Proceedings of the 2nd International Conference on Teaching and Computational Science

Session: Computer Science and Engineering

39 articles
Proceedings Article

A Research on Dynamic Forms Verification Technology Based on PHP + Ajax

Shengju Yang
It is necessary to verify the input data to ensure the safety of high-quality software applications. The traditional WEB forms Verification under B/S model is characterized by the problems of restrictions by HTTP, refreshment of entire pages, long-time waiting of users, etc. In order to solve these problems,...
Proceedings Article

With the Construction of China Mobile Library Construction

Na Li
With China's rapid economic growth, China has significantly informatization development and progress, narrowing the distance with the developed countries. Development of information technology and the popularity of Internet applications, changing the way people read and approaches, but also changed the...
Proceedings Article

Digital City 3d Model Making Technology

Rui Jiang
Starting from the concept of digital city, this paper briefly introduces the specifications and requirements, the three-dimensional modeling of digital city are introduced from the practical Angle in the 3 ds MAX software used in two-dimensional environment tracing and extrusion method model, and use...
Proceedings Article

The Application of Media Asset Management System in Television Program Operation

Xi Wang, Haining Dong
Summarized the related concepts of the Media Asset Management System. Detailed analyzed the application of Media Asset Management System in the Television Programme in operation. The Media Asset Management System will enhance the core competence of TV media, reconstruct the value chain of TV media which...
Proceedings Article

High-efficiency Handwriting Recognition Online Shopping Systemby Mobile Devices

Sung-Jung Hsiao, Kuang-Yow Lian, Wen-Tsai Sung
This paper proposed an innovational method and technology real-time to carry out remote recognition system by a mobile device. User draws a pattern in the local browser to transmit to remote server that will to do recognized task and database search immediately. The recognition system is bidirectional...
Proceedings Article

Research on Resampling Algorithms for Particle Filter

Xiaohui Zeng, Yibing Shi, Yi Lian
Particle filter has been widely applied in many fields in recent years. In order to reduce the particle degeneracy problem, some resampling strategies are introduced to improve the real-time performance of particle filtering. In this article, we present many resampling algorithms and their modified strategy,...
Proceedings Article

Distributed Quality System under the Condition of Wireless Network

Mengqing Tanli, Yan Jiang, Rushu Peng, Chunliang Zhang
Comparison of wireless broadband and cable network is analyzed firstly, and models of distributed quality system under the condition of wireless network are put forward, and core technologies are discussed. The hierarchy model can be divided into four layers: device layer, disposal layer, control layer,...
Proceedings Article

Closed-loop Virtual Reference Feedback Control System Design

Hong-cheng Zhou, Zhi-peng Jiang
Firstly the controller using virtual reference feedback control design, at the same time considering the expectation of a given model match the closed-loop transfer function and sensitivity function, which need to be in the two objective function increases the expression in a model of the sensitivity...
Proceedings Article

Based on Bagging Method Moving Object Detection Design

Hong-cheng Zhou, Cun-bao Chen
Focusing on the disturbance of moving cast shadow, a Bagging moving cast shadow removal method is proposed. Collecting shadow discrimination features from multiple shadow discrimination models, a shadow detector is trained by employing Bagging ensemble based learning framework. The shadow detector can...
Proceedings Article

New Data Storage Auditing Protocols

Xinpeng Zhang, Chunxiang Xu, Wei Sai, Ying Li, Tao Zhou
Cloud storage is a kind of cloud computing services that allows users to store their data in a remote cloud. Because of the loss of data control, data owners will concern that their data will be misused or unauthorized access by other users, in addition, they also worry their data may be lost in the...
Proceedings Article

An Inventory Strategy with Emergency Order in Cluster Supply Chain

Benhe Gao, Yili Jiang
The enterprises in the cluster supply chain network not only cooperate in a chain, but also compete and cooperate cross other supply chains. We focus on bidirectional replenishment policy for the enterprises in two chains so that both of the enterprises can reduce cost. Meanwhile, we provide a research...
Proceedings Article

Overview of Security Enhanced Android’s Security Architecture

Chaowen Zheng
Security Enhanced Android is the integration of Android with SE Linux launched by NSA to strengthen security. This system adopting Mandatory Access Control prevents attacks and enforces application isolation. Also, it provides an implementation of SE Linux in current Android environment. Therefore the...
Proceedings Article

Design and Development of Route-selection and Decision-making System

Junfeng Zhang, Yan Shen
In the study of route selection, due to the diversity, fuzziness, no-determinacy and randomness of the evaluating index, it is very complex for the information processing and decision making, and the CAD system cannot solve these questions at present. This paper aims at the facts of Tianshan-Road, utilizes...
Proceedings Article

The Context of the Digital Media Practice Path of Tianjin Triple Play

Jun Ai, Xiaolong Jiang
Since the 1990s, digital technology has made rapid development in the field of mass communication has been the spread of traditional analog digitization process began, more and more digital media began to walk into people's daily lives. Since the new century, the media industry in the development of...
Proceedings Article

Research and Design of the Coal Mine Safety Supervision System Based on IOT

Liwang Zhu, Shaobo Zhang, Chengzhang Zhu
This paper studied the coal mine safety supervision technology systematically, and proposed an overall structure of an integrated safety supervision system with environment supervision, mine equipment monitoring and person / vehicle location management functions. Then, it intensively analyzed the functional...
Proceedings Article

A Stable Multipath QoS Routing Protocol Based on the Remaining Power of the Nodes in Opportunistic Networks

Xuebin Ma, Liting Wang
With the growing popularity of smart devices, people have increasingly requirements for network’s quality of service (QoS). There is a growing tendency in opportunistic networks to establish stable paths by using long path lifetimes, low routing overhead and high packet delivery ratio. According to recent...
Proceedings Article

A Unified Approach to Weighted L2,1 Minimization for Joint Sparse Recovery

Binqiang Ma, Aodi Zhang, Dongyang Xiang
A unified view of the area of joint sparse recovery is presented for the weighted L2,1 minimization. The support invariance transformation (SIT) is discussed to insure that the proposed scheme does not change the support of the sparse signal. The proposed weighted L2,1 minimization framework utilizes...
Proceedings Article

Road Obstacle Detection Based on Randomized Hough Transform

Jing Lv, Yuanyuan Shang, Hui Ding
Road obstacle detection is the core of pedestrian safety. As an effective image object detection method, Hough transform can detect straight lines, circles, ellipses, parabolas, and many other analytical graphics. This paper mainly detects bar deceleration strips and round well covers, owing to obvious...
Proceedings Article

Study on Learning Resources Recommendation Based on Tasks in Team Collaboration

Lin Gong, Jian Xie, Yang Liu, Xiaodan Zhang
Nowadays, learning team has become an important foundation for modern work. In a team, how to recommend learning resources to the appropriate team member according to the task requirements is a key factor of success. This paper firstly reviewed related methods and concepts in knowledge modeling and learning...
Proceedings Article

Design and Accomplishment of BS-based Supervisory System for Student Assignment Online

Xiao Wang, Jiashan Wang
Computer education has been developed into education of information technology with the rapid development in information technology represented by computer and Internet in the world today. Schools employ a load of approaches to investigate the efficiency in computer and information technology education,...
Proceedings Article

Research of Multi-export Campus Network Upgrade Program Based on Redundant Architecture

Shan Jing, Qi Qi, Na Yang, Runyuan Sun
In order to improve the stability and effectiveness when campus network user access to Internet, the paper, relied on the multi-export campus network environment and based on the analysis on characteristics and demands of the campus network users, completes the design of network upgrade program by adopting...
Proceedings Article

Research on University Library Digital Resources Integration under the Cloud Computing

Xinzhu Huang
With the rapid development of information technology, internet technology and communication technology, library resources building and information services of university is facing new opportunities and challenges and single library resources can not meet the needs of readers. This paper proposes a strategy...
Proceedings Article

Cluster Key Management Scheme for Wireless Sensor Networks

Qisheng Zhao, Xiaoming Liu
The information security of wireless sensor networks is a hot issue in research. This paper examines combining the scheme of the asymmetrical public key system and the threshold key scheme, and proposes a dynamic key management scheme through the second level key matrix of authentication mechanism from...
Proceedings Article

Vulnerabilities Analysis and Solution of VxWorks

Zhigang Zhang, Zhuo Lv, Jiansong Mo, Shuangxia Niu
The paper provides a brief introduction about VxWorks, analyzestheimportanceofOSsecurity, discusses the current revealed vulnerabilities, describes the risks the attack paths and the affected systems about them, and gives the solutions on this foundation.
Proceedings Article

Design and Implementation of Lightweight RMI Framework Based On HTTP Tunnel

Long-da Huang, Jin Liu, Su-yan Long, Jun-song Wang
Java RMI has greatly enhanced the ability to develop java distributed applications, but it is still difficult when passeing through the enterprise firewalls in the public network. Meanwhile, it need extra deployment and registry besides application programs deployment. The paper designed and implemented...
Proceedings Article

The Workflow Modeling Research Based on the Expanded P/T System

Long-da Huang, Jin Liu, Jun-song Wang, Su-yan Long
A workflow modeling method based on the expanded P/T system (hereafter to be called the xP/T system) is put forward to make the correctness verification of the graphical modeling easier and simplify the complication of Petri net modeling. Meanwhile the correctness verification of the modeling is given....
Proceedings Article

A Design of the Traffic Lights Intelligent Control System Based on ARM and Zig Bee

Fensu Shi, Ningning Ge
With the rapid development of economy,Road traffic environment is changing slowly,the efficiency of the people and car traffic is becoming more and more aroused people's attention,As one of important infrastructure of road network,traffic lights have a great impact on traffic efficiency.In the traditional...
Proceedings Article

The Research and Implementation on Extending Algorithm that High Response Ratio Tasks Schedule Preferentially on C/OS-II

Fensu Shi, Hua Wang
To overcome shortcomings that C/OS-II based on static priority scheduling policy may block the tasks in low priority for a long time task scheduling policy based on high response ratio scheduling preferentially is added and achieved .This scheme divided the task in the system into significant tasks and...
Proceedings Article

A Fast Context -Based Fractal Mobile Video Compression with GA and PSO

Junshe Wan, Linru You
Mobile video compression is an important method to translate multimedia from server to client, especially mobile video compress with fractal model is a good way to solution the unbalance computer capacity. Because computer capacity of servers are so powerful that complete encode of fractal video compress...
Proceedings Article

The Design and Implementation of Production Management Information System Based on B/S

Peng Zhang
this paper took the practical situation of some manufacturing enterprise in Tianjin as the basis of system demand to design and develop the overall framework and the function of various modules by analyzing and studying its internal management process and business process. Then this paper determined...
Proceedings Article

Illumination – The Navigation System Associated with Speech and Image Recognition Based on Location Service

Zhenyu Liu, Rong Bi, Jiawu Li, Heng Shen, Ye Song, Fang Zhao
this paper deals with the current navigation system for the visual-impaired people, developing an indoor and outdoor navigation system, Illumination, in association with speech and Image Recognition for them. For human-machine interaction, Illumination is launched by shaking the phone instead of traditionally...
Proceedings Article

Implementation of Traffic E-Government Cloud Technology for Department of Transportation

Jian Lian, Yan Zhang, Mingqu Fan, Haitao Pu
Transport is one of most important aspect of economy and social development in one country. For recent years transportation industry in China has made plenty of great achievements, in which the transportation industry as well as Department of Transportation contributed greatly. Gradually public services...
Proceedings Article

Improvement of Gradient Projection Algorithm for Nonlinear Programming

Dan Wang, Yong-ming Zhang
The search direction by making use of the matrix LU decomposition gradient projection algorithm for nonlinear programming is given, the stability of sparse and thealgorithm of this method can maintain effective constraintmatrix, the algorithm can be applied to large sparsenonlinear optimization problem...
Proceedings Article

A Optimal Design of New Touching Key

Li Zhang
JST080 is a capacitive touch-sensitive chip based on the principle of relaxation, which can design and implement touch key system with MCU. The system is qualified with simple hardware circuit, reliable performance and convenient usage. To improve the reliability of capacitive touch key system, in terms...
Proceedings Article

Development and Exploration of Cloud-based Three-dimensional Digital Resource Sharing Courses

Weifeng Zhu, Jun Tian
With the maturity of cloud technology and the advance of national education informatization process, the construction of professional courses has gradually focused on cloud-based three-dimensional digital resources sharing, thus breaking the shackles of traditional teaching mechanism. The focus of the...
Proceedings Article

Design and Application of AIS Technology in Marine Fishing Management

Yu Wang, Shuo Xu, Zhen-zhou Wang
This paper summarily introduced the production safety problems during operation process of fishing ships in China. In order to solve these problems, we present the range and significance of utilizing AIS technology in the fishing ships management, and summarily introduced the scale of AIS technology...
Proceedings Article

The Security Model of Broadcast Intelligent Terminal Application and Technology Realization on TVOS

Xin Wang, Delin Chen, Yue Sun, Xu Wang, Suying Yao
With the trends of intelligent terminal and broadband network, all kinds of intelligent terminal application based on internet emerge in an endless stream. How to ensure the security of the various applications running on the next generation operating system TVOS is a key technical problem to be solved...
Proceedings Article

Design and Development of the Online Examination System Based on B/S Structure

Hongmei Nie
Online examination is one of the crucial parts for online education. It is efficient and fast enough and reduces the large amount of material resource. An examination system is designed and developed based on web. This paper describes the principle of the system, presents the main functions of the system,...
Proceedings Article

Risk Evaluation for Security Network Based on Protection Model and Risk Entropy

Haitao Lv, Ruimin Hu
A security network is considered as a diagram of security systems deployed in different places in a guard zone. For a security network, its risk is an important metric to judge whether its protection effectiveness is good or not. How to evaluate the risk of a security network In this paper, the protection...