that leads to differences between the prediction results and the actual software behavior. Aiming at this problem, this paper presents...
Proceedings Article

An Energy Efficient Virtual Machine Migration Method in Cloud

Hongtao Liang, Jianliang Xu, Min Yuan, Mingtao Liu, Xiaohong Wang
Cloud computing, as a newly emerged service oriented paradigm, is emerging as a leading solution for on-demand services. One of the challenges faced by current cloud is to decide how to migrate virtual machine to another physical machine. This paper presents an energy efficient virtual machine migration...
Proceedings Article

Incremental Wavelet Neural Network based Prediction of Network Security Situation

Xiaojian Liu
Network security situation prediction can help network administrators to make security decisions, and the current network security technology cannot predict the future network security situation. Hereby, a network security situation prediction based on incremental wavelet neural network (IWNN) was proposed,...
Proceedings Article

Research on Cloud Computing Network Architecture Based on SDN Technology

Weibo Li
Traditional internet data center is shifted to cloud computing data center with rapid development of mobile Internet and cloud computing currently. Cloud computing network burden is aggravated as a result. More optimal cloud computing network architecture is required for replacing traditional cloud computing...
Proceedings Article

Numerical Simulation of Air Spray using the Eulerian multiphase model

Yan Chen, Shaowei He, Gang Zhang, Wenzhuo Chen, Junze Jiang
This work establishes an air spray model using the Eulerian multiphase model, and analyzes the spray cone shape and characteristic of paint droplets in the cone by performing computational simulations. Results show that the cross section of spray cone is elliptical. The distribution of big droplet phase...
Proceedings Article

Comprehensive DSRC Communication Testing Design and Support for Next-Generation Smart Vehicles

Qingquan Zou, Wei Zhang, Min Huang, Wenhan Huang, Sijun Li
DSRC plays an important role in current V2X communication market, but its performance in real environment is still not very clear which raise potential dangerous to both the passengers and the vehicle factory’s business. It’s important for the vehicle designer to know the communication performance...
Proceedings Article

Symbol error rate analysis of DMIMO antenna systems in linear cell

Rongrong Xu, Yueheng Li, Ping Huang, Meiyan Ju, Guoping Tan
In this paper, the symbol error rate of distributed MIMO antenna systems in a linear cell is analyzed. Firstly, a composite channel model which includes the fast fading, shadow fading and path loss is established. Then, a closed form expression of symbol error rate for point-to-point downlink MIMO communication...
Proceedings Article

An Infrared Image Super-resolution Reconstruction Method Based on Compressive Sensing

Yuxing Mao, Yan Wang, Jintao Zhou, Haiwei Jia
Limited by the properties of infrared detector and camera lens, infrared images are often detail missing and indistinct in vision. The spatial resolution needs to be improved to satisfy the requirements of practical application. Based on compressive sensing (CS) theory, this thesis presents a single...
Proceedings Article

Research on Personalized Information Recommendation of Library

Bo He, Hongyuan Zhang
Personalized information recommendation service of library had becoming an important research task. This paper divided library users into new users and other users. It proposed the recommendation strategy based on user segmentation. On the base of these, it designed a personalized information recommendation...
Proceedings Article

Impact of mutual coupling on performance of MIMO systems based on network theory analysis

Tuanjie Xue, Yueheng Li, Ping Huang, Meiyan Ju, Guoping Tan
In this paper, we investigated the performance of multiple elements array system such as receive power, signal correlation, channel capacity, and etc., in the presence of mutual coupling based on microwave network theory analysis. Combining S-parameter method and network analysis, the performance of...
Proceedings Article

A Time-Sensitive Spam Filter Algorithm Dealing with Concept-drift

Jiaolong Liu
Spam, under a variety of shapes and forms, continues to inflict increased damage. Varying machine learning techniques have played an important role in spam filtering field in condition that ample training data is available to build a robust classifier. These methods include Decision Tree, Support Vector...
Proceedings Article

A novel Implementation of Encryption Algorithms based on FPGA Gates

Huabo Zhang, Hongmin Gao, Xuetian Wang, Xiangzhi Yu
A novel implementation of encryption algorithms based on FPGA gates is described in this paper. The encryption algorithm is focused on different FPGA devices with the same number of cascaded NOT gates but have different time delays to signals. The cascaded NOT gates are achieved by programming. These...
Proceedings Article

Segmentation and Clustering of 3D Forest Point Cloud Using Mean Shift Algorithms

Xingbo Hu, Ying Xie
Segmenting individual trees from the forest point cloud has significant implications in forestry inventory. This paper presents a novel computational scheme to segment and cluster the 3D point cloud data acquired by an airborne LiDAR. The scheme employs a mean shift-based iterative procedure on the data...
Proceedings Article

Data encryption standard based protection method of privacy data on Internet of Things

Xiaohui Cheng, Zhongning Liang
There are a lot of information and network security threats along with the rapid development of Internet of things (IoT). This paper according to the environmental features of the IOT node limited hardware resource and its requirements, and takes aim at the privacy information security issues for the...
Proceedings Article

Design and Development of Wireless Communicating and Sensing Module for Medical Equipments

Shihua Cao, Qihui Wang, Lidong Wang, Huixi Zhang, Yuhai Wang, Manna Zhang
In view of the problems of poor equipment mobility and limited transmission distance when the existing hospital medical equipments transmits data to the hospital information system through wired connection, a type of wireless communicating and sensing module for medical equipments was designed, which...
Proceedings Article

Application of Maize Precision Fertilizer Expert System in the Maize Production

Yu-xia Yao, Yun Zhang
According to the nowadays production conditions of JinLin province, The effective system was developed by utilizing the knowledge of agricultural production, computer science and internet technology and so on in the paper. In order to reach the aim, the author combined theory model and quantitative research...
Proceedings Article

The Application of Multimedia Intelligent Rice Production System

Yu-xia Yao, Kun-hao Wang
In order to realize the intelligent scientific farming, multimedia rice production intelligence system was developed. The study to the water in the rice planting, fertilizer, soil, pests and diseases, weeds and other field management as the breakthrough point, using computer technology to realize the...
Proceedings Article

Communication Technology in the CompactRIO

Bin You, Ming Li
In order to solve the communication problems involved in acquisition system based on CompactRIO. Analysing data collection from FPGA terminal to RT terminal and elaborate RT terminal and PC terminal communication method. Comparing the merits of the single point polling acquisition model and collection...
Proceedings Article

Research and application of food safety Pre-warning model based on AHP and time series Association

Shilong Guo, Yong Wang
Establishing food safety warning system hierarchy based on AHP,through the HACCP system and the time sequence related knowledge, the food safety critical control index is obtained,combined with the nine level scale method, the five point scale scale to establish the judgment matrix and calculate the...
Proceedings Article

Research and implementation of Highcharts in patent map

Shilong Guo, Yong Wang
The B/S(Browser/Server) network structure plays an important role in computer architecture today, and it has become increasingly important to display the patent map in the browser, currently on the market circulation of a large number of patent map analysis software, but are generally very expensive...
Proceedings Article

Research of Automatic Test Case Generation Algorithm Based on Improved Particle Swarm Optimization

Weiwei Wu
The software testing is an important way to find bugs, and guarantee the quality and reliability of software. Automatic software case generation can effectively improve test efficiency, reduce test time and cost of development, so it has been widely concerned. Aiming at premature convergence and local...
Proceedings Article

Research and design of NFC mobile payment based on Android

Zhizhou He, Yijun Liu
For mobile payments using Near Field Communication,this paper summarizes weaknesses in its implementation by the Android Operationg System and vulnerabilities in hardware layer.a new NFC payment model is proposed using NFC shield in paper.this model is secured by design and can be implemented using existing...
Proceedings Article

Research and analysis of NFC mobile payment security

Zhizhou He, Yijun Liu
This paper analyze the development of NFC mobile phone payment, and elaborates the concept of NFC, discuss some technical problems in latest.Be directed against every layers of technical security problems in this field.
Proceedings Article

Joint 2D-DOD and 2D-DOA Estimation in Bistatic MIMO Radar

Hao Liang, Chen Cui, Jian Yu
In this paper, the issue of two-dimensional (2D) direction of arrival (DOA) and two- dimensional (2D) direction of departure (DOD) estimation for bistatic multiple-input-multiple- output (MIMO) radar with cross array is investigated. A novel multidimensional angle estimation methods based on unitary...
Proceedings Article

Fault Tree Establishment of Flight Conflict Based on the HAZOP Method

Qike Wu, Xusheng Gan, Dengkai Yao, Qianrui Sun
Aiming at the issues of subjectivity, coverage and ambiguity, this paper presents a systematic approach to constructing fault trees of flight conflict at airport based on HAZOP. First, the necessary deviation events are determined by associating the HAZOP guide words with the ATC parameters of terminal...
Proceedings Article

A Novel Bat algorithm of solving equation group

Huadan Duoji
To solve equation group problems, this paper constructed a bat algorithm. the algorithm was experimented and the experimental results show that the novel algorithm is effective for solving ill-conditioned linear equation groups.
Proceedings Article

A Novel Bat algorithm of solving 0-1 Knapsack Problem

Yanfeng Chen
0-1 knapsack problem is a typical NP complete problem. In this paper, based on the bat algorithm, combined with the idea of genetic variation, the paper introduces the processing rules of the active evolutionary operator, invalid bat and the current optimal position. The simulation results show that...
Proceedings Article

Research on Reliability of Aeroengine based on Grey Correlation Algorithm

Jian Zhang, Yanjun Li, Lina Zhang, Zhengqiang Cheng
With the rapid development of the aviation industry, the safety of aircraft is obtaining more and more attention. Engine is the key component of the aircraft, its reliability is increasingly important. This paper proposes a new method of reliability analysis for aircraft engine using grey correlation...
Proceedings Article

The Design of Constant False Alarm Module Based on CMLD-CFAR Algorithm

Mengjiao Wu, Jun Yang, Can Zhao, Xintao Huang
Deleting the average class of constant false alarm rate monitoring (CMLD - CFAR) ,which bases on an average constant false alarm rate monitoring(CA - CFAR) ,can not only overcome the ML type detector under the background of multiple targets detection problem of poor performance, but also address the...
Proceedings Article

An improved bat optimization algorithm of Sports Video

Qingmei Liu
In this paper, an improved bat optimization algorithm to solve sports video was proposed, which presented the concept of adjustment sequence to design the strategy of local searching, and added the maneuver flight in the global exchange of information. Experimental results indicate that, the proposed...
Proceedings Article

Application of firefly algorithm of solving equation group

Huadan Duoji
An improved Firefly Algorithm is proposed for solving equation group. In the proposed algorithm, a heuristic exchange rule is introduced. Finally, numerical testing results are provided, and the comparisons demonstrate the effectiveness of the proposed algorithm for solving the equation groups.
Proceedings Article

Application of plant growth simulation algorithm

Zhenen Fan
Permutation flow shop scheduling problem with total flow time criterion has been increasingly dealt with in recent years. A number of heuristics and meta-heuristics have been developed for this problem. However, the calculation of total flow time for job permutations spends too much computational time...
Proceedings Article

Application of firefly algorithm for job shop scheduling

Guiying Mai
An improved firefly algorithm is proposed for solving the job shop scheduling problem.Starting with the characteristic of job shop scheduling problem, combining disjunctive graph according to the sequence of scheduling, analyzing Scheduling options that decided by exchangeable set and alternative set,...
Proceedings Article

The Application Research of Improved Genetic Algorithm Based on Chaos for job shop scheduling

Juping Peng
An improved genetic algorithm is proposed for solving the job shop scheduling problem.Starting with the characteristic of job shop scheduling problem, Therefore, we use the advantage of chaos method and combine the simulated annealing algorithm to improve the genetic algorithm, and then We do a lot...
Proceedings Article

The Application Research of Improved Bat Algorithm for Time Table Problem

Wenxiang Liu
The time table problem is a typical NP complete problem, when the bat algorithm solves this problem; it will quickly converge, and can get the local optimal solution but not the global optimal solution. Therefore, we use the advantage of active evolutionary operator to improve the bat algorithm, and...
Proceedings Article

An Improved Algorithm for Dv-Hop Based on Hops Correction

Yujian Wang, Kaiguo Qian, Sunyan Hong, Chunfen Bu
For the disadvantage which is larger positioning error, the RSSI signal strength is used to calculate the hops between the sensors which make it more close to the real network; Meanwhile, the hyperbolic method is adopted to improve the unknown node location which eliminates the cumulative error and improves...
Proceedings Article

The Study of How to Arrange the Asset Structure with the Use of Information Theory and Cybernetics

Baifang Liu, He Chen, Xinyu Liu
Information theory and cybernetics pertain to science and technology, but it's theory principle has the role of guiding allocating the enterprise resource at the macro level. From a practical perspective, the assets structure could be regarded as an information system, through the collection, storage...
Proceedings Article

Design on Terminal Security Platform for Android System

Chunqiang Li
Android mobile terminal devices for security and sensitive data leaks and other problems, the design based on the Android mobile terminal security management platform, for the user carry on the security management for mobile terminal equipment and storage of data. Design platform to Android architecture...
Proceedings Article

Research on Multi-level Domain Name Comprehensive Information Management

Chunqiang Li
Domain name system are both the underlying business, but also an important part of the Internet infrastructure. Research for this article expand BIND domain name system management problems. First, four domain names, for example, study the structure of multi-level domain name system; Then, based on the...
Proceedings Article

Research on Module Function for Key Management System

Chunqiang Li
Abstract. The password technology is one of the core technology of information security problem. The purpose of the key management is the key of the production, storage, distribution, update, control and destroyed in the process of the whole life cycle to ensure the safety of the key. Key management...
Proceedings Article

Design on Micro Blog Distribution System Based on Struts2 Framework

Zhe Li, Yuqiang Yang, Houhua Shen
Micro blog content distribution becomes a bottleneck restricting the development of micro blog. In this paper, a study based on Struts2 framework provides technical support for the system development. Firstly, learning Struts2 framework, core controller, business controller and business logic components;...
Proceedings Article

Functional Requirements Analysis on Construction Project Cost System

Nannan Zhang, Jingzhao Luan
Construction project cost is the key problem in the control and management of construction project. For the existing cost system can not adapt to the development of the construction industry information needs of the status, this paper based on the use case model technology to the construction cost system...
Proceedings Article

Design and implementation of network streaming media play system based on DSP

Jinhai Zhang, Hongbing Qin
With the development of multimedia technology and the popularity of Internet technologies, network streaming media of communication have become multimedia communication is required. Using existing audio and video encoding and decoding algorithm can dramatically reduce the amount of data transferred,...
Proceedings Article

Research and application on the Data mining technology in medical information systems

Jinhai Zhang
After several years of vigorous development, theory and application of data mining technology has produced fruitful results. As an application of strong discipline, data mining technologies have permeated all areas of the national economy, caused great attention from academia and industry, have been...
Proceedings Article

Research on Internet of system based on communication network

Jinhai Zhang
In various fields of application of Internet of things endlessly, it development paints a bright future. However, the Internet application of common standards are not unified, compatibility between different Internet systems and scalable, these shortcomings and irregularities are restricted the application...
Proceedings Article

Research On Large outliers in the data set data mining algorithm

Jinhai Zhang
Main purpose of outliers mining is from a large number of, incomplete, there are all kinds of data, the found hidden in one of the people is not known in advance but potentially valuable information or knowledge. Outlier is a data: deviate significantly from other data, it does not meet the general patterns...
Proceedings Article

Research on the decision system of the ships evade bump based on the AIS

Jinqiang Tong
Automatic Identification System(AIS) is a way to transntificatifer large amount of information, overcoming barriers, resistance to weather influences, with ship shore, boat shipping information networking capacity and close global automatic identification system of the target display. Research directions...
Proceedings Article

Study on Software project management system based on DFD Editor version

Jinhai Zhang
Software process management system, the needs analysis is the basis for all work and source, is a top priority. Requirements analysis, software developers, project leaders and team members and between the software developer and software on the client side, requires adequate and convenient communication....
Proceedings Article

Study on simulation data analysis of complex system based on data mining method

Jinhai Zhang
Analysis of simulation data is purposefully collected data and analyze data, make this information or knowledge of the process is conducted in order to better understand and improve the system, is the focus of simulation problems. Due to existing simulation and data analysis methods, lacking to deal...
Proceedings Article

Research on Micro Energy Collection for Building Energy Saving Prediction

Hong Zhang
The diversity and complexity of large public buildings, our country's local climate, economy, life habits variation result in a lack of basic data to support energy-saving operation standard, energy saving technology for the reconstruction of the applicability and the lack of practical test, which leads...
Proceedings Article

The Evaluation of Bus Operation Reliability at the Stops Based on the Monte Carlo Simulation

Qiang Lin, Lei Zhai, Song Liu
To enhance the bus operation stability is the key to improve bus service. Traditional evaluation of the bus operation stability always relies on the whole line, the stability of the bus operation at the stops can not be reflected. Besides, traditional evaluation of the bus operation stability drawing...
Proceedings Article

Frequent errors in Calculus

Jixia Deng
Through years of calculus teaching, we found that the students in learning the universal existence question, that is, apply the principle and theory of problem solving, tend to ignore laws and theorems, resulting in incorrect solutions, the author try to this class of problems, summed up, remind students...
Proceedings Article

Image Information Extraction Model Based onMulti-features of K-nearest Neighbors

Anmin Xu
Bidirectional Reflectance Distribution Function (BRDF) and Bidirectional Texture Function (BTF) are two major methods used to describe the reflectance of light at a surface under different illuminations and different views. However, due to a large number of measurement data, an efficient compression...
Proceedings Article

Influence analysis of microscopic image quality in surface topography

Yingzhong Tian, Wenjun Zhang, Ji Qi, Tinggang Jia, Long Li
Focus variation is an optical contact-free method that allows the measurement of 3D surface metrology using optics with limited depths of field and vertical scanning. It was documented in the ISO 25178-6 for the first time in 2010. Based on this method, two categories of typical instruments are described...
Proceedings Article

Research on Service Driven Based Management Information System Reengineering in Cloud Environment

Yang Xiang, Shengbin Jia, Bo Zhang, Dongdong Lv, Dong Wang, Li Yang
With the emergence of cloud era, varieties of data resources, computing resources as well as service resources have been greatly enriched by many existing cloud platforms. Although these cloud resources have brought new opportunities for management information system reengineering, we are still facing...
Proceedings Article

An improved genetic algorithm for solving packing problem

Zhi-yan Li
Targeted at solving slow rate of convergence in the current genetic algorithm, an improved genetic algorithm is put forward in the article. The current genetic algorithm is improved by adding the best fit decrease algorithm to generate individuals into the initial population, conversing the preservation...
Proceedings Article

The Application of Wireless Broadband Communication for Smart Power Distribution and Utilization Networks

Yongjun Feng, Mingxia Li, Xiaohua Liu, Mingfeng Yuan, Yeshen He
The power wireless broadband communication is one of key support for smart power distribution and utilization networks, which is usually at the end of the power system communication network and deployed in where the optical fiber communication is not easy to achieve. In this paper, we design an application...
Proceedings Article

Evaluation of The faults of Data Security and Privacy in the Cloud Computing

Waleed AL-Museelem, Chunlin Li
Recently the topic of Cloud Computing use is considered to be a burning issue as this notion is rather new and still not studied enough. Therefore, its advantages and disadvantages are currently discussed by the specialists. According to the definition, Cloud Computing is “a model for delivering information...
Proceedings Article

The Algorithm for Evaluation of Landscape Water Quality based on intuitionistic fuzzy sets of emphasizing hesitancy degree

HaiFeng Wang, Kun Zhang, Zhuang Li, HongXu Wang
Distance measure of intuitionistic fuzzy sets(IFS) is a measure of the difference sizes between two IFS. The original distance measure definition is modified in this paper, the new distance measure definition and a new distance formula of IFS are provided. Pattern recognition method based on distance...
Proceedings Article

Identity Routing Symmetry Metrics for Routing Behavior

Fang Dong, Junbiao Liu, Shenyi Dai
Routing affects several protocols and impacts traffic analysis techniques. In this paper, an identity routing symmetry (IRS) metric is proposed to express network routing and its formulation is derived, which the forward and reverse flows coming from one node to another are exactly the same. IRS in three...
Proceedings Article

Plasma Wake and Interaction force for Diatomic Molecular ion Transporting through plasmas

Guiqiu Wang, Siyuan Liu, Yaochuan Wang
The objective of the present work is to study the interactive potential and forces for a diatomic molecular ion in plasma within the dielectric response theory.The results show that the interactive force shows the asymmetric property due to the wake effects. In addition, the force can be divided into...
Proceedings Article

Finite-Precision Implementation of Decoders for LDPC-Coded M-QAM Symstems

Jun Ao, Chunbo Ma, Guixing Cao, Cong Li
In this letter, we address the problem of a finite-precision implementation of demapper and decoder with parity likelihood ration algorithm for LDPC-Coded M-QAM systems. By exploiting the inherent property of the variations in bit reliabilities caused by QAM signal constellation, we introduce a novel...
Proceedings Article

Evaluating Mobile Cloud Computing Models

Mohammad Alshamaileh, Chunlin Li
Mobile cloud computing has been a popular technology in the market for almost a decade now. However, even as the technology continues attracting more users, certain aspects of mobile cloud computing are relatively challenging to users and developers. These aspects relate to the architecture of the setup...
Proceedings Article

Distance-based maximum likelihood estimation method for node localization in wireless sensor networks

Jing Xu, Jingsha He, Yuqiang Zhang, Fangbo Cai
Node localization is an important supporting technique in wireless sensor networks (WSNs). The traditional maximum likelihood estimation localization method (MLE) assumes that measurement errors are independent of the distance between anchor node and target node. However, the assumption may contradict...
Proceedings Article

Application of F5 (0.000001) in Forecasting Tourist Quantity of Sanya

Kun Zhang, HongXu Wang, HaiFeng Wang, Zhuang Li
The work proposed F5 (0.000001)—an element in the set of FTSFM 5 (Fuzzy Time Series Forecasting Model 5). It is a time series forecasting model established based on the variables of historical data, percentage of historical data, the percentage of percentage of historical data, and inverse fuzzy number....
Proceedings Article

Forecast of Tourism Revenues in Sanya Using F6(0.004)

Kun Zhang, HongXu Wang, HaiFeng Wang, Zhuang Li
F6(0.004) is an element of Set FTSFM 6 of fuzzy time series forecasting model. Its forecasting formula consists of historical data, difference of historical data, difference percentage of historical data and inverse fuzzy number. F6(0.004) was used to analyze historical data during 2006-2014 and forecast...
Proceedings Article

STC Tracking Algorithm Based on Kalman Filter

Panqiao Chen, Mengzhao Yang
During object tracking, Fast tracking via Spatio-Temporal Context Learning which combines temporal correlation among sequential frames and spatial correlation between object and background can solve the problem of semi-occlusion, but not full-occlusion. Kalman Filter makes use of the predictive value...
Proceedings Article

Performance Evaluation of Local Area Network based on Support Vector Machine

Qi Liu, Yin Liu, Yiyong Lin, Ling He, Yunzhi Huang
This work presents an IP performance evaluation method, based on the Support Vector Machine (SVM). In this work, eight network parameters are collected: CPU utilization of switchboard, utilization of memory, network link-off, delay, delay jitter, bandwidth, bit rate of transmission and bit rate of reception....
Proceedings Article

Application Research on International Trade Information Management System Oriented On Service

Kejia Yin
With the rapid development of network communication technology and Internet technology, international trade enterprises will face the business operation mode change by using the advanced information technology to strengthen the traditional advantages itself. The application of international trade information...
Proceedings Article

Wireless Sensing Information Transmission and Storage Technology Research for the Internet of Things

Chuan He
The main objective is to achieve networking integration with a wide range of interconnected information space and depth of the physical world, and wireless sensor networks as a peripheral network of things, it is possible on a larger spatial and temporal scale networking provides active physical perception...
Proceedings Article

Research on Distributed Signal Processing Technology in Wireless Sensor Networks

Zhengnan Wu, Yuansheng Cheng, Jun Lu
Wireless sensor network is widely used in military, industrial, medical, transportation and other fields. As a product of the era in the future, wireless sensor network will play a more and more important role. This network is usually composed of sensor nodes that of low power consumption and low cost....
Proceedings Article

Research of the English Network Teaching Resources System based on Data Warehouse Technology

Da Liu, Jingwei Shu, Xueyan Fan
Build a platform of informationization as teaching auxiliary has become the mainstream teaching methods in all kinds of school under the network environment. It has the main target of the current middle school English teaching reform that involve various types of multimedia teaching resources into the...
Proceedings Article

Design and Realization of Data Mining System based on Web

Defu He
For enterprises, it appears especially important to survive in the increasingly fierce competition in the business and strive for more customers. If they understand what customers need and interested better, and make key decisions that can attract more users to buy their goods, then they will make more...
Proceedings Article

A Fusion Location Algorithm Based on Federated Kalman Filtering

Long-hui Lv, Hong-xia Jin
The paper designed a WLAN system with RFID systems joint locating algorithm based on Federated Kalman Filtering. For the problem in indoor mobile node single positioning system, such as insufficient positioning accuracy, longer positioning time and not ideal algorithm complexity, it was proposed that...
Proceedings Article

Facial Animation System Design based on Image Processing

Xueyan Du
Using computer to make face model, establish facial expression animation and exaggerate facial image processing is a hot research topic in the current, which technology has a broad application prospect and huge economic benefits. For example, remote teaching, film and television entertainment, video...
Proceedings Article

Design and Implementation of College Sports Management Information System based on UML

Shu-An Zhang
This paper used the methods like literature data method to analyze the present situation of university sports information management, expound college PE informationization goal, and use UML to conduct university sports information management system function analysis and design from the perspective of...
Proceedings Article

The Application of Computer Aided Analysis in Graphic Design of Visual Aesthetics

Hong-Li Qiu, Hong-Lei Wang
Order beauty is the core of graphic design, with its good works follow the rules of th11e performance of the order (such as symmetry, golden section, etc.) consciously or unconsciously. In graphic design, these rules reflect the basic principles for the design geometry whose proper use can make the design...
Proceedings Article

Usability Evaluation of Software Testing Based on Analytic Hierarchy Process

Dandan He, Can Wang
In software product development process, software usability testing is essential and must be carried out in the actual work tasks and operating environment of the user. Expand the availability of this article assessment of software testing based on analytic hierarchy process (AHP), it qualitative and...
Proceedings Article

Early Warning System Design of Safe Production of Coal Mine Based on Improved BP Neural network

Hong-Li Qiu, Pei-shuo Sun
For staff, environment, equipment and management the four aspects, the early warning index system of coal mine safety production adopts the additional momentum method and adaptive vector, particle swarm optimization (PSO) algorithm and the method of variable weight and asynchronous learning factor and...
Proceedings Article

Design and Implementation of Simulation Training System of Immersion Transformer Substation

Zhengjie Zhou, Yongsheng Luo
Transformer substation operation process should first ensure the running safety. Job skill of substation operation staff is one of the important factors to make sure the safe operation of power system reliability. Therefore, the attendant must pass professional training to mount guard operation. Traditional...