Proceedings of 2013 International Conference on Information Science and Computer Applications

+ Advanced search
62 articles

Data Mining in Cloud Computing

Xia Geng, Zhi Yang
Mining is a process of extracting potentially useful information from raw Data, so as to improve the quality of the information service. With the rapid development of the Internet, the size of the data has increased from KB level to TB even PB level; The object of data mining is also more and more complicated,...

Corridor Lamp Control System Based on Solar and LED Lighting

Xiangrong Ding, Ping Jia
Porch lamp control system is a very important part of the smart home system. The traditional light source control system is unable to control and adjust the color temperature of the light source. This design uses LED and solar porch lamp as the light source with STC15 Series MCU intelligent control unit...

Chinese Question Classify Model Based on Interrogative Semantic Unit

Yue Hu, Bo Liu, Shouwei Zhang
The concept of interrogative semantic unit was proposed, recognition algorithm for interrogative semantic unit was provided on the basis of this concept, and question classification was carried out by combining interrogative semantic unit with HowNet. The test shows that this method obtains good classification...

Fault Injection for SCADE Models

Xiaolin Shen, Shaoyin Wang, Daqing Wang, Xiaoping Xue
A fault injection method based on SCADE was designed in this paper, which can simulate hardware failure in the form of software fault. Injecting faults into SCADE models brings forward fault tolerance testing to development phase avoiding the cost of changing fault-tolerant design by modifying the code....

Research on Formal Modeling and Verification of on-board ATP System

Caiyun Chen, Qing Luo, Fang Zhang, Daqing Wang, Xiaoping Xue
Formal software safety verification is an important issue for on-board ATP (Automation Train Protection) system. A SCADE-based model safety formal verification method is designed in this paper. The extracted safety properties of ATP are expressed by formal automaton machine, which is an unambiguous semantics...

Research on Automatic Diagnosis Based on ANN Well Conditions Fault

ZhengJia Wu, ShaoXiong Huang, YueSheng Luo
This thesis combines the extraction of geometric characteristics and the neural network, which supplies a method that can define the operating conditions relatively accurately through the diagram feature parameter of the rod pumping system pump and avoids setting up and solving complex nonlinear dynamic...

The Development and Prospect of New Technology in Modern distance education

Yunguang Chen, Xue Dong
Modern distance education is a new way of education derived from the extensive application of new technologies. With the development of new technology & media, distance education is also developing. This paper goes as follows: firstly, introduce the concept of distance education and the importance to...

Research on methods of technical support equipment maintainability verification based on Stratified random sampling

Dong Zhang, Aihua Xu, Yanmei Lv, Yanlong Ni
This paper introduced a type of maintainability verification method based on stratified random sampling, which improve the representativeness of the sample and the accuracy of final conclusions. Then deduced the method for determining samples quantity and test conclusions. Finally, take a certain type...

Region-based Image Segmentation Using Shape-Varying Agents

Xu Qi
Image segmentation is an important problem in image processing. Existing methods have not solved this problem in some aspects. Alife is a new natural computing method with much good performance. We induce it into image segmentation and propose a novel Alife model Shape-Varying Agent (SVA). The new method...

Application of ID3 Algorithm in the Analysis of Satellite Telemetry Data

Fan Yu, Qin Yan
In order to deeply exploit the knowledge hidden in the telemetry data and find out the correlation between the data, ID3 algorithm was used in the article to analyze the telemetry data of solar panel substrate. The information gain value of parameter was calculated and the maximum gain value is the split...

Application of Network Program Technique in Software Development and Management

Yanlin Tao, Limei Cui
This paper analyses the Network Program Technique from the perspective of its principle and procedures of implementation as well as its merits and demerits, with the aim to solve the problem of overtime and overspend in software development, and provide the incumbent software developer with reference...

WordNet-Based Suffix Tree Clustering Algorithm

Qiuyue Dang, Jiwei Zhang, Yueming Lu, Kuo Zhang
High space cost and ignoring synonyms in STC (Suffix Tree Clustering algorithm) are challenges for search results clustering. Aiming at these challenges, this paper proposes a WordNet-based suffix tree clustering algorithm (WNSTC). WNSTC can construct a suffix tree containing WordNet synsets. When constructing...

Real-Time Risk Assessment of Network Security Based on Attack Graphs

Xiaochuan Yin, Yan Fang, Yibo Liu
Facing hackers’ intelligent attacks and multi-source information from various security equipments, evaluating real-time risk of the network becomes more and more complicated to handle. This paper proposes a new attack graphs model(NAG)-based analysis method in order to assess the impact on the network...

An Integration of Extreme Learning Machine for Classification of Big Data

Guanwu Zhou, Yulong Zhao, Wenju Xu
Classification is an important task in data mining field. As the time of big data is coming, the traditional methods of classification cannot satisfy the requirements of real-time processing and storage for big data. This study firstly applies a machine learning technique called extreme learning machine...

Simulation and Application of Urban intersection traffic flow model

Yubin Li, Bingmou Cui, Siyu Hao, Yan Wei
Based on the theory of computer simulation and the theory of traffic flow, the urban intersection traffic microscopic simulation model is established. Besides, the simulation system is realized on the basis of this model and the object-oriented design. This system is implemented in the integrated development...

An improved routing protocol Ad-AODV Based on AODV

Zuhong Feng, Long Wang, Xiujuan Gao
In Ad Hoc network, AODV routing protocol is an on-demand routing protocol of relative maturity and extensive application. Due to the fact that AODV routing protocol doesn’t consider the residual energy and the load situation of the nodes when choosing routes, its efficiency declines sharply in the case...

Design and Realization of MiniPLC Programming System

QingChao Wei, QiZhong Cai, CongSe Xie, ShaoMing Pan
According to the independent research small Programmable Logic Controller based on ARM and FPGA, a miniPLC programming system is designed. LPC2478 and C/OS-II system are adopted as the platform’s core. Instruction List is adopted as the programming language. A new instruction system and its encodes...

University Teachers' Professional Title Evaluation Prediction Mode Based on LVQ Neural Network

Jigang Zhang, Na Liang
At present, university teachers’ professional title evaluation is still mainly based on the qualitative analysis in our country, having their limitation, for example low efficiency, tedious process, complex operation and so on. On the basis of the Learning vector quantization neural network(LVQ), a...

Research on HD video transmission of Smart Home based on Linux System

Shanhui Yin, Chunhai Zhang, Hao Liu, Yanxiu Sheng, Xi Wang, Zhiqiang Wei
With the rapid development of computer network technology and multimedia technology, in the intelligent home field, digitalization, network, multimedia and intelligent will become the inevitable trend of development. In the context of convergence of three networks, intelligent household demand for video...

Design and Implementation of Push Notification System Based on the MQTT Protocol

Konglong Tang, Yong Wang, Hao Liu, Yanxiu Sheng, Xi Wang, Zhiqiang Wei
MQTT (Message Queuing Telemetry Transport) is a broker-based publishing/subscribing, instant messaging protocol. It’s designed to be open, simple, lightweight and easy to implement. This paper described a method of pushing notification system based on the MQTT protocol. It can be used to solve the problem...

Design and implementation of wellsite data transmission system based on C/S

Baolei Ma, Yanmei Zhang
The paper introduces the data transmission system in the Petroleum Industry with the help of programming systematically. The wellsite data could be available for the usage of other Petroleum Service Departments by using this system. The perfection of Internet technology enables network programming to...

Research on Internet-based Teaching of English Newspaper Reading

Xueai Zhao, Yingcong Zhao
In order to develop Chinese student’s ability in reading English newspaper, the authors innovatively designed an internet-based teaching model for English newspaper reading course based on constructivism. Through a comparative study, the authors concluded that the new teaching pattern of English newspaper...

Name Origin Recognition in Chinese Texts Based on Conditional Random Fields

Jing Zhang, Jian Xu, Yujie Zhang
Name origin recognition is to identify the origin of a name. In natural language processing, information of name origin is an important feature for name entity translation and question answering. Language identification of the origins of names can help to know what language-specific transliteration approaches...

The Application of MRF Based-on Chaos-PSO Optimization in Depth Information Estimation

Xiangjin Zeng, Cheng Lu
For depth information estimation of vision image, a blur parameter model of defocus image based on Markov random field (MRF) has been present. It converts problem of depth estimation into optimization problem. An improved chaos-PSO Algorithm has been applied to complete optimization problem, which prevents...

High-sensitivity ultrasound detection based on phase-shifted fiber Bragg grating

Mingrui Xua, Jingjing Guo, Changxi Yang
Fiber Bragg grating based ultrasound sensors has been receiving continuous attention from science and industry. It is of great potential in medical imaging, oil exploration, etc. In this paper, we construct an all fiber ultrasound sensing system with cascaded phase-shifted FBG and a normal FBG. Correlation...

An Improved Image Segmentation Method Using Three-dimensional Region Growing Algorithm

Qiao Wang, Xiaolong Song, Zhengang Jiang
As an important means of clinical diagnoses and treatment of liver diseases, CT scan of liver has been applied more widely. How to extract liver from CT image automatically and accurately is one of the hot topics in the field of medical image segmentation. Because of the diversity and complexity of medical...

Safety-Oriented Software Architecture Design Approach

Yuling Huang
Software Architecture; Software Safety; Safety Requirements; Safety Tactics

Iris Localization with an Improved Least Squares Fitting Algorithm

Tao Wei, Shuxiang Song, Haiying Xia
According to the disadvantages that calculation speed of traditional iris localization algorithm is slow and takes up much space. In this paper, we propose a new iris localization algorithm with an improved least squares fitting. Making use of the characteristics that gray value of iris image is difference...

Design and Practice for National Fitness Network Consultation System

Kefei Wang, Li Zhang
According to national fitness knowledge and theory, combine module theory and Internet technology designed national fitness network consultation system. This paper makes explanation on design ideas, technology crucial, module and function design, working example of the system. This system can assess...

Edible oil electrical parameters detection system design based on interdigital sensor

Yufeng Peng, Lili Zhao, Shaoge Yang
Edible oil quality is related to people healthy,existing technology can't realize the convenient and fast detection.This paper studied on the basis of the interdigital capacitance sensor,based on the dielectric constant measurement principle ,used to detect edible oil electrical parameter.Useing capacitance...

Image Mosaic Algorithm and Its Application to the Microimage of Grass Seeds

Lina Ning, Xin Pan, Lin Zhai, Fan Han
This paper presents an image mosaic algorithm and its application to the microimage of grass seeds. The following main steps are involved, firstly in the registration stage, the scale invariant feature transform (SIFT) is employed to obtain initial matches. Then the Random Sample Consensus (RANSAC) is...

Bayesian Network Structure Learning Based On Rough Set and Mutual Information

Zuhong Feng, Xiujuan Gao, Long Wang
In Bayesian network structure learning for incomplete data set, a common problem is too many attributes causing low efficiency and high computation complexity. In this paper, an algorithm of attribute reduction based on rough set is introduced. The algorithm can effectively reduce the dimension of attributes...

Sensor Technologies for Prognostics and Health Management of Electronics

Wenxue Yang, Zhe Chen, Feng Yang
This paper introduces the sensors and their sensor technologies. The required attributes of sensors for the development for PHM of electronics are discussed. Finally, their trends in sensor systems are presented.

The Phoenix-based Parallel Algorithm for Constructing Extremal Graphs

Ruijun Zheng, Yongqi Sun, Yali Wu, Rui Zhang
Phoenix is an implementation of MapReduce on shared memory, aiming at supporting parallel computing based on multi-core/multi-processor efficiently. The extremal graph is a graph with the maximum number of edges without some given subgraphs. In this paper, by allocating the data of tasks appropriately...

VIRE and Recursive-Verify Based RFID Location Algorithm

Chang Wan, Wenhua Zeng, Lvqing Yang
Currently RFID is a widely used technique in indoor location. Some related technology and algorithms using active tag for indoor location is studied in this paper. Based VIRE algorithm, an improved location algorithm is proposed by the introduction of a correction mechanism called recursive-calibrate...

Design of video acquisition identification system based on Zynq-7000 Soc Platform

Weikang Qian, Junhui Mei
This paper Introduced to a practical design method of video acquisition system. It took Zynq-7000 SoC platform's FPGA as the main control chip, OV7670 video sensor as the video source, initialized it by the Serial Camera Control Bus (SCCB) to achieve image acquisition and using edge detection algorithm...

An Image Adaptive Steganogaphy Algorithm Based on Sparse Representation and Entropy

Chunmei Yu, Jianjun Wang
According to the image processing theory, complex texture image regions have larger entropy values, an adaptive steganography algorithm in the sparse domain is proposed here. The algorithm first divides an image into nonoverlapping image blocks, then computes the entropy of each block and chooses the...

Modeling for Vibrio fischeri quorum sensing phenomenon based on Multicompartmental Gillespie algorithm

Ji Hu, Xiaoping Wang, Xiaoping Xue
Our research purpose is abstracting computational model from the structure and function as well as collaboration among the biolo58gical cells. Quorum sensing P system means bacteria produce specific signaling molecules spontaneously and sense the change in their concentration. In this paper, we use multicompartmental...

An Experience-Feedback Algorithm of D-S Evidence Theory

Baowen Hu, Bo Shen, Qing Liu
D-S evidence theory is a kind of important method of data fusion to get accurate prediction. In this paper, we propose an improved method in which we build an experience-feedback mechanism for reasoning process. Then prediction accuracy is fed backed to a new round of fusion process in the form of weights...

Research on Operational Architecture Modeling and Validation Method Based on DoDAF

Jing Wang, Chenhan Wu, Rui Xu, Huisan Zhang
Military information system has the tendency of larger scale, more complicated component, on the contrary of shorter and shorter developing cycle. Aiming at these, this paper puts forward an operational architecture modeling method based on DoDAF, and gives the detailed steps of operational architecture...

The Research and Design of Personalization preferences Based on Signaling analysis

ZhiQiang Wei, YiYan Zhang, Hao Liu, YanXiu Sheng, Xi Wang
With the development of electronics, especially that of semiconductor, integrated circuit and computer technology, mobile communication has developed greatly. The rapid development of mobile communication makes people turned their attention to signaling system which has rich user personalization data....

An ontology based agile C2 organization model

Tingting Yang, Baoxin Xiu, Weiming Zhang, Jie Liu
Agility is arguably one of the most important characteristics of successful Information Age organizations. The study of agility organizations is currently one of the hottest topics in the organization study field. In this paper, we put forward an agile command and control (C2) organization model and...

Research on The Key Technology of Embedded Linux Logistics System

Jianli Chu, Xia Liu, Jun Li, Xiaoji Chen
Embedded Linux has a very wide range of applications, but also for the field of logistics information provides a powerful and flexible solution, this paper makes research on the key technology. First of all, research embedded Linux systems build, including the system components, the typical hardware...

Research of Boiler Fault Diagnosis Based on Fuzzy Neural Network

Yifeng Wu, Xiaoqi Lin
Boiler system has the characteristics of high complexity, strong simultaneity, multiple measuring points, multiple faults, and the traditional fault diagnosis method can not meet the requirements. A fault diagnosis model based on fuzzy neural network is built by the combination of fuzzy logic technology...

An Improved KNN Algorithm in Text Classification

Xiaoni Wang, Zhenjiang Zhang, Wei Cao
In Ad Hoc network, AODV routing protocol is an on-demand routing protocol of relative maturity and extensive application. Due to the fact that AODV routing protocol doesn’t consider the residual energy and the load situation of the nodes when choosing routes, its efficiency declines sharply in the case...

Camera Calibration with Accuracy Evaluation and Real-time Evaluation in the Use of Vision Robot

Zhen Fan, Lei Zhang, Fengbing Luo
In order to calibrate a wide-angle camera in real-time and find the precious position of the target object which could help the robot to find to location where they are, new method which uses the center iteration method and the regional interpolation method based on the distortion correction table is...

Risk Assessment Research of college students online entrepreneurship based on Disturbing Fuzzy Comprehensive Evaluation

Binye Wu, Xuejiao Wu, Xiaolong Ma, Xufeng Tao, Jiawei Fang
The current situation of college graduates employment is severe and complex, college  students entrepreneurship has attracted more and more attention, andonline entrepreneurship has  been a fashion but existing risks. This paper presents apattern and method of disturbing fuzzy  comprehensive evaluation method of collegestudents’ online entrepreneurship risk. For entrepreneurial risk are analyzed and the optimal discriminant, and finding the main factors that lead to risk so  as to provide a scientific basis for college students online entrepreneurship risk management. 

A wireless sensor network DV-Hop localization algorithm

Huami Yang, Qi Wang, Zhuang Liu
This paper first introduces wireless sensor networks self-positioning classical algorithm DV-Hop (distance vector-hop) algorithm, then analyze its shortcomings, Finally, a new improved algorithm and through improved algorithm matlab simulation verify the situation after the positioning accuracy.Comparative...

Intelligentized Dispatching Control of Railway Transport of Molten Iron in Metallurgical Enterprise

Xiaoyan Yang, Bingmou Cui, Jie Chen
Focusing on railway transport of molten iron in steel enterprise, this paper tries to meet the demand and supply of molten iron between blast furnace and steel mill through TPC (torpedo car) transport. Taking mill railway as a network, based on path selection of molten iron transport and automatic collision...

Design and Implementation of Vehicles Monitoring System Based on Android Mobile Terminals

Nuan Sui, Chunhai Zhang, Hao Liu, Yanxiu Sheng, Xi Wang, Zhiqiang Wei
With the popularity of android smartphone and the increasing number of the vehicles the problems of obtaining real-time vehicle status information and historical trace information have attracted considerable attention. For these two problems, the vehicle monitoring system client running on android smartphone...