Proceedings of the 2015 3rd International Conference on Machinery, Materials and Information Technology Applications

Session: Computer Science and Application

150 articles
Proceedings Article

Research on Algorithm for Virtual Network Embedding Based on Integer Programming

Min Lai, Zhengliang Liu
The virtual network embedding problem is a majorchallenge in this field. Its target is to efficiently map the virtual nodes and virtual linksonto the substrate network resources. Due to multiple objectives and multipleconstraints, finding the optimal solution turns out to be a very difficult problem....
Proceedings Article

Research on the Design of Medical Image Database System Basedon Web

Zhengliang Liu, Min Lai
In recent years, with the extensive application of database technique, medical image information becomes easier to be storage and archiving. Based on selection of development, script languagesand database technology, this paper designs the system structure, system process, webpage function, and system...
Proceedings Article

The Scale Data and Strategy Analysis of the Buildings in Jiaju Tibetan Village

Wei Liu
By analyzing the present situation of Jiaju Tibetan Village in Sichuan Province, three issues were found, that is, a) the abrupt change of the traditional building environment; b) the unbalanced proportion of the buildings and its surroundings; c) the contradiction between numerous buildings and local...
Proceedings Article

Exploration of the Application of Virtual Reality Technology on Sports Simulation Training

Guangtian Qian
Through the concept of virtual reality technology, the introduction of features, leads in particular application of virtual reality technology in all areas of sports fields; then, from the build simulation training field, a single person special training, remote training with the environment, the core...
Proceedings Article

Design and Realization of SVM Topic Crawler Based on Incremental Learning

Ping Zhou
Using information technology such as search engine for collecting and monitoring of network public opinion is a practical and effective method. This paper puts forward an improved algorithm of SVM classifier based on incremental learning online, and then implements a topic crawler system for network...
Proceedings Article

Study on HEVC Intra Prediction Algorithm and Its Optimization Technique

Yueran Cai
The high efficiency video coding (HEVC) standard was developed by JCT-VC in 2010 and was officially released in 2013. Compared to the previous video coding standard of H.264/AVC, HEVC can save about 50% bit-rate for equal perceptual video quality, but the computational complexity significantly increases....
Proceedings Article

Analysis of document recommendation based on Hierarchical analysis method and BP neural network

Rongyu Zhang
At present, with the development of the information technologies and the Internet, evaluation and ,the recommendation of all kinds of information is increasingly concerned. We can get User’ evaluation on the books for 5 points. Considering the effect of different factors on the books’ score then the...
Proceedings Article

Threat Evaluation of Early Warning Detection Based on Incomplete Attribute Information TODIM Method

Zhiyang Gao, Li Zhu, Zheng Li, Pengcheng Fan
The incomplete attribute information TODIM method is applied to the early warning detection threat evaluation to enhance decision-making scientific and targeted due to the limitations of traditional multi-attribute evaluation methods. This paper introduces the incomplete attribute information TODIM method...
Proceedings Article

Computer Database Security Management Analysis and Discussion

Kai Hu
Human society entered the 21st century, the Internet and mature technology of the database has been an unprecedented development, security issues have always been a computer database security and database data loss problems are hacking seriously affect the database, for database security Research management...
Proceedings Article

Anycast Routing Algorithm With The chaotic Disturbance

Baolong Zhang, Haiyan Huang
There is a problem of partial convergence in anycast routing based on genetic algorithm, therefore an improved anycast routing algorithm is proposed in this paper. The chaotic disturbance operator is adopted in the improved algorithm. The simulation results show that the proposed algorithm has a faster...
Proceedings Article

The Analysis of Improved Network Security Model Based on Dynamic Wireless Networks

Lifang Lu
Nowadays, dynamic wireless network security model flawed in terms of initiative defense, risk assessment and security policy generation and others. To solve this problem, we proposes an improved model of network security model based on dynamic wireless networks. This network security model is mainly...
Proceedings Article

Research on the key technology of data security protection based on cloud computing

Juan Guo
cloud computing is the hot topic in the application and the research sphere. And the most IT Enterprises staffs think that cloud computing is the core application architecture of the next generation of computer network technology. Though the appearing of cloud computing bring a lot of advantage, but...
Proceedings Article

Research on the New Characteristics System of New Media Technology

Hanmei Qu
Sparse literature exists on the topic of college students' core values education via new media, so in this study the theory of communicative ideological education was applied to build the mode of college student's core value education via new media. This was also based on the characteristics of college...
Proceedings Article

Research and Application on Tangka Image Segmentation Algorithm

Yan Xu, WeiLan Wang
This paper studies the key problems of many Tangka image segmentation algorithms and computational complexity and hard to applies to large scale images segmentation. As a exploratory research of Tangka image, the paper fully took the comprehensive and robustness of algorithm into account. The image segmentation...
Proceedings Article

A Decision Support Model about Medical Community Based on CBR

Bing Jiang, Cheng Liu
The level of information management community health care in our country is not high , and the technology is very scarce. In this paper, we raise a decision support model about community medical?in the light of the degree of information is far from enough. The paper discussed how to design?build and...
Proceedings Article

Study of Intelligent Optical Network Technology in Power Communication Network

Feng Wang, Ning Yu, Dong Wang, Yang Li
In this paper, we introduced the ASON technology and the development, have analyzed its architecture characteristic and the function characteristic, and with transmission systems and so on WDM, MSTP, RPR has carried on the comparison. Has obtained the ASON technology for the electric power communications...
Proceedings Article

Design and Implementation of Financial Warning System based on Large Data

Guoqiang Wu
This dissertation is going to bring forward modern development and design of Big Data Integration for financial management system, based on limits of traditional financial management and situation under large numbers of business data accumulation. As per development and requirement of financial management,...
Proceedings Article

The Application and Research of Embedded Mobile Database

Shi Yang
With respect to the current situation of logistics industries, the data synchronization technique in embedded mobile database design is researched. The focuses is on the establishment and maintenance of server databases, so as to solve the problems, like the date acquisition in data synchronization and...
Proceedings Article

Research on New Models of Network Travel

Bin Xue, Wei Li, Hongyan Song
With rapid development and popularity of internet across the world, information technology has been applied to social life and production of people, and enters the fields of traditional business including tourism at an unprecedented rate. The network travel in future should provide a full range of tourism...
Proceedings Article

Optimizing Service Selection Using Hybrid Multi-objective Genetic Algorithms

Bo Li, Changsheng Zhang, Baoxing Bai
Developments in web services lead increasing numbers of enterprises to focus themselves on core business by outsourcing parts of service flows. As an important measure of the web service, quality of service (QoS), determines the success of the combined services to some extent, highlighting the need for...
Proceedings Article

Multi-Mode and Single Goods Transportation Network Equilibrium Model Based on Super Network

Ting Chen
We expatiate and summarize the partition method about transportation mode, and then we analyze the function concept of generalized transportation cost in details in this paper. After the equilibrium model of regional transportation network and the algorithm of the multi-mode and single goods have been...
Proceedings Article

An Improved TLS handshake protocol

Xian-Zhu Li, Jun Liu
The transport layer security protocol (TLS) used in the Internet exist complex certificate management shortcomings and highly handshake delay due to the use of the certificate, IBE avoid the above problems by not using the certificate. he article introduces the identity based encryption system into the...
Proceedings Article

Fall Detection Algorithm for the Elderly Based on Trial Acceleration and Heart Rate

Weibin Meng, Chenchao Wang, Haoyang Li, Meichen Ji
The paper introduces a method of judging the gesture according to triaxial acceleration data and heart rate data. The acceleration transducer is used to collect the triaxial acceleration data, and some experimental data is selected as training data. The collected data is classified according to KNN algorithm,...
Proceedings Article

Research on Application of Spatial Information Technology in Gas Pipeline Repair

Ming Yong
With the application of spatial information technology in repair of gas networks, SCADA system is combined with GIS system to determine the damaged equipment and components of the booster, and the severity of the booster. The technical parameters including the manufacture, size, material, size and type...
Proceedings Article

Implementation of mobile augmented reality system based on ORB-FREAK Algorithm

Yutao Niu, Hui Huang
At present?the existing algorithm registration for mobile equipment is weak on real-time feature,this paper proposes an Tracking registration for Mobile augmented reality based on ORB-FREAK algorithm.To Reduce the algorrithm time overhead,using ORB and FREAK as detecter and descriptor,Hamming-based Brute-force...
Proceedings Article

Research and Implementation of Wireless Personal Area Network based on IEEE802.15.4

Liugang Zheng
IEEE 802.11 wireless LAN’s popularity, and IEEE 802.16 wireless broadband network in the commercial standardization in recent years, have made significant wireless network technology increasingly important, but also more and more applications and products has emerged. While wireless personal area network...
Proceedings Article

Web Service-oriented Collaborative Management of Multi-Agent Supply and Demand Network

Li Zhou
The paper firstly introduces Web service technique, based on which the paper researches the supply and demand service under Web services-oriented supply and demand network collaborative management system architecture. Agent has features, so the paper focuses on researching integration method of Agent...
Proceedings Article

Simulation research of university library recommended system based on big data and data mining

Rui Li
This paper based on the specific needs of the university library, analyzes construct necessity, feasibility and technical solutions to select automatic recommendation system for books, and a brief introduction of collaborative filtering algorithms, in particular the correlation calculation and different...
Proceedings Article

Personalized Facet Recommendation based on Conditional Random Fields

Yongquan Dong, Qiang Chu, Ping Ling
Faceted search is a kind of exploratory search, which is the complementary of keyword search. The current faceted search techniques display all facets. When there are plenty of facets, they are not available. Existing facet recommendation approaches mainly select facets according to the experts’ experience...
Proceedings Article

The Travelling Wave Solutions of the nonlinear beam equations

Weishi Yin, Yixian Gao, Pinchao Meng
This paper is concerned with the existence of exact traveling wave solutions of nonlinear evolution equation by the tanh-function method. The validity and reliability of this method is demonstrated by applying it to a variety of the nonlinear beam equations.
Proceedings Article

Design of the Identity Authentication and Key Management System Based on Wireless Community

Linsheng Wang, Ke Zhou
With the rapid development of wireless communication technology, wireless community has brought a lot of convenience to people's life. However, in the open wireless network environment, the communication system has been attacked and threatened to be higher than the traditional wired network. In order...
Proceedings Article

Network Data Encryption Technology based on Hardware Protocol and Algorithm

Linjing Wang, Guoliang Tang
In order to improve the security of network data transmission and avoid the leakage of transmission data, this paper proposes an enhanced data transmission security and reliability scheme, and design a new data encryption and decryption system using hardware encryption protocol and algorithm. The main...
Proceedings Article

Research on Key Technology of Authentication and Key Negotiation in Cloud Computing Environment

Linjing Wang, Chunxia Zhao
Due to the complexity of cloud computing environment, cloud computing in the process of information security certification not only requires the server identifying user information, but also identifying authenticity of user authentication server, which can realize two-way authentication between server...
Proceedings Article

Research on the Data Mining Method based on Information Security Vulnerability Ontology

Han Zhang, Yali Lv
Information security has experienced a long time from the concept to deepen. Nowadays, with the development and in-depth of computer science and technology, the problem of information security grow with each passing day out. In June 2014, the freely available WiFi has trap vulnerability event, it specifically...
Proceedings Article

The research on the fluorescence image of the hydraulic leakage acquisition and analysis

Yufeng Zhang, Xi Zhang, Minrui Li
This paper introduced the principle of the fluorescence image of the hydraulic leakage acquisition and analysis system. The function and structure of system and the composition diagram of automatic detection hardware had been analyzed. The thresholding and semithresholding on the fluorescence image of...
Proceedings Article

The Research of Massive Data Analysis and Processing Based on Hadoop

Julan Yi
how to quickly extracted from these massive data out of the enterprise value of useful information has become the most vexing problems in the development of application software programmers encounter in the course. Based on the starting point of this issue, this paper analyzes the key technical foundation...
Proceedings Article

A Group Decision Matrix Construction Method Based On OWA Operator

Yanling Li, Qifei Yan, Xinli Yin
A method of constructing a group decision matrix based on OWA operator is proposed for the construction method of the group decision matrix research. In this method, the OWA operator is used to aggregate the expert's decision matrix into the initial group decision matrix, then the degree of deviation...
Proceedings Article

Self-learning dynamic adjustment scheduling algorithm based on Hadoop

Fucong Li, Zhuyu Li, Guohui Chen, Xiangxin Li
Speculative execution is the key technology to improve the execution efficiency of Hadoop cluster. In the large-scale cluster reasonable Speculative execution can effectively reduce the execution time for the job. At present, there is still a big problem in the detecting of the Hadoop's Speculative execution...
Proceedings Article

An Encounter-based Routing Scheme for Delay Tolerant Networks

Hang Guo, Bo Sun
Delay Tolerant Networks (DTNs) are a type of networks which suffer from intermittent disruption due to the factors such as mobility and energy. Whereas only a little state of art routing algorithms in DTNs address the problem of message loss due to the insufficient contact capacity because of mobility....
Proceedings Article

Air-born Satellite Emergent Transmission System based on Civil DVB-RCS Technical Scheme

Yahan Pan, Bin Shang, Xin Liu
The return link performance of conventional civil DVB-RCS transmission technology limits its direct application to air-borne satellite video transmission system. This paper studies the novel emergent DVB-RCS return link technique based on introducing adaptive parallel processing to the conventional civil...
Proceedings Article

Satellite Cloud Image Retrieval With Grid Based Inscribed Circle Method

Shiming Xia, Qian Li, Jing Zhang
Satellite cloud image retrieval can help the forecasters positioning similar weather in the past quickly and improve the reliability of the weather prediction. This article attempts to use the Zernike moment and Grid based method to extract the region-based features of cloud images. First of all, carry...
Proceedings Article

A Novel Integration Scheme Based on Mean Shift and Region-Scalable Fitting Level Set for Medical Image Segmentation

PeiRui Bai, Dandan Song, Lijun Bi, Lei Li, Tao Qi
In this study, a novel integration scheme for coupling the results of mean shift with initial contours of the region-scalable fitting level set method (RSF model) is presented. There are two main contributions in the study. First, a new adaptive threshold formula to fit dynamic range of the mean shift...
Proceedings Article

Improved Routing Protocol of Wireless Sensor Network Based on Wavelet Neural Network

Xiaopeng Wang
The resource and especially the node energy of the wireless sensor network are limited. It can effectively prolong the lifetime of the wireless sensor network by reducing the energy consumption in the process of information collection and transmission as much as possible. Hereby a routing protocol improved...
Proceedings Article

Network Traffic Prediction Based on LMD and Neural Network

Yongsheng Luo
The network traffic data has a very strong burst and self similarity and so on, which results in the system flow is not stable and inaccurate. The traditional network traffic prediction model is not accurate enough. To solve the above problems, a network traffic prediction model based on local mean decomposition...
Proceedings Article

Implementation of reconstructed radiance of IASI observations in WRF data assimilation system

Yi Yu, Weimin Zhang, Minhua Ye, Jing Sun, Yukuan Zhang
Methodology is explored for the reconstructed radiances from the Infrared Atmosphere Sounding (IASI) for the purpose of assimilation into numerical weather prediction models. A principal component based fast radiative transfer model has been implemented into the WRF data assimilation system, thus allow...
Proceedings Article

An improved commutative replicated data type for peer to peer collaborative editing

Xiao Lv, Yongjie Li, Chaoqun Ang
With the development of Internet, collaborative editing over Internert becomes a common office affair,which can support a harmonious human to human interaction.Peer-to-peer (P2P) networks are very efficient for distributed collabotative editing. Existing many collaborative editing algorithms depend on...
Proceedings Article

Sparse beamforming in peer-to-peer relay networks

Yunshan Hou, Zhijuan Qi, Jianhua Chen
To reduce active relays in peer-to-peer relay networks, a sparsity promoting penalty term is introduced into the objective function to obtain beamforming weights through minimization of the total relay transmit power while the signal-to-interference-plus-noise ratio (SINR) at the destinations are guaranteed...
Proceedings Article

An Image Highlights Removal Method with Polarization Principle

Fang Li, Jiandong Tian, Yandong Tang, Yan Wang
The existing highlight detection and removal methods usually depend on color or some geometrical information. These methods cannot be used when highlight region degrades texture details of object surface. In this paper, we propose a novel, simple and effective method to solve this problem. In our method,...
Proceedings Article

Digital services of Libraries in the Era of Mobile Internet

Yanxiang Lu
The full coverage of the network, cloud digital products and the ever-upgrading reading devices have transformed users’ reading environment, reading content and reading mode in a profound way. Against the backdrop of Information Era, Libraries are supposed to keep up with the times, with a bid of catering...
Proceedings Article

Sink mobile routing protocol for WSNs Based on PSO

Changjiang Jiang, Yuwei Zhou, Yulan Zhang
In model of multi- hop wireless sensor networks, if a cluster head is more close to the sink, it will have much more transmitting tasks, therefore a head more close by the sink will consume much more energy. A new mobile sink protocol based on Particle Swarm Optimization (PSO) algorithm is proposed.The...
Proceedings Article

Analysis of Taxi Supply and Demand Matching Degree Based on BP Neural Network

Yajing Li
To analyze supply and demand matching degree of taxi resources in different periods in the long span, namely, with year as its measuring unit, this paper selects Wuhan city whose taxi ordering volume ranks in forefront [1] in China, analyzes the change law and development trend of supply and demand matching...
Proceedings Article

Numerical Computation Method in Specific Harmonic Elimination Technology of Step Wave

Yajing Li
Combining the specific harmonic elimination pulse width modulation technology of cascading H-bridge convertor, this paper discusses the function relationships between its parameters, and establishes the corresponding multiple nonlinear system of equations, and focuses on analysis of advantages and disadvantages...
Proceedings Article

A Conversion Method for SCL to CIM Based on Ontology Matching

Shaomin Zhang, Lv Shi, Baoyi Wang
There are structure and content differences between SCL,the substation configuration language defined in IEC61850, and CIM,the common information model contained in IEC61970, which lead to the data exchange barriers between the substation system with the power dispatching center. While the traditional...
Proceedings Article

A Data Replica Selection Algorithm Based on Cloud Platform

Shaomin Zhang, Qi Wang, Baoyi Wang
Aiming at the problem that how to choose the least cost data resources from multiple datasets which have the same contents but different locations for smart grid tasks, a least cost of selection algorithm based on locality is proposed. First, the problem of choosing data replicas is abstract as a shortest...
Proceedings Article

A Short Term Load Forecasting Algorithm Based on Gray Elman Neural Network and Genetic Algorithm

Baoyi Wang, Zheng Wang, Shaomin Zhang
Short term power load sample is highly variable, and the influence factors are not determined, the data sample is little. In view of the characteristics of the load, we combine the Grey Theory and Elman neural network to predict the short-term power load. Because the gray neural network convergence is...
Proceedings Article

An Improved Heuristic Minimal Attribute Reduction Algorithm Based on Condition Information Entropy

Baoyi Wang, Xuefei Li, Shaomin Zhang
Attributes reduction was one of the key problems in rough set theory. However, to find the minimum attribute reduction is a NP-hard problem. This paper proposed an improved algorithm of heuristic minimal attribute reduction. First it calculates the attribute importance and gets core, then taking the...
Proceedings Article

Research on Fuzzy Clustering Image Segmentation Algorithm based on GA and Gray Histogram

Baoyi Wang, Long Kang, Shaomin Zhang
When the traditional FCM algorithm is applied to image segmentation, it is sensitive to the selection of clustering center and can not automatically determine the number of clustering center. According to these problems, this paper proposes a fuzzy clustering image segmentation algorithm based on genetic...
Proceedings Article

Research on the Remaining Load Forecasting of Micro-Gird based on Improved Online Sequential Extreme Learning Machine

Shaomin Zhang, Peng Zhou, Baoyi Wang
In order to improve the forecast accuracy and stability of the micro-grid uncontrollable remaining load and provide a more reliable basis for micro-grid power generation plan, an ultra-short-term micro-grid uncontrollable remaining load forecasting model based on the improved online sequential Extreme...
Proceedings Article

Simulation of open loop response of a kind of high speed aircraft with virtual flying conditions

Junbo Chu, Aijun Zhou, Yuqiang Jin
A kind of numerical simulation method is used to testify the open loop response of a kind high speed aircraft. Since the final aim is to the testify the rightness of the system model and its corresponding air coefficients, so virtual flying condition is set to make the system more simple and more easy...
Proceedings Article

Study on Automatic Classified Protection Testing and Evaluating System

Jing Yuan
Technology report of classified protection testing and evaluating is consulted in supervision and inspection of classified protection of information. The paper brings forward a system for automatically evaluating information system’s security. The system analyses knowledge during classified security...
Proceedings Article

Design and Completion of the Indoor Positioning System Based-on Taylor Iterative

Liyan Fan, Song Chen, Shuang Wan, Shilei Zhu
Development belonging to Location-Based Service (LBS) makes people’s daily lives more convenience. Compared with Outdoor Location System, which developing more and more mature, Indoor Location System achieves much more attention from community. In this paper, by comparing the advantages and disadvantages...
Proceedings Article

CPIS-compliance Security Requirement Analysis for Software Development

Lei Jiang, Jing Yuan, Weihong Ren, Tai Zhao
China CPIS policy is the fundamental policy of China cybersecurity strategy. Therefore, CPIS-compliance software solution is highly demanded to help organizations comply with CPIS associated policies and standards. In this paper, a CPIS-compliance security requirements analysis method for software development...
Proceedings Article

Research on Prediction of Architectural Engineering Cost based on the Time Series Method

Qian Zhang
Cost plays a very important role in architectural engineering, and the methods to predict the cost rapidly and accurately are needed. On the basis of the valuation mode of quantities bill, this paper proposed the time series method for predicting project cost. According ti the theory of test, modeling...
Proceedings Article

A Scheme of Implementing PCA Alogrithm on Storm Platform

Yan Shan, Lingjuan Li, Yimu Ji
In order to sovle the problem of dimension disaster when mining the high-dimensional data in the data stream and the problem of poor real-time response and insufficient system throughput of dimensional reduction algorithms, a scheme of implementing PCA algorithm on Storm platform is designed. This scheme...
Proceedings Article

The Mobile Terminal Security Access System Based on IPSec VPN

Di Zhao, Xin He, Yunjun Li
Based on IPSec VPN technology, we propose a scheme for realization of mobile terminal security access system. The scheme, which combines with SM2, SM3 and the IPSec, realizes the establishment of the IPSec VPN client data communication, and the client-server security communication functions by using...
Proceedings Article

A recovery mechanism of MapReduce model based on transferring dependency

Zhuyu Li, Fucong Li, Xiangxin Li
MapReduce is a popular big data processing tool, but there exists a main node failure problem. In order to make the restarted JobTracker recover jobs site quickly, there are mainly two recovery mechanisms: synchronization mechanism and backup mechanism. In synchronization mechanism, TaskTracker sends...
Proceedings Article

Symbolic Computation of Exact Solutions of Two Nonlinear Lattice Equations

Sheng Zhang, Yingying Zhou
In this paper, a modified discrete G’/G-expansion method is used to construct exact solutions of Toda lattice equation and Ablowitz-Ladik lattice equations. With the aid of computer symbolic computation, we obtained in a uniform way hyperbolic function solutions, trigonometric function solutions and...
Proceedings Article

Fan Sub-Equation method with Improved Algorithms for Travelling Wave Solutions of Jimbo-Miwa Equation

Sheng Zhang, Aoxue Peng
In this paper, the (3+1)-dimensional Jimbo-Miwa equation is solved by Fan sub-equation method with improved algorithms. As a result, many new and more general travelling wave solutions are obtained including kink-shaped soliton solutions, rational solutions, triangular periodic solutions, Jacobi and...
Proceedings Article

A Novel Web Service Recommendation Approach based on Credible User Comment

Denghui Wang, Hao Huang, Changsheng Xie
User comment is an important criterion for the approach of web service recommendation. But estimating the credibility of user comment is always a big challenge. This paper proposes a novel method to calculate the trust degree of the user evaluation. In the proposed method, the trust degree of the user...
Proceedings Article

A Benefit-driven Task Scheduling Algorithm based on Genetic Algorithm in Cloud Computing

Jie Zhao
To solve the benefit-driven task scheduling problem in clouding computing, a benefit-driven task scheduling algorithm based on genetic algorithm is proposed. Under the precondition of meeting the QoS constraints, the proposed algorithm takes computation overhead, service profit and delay compensation...
Proceedings Article

Study on the Big Data Design of Business System

Jian Yu, Yu Yan
Business management is an important part of enterprise management. Information management system is an important means to realize the modernization of management, goods. The current problems, the construction of business management information system, the design of big data, big data management system...
Proceedings Article

Research on Construction of Industrial Park Management Platform Based on Cloud Computing

Lin Yang, Yu Nie, Yilai Zhang
An efficient management platform of industrial park can provide data analysis and data decision support, such as operation services as investment, property management, maintenance and security. However the construction of the management platform of industrial park is the key issue to assure that the...
Proceedings Article

Design of a Heterogeneous QR code for Internet of Things Based on Digital Watermarking Techniques

Ning Zheng, Shuangli Wu
A systematic solution based on the design of a heterogeneous code is proposed to promote the unified governance foundation of the existing Internet of Things (IoT). The proposed scheme enables advanced functionalities and maintains the compatibility with applications of the existing identifications (QR...
Proceedings Article

Trojan Behavior Analysis Based on FAHP Improved Algorithms

Hongliang Liu, Chunguang Ma, Chao Liu, Min Yu
In the paper, we modelling for behavior of Trojan based on fuzzy analytic hierarchy process (FAHP) improved algorithms, an efficacious analysis method which good at behavioral assessment, and has been applied in many fields of malicious code analysis. Based on the model, the harmfulness of software behavior...
Proceedings Article

The review of the acceleration of Smith-Waterman algorithm by using CUDA-enable GPU

Chenyang Jing, Le Zhang
Smith-Waterman (SW) algorithm, which calculates the similarity between two given sequences, is broadly used in bioinformatics research field. However, the time complexity of the SW algorithm prevents it from being used for long sequence alignment. Since SW algorithm is based on dynamic programing, using...
Proceedings Article

A New Message Middleware for Business Process Engine Integration Based On Publish/Subscribe Model

Dalei Zhou, Shuai Zhao, Bo Cheng
This paper presents an outline on architecture and performance of a new message middleware based on publish/subscribe model. This architectural uses topic tree to organize topics in the publish/subscribe system. The system collects network topology information and then forward messages after routing...
Proceedings Article

Research on Characteristics Analysis and Classification of Microblog Users

Xin Jiang, Wenmin Li
Microblog has become an important part of social media, a large number of users send and thus spread information on this platform. Nowadays, the network environment of microblog is impacted by the presence of anomalies in users seriously. So the research on identifying the types of microblog users is...
Proceedings Article

Research and Design of a Knowledge Base Application System for K12 Educational Resource Library

Jing Du, Lingling Wu, Li Zheng, Fei Li
This paper firstly describes a whole research framework when constructing a knowledge base for K12 education. Then the paper demonstrate thedesign of knowledge base application system for educational resource library, and analyze the how to complete the interoperability between different levels. Finally,...
Proceedings Article

Digital Kaleidoscope Patterns Design Based on Java Language

Ning Tang, Jianxia Su, Li Zhao
In order to apply kaleidoscope patterns into textiles or garments, several methods are studied in this paper. Based on Java language, fractal algorithms, M set algorithm and Julia set algorithm are used to simulate kaleidoscope patterns. The simulation results show that the kaleidoscope patterns programed...
Proceedings Article

A Research Based on The Mode Mobile Terminals’ of Digital Library Application

Xin Zhang, Dingli Song, Fuxing Yu, Shu Yan
With the development of the information age, the traditional library can not meet the users' needs for information resources, it needs to be digital transformation. The mobile terminal as the currently new developed information devices, has great convenience that the user can access the Internet anytime,...
Proceedings Article

A Permutation-substitution Based Image Encryption Scheme with Bit-plane Exchanging Strategy

Ruisong Ye, Ming Ye, Yafang Li, Xiaoyun Shi, Wenhao Ye
A novel image encryption scheme with permutation-substitution mechanism is proposed. In the permutation process, the discrete generalized Arnold map is applied to disorder pixel positions and exchange the gray values of corresponding pixels at bit-plane pair. The continuous generalized Arnold map is...
Proceedings Article

3D Reconstruction From A Single Image Based On Shape Evolution

Qian Ma
3D reconstruction from a single image is a challenging problem. In this paper, we present an improved method for 3D reconstruction. We use improved arrival time method to solve the Hamilton-Jacobi equation which is obtained from the method of shape from shading (SFS). The concave-convex ambiguity problems...
Proceedings Article

Simulation Research on Dynamic Matrix Control of Middle Speed Mill

Shihe Chen, Xi Zhang, Shubin Xiao, Peng Liao, Haihua Xiao, Jianguo Duan, Li Zhang, Yuguang Niu, Zhongwei Lin
By using the on-site parameters from the middle speed mill (MSM) of the power plant, the mathematical model of middle speed mill is given by using the test-modeling method. Based on the obtained model, the dynamic matrix control (DMC) of middle speed mill is introduced in MATLAB/SIMULATION environmental....
Proceedings Article

Water Quality Monitoring Network Localization Method Based on RSSI Ranging

Bo Chang, Xin-rong Zhang, Bao-guo Xu
In order to understand the water environment quality and improve the production efficiency, a wireless sensor network localization algorithm about water quality monitoring based on RSSI ranging is proposed. Firstly the dynamic path loss index is obtained for ranging, then the measurement range is corrected...
Proceedings Article

The research and design of real-time collaborative document management system

Xiao Lv, LiangZhong Cui, Juan Li
Different from traditional document management system, the real-time collaborative document management system pays more attention to support multiple users in different places to manage a document simultaneously . In order to support natural and harmonious human to human interactions in real-time collaborative...
Proceedings Article

A Web Mining Based Network Personalized Learning System

Hua Pang, Jian Yu, Long Wang
In order to solve the problems of the traditional network learning system, a network personalized learning system based on web mining is presented in this paper. The web mining technology is simply introduced. The system model is given and the work process of this model is depicted in detail. For improve...
Proceedings Article

Application Research on Public Security Case Information Spatio-temporal Analysis in Police Practical Teaching

Dong Cai, Yanming Chen, Chao Gao
From the perspective of the wisdom public security, this paper concludes the significance of case information Spatio-temporal analysis technology and points its important position in police practical teaching. Combined with the case information Spatio-temporal analysis examples researched in emergency...
Proceedings Article

A Graphic Modeling Method of Thermal Hydraulic System in Power Plant Based on MUSE

Yaqing Zhu, Fengping Pan, Lingling Shi, Zhiqiang Pang, Juanjuan Ren, Shengfang Yu
Based on the MUSE simulation support environment, designed a complete graphic modeling equation of thermal hydraulic system. Developed a module library, source files library, and a series of manage and configuration tools software. This software package is complete opened and orient. It has a simple...
Proceedings Article

A Stimulated Simulation System Based on Ovation Virtual DCS

Shihe Chen, Fengping Pan, Lingling Shi, Zhiqiang Pang, Juanjuan Ren, Xiangsen Zhan
In full accord function with reality power unit, Operator station and engineer station provided by Ovation virtual DCS is accepted by simulation users. The development of interface between virtual DCS and simulation model is key technology for Stimulated Simulation System. The application in Guangdong...
Proceedings Article

RFID Bi-directional Authentication Protocol Based on Random Number and Hash Function

Jian-dong Liu, Ye-quan Wang, Xiao Zhang, Kai Shang
On the basis of the analysis of commonly used RFID authentication protocols’ shortcomings, this paper proposes a random number and hash function based RFID bi-directional authentication protocol. This protocol can resolve eavesdropping, illegal access, location tracking, impersonation and replay attack.
Proceedings Article

The Research on Software of SOA Evolution

Jun Ding, Ye Qian, Jihong Sun, Na Li, Guoquan Lu
Service-oriented software system is facing a challenge to regulate itself promptly because of the evolving Internet environment and user requirements. In order to effectively control software of SOA dynamic evolution, by the formal tool Workflow-net, software of SOA model which is composed of four basic...
Proceedings Article

A Method of Encrypting and Querying String Data for Database

Baohua Huang, Tianjing Wang, Jiafeng Wei
As the information era is coming, more and more sensitive information will be encrypted into databases for secure accessing. This paper focuses on encrypting String data in databases and provides a method to build index for sensitive attributes. The index is composed of partition value, characteristic...
Proceedings Article

An IoT and Mobile Cloud based Architecture for Smart Planting

Changbo Ji, Hongyue Lu, Changqing Ji, Jingguo Yan
Nowadays, Smart Planting has become a core and an effective technology to achieve agricultural modernization technologies. In this paper, a new scheme of smart planting innovative scheme based on the Internet of Things and Cloud Computing technology is independently developed. We provide an architecture...
Proceedings Article

Application of Computer in Track and Field Athletics Management

Chunlin Li, Lei Jin
This paper discusses how to apply the advantage of the computer to complete the management work of the track and field athletics, and make the management work more scientific and systematic, and apply the successful experience of the management to expound it theoretically.
Proceedings Article

On the Application of Holographic Projection Technology in the Large?scale Sports Performance Arrangement

Na-Hu Yu, Lei Jin
This paper analyzes the advantages and trends of holographic projection technology and the characteristics of large sports performance arrangement using the method of literature,aiming at providing new ideas for the performance arrangement,thus facilitating new artistic system of large sports performance...
Proceedings Article

Online Appreciation System for English Literature Based on Mobile Technology

Weiwei Qu
With the rapid development of information technology, the deep integration of information technology and English becomes the core of the current English learning. The rapid development of mobile technology brings much convenience in people's life, at the same time also brought new opportunity for English...
Proceedings Article

Research on Computer Intelligent Test Paper Composition Based on Genetic Algorithm

Liming Wang
The test paper composition is an important part of the exam, how to choose an efficient, scientific and rational way, can ensure test papers the greatest extent possible to meet the different needs of users, and random, science, rationality and other characteristics, it is very critical. Aiming at the...
Proceedings Article

Key Technology of Online Writing System Development

Hongmei Zhao
With the development of information technology, new writing tools are emerging, to help inspire authors and to improve writing skills and efficiency. This paper studies the problems existed in the popular writing tools. Firstly, studies the system framework, discusses the advantages and workflow for...
Proceedings Article

Scores Query System of English Grade Test Based on Android Platform

Hongxia Bian
English grade test is a nationwide test of testing English proficiency, scores query after the test has become the most concerned issues for candidates. In order to facilitate the candidates query test scores, download exam transcripts at anytime and anywhere; by contrast with previous test scores, rationally...
Proceedings Article

A Pulsar Timescale Algorithm Using NANOGRAV Data

Dongshan Yin, Shuhong Zhao, Yuping Gao, Yuejuan Jing
Millisecond pulsar can generate another type of time scale that is totally independent of atomic time scale, because physical mechanisms of pulsar time scale and atomic time scale are quite different. Usually pulsar timing observation isn't even sampled, and their data set is sparse, So we use cubic...
Proceedings Article

The Study of Architecture on Vehicle Information System

Pengfei Liu, Yong Wang, Pengfei Yin
Vehicle Information System is one of the important components of the modern automobile electron. Because of the development of the science and technology and the huge market demands, In-vehicle electronic equipment which was the single in-vehicle navigation equipment at the very beginning is developing...
Proceedings Article

Research on the Functions Fusion of Vehicle Information System

PengFei Yin, Juan Li
In view of the traditional vehicle information systems cannot satisfy the modern vehicle needs. Using the simulation software on the vehicle information system,based on the mutual cooperation of four computers, researching the functions fusion.Experiments show thatthe function of vehicle information...
Proceedings Article

Theory and Technology Research on Software Health Based on HDFS

Hangchao You, Qiuying Li
Software health management is defined as a technology that applies the principles and techniques similar to the one used for system heath management to software systems. The goal of software health management is to maintain software system function and performance and improve software system availability...
Proceedings Article

Parallel MapReduce for Clustering of Residential Customers Energy Behavior

Zheng Wang
In allusion to the problem about electricity behavior analysis in the low efficiency of dealing with huge amounts of data, we puts forward the Fuzzy c-means clustering (Fuzzy c-means clustering, FCM) parallel algorithm based on Mapreduce technology. By decomposing the iterative process of FCM algorithm...
Proceedings Article

Evaluation on the Development Levels of the Low-carbon Cities in Hunan Province Based on AHP and TOPSIS

Yuxiang Yang
The AHP(analytic hierarchy process) and TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) are applied to evaluate low-carbon urban development level of 14 prefecture-level cities in Hunan province. These methods not only have various advantages of analytic hierarchy process and...
Proceedings Article

Improvements and Implementation of Hierarchical Clustering based on Hadoop

Jun Zhang, Chunxiao Fan, Yuexin Wu, Ao Xiao
As the traditional agglomerative hierarchical clustering has a higher number of iterations which makes low efficiency of parallel realization on Hadoop, we propose an improved hierarchical clustering method: when the between-class distance is monotonically increasing, by changing the clustering order...
Proceedings Article

LabVIEW Application to Heat Balance Calculation of Thermal Treatment for Large Spherical Tank

Tingting Li, Songling Ma, Zhongbao Lu
Based on the basic formula of heat balance calculation, a computational simulation system is developed by LabVIEW, which is of thermal treatment for large spherical tank. This system takes full account of the size and material of spherical tank, and calculates the total quantity of heat and the consumption...
Proceedings Article

Numerical Investigation of Supersonic Gas Jet Noise using Large Eddy Simulation

Lei Zhang, Hao Wang, Wenjun Ruan
Noise of gas jet is one of the main noise sources for solid rocket motor, the jet flow field parameters plays an important role in the radiated noise generated. An implicit large eddy simulation (LES) methodology is performed of supersonic gas jet flows in this paper. The flow-induced noise generated...
Proceedings Article

Exploration and Prospect of 3D Virtual Fitting Technology

Hongliang Xing
The invention of 3D virtual fitting technology not only reflects the extension of fitting room in traditional shopping mall, but also breaks the restriction of reality, so users can have richer virtual fitting experience and the technology widens consumers’ selection on clothes. The development of 3D...
Retraction

RETRACTION: Deconstructing Multi-Processors with Dasymeter

Bing Li, Li Chen, Lianyong Zhou
In April 2020, Atlantis Press was alerted to fake proceedings articles hosted on our platform. These articles, mostly in computer science and engineering, were generated by the SCIgen computer program and were all published between 2006-2018. Immediately after receiving the alert, Atlantis Press initiated...
Proceedings Article

The Research of Control Mechanism in Mobile Botnet

Tao Liu, Kai Zhu
With the rapid development of mobile communication technology, mobile botnet comes into being which gives mobile users a great threat. The botnet hacker issue orders through the command and control channel to let the bots launch attacks to gain significant economic benefits. Based on this, this paper...
Proceedings Article

Research and improvement of GPON dynamic bandwidth allocation algorithm

Qiang Han, Hanjian Ni
The dynamic bandwidth allocation algorithm for GPON system based on traffic detection is proposed, and the algorithm of dynamic allocation is studied. According to the existing problems, the improved scheme is put forward.
Proceedings Article

Attacker-Defender Signaling Game in Multi-Period Based on Technology Accumulation and Bayesian Learning

Xiaoyan Zhou, Jincai Huang, Guangquan Cheng
The paper models an incorporated multi-period dynamic signaling game between one attacker and one defender with incomplete information. It is assumed that the defender of two types for high and low attribute properties pays attention to his innovation and development by accumulating technologies, while...
Proceedings Article

Experimental Study on Developing Flexible Tubes with Turbulent Drag Reduction Effects

Shupeng Cai, Gao Peng, Binwen Luo
In order to probe into developing technology for pipe fluid transportation with drag reducing effects by using a flexible tube, an experimental study was performed on the effects of turbulent drag reduction by using sleeve-structured flexible tubes in the operating conditions that there are water and...
Proceedings Article

Image Scene Classification Based on Fisher Discriminative Analysis and Sparse Coding

Jianliang Meng, Rui Ni, Ye Wang, Peng Zhao
Bag of visual words (BoVW) is currently widely utilized as an image representation model. However, conventional BoVW methods usually bring drawbacks such as large representation errors, lack of spatial information and weak discrimination. In order to overcome those, this paper proposes a new image scene...
Proceedings Article

Research on Object Tracking Algorithm Based on Sparse Representation

Jianliang Meng, Rui Ni, Ye Wang, Peng Zhao
Visual tracking has been an active research topic which has a wide application in many computer vision tasks such as intelligence surveillance, vehicle navigation, human computer interaction, and so on. Introducing the background into the template set as the negative sample, the representative ones combine...
Proceedings Article

The Improved Genetic Algorithm for Distribution Network Life Cycle Costs Planning

Pei Hao, Jingang Shi, Chenrui Li
The life cycle economy of the power distribution network planning scheme is becoming more and more important in power markets. The model of the distribution network planning and the configuration of switches based on the life cycle cost (LCC) of equipment was presented. The main objective is to minimize...
Proceedings Article

Design transportation route scheme based on artificial intelligence algorithm and computer simulation

Yuchuan Huang
This article adopts Computer simulation and graph theoretic algorithm to choose the most reasonable place to convey drugs. And this article use mathematical modeling and computer programming to solve the problem of transport drugs.
Proceedings Article

Study on structural effect of equivalent elastic modulus of columnar jointed rock mass

Zhen Cui, Qian Sheng, Xianlun Leng
Owning to its special geological origin, columnar jointed rock mass is a special kind of geological structure with strong discontinuity and anisotropic. In this paper, influence of structural effect on the equivalent modulus of columnar jointed rock mass is discussed via Jointed Finite Element technique...
Proceedings Article

The Design of Software Work flow Architecture Based on Cloud Environment

Bo Han, Lingyu Xu, Lei Wang
In order to deal with the large-scale data access and massive marine information to provide reliable real-time cloud computing services, put forward the concept of software work flow and construct a system based on cloud platform with software work flow. Software work flow engine is at the bottom of...
Proceedings Article

Agent-based Network Security Simulator Nessi2

Yuntian Zhao, Youjun Wang, Hongqi Zhang, Chuanfu Zhang, Chao Yang
With the development of the Internet, a variety of attack behaviors are emerging, which seriously threaten the security of cyberspace. In order to effectively defend these attacks, the researchers put forward a variety of research methods. During these methods, using simulation software to model the...
Proceedings Article

A new predictor-corrector method for the numerical solution of fractional differential equations

Jimin Yu, Chen Wang, Weihong Wu, Xiaofei Huang, Rong Luo
In this paper, first, a new predictor-corrector method( called the modified predictor-corrector method ) for the fractional differential equations is developed. And the new method can be formally viewed as a modification as the classical predictor-corrector method. Second, it is proved that the numerical...
Proceedings Article

Improved DV-HOP localization algorithm in the park location

Guoqing Qiu, Jian Wu, Fangyan Li, Xiangjiao Shen
Aiming at classical DV-Hop localization algorithm has a big positioning error in the situation that network nodes distribute unevenly, an improved DV-Hop algorithm is put forward. The anchor node’s hop distance will be revised by hop counts in the parking lot of location model and hyperbolic positioning...
Proceedings Article

Ad Hoc network traffic prediction based on the Elman neural network

Yuanming Ding, Jiayao Gao, Xue Wang
For complex Ad Hoc network environment, based on Elman neural network prediction model, using particle swarm optimization algorithm to optimize the original Elman BP training can find the global optimization thresholds and weights of the neural network layers, and a modified Elman neural network model...
Proceedings Article

Research on Attack-defense Technology Based on Web Server Side

He Gao, Yijie Shi, Yan Gao, Qiuyu Zhang
With the development of web 2.0 technology, all kinds of services based on web have appeared many new features. The invasion methods and attack technologies aimed at web service side are becoming more and more diverse, which threaten the security of network seriously. Therefore it is necessary to research...
Proceedings Article

The Model of the Distribution of Taxicab Resources

Ruiqi Zhan
Based on the first question of problem B in the National Undergraduate Mathematical Modeling Contest of the Higher Education Cup in 2015, this model would quantify some relevant indexes to analyze the degree of supply and demand for taxicab resources. In view of this question, this paper would estimate...
Proceedings Article

Pallet Loading Problem Model Based on Nested Loop Algorithm

Ruiqi Zhan
This model is based on the problem B in the Mathematical Modeling Contest of North China Electronic Power University in 2015. It works out solutions for non-overlapping box arrangement with load-bearing limits and without bearing limits, which can finally solve the practical loading problem of overlapping...
Proceedings Article

The analysis of online users’ emotions based on data mining

Yi Zhou
With the rapid development of social network, analysis for online users’ emotions and tendencies has gradually developed. Sentiment analysis and social relations analysis on social network has made significant progress. Based on data mining, this study summarized the existing work about users’ emotion...
Proceedings Article

The Research of Tank Bottom Structure Failure Based On Numerical Simulation

Mulin Zheng, Min Wang, Yanting Xu, Jiele Xu, Weican Guo
The structural failure of storage tank under internal overpressure mainly have two forms: uplift deformation and corner weld avulsion. And tank bottom is a sensitive position. A practical case of tank bottom deformation was detected in 2014. Based on this practical engineering case, tank bottom structure...
Proceedings Article

Study on Comprehensive Evaluation of Conflict Operations in Man-machine Interaction System

Xiaohui Sun, Jingquan Zhao, Xiugan Yuan
Conflict operations seriously affect the performance of man-machine interaction in time-critical domains. Even conflict sometimes adversely impacts on safety operation. Based on collaboration task analysis, the hierarchy of comprehensive evaluation index system of conflict operations was established...
Proceedings Article

A study of rumors spreading model with on scale-free network

Tao Li, Qian Zhang
In this paper, a novel SIRS model of rumors on scale-free network with time delay is proposed. The basic reproductive number for the model is presented. We prove that the rumors will die out when the basic reproductive number is less than the unity. Whereas the permanence of the rumors is shown if the...
Proceedings Article

The Study on the Construction of the Computing Platform Based on OpenStack

Chunyu Li
When the information network of an enterprise grows to a certain size, higher requirements will be set to the security and the use of network resources maximum effectiveness. In the current internal network of an enterprise, various needs of IT applications of the enterprise can be met by commonly using...
Proceedings Article

Design and Implementation of the Operation Skill Training System for Elevator

Junfang Xia, Ping Tang, Shirong Liu, Mulin Zheng, Shuai Kong
Based on the virtual reality technology, we developed a training operation skill system for elevator by the modular design. It would be applied to assess workers for elevator. According to the country assessment outline, the system realized the functions of theory and operation skill training. In addition,...
Proceedings Article

The Design and Development of Virtual Elevator Assistant Training System

Zhangwei Ling, Junfang Xia, Min Wang, Ping Tang
Aiming at the problem of assistant teaching and training system for the elevator operator and maintenance operators, the present professional training patterns were analyzed. The virtual elevator system was applied to the elevator training areas, based on the ‘Examination requirements for Safety Administrator...
Proceedings Article

Simulation Study of Improving Mutative Scale Chaos Optimization Algorithm in Complex Nonlinear System

En Zou, Qing Huo, Shuihong Huang, Shengchuang Chen
This paper addresses a reliability optimization problem, where the motive is to select the best optimization method for complex nonlinear system. In order to avoid blind and repeated searching of chaos optimization in searching space of complex nonlinear system, an improving mutative scale chaos optimization...
Proceedings Article

Scheduling Methods for Resource Management in the Cloud computing environment

Chunxia Zhao, Fan Liao
The core problem of cloud computing is to deal with the dynamic scheduling problem of physical and virtual resource, which can be regarded as a new problem in cloud computing, in order to achieve energy saving and emission reduction with high performance and low investment as well as some other targets....
Proceedings Article

MPPT ALGORITHM BASED ON PARTICLE SWARM OPTIMIZATION WITH NATURAL SELECTION

Yishuang Hu, Jingyi Lu, Yue Deng, Zimu Zhang
The output of photovoltaic array under non-uniform light is nonlinear with multi peaks. Since the traditional MPPT algorithm based on particle swarm optimization (PSO) is likely to fall into premature convergence and may work slower in the later iterations, the MPPT method based on improved PSO with...
Proceedings Article

A Weighted Iterative Conflict Reducing Algorithm for Sliding Scheduled Lightpath Provisioning in WDM Optical Networks

Cheng Zheng
In WDM optical networks, the consistent variation of quality of service (QoS) demand has conducted the advent of sliding scheduled traffic, which does not have a rigid deadline and allows flexible sliding within a large time window. In this paper, the static sliding scheduled lightpath demand (SSLD)...
Proceedings Article

The realization of low order FSM method and its application

Jiai He, Xiangyang Liu, Chengquan Pei
Cyclostationary statistical characteristic is the main theory of studying non-stationary periodic signal. Signal and noise are always assumed that obey Gaussian distribution model in traditional signal’s processing. As the environment of non-Gaussian pulse is increasing complex, degradation problems...
Proceedings Article

The emulsifier fault early warning on BP neural network theory

Yuesheng Wang, Kangjian Lu
Emulsifier is the key equipment in the production of emulsion explosive. The condition of the emulsifier is very important to the production safety of the emulsion explosive. The paper focuses on emulsifier fault warning in the production of emulsion explosive. Now the emulsifier fault warning is based...
Proceedings Article

Analytical Solutions of the Fisher-KPP equations

Weishi Yin, Zhixia Jiang
This paper is concerned with the existence of exact traveling wave solutions of nonlinear evolution equations by the tanh-function method.The validity and reliability of this method is demonstrated by applying it to the Fisher-KPP equations.
Retraction

RETRACTION: Decoupling 802.11 Mesh Networks from Model Checking in Courseware

Bing Li, Li Chen, Lianyong Zhou
In April 2020, Atlantis Press was alerted to fake proceedings articles hosted on our platform. These articles, mostly in computer science and engineering, were generated by the SCIgen computer program and were all published between 2006-2018. Immediately after receiving the alert, Atlantis Press initiated...
Proceedings Article

Theoretical line loss calculation based on the Spark of memory cluster technology

Dewen Wang, Jiangman Li
Theoretical line loss calculation is the basis for line loss analysis, and reduce the time of calculating the theoretical line loss can improve the efficiency of the line loss analysis.This paper,aiming at the wasted issue in power transmission,presents a theoretical line loss calculation framework that...
Proceedings Article

GIS-based Integrated Management Platform for Electricity Payment Channels

Bo Ning, LuJin Ma, Ying Li, HuaQin Qin
This paper analyzed the current situation of integration management for payment channels in Jibei Electric Power co., LTD of State Grid, and then proposed an effective solution of GIS-based payment channel integrated management platform. The design of the platform is based on the existed integrated payment...
Proceedings Article

Empirical Analysis and Predictions of Civil Aviation Passenger Traffic Based on ARIMA model

Xiaoxia Zhao, Hongxia Zhao
With the help of statistical software Eview6.0, qualitative analysis is carried out of China's civil aviation passenger traffic since reform and opening up. It is found that China’s civil aviation passenger traffic development experienced three stages: slow development stage from 1978 to1990, relatively...
Proceedings Article

The New Exploring for the Key Technology of Distributed Network Security System Design

Honghui Gong, Yanwei Xu, Ting Zhang
With the rapid development of Internet, the computer network is gradually becoming a country's economic development foundation and lifeblood of the world dependent on the network is also growing, network security issues attendant becomes increasingly prominent. Network security infrastructure Laboratory,...
Proceedings Article

The Skill Research of Interactive Web Site Based on.NET: The Design and Development

Yanwei Xu, Honghui Gong, Ting Zhang
With the development of network information technology and multimedia technology, require Web sites with convenient, fast and efficient features, interactive website built into the current research focus. The use of interactive, resource sharing, this paper describes the development of interactive multimedia...
Proceedings Article

Application Research of Internet of Things Technology in Building Energy Saving

Wei Dong
Concepts, architecture, data analysis and processing methods and other technical requirements in the standard Internet of things systematically optimize and improve existing building energy consumption monitoring theory, network architecture and implementation of technology, the concept of building energy...
Proceedings Article

Research on Sports Demonstration Teaching System Based on Kinect

Li Zhou
With the pace of modern life continues to accelerate, it will allocate more time to work, while ignoring the importance of physical exercise, which virtually led to a decline in physical fitness. The best way to solve this problem is to develop a set of easy-to-install, inexpensive sports teaching system,...
Proceedings Article

Intelligent Logistics Distribution System Design under the Environment of Internet of Things

Yun Wu
With the proposed concept of things, things technology in logistics and distribution will promote the further development of logistics and distribution. Based on the current status of domestic and international distribution logistics comparative study found insufficient logistics existing in our country...