Proceedings of 2013 International Conference on Information Science and Computer Applications

+ Advanced search
62 articles

Algorithm for Map/Reduce-based association rules data mining

Wenqi Wang, Qiang Li
In order to realize massive information data mining, the traditional Apriori algorithm is updated into a Map/Reduce-based frequent itemsets generating method, so as to distribute the massive data into several servers for parallel processing. The construction of Hadoop platform helps to realize this method...

A Weighted ML-KNN Model for Predicting Users’Personality Traits

Xianglin Zuo, Baoping Feng, Yuan Yao, Tianyi Zhang, Qian Zhang, Mengmeng Wang, Wanli Zuo
Gaining insight into human personality and its impact on human behavior is very valuable in many applications, such as web information credibility prediction. In this paper, we explore using weighted ML-kNN model for automatic recognition of personality traits of web users, based on a given composition...

Hyperspectral Remote Sensing Images Classification Method Based on Learned Dictionary

Min Li, Jun Shen, Lianjun Jiang
A novel hyperspectral image classification method based on learned dictionary is presented in this paper. Firstly, the sampled image pixel and its classification vector are combined as sample pair. Secondly, defined as a sample vector, the sample pair are used for sparse coding and dictionaries learning....

Use OWC Control to Achieve Lamp Energy Consumption Comparison

De-yan Wang
When develop a B/S management system for the LED lamp company, there are many data need analysis on WEB Page. How to directly display lamp energy consumption, we use OWC control to draw the picture. The experimental results prove that the method is simple, effective.

Simulation and Application of Urban intersection traffic flow model

Yubin Li, Bingmou Cui, Siyu Hao, Yan Wei
Based on the theory of computer simulation and the theory of traffic flow, the urban intersection traffic microscopic simulation model is established. Besides, the simulation system is realized on the basis of this model and the object-oriented design. This system is implemented in the integrated development...

Design and Realization of MiniPLC Programming System

QingChao Wei, QiZhong Cai, CongSe Xie, ShaoMing Pan
According to the independent research small Programmable Logic Controller based on ARM and FPGA, a miniPLC programming system is designed. LPC2478 and C/OS-II system are adopted as the platform’s core. Instruction List is adopted as the programming language. A new instruction system and its encodes are...

Design and Implementation of Push Notification System Based on the MQTT Protocol

Konglong Tang, Yong Wang, Hao Liu, Yanxiu Sheng, Xi Wang, Zhiqiang Wei
MQTT (Message Queuing Telemetry Transport) is a broker-based publishing/subscribing, instant messaging protocol. It’s designed to be open, simple, lightweight and easy to implement. This paper described a method of pushing notification system based on the MQTT protocol. It can be used to solve the problem...

Research on Internet-based Teaching of English Newspaper Reading

Xueai Zhao, Yingcong Zhao
In order to develop Chinese student’s ability in reading English newspaper, the authors innovatively designed an internet-based teaching model for English newspaper reading course based on constructivism. Through a comparative study, the authors concluded that the new teaching pattern of English newspaper...

Design and Practice for National Fitness Network Consultation System

Kefei Wang, Li Zhang
According to national fitness knowledge and theory, combine module theory and Internet technology designed national fitness network consultation system. This paper makes explanation on design ideas, technology crucial, module and function design, working example of the system. This system can assess...

Edible oil electrical parameters detection system design based on interdigital sensor

Yufeng Peng, Lili Zhao, Shaoge Yang
Edible oil quality is related to people healthy,existing technology can't realize the convenient and fast detection.This paper studied on the basis of the interdigital capacitance sensor,based on the dielectric constant measurement principle ,used to detect edible oil electrical parameter.Useing capacitance...

Image Mosaic Algorithm and Its Application to the Microimage of Grass Seeds

Lina Ning, Xin Pan, Lin Zhai, Fan Han
This paper presents an image mosaic algorithm and its application to the microimage of grass seeds. The following main steps are involved, firstly in the registration stage, the scale invariant feature transform (SIFT) is employed to obtain initial matches. Then the Random Sample Consensus (RANSAC) is...

Research on Formal Modeling and Verification of on-board ATP System

Caiyun Chen, Qing Luo, Fang Zhang, Daqing Wang, Xiaoping Xue
Formal software safety verification is an important issue for on-board ATP (Automation Train Protection) system. A SCADE-based model safety formal verification method is designed in this paper. The extracted safety properties of ATP are expressed by formal automaton machine, which is an unambiguous semantics...

Research on Automatic Diagnosis Based on ANN Well Conditions Fault

ZhengJia Wu, ShaoXiong Huang, YueSheng Luo
This thesis combines the extraction of geometric characteristics and the neural network, which supplies a method that can define the operating conditions relatively accurately through the diagram feature parameter of the rod pumping system pump and avoids setting up and solving complex nonlinear dynamic...

Real-Time Risk Assessment of Network Security Based on Attack Graphs

Xiaochuan Yin, Yan Fang, Yibo Liu
Facing hackers’ intelligent attacks and multi-source information from various security equipments, evaluating real-time risk of the network becomes more and more complicated to handle. This paper proposes a new attack graphs model(NAG)-based analysis method in order to assess the impact on the network...

Design of video acquisition identification system based on Zynq-7000 Soc Platform

Weikang Qian, Junhui Mei
This paper Introduced to a practical design method of video acquisition system. It took Zynq-7000 SoC platform's FPGA as the main control chip, OV7670 video sensor as the video source, initialized it by the Serial Camera Control Bus (SCCB) to achieve image acquisition and using edge detection algorithm...

An ontology based agile C2 organization model

Tingting Yang, Baoxin Xiu, Weiming Zhang, Jie Liu
Agility is arguably one of the most important characteristics of successful Information Age organizations. The study of agility organizations is currently one of the hottest topics in the organization study field. In this paper, we put forward an agile command and control (C2) organization model and...

Research on The Key Technology of Embedded Linux Logistics System

Jianli Chu, Xia Liu, Jun Li, Xiaoji Chen
Embedded Linux has a very wide range of applications, but also for the field of logistics information provides a powerful and flexible solution, this paper makes research on the key technology. First of all, research embedded Linux systems build, including the system components, the typical hardware...

Research of Boiler Fault Diagnosis Based on Fuzzy Neural Network

Yifeng Wu, Xiaoqi Lin
Boiler system has the characteristics of high complexity, strong simultaneity, multiple measuring points, multiple faults, and the traditional fault diagnosis method can not meet the requirements. A fault diagnosis model based on fuzzy neural network is built by the combination of fuzzy logic technology...

Camera Calibration with Accuracy Evaluation and Real-time Evaluation in the Use of Vision Robot

Zhen Fan, Lei Zhang, Fengbing Luo
In order to calibrate a wide-angle camera in real-time and find the precious position of the target object which could help the robot to find to location where they are, new method which uses the center iteration method and the regional interpolation method based on the distortion correction table is...

An improved routing protocol Ad-AODV Based on AODV

Zuhong Feng, Long Wang, Xiujuan Gao
In Ad Hoc network, AODV routing protocol is an on-demand routing protocol of relative maturity and extensive application. Due to the fact that AODV routing protocol doesn’t consider the residual energy and the load situation of the nodes when choosing routes, its efficiency declines sharply in the case...

University Teachers' Professional Title Evaluation Prediction Mode Based on LVQ Neural Network

Jigang Zhang, Na Liang
At present, university teachers’ professional title evaluation is still mainly based on the qualitative analysis in our country, having their limitation, for example low efficiency, tedious process, complex operation and so on. On the basis of the Learning vector quantization neural network(LVQ), a new...

High-sensitivity ultrasound detection based on phase-shifted fiber Bragg grating

Mingrui Xua, Jingjing Guo, Changxi Yang
Fiber Bragg grating based ultrasound sensors has been receiving continuous attention from science and industry. It is of great potential in medical imaging, oil exploration, etc. In this paper, we construct an all fiber ultrasound sensing system with cascaded phase-shifted FBG and a normal FBG. Correlation...

WordNet-Based Suffix Tree Clustering Algorithm

Qiuyue Dang, Jiwei Zhang, Yueming Lu, Kuo Zhang
High space cost and ignoring synonyms in STC (Suffix Tree Clustering algorithm) are challenges for search results clustering. Aiming at these challenges, this paper proposes a WordNet-based suffix tree clustering algorithm (WNSTC). WNSTC can construct a suffix tree containing WordNet synsets. When constructing...

An Integration of Extreme Learning Machine for Classification of Big Data

Guanwu Zhou, Yulong Zhao, Wenju Xu
Classification is an important task in data mining field. As the time of big data is coming, the traditional methods of classification cannot satisfy the requirements of real-time processing and storage for big data. This study firstly applies a machine learning technique called extreme learning machine...

An Image Adaptive Steganogaphy Algorithm Based on Sparse Representation and Entropy

Chunmei Yu, Jianjun Wang
According to the image processing theory, complex texture image regions have larger entropy values, an adaptive steganography algorithm in the sparse domain is proposed here. The algorithm first divides an image into nonoverlapping image blocks, then computes the entropy of each block and chooses the...

Applications of Clonal Selection Algorithm Based on Tabu Criteria in Combinatorial Optimization

Yongfei Miao, Yufu Yin, Yunpeng Wang
Clonal selection algorithm has a shortcoming when solving the problem of combinatorial optimization which is that the antibody diversity of population evolution declines in later stage. Therefore, this paper has improved the selection operator of this algorithm and introduced tabu criteria. What’s more,...

Modeling for Vibrio fischeri quorum sensing phenomenon based on Multicompartmental Gillespie algorithm

Ji Hu, Xiaoping Wang, Xiaoping Xue
Our research purpose is abstracting computational model from the structure and function as well as collaboration among the biolo58gical cells. Quorum sensing P system means bacteria produce specific signaling molecules spontaneously and sense the change in their concentration. In this paper, we use multicompartmental...

An Experience-Feedback Algorithm of D-S Evidence Theory

Baowen Hu, Bo Shen, Qing Liu
D-S evidence theory is a kind of important method of data fusion to get accurate prediction. In this paper, we propose an improved method in which we build an experience-feedback mechanism for reasoning process. Then prediction accuracy is fed backed to a new round of fusion process in the form of weights...

The Research and Design of Personalization preferences Based on Signaling analysis

ZhiQiang Wei, YiYan Zhang, Hao Liu, YanXiu Sheng, Xi Wang
With the development of electronics, especially that of semiconductor, integrated circuit and computer technology, mobile communication has developed greatly. The rapid development of mobile communication makes people turned their attention to signaling system which has rich user personalization data....

An Improved KNN Algorithm in Text Classification

Xiaoni Wang, Zhenjiang Zhang, Wei Cao
In Ad Hoc network, AODV routing protocol is an on-demand routing protocol of relative maturity and extensive application. Due to the fact that AODV routing protocol doesn’t consider the residual energy and the load situation of the nodes when choosing routes, its efficiency declines sharply in the case...

Markov Decision Process Parallel Value Iteration Algorithm On GPU

Peng Chen, Lu Lu
This paper defines an Out Of Play model based on Markov Decision Process. The best path for playing can be found and recommended by using this model, and a value iteration algorithm of Markov Decision Process is used to implement the model. In this paper, the implementation of this model with CPU is...

Regression Testing for Automatic Fare Collection System of Rail Transit

Mo Cheng, Maolin Zhang
Since regression testing technologies are mainly for software systems, there are few research about the access detecting of the auto fare collection system in rail transit. This paper study the multi-level functional modeling, the source code importing of detected object, the historical test information...

Corridor Lamp Control System Based on Solar and LED Lighting

Xiangrong Ding, Ping Jia
Porch lamp control system is a very important part of the smart home system. The traditional light source control system is unable to control and adjust the color temperature of the light source. This design uses LED and solar porch lamp as the light source with STC15 Series MCU intelligent control unit...

Research on methods of technical support equipment maintainability verification based on Stratified random sampling

Dong Zhang, Aihua Xu, Yanmei Lv, Yanlong Ni
This paper introduced a type of maintainability verification method based on stratified random sampling, which improve the representativeness of the sample and the accuracy of final conclusions. Then deduced the method for determining samples quantity and test conclusions. Finally, take a certain type...

The Application of MRF Based-on Chaos-PSO Optimization in Depth Information Estimation

Xiangjin Zeng, Cheng Lu
For depth information estimation of vision image, a blur parameter model of defocus image based on Markov random field (MRF) has been present. It converts problem of depth estimation into optimization problem. An improved chaos-PSO Algorithm has been applied to complete optimization problem, which prevents...

Iris Localization with an Improved Least Squares Fitting Algorithm

Tao Wei, Shuxiang Song, Haiying Xia
According to the disadvantages that calculation speed of traditional iris localization algorithm is slow and takes up much space. In this paper, we propose a new iris localization algorithm with an improved least squares fitting. Making use of the characteristics that gray value of iris image is difference...

Research on HD video transmission of Smart Home based on Linux System

Shanhui Yin, Chunhai Zhang, Hao Liu, Yanxiu Sheng, Xi Wang, Zhiqiang Wei
With the rapid development of computer network technology and multimedia technology, in the intelligent home field, digitalization, network, multimedia and intelligent will become the inevitable trend of development. In the context of convergence of three networks, intelligent household demand for video...

Name Origin Recognition in Chinese Texts Based on Conditional Random Fields

Jing Zhang, Jian Xu, Yujie Zhang
Name origin recognition is to identify the origin of a name. In natural language processing, information of name origin is an important feature for name entity translation and question answering. Language identification of the origins of names can help to know what language-specific transliteration approaches...

An Improved Image Segmentation Method Using Three-dimensional Region Growing Algorithm

Qiao Wang, Xiaolong Song, Zhengang Jiang
As an important means of clinical diagnoses and treatment of liver diseases, CT scan of liver has been applied more widely. How to extract liver from CT image automatically and accurately is one of the hot topics in the field of medical image segmentation. Because of the diversity and complexity of medical...

Bayesian Network Structure Learning Based On Rough Set and Mutual Information

Zuhong Feng, Xiujuan Gao, Long Wang
In Bayesian network structure learning for incomplete data set, a common problem is too many attributes causing low efficiency and high computation complexity. In this paper, an algorithm of attribute reduction based on rough set is introduced. The algorithm can effectively reduce the dimension of attributes...

The Phoenix-based Parallel Algorithm for Constructing Extremal Graphs

Ruijun Zheng, Yongqi Sun, Yali Wu, Rui Zhang
Phoenix is an implementation of MapReduce on shared memory, aiming at supporting parallel computing based on multi-core/multi-processor efficiently. The extremal graph is a graph with the maximum number of edges without some given subgraphs. In this paper, by allocating the data of tasks appropriately...

Fault Injection for SCADE Models

Xiaolin Shen, Shaoyin Wang, Daqing Wang, Xiaoping Xue
A fault injection method based on SCADE was designed in this paper, which can simulate hardware failure in the form of software fault. Injecting faults into SCADE models brings forward fault tolerance testing to development phase avoiding the cost of changing fault-tolerant design by modifying the code....

Region-based Image Segmentation Using Shape-Varying Agents

Xu Qi
Image segmentation is an important problem in image processing. Existing methods have not solved this problem in some aspects. Alife is a new natural computing method with much good performance. We induce it into image segmentation and propose a novel Alife model Shape-Varying Agent (SVA). The new method...

Application of ID3 Algorithm in the Analysis of Satellite Telemetry Data

Fan Yu, Qin Yan
In order to deeply exploit the knowledge hidden in the telemetry data and find out the correlation between the data, ID3 algorithm was used in the article to analyze the telemetry data of solar panel substrate. The information gain value of parameter was calculated and the maximum gain value is the split...

Application of Network Program Technique in Software Development and Management

Yanlin Tao, Limei Cui
This paper analyses the Network Program Technique from the perspective of its principle and procedures of implementation as well as its merits and demerits, with the aim to solve the problem of overtime and overspend in software development, and provide the incumbent software developer with reference...

A Method to Reduce Correction Error for Electromagnetic Wave Propagation Model

Tiegang Zou
Electromagnetic wave propagation model needs to be corrected before it is used to predict wireless signal coverage. Control of the correction error will directly affect the accuracy of coverage prediction. A method to reduce the correction error is introduced in this paper. In this way, we carry out...

A Secure Localization Algorithm in Wireless Sensor Networks with Mobile Anchor Nodes

Jifeng Cui, Feng Xu, Wei Zhou
In process of localization in wireless sensor networks (WSNs) to improve localization precision, lower network cost and reduce network consumption, mobile anchor node-based localization algorithms for WSNs are ceaselessly put forward and improved. In WSNs localization algorithm with a few mobile anchor...

VIRE and Recursive-Verify Based RFID Location Algorithm

Chang Wan, Wenhua Zeng, Lvqing Yang
Currently RFID is a widely used technique in indoor location. Some related technology and algorithms using active tag for indoor location is studied in this paper. Based VIRE algorithm, an improved location algorithm is proposed by the introduction of a correction mechanism called recursive-calibrate...

Research on Operational Architecture Modeling and Validation Method Based on DoDAF

Jing Wang, Chenhan Wu, Rui Xu, Huisan Zhang
Military information system has the tendency of larger scale, more complicated component, on the contrary of shorter and shorter developing cycle. Aiming at these, this paper puts forward an operational architecture modeling method based on DoDAF, and gives the detailed steps of operational architecture...

Risk Assessment Research of college students online entrepreneurship based on Disturbing Fuzzy Comprehensive Evaluation

Binye Wu, Xuejiao Wu, Xiaolong Ma, Xufeng Tao, Jiawei Fang
The current situation of college graduates employment is severe and complex, college  students entrepreneurship has attracted more and more attention, andonline entrepreneurship has  been a fashion but existing risks. This paper presents apattern and method of disturbing fuzzy  comprehensive evaluation method of collegestudents’ online entrepreneurship risk. For entrepreneurial risk are analyzed and the optimal discriminant, and finding the main factors that lead to risk so ...