Proceedings of the 2018 Second International Conference of Sensor Network and Computer Engineering (ICSNCE 2018)

Session: Computer Science

12 articles
Proceedings Article

Levenberg-Marquardt Method Based Iterative Square Root Cubature Kalman Filter and its Applications to Maneuvering Re-entry Target Tracking

Mu Jing, Wang Changyuan
Levenberg-Marquardt (abbr.L-M) method based iterative square root cubature Kalman filter (abbr. ISRCKFLM) inherits the numerical stability of square root Cubature Kalman filter and effectively suppresses the influence of the larger initial estimation error and the nonlinearity of the measurement equation...
Proceedings Article

Earthquake Damage Predicting System of Songyuan Based on GIS

Su Zhenjiang, Huang Meng, Xie Shaohui, Zhang Dian, Wang Zhe
With the rapid development of cities, the research on urban seismic damage prediction should have a breakthrough based on the modern technology. The paper takes Songyuan of Jilin Province as the research object, and creates a spatial database by field data and Baidu maps. We simulate the earthquake by...
Proceedings Article

Quadrotor Formation Control Method Based on Graph and Consistency Theory

Yang Sen, Xi Leiping
This paper introduces graph and group system consistency theory and puts forward a quadrotor formation control method. The quadrotor is described as a second-order integrator dynamic system, and the relative position deviation of different quadrotors is used to describe formation. According to the communication...
Proceedings Article

An Improved Algorithm of the Collision Detection Based on OBB

Geng Chaoyang, Gao Fenli
Collision detection plays a vital role in improving the sense of immersion and realism in virtual environment. The bounding box is the most basic collision detection algorithm, The OBB intersect test tightness and can able to significantly reduce the number of bounding volume. and try to occupy less...
Proceedings Article

Research on the Construction of Sports Resources Information Platform Based on Big Data

Wang Shuangming, Shi Jianwei, Fu Shiqiu, Xu Wanlin
The rapid development of communication technology such as big data makes the integration and application of sports resource information become the key of sports informatization construction. The construction of sports resources information big data platform is of great significance to the integration...
Proceedings Article

Research on Digital Holographic 3D Reconstruction Software

Ma Jing, Fu Yanfang, Tan Penghui
Digital holography has a wide range of applications in displaying the surface morphology of three-dimensional objects. There have been many studies on the physical methods and implementation methods of digital holography. One of the main problems at present is to design a stable and fast reconfiguration...
Proceedings Article

Research on Bounding Volume Boxes Collision Detection Algorithm in Virtual Reality Technology

Wan Chao, Liu Pingping, Hong Bo
This paper take the development of virtual campus roaming system as an example. Aiming at the defects of the different kinds of bounding boxes collision detection technology, analyzes the advantages of the hybrid hierarchical bounding box collision detection algorithm based on spheres and oriented bounding...
Proceedings Article

Simulation of Self-similarFlow Based on Fractal Gaussian Noise Method

Li Jie, Lu Ying, Tang Junyong
The conventional network traffic flow models are mostly based on Poisson model . With the continuous development of network services, studies found that the actual network traffic has a long-range dependence (LRD) now and in a very long time , which is a kind of self-similarity. In this paper, RMD and...
Proceedings Article

Design and Implementation of Music Recommendation System Based on Hadoop

Zhao Yufeng, Li Xinwei
In order to solve the problem of information overload of music system under large data background, this paper studies the design scheme of distributed music recommendation system based on Hadoop. The proposed algorithm is based on the MapReduce distributed computing framework, which has high scalability...
Proceedings Article

A Searchable Re-encryption Storage Method in Cloud Environment

Wang Hui, Hong Bo, Tang Junyong
Traditional cloud storage systems do not adapt well to different application environment and does not guarantee the integrity and confidentiality of cloud data. In order to solve the problems brought by the hysteretic and density in the cloud storage system,A Searchable Re-encryption Storage Method (SReCSM)...
Proceedings Article

Research and Implementation of the Key Technology of UAV Aerial Image Transmission

Fan Yijun, Lai Yufeng
With the maturity of UAV technology, especially the cost of the four rotor unmanned aerial vehicle is decreasing, the unmanned aerial vehicle (UAV) will be a trend in the future. At the same time, because ZigBee has the characteristics of low cost, low speed and short transmission distance, we use ZigBee...
Proceedings Article

Research on the Key Technology of Survey Measurement Image Based on UAV

Ding Li, Chong Jiao
With the development of computer technology,especially the emergence of high resolution image sensor, aerial photogrammetry has played an important role in geological survey. Traditional aerial measurements are carried out by manned large aircraft, with a large volume of measured information and a wide...