Proceedings of the 2015 3rd International Conference on Machinery, Materials and Information Technology Applications

+ Advanced search
355 articles

Research on Algorithm for Virtual Network Embedding Based on Integer Programming

Min Lai, Zhengliang Liu
The virtual network embedding problem is a majorchallenge in this field. Its target is to efficiently map the virtual nodes and virtual linksonto the substrate network resources. Due to multiple objectives and multipleconstraints, finding the optimal solution turns out to be a very difficult problem....

Research on the Design of Medical Image Database System Basedon Web

Zhengliang Liu, Min Lai
In recent years, with the extensive application of database technique, medical image information becomes easier to be storage and archiving. Based on selection of development, script languagesand database technology, this paper designs the system structure, system process, webpage function, and system...

The Decision Support System of Urban Distribution Network Planning Based on Electric Power Demand Forecasting

Suling Chen
The functional architecture and overall design of the decision support system of urban distribution network planning based on electric power demand forecasting are introduced, with the focus on the function implementation and key planning results of the electric power demand forecasting module for the...

The Scale Data and Strategy Analysis of the Buildings in Jiaju Tibetan Village

Wei Liu
By analyzing the present situation of Jiaju Tibetan Village in Sichuan Province, three issues were found, that is, a) the abrupt change of the traditional building environment; b) the unbalanced proportion of the buildings and its surroundings; c) the contradiction between numerous buildings and local...

Exploration of the Application of Virtual Reality Technology on Sports Simulation Training

Guangtian Qian
Through the concept of virtual reality technology, the introduction of features, leads in particular application of virtual reality technology in all areas of sports fields; then, from the build simulation training field, a single person special training, remote training with the environment, the core...

Design and Realization of SVM Topic Crawler Based on Incremental Learning

Ping Zhou
Using information technology such as search engine for collecting and monitoring of network public opinion is a practical and effective method. This paper puts forward an improved algorithm of SVM classifier based on incremental learning online, and then implements a topic crawler system for network...

Study on HEVC Intra Prediction Algorithm and Its Optimization Technique

Yueran Cai
The high efficiency video coding (HEVC) standard was developed by JCT-VC in 2010 and was officially released in 2013. Compared to the previous video coding standard of H.264/AVC, HEVC can save about 50% bit-rate for equal perceptual video quality, but the computational complexity significantly increases....

Research on Design Features of Intelligent Product based on Big Data

Kai Dong, Xuedi Mao
At present, the products design and development of enterprises are facing more complex internal and external environment, the specific performances are the technological and economic changes, the endless innovation of competitor, the constant changing of consumer's demands. To the enterprise management,...

Analysis of document recommendation based on Hierarchical analysis method and BP neural network

Rongyu Zhang
At present, with the development of the information technologies and the Internet, evaluation and ,the recommendation of all kinds of information is increasingly concerned. We can get User’ evaluation on the books for 5 points. Considering the effect of different factors on the books’ score then the...

Threat Evaluation of Early Warning Detection Based on Incomplete Attribute Information TODIM Method

Zhiyang Gao, Li Zhu, Zheng Li, Pengcheng Fan
The incomplete attribute information TODIM method is applied to the early warning detection threat evaluation to enhance decision-making scientific and targeted due to the limitations of traditional multi-attribute evaluation methods. This paper introduces the incomplete attribute information TODIM method...

Information collection system of agricultural traceability based on things

Tingting Li, Bo Li, Dechang Huang
Things agriculture is an important development direction of networking applications, networking technology in the field of agriculture for the development of agriculture has brought immeasurable impetus and prospects immeasurable. In agriculture things, how can the production process the data collected...

Computer Database Security Management Analysis and Discussion

Kai Hu
Human society entered the 21st century, the Internet and mature technology of the database has been an unprecedented development, security issues have always been a computer database security and database data loss problems are hacking seriously affect the database, for database security Research management...

Anycast Routing Algorithm With The chaotic Disturbance

Baolong Zhang, Haiyan Huang
There is a problem of partial convergence in anycast routing based on genetic algorithm, therefore an improved anycast routing algorithm is proposed in this paper. The chaotic disturbance operator is adopted in the improved algorithm. The simulation results show that the proposed algorithm has a faster...

The Analysis of Improved Network Security Model Based on Dynamic Wireless Networks

Lifang Lu
Nowadays, dynamic wireless network security model flawed in terms of initiative defense, risk assessment and security policy generation and others. To solve this problem, we proposes an improved model of network security model based on dynamic wireless networks. This network security model is mainly...

Research on the key technology of data security protection based on cloud computing

Juan Guo
cloud computing is the hot topic in the application and the research sphere. And the most IT Enterprises staffs think that cloud computing is the core application architecture of the next generation of computer network technology. Though the appearing of cloud computing bring a lot of advantage, but...

Research on the New Characteristics System of New Media Technology

Hanmei Qu
Sparse literature exists on the topic of college students' core values education via new media, so in this study the theory of communicative ideological education was applied to build the mode of college student's core value education via new media. This was also based on the characteristics of college...

Research and Application on Tangka Image Segmentation Algorithm

Yan Xu, WeiLan Wang
This paper studies the key problems of many Tangka image segmentation algorithms and computational complexity and hard to applies to large scale images segmentation. As a exploratory research of Tangka image, the paper fully took the comprehensive and robustness of algorithm into account. The image segmentation...

A Decision Support Model about Medical Community Based on CBR

Bing Jiang, Cheng Liu
The level of information management community health care in our country is not high , and the technology is very scarce. In this paper, we raise a decision support model about community medical?in the light of the degree of information is far from enough. The paper discussed how to design?build and...

Study of Intelligent Optical Network Technology in Power Communication Network

Feng Wang, Ning Yu, Dong Wang, Yang Li
In this paper, we introduced the ASON technology and the development, have analyzed its architecture characteristic and the function characteristic, and with transmission systems and so on WDM, MSTP, RPR has carried on the comparison. Has obtained the ASON technology for the electric power communications...

Design and Implementation of Financial Warning System based on Large Data

Guoqiang Wu
This dissertation is going to bring forward modern development and design of Big Data Integration for financial management system, based on limits of traditional financial management and situation under large numbers of business data accumulation. As per development and requirement of financial management,...

The Application and Research of Embedded Mobile Database

Shi Yang
With respect to the current situation of logistics industries, the data synchronization technique in embedded mobile database design is researched. The focuses is on the establishment and maintenance of server databases, so as to solve the problems, like the date acquisition in data synchronization and...

The research of new start frame beginning spinning position signal acquisition system based on reed sensor

Qingbin Zhao, Guangdong Jiang
In this paper, a new frame beginning spinning position signal acquisition system is designed with reed sensors. Compared with the beginning spinning position signal acquisition device, the experiment proves that, the structure of the signal acquisition device is easy to adjust, stable and long usage...

Development of Exercise Intensity Monitoring System Based on Wearable Device

Yurong Chen, Ran Yi
In this paper, we study heart rate, metabolic equivalent, the degree of subjective sensation and motion energy consumption characteristics. From the basic response characteristics of heart rate of sports load Heart rate measurement using the target heart rate to arrange exercise load strength and heart...

Research on New Models of Network Travel

Bin Xue, Wei Li, Hongyan Song
With rapid development and popularity of internet across the world, information technology has been applied to social life and production of people, and enters the fields of traditional business including tourism at an unprecedented rate. The network travel in future should provide a full range of tourism...

Research on Construction Technology of Optical Radiation Measuring System Based on Virtual Instrument Technology

Sanfeng Dong
Using virtual instrument technology, digital signal processing technology and traditional optical radiation measuring technology to construct optical radiation measuring system breaks the construction methods of traditional instruments. Signal processing, collection, control and process of measuring...

Optimizing Service Selection Using Hybrid Multi-objective Genetic Algorithms

Bo Li, Changsheng Zhang, Baoxing Bai
Developments in web services lead increasing numbers of enterprises to focus themselves on core business by outsourcing parts of service flows. As an important measure of the web service, quality of service (QoS), determines the success of the combined services to some extent, highlighting the need for...

Multi-Mode and Single Goods Transportation Network Equilibrium Model Based on Super Network

Ting Chen
We expatiate and summarize the partition method about transportation mode, and then we analyze the function concept of generalized transportation cost in details in this paper. After the equilibrium model of regional transportation network and the algorithm of the multi-mode and single goods have been...

An Improved TLS handshake protocol

Xian-Zhu Li, Jun Liu
The transport layer security protocol (TLS) used in the Internet exist complex certificate management shortcomings and highly handshake delay due to the use of the certificate, IBE avoid the above problems by not using the certificate. he article introduces the identity based encryption system into the...

Fall Detection Algorithm for the Elderly Based on Trial Acceleration and Heart Rate

Weibin Meng, Chenchao Wang, Haoyang Li, Meichen Ji
The paper introduces a method of judging the gesture according to triaxial acceleration data and heart rate data. The acceleration transducer is used to collect the triaxial acceleration data, and some experimental data is selected as training data. The collected data is classified according to KNN algorithm,...

Research on Application of Spatial Information Technology in Gas Pipeline Repair

Ming Yong
With the application of spatial information technology in repair of gas networks, SCADA system is combined with GIS system to determine the damaged equipment and components of the booster, and the severity of the booster. The technical parameters including the manufacture, size, material, size and type...

Research of Measure-Control Information Collection and Processing System Construction Based on Ifix

Ming Yong
The paper about the research of measure-control information collection and processing system construction based on iFix starts from the monitoring and analysis of general industrial test information collection. And it puts forward that we adopt the industrial production field measurement and control...

Implementation of mobile augmented reality system based on ORB-FREAK Algorithm

Yutao Niu, Hui Huang
At present?the existing algorithm registration for mobile equipment is weak on real-time feature,this paper proposes an Tracking registration for Mobile augmented reality based on ORB-FREAK algorithm.To Reduce the algorrithm time overhead,using ORB and FREAK as detecter and descriptor,Hamming-based Brute-force...

The Design of the DSP Control Circuit in the Conversion Device of Power Source about Medium Frequency Generator

Jingfeng Tian
This paper describes the design of control circuit which makes the TMS320LF2407 as the core. It mainly introduces the characteristics of DSP, the general development process of DSP system and the DSP chip TMS320LF2407’s characteristics adopted by this system. It focused on the peripheral circuit design...

Research on Device Control System Design Based on Stepping Motor

Zhongyong Tian
Applying stepping motor to motion control system of equipment can make the device achieve the objective of two-dimensional motion control. Firstly, the paper defines the motion control scheme of system. Then, the paper makes detailed analysis on central processing unit and motion controller of hardware...

On Debugging of Secondary Equipment of Digital Substation based on IEC61850-9-2

Xueqiang Zhang, Zhiyuan Cheng
since 1990s, the substation has entered the digital age along with rapid development of information control technology, power grid technology, computer technology and measuring technology, and a great breakthrough has been made in aspects of function improvement, cost reduction, reliability enhancement...

Surface Profile Measurement System Based on Incoherent Optical Feedback

Zhijun Zhang
Optical feedback effect has been widely applied to external cavity laser, and it has achieved good effect in narrowing the spectral line of laser. And the measurement technique based on optical feedback effect attracts the attention of the researchers. The measurement system based on optical feedback...

Numerical Simulation of Waveform Adjustment in high G Accelerometer Calibration System Using Hopkinson Bar

Xing-liang Zhao, Xin-liang Li, Peng Xu, Da-zhi Zhang
High-G accelerometer impact excitation using Hopkinson pressure bar was introduced. The impact excitation course was simulated on ANSYS/LS-DYNA using Lagrange's method and Johnson-Cook constitutive model. The effects of projectile nose shape, nose length, and adjustment pad material on acceleration waveforms...

Research and Implementation of Wireless Personal Area Network based on IEEE802.15.4

Liugang Zheng
IEEE 802.11 wireless LAN’s popularity, and IEEE 802.16 wireless broadband network in the commercial standardization in recent years, have made significant wireless network technology increasingly important, but also more and more applications and products has emerged. While wireless personal area network...

Web Service-oriented Collaborative Management of Multi-Agent Supply and Demand Network

Li Zhou
The paper firstly introduces Web service technique, based on which the paper researches the supply and demand service under Web services-oriented supply and demand network collaborative management system architecture. Agent has features, so the paper focuses on researching integration method of Agent...

Simulation research of university library recommended system based on big data and data mining

Rui Li
This paper based on the specific needs of the university library, analyzes construct necessity, feasibility and technical solutions to select automatic recommendation system for books, and a brief introduction of collaborative filtering algorithms, in particular the correlation calculation and different...

Personalized Facet Recommendation based on Conditional Random Fields

Yongquan Dong, Qiang Chu, Ping Ling
Faceted search is a kind of exploratory search, which is the complementary of keyword search. The current faceted search techniques display all facets. When there are plenty of facets, they are not available. Existing facet recommendation approaches mainly select facets according to the experts’ experience...

The Travelling Wave Solutions of the nonlinear beam equations

Weishi Yin, Yixian Gao, Pinchao Meng
This paper is concerned with the existence of exact traveling wave solutions of nonlinear evolution equation by the tanh-function method. The validity and reliability of this method is demonstrated by applying it to a variety of the nonlinear beam equations.

Design and Realization of Measurement System for Underwater Equipments

Hao Wang
Underwater equipment auxiliary monitoring is the important premise to ensure system work normally and effective data analysis. This system give full consideration to the output form of all kinds of sensors and realize the net access of different kinds of auxiliary measuring module by using network bus...

Design of Intelligent Car Based on Arduino Development Board

Ru Nie
As the development of science and technology, the microchip technology has become closer relationship to our life which gives our life more convenient, not only the telephone but computers and digital cameras can’t work without the microchip’s development. “Arduino”, it’s cheap and easy to develop but...

Design of the Identity Authentication and Key Management System Based on Wireless Community

Linsheng Wang, Ke Zhou
With the rapid development of wireless communication technology, wireless community has brought a lot of convenience to people's life. However, in the open wireless network environment, the communication system has been attacked and threatened to be higher than the traditional wired network. In order...

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model

Linjing Wang, Han Zhang
With the rapid development of science and information technology, computer and network technology have made jumping progress, which not only speeds up the global information, but also brings more serious information security issues. Information network security has become a new term, which is related...

Research on Mobile Network Payment Security Protocol based on Symmetric Cryptography

Linjing Wang, Peijiang Zhang
With the rapid development of network technology and mobile terminal equipment, mobile payment has become a trend. Due to the complexity of payment environment, the payment terminal equipment performance is limited, mobile payment security protocol is essential with a high degree of security. This paper...

Network Data Encryption Technology based on Hardware Protocol and Algorithm

Linjing Wang, Guoliang Tang
In order to improve the security of network data transmission and avoid the leakage of transmission data, this paper proposes an enhanced data transmission security and reliability scheme, and design a new data encryption and decryption system using hardware encryption protocol and algorithm. The main...

Research on Key Technology of Authentication and Key Negotiation in Cloud Computing Environment

Linjing Wang, Chunxia Zhao
Due to the complexity of cloud computing environment, cloud computing in the process of information security certification not only requires the server identifying user information, but also identifying authenticity of user authentication server, which can realize two-way authentication between server...

Research on the Data Mining Method based on Information Security Vulnerability Ontology

Han Zhang, Yali Lv
Information security has experienced a long time from the concept to deepen. Nowadays, with the development and in-depth of computer science and technology, the problem of information security grow with each passing day out. In June 2014, the freely available WiFi has trap vulnerability event, it specifically...