Proceedings of 2013 International Conference on Information Science and Computer Applications

+ Advanced search
62 articles
Proceedings Article

Data Mining in Cloud Computing

Xia Geng, Zhi Yang
Mining is a process of extracting potentially useful information from raw Data, so as to improve the quality of the information service. With the rapid development of the Internet, the size of the data has increased from KB level to TB even PB level; The object of data mining is also more and more complicated,...
Proceedings Article

Corridor Lamp Control System Based on Solar and LED Lighting

Xiangrong Ding, Ping Jia
Porch lamp control system is a very important part of the smart home system. The traditional light source control system is unable to control and adjust the color temperature of the light source. This design uses LED and solar porch lamp as the light source with STC15 Series MCU intelligent control unit...
Proceedings Article

Chinese Question Classify Model Based on Interrogative Semantic Unit

Yue Hu, Bo Liu, Shouwei Zhang
The concept of interrogative semantic unit was proposed, recognition algorithm for interrogative semantic unit was provided on the basis of this concept, and question classification was carried out by combining interrogative semantic unit with HowNet. The test shows that this method obtains good classification...
Proceedings Article

Fault Injection for SCADE Models

Xiaolin Shen, Shaoyin Wang, Daqing Wang, Xiaoping Xue
A fault injection method based on SCADE was designed in this paper, which can simulate hardware failure in the form of software fault. Injecting faults into SCADE models brings forward fault tolerance testing to development phase avoiding the cost of changing fault-tolerant design by modifying the code....
Proceedings Article

Research on Formal Modeling and Verification of on-board ATP System

Caiyun Chen, Qing Luo, Fang Zhang, Daqing Wang, Xiaoping Xue
Formal software safety verification is an important issue for on-board ATP (Automation Train Protection) system. A SCADE-based model safety formal verification method is designed in this paper. The extracted safety properties of ATP are expressed by formal automaton machine, which is an unambiguous semantics...
Proceedings Article

Research on Automatic Diagnosis Based on ANN Well Conditions Fault

ZhengJia Wu, ShaoXiong Huang, YueSheng Luo
This thesis combines the extraction of geometric characteristics and the neural network, which supplies a method that can define the operating conditions relatively accurately through the diagram feature parameter of the rod pumping system pump and avoids setting up and solving complex nonlinear dynamic...
Proceedings Article

The Development and Prospect of New Technology in Modern distance education

Yunguang Chen, Xue Dong
Modern distance education is a new way of education derived from the extensive application of new technologies. With the development of new technology & media, distance education is also developing. This paper goes as follows: firstly, introduce the concept of distance education and the importance to...
Proceedings Article

Research on methods of technical support equipment maintainability verification based on Stratified random sampling

Dong Zhang, Aihua Xu, Yanmei Lv, Yanlong Ni
This paper introduced a type of maintainability verification method based on stratified random sampling, which improve the representativeness of the sample and the accuracy of final conclusions. Then deduced the method for determining samples quantity and test conclusions. Finally, take a certain type...
Proceedings Article

Region-based Image Segmentation Using Shape-Varying Agents

Xu Qi
Image segmentation is an important problem in image processing. Existing methods have not solved this problem in some aspects. Alife is a new natural computing method with much good performance. We induce it into image segmentation and propose a novel Alife model Shape-Varying Agent (SVA). The new method...
Proceedings Article

Application of ID3 Algorithm in the Analysis of Satellite Telemetry Data

Fan Yu, Qin Yan
In order to deeply exploit the knowledge hidden in the telemetry data and find out the correlation between the data, ID3 algorithm was used in the article to analyze the telemetry data of solar panel substrate. The information gain value of parameter was calculated and the maximum gain value is the split...
Proceedings Article

Application of Network Program Technique in Software Development and Management

Yanlin Tao, Limei Cui
This paper analyses the Network Program Technique from the perspective of its principle and procedures of implementation as well as its merits and demerits, with the aim to solve the problem of overtime and overspend in software development, and provide the incumbent software developer with reference...
Proceedings Article

WordNet-Based Suffix Tree Clustering Algorithm

Qiuyue Dang, Jiwei Zhang, Yueming Lu, Kuo Zhang
High space cost and ignoring synonyms in STC (Suffix Tree Clustering algorithm) are challenges for search results clustering. Aiming at these challenges, this paper proposes a WordNet-based suffix tree clustering algorithm (WNSTC). WNSTC can construct a suffix tree containing WordNet synsets. When constructing...
Proceedings Article

Real-Time Risk Assessment of Network Security Based on Attack Graphs

Xiaochuan Yin, Yan Fang, Yibo Liu
Facing hackers’ intelligent attacks and multi-source information from various security equipments, evaluating real-time risk of the network becomes more and more complicated to handle. This paper proposes a new attack graphs model(NAG)-based analysis method in order to assess the impact on the network...
Proceedings Article

An Integration of Extreme Learning Machine for Classification of Big Data

Guanwu Zhou, Yulong Zhao, Wenju Xu
Classification is an important task in data mining field. As the time of big data is coming, the traditional methods of classification cannot satisfy the requirements of real-time processing and storage for big data. This study firstly applies a machine learning technique called extreme learning machine...
Proceedings Article

Simulation and Application of Urban intersection traffic flow model

Yubin Li, Bingmou Cui, Siyu Hao, Yan Wei
Based on the theory of computer simulation and the theory of traffic flow, the urban intersection traffic microscopic simulation model is established. Besides, the simulation system is realized on the basis of this model and the object-oriented design. This system is implemented in the integrated development...
Proceedings Article

An improved routing protocol Ad-AODV Based on AODV

Zuhong Feng, Long Wang, Xiujuan Gao
In Ad Hoc network, AODV routing protocol is an on-demand routing protocol of relative maturity and extensive application. Due to the fact that AODV routing protocol doesn’t consider the residual energy and the load situation of the nodes when choosing routes, its efficiency declines sharply in the case...
Proceedings Article

Design and Realization of MiniPLC Programming System

QingChao Wei, QiZhong Cai, CongSe Xie, ShaoMing Pan
According to the independent research small Programmable Logic Controller based on ARM and FPGA, a miniPLC programming system is designed. LPC2478 and C/OS-II system are adopted as the platform’s core. Instruction List is adopted as the programming language. A new instruction system and its encodes are...
Proceedings Article

University Teachers' Professional Title Evaluation Prediction Mode Based on LVQ Neural Network

Jigang Zhang, Na Liang
At present, university teachers’ professional title evaluation is still mainly based on the qualitative analysis in our country, having their limitation, for example low efficiency, tedious process, complex operation and so on. On the basis of the Learning vector quantization neural network(LVQ), a new...
Proceedings Article

Research on HD video transmission of Smart Home based on Linux System

Shanhui Yin, Chunhai Zhang, Hao Liu, Yanxiu Sheng, Xi Wang, Zhiqiang Wei
With the rapid development of computer network technology and multimedia technology, in the intelligent home field, digitalization, network, multimedia and intelligent will become the inevitable trend of development. In the context of convergence of three networks, intelligent household demand for video...
Proceedings Article

Design and Implementation of Push Notification System Based on the MQTT Protocol

Konglong Tang, Yong Wang, Hao Liu, Yanxiu Sheng, Xi Wang, Zhiqiang Wei
MQTT (Message Queuing Telemetry Transport) is a broker-based publishing/subscribing, instant messaging protocol. It’s designed to be open, simple, lightweight and easy to implement. This paper described a method of pushing notification system based on the MQTT protocol. It can be used to solve the problem...
Proceedings Article

Design and implementation of wellsite data transmission system based on C/S

Baolei Ma, Yanmei Zhang
The paper introduces the data transmission system in the Petroleum Industry with the help of programming systematically. The wellsite data could be available for the usage of other Petroleum Service Departments by using this system. The perfection of Internet technology enables network programming to...
Proceedings Article

Research on Internet-based Teaching of English Newspaper Reading

Xueai Zhao, Yingcong Zhao
In order to develop Chinese student’s ability in reading English newspaper, the authors innovatively designed an internet-based teaching model for English newspaper reading course based on constructivism. Through a comparative study, the authors concluded that the new teaching pattern of English newspaper...
Proceedings Article

Name Origin Recognition in Chinese Texts Based on Conditional Random Fields

Jing Zhang, Jian Xu, Yujie Zhang
Name origin recognition is to identify the origin of a name. In natural language processing, information of name origin is an important feature for name entity translation and question answering. Language identification of the origins of names can help to know what language-specific transliteration approaches...
Proceedings Article

The Application of MRF Based-on Chaos-PSO Optimization in Depth Information Estimation

Xiangjin Zeng, Cheng Lu
For depth information estimation of vision image, a blur parameter model of defocus image based on Markov random field (MRF) has been present. It converts problem of depth estimation into optimization problem. An improved chaos-PSO Algorithm has been applied to complete optimization problem, which prevents...
Proceedings Article

High-sensitivity ultrasound detection based on phase-shifted fiber Bragg grating

Mingrui Xua, Jingjing Guo, Changxi Yang
Fiber Bragg grating based ultrasound sensors has been receiving continuous attention from science and industry. It is of great potential in medical imaging, oil exploration, etc. In this paper, we construct an all fiber ultrasound sensing system with cascaded phase-shifted FBG and a normal FBG. Correlation...
Proceedings Article

An Improved Image Segmentation Method Using Three-dimensional Region Growing Algorithm

Qiao Wang, Xiaolong Song, Zhengang Jiang
As an important means of clinical diagnoses and treatment of liver diseases, CT scan of liver has been applied more widely. How to extract liver from CT image automatically and accurately is one of the hot topics in the field of medical image segmentation. Because of the diversity and complexity of medical...
Proceedings Article

Safety-Oriented Software Architecture Design Approach

Yuling Huang
Software Architecture; Software Safety; Safety Requirements; Safety Tactics
Proceedings Article

Iris Localization with an Improved Least Squares Fitting Algorithm

Tao Wei, Shuxiang Song, Haiying Xia
According to the disadvantages that calculation speed of traditional iris localization algorithm is slow and takes up much space. In this paper, we propose a new iris localization algorithm with an improved least squares fitting. Making use of the characteristics that gray value of iris image is difference...
Proceedings Article

Design and Practice for National Fitness Network Consultation System

Kefei Wang, Li Zhang
According to national fitness knowledge and theory, combine module theory and Internet technology designed national fitness network consultation system. This paper makes explanation on design ideas, technology crucial, module and function design, working example of the system. This system can assess...
Proceedings Article

Edible oil electrical parameters detection system design based on interdigital sensor

Yufeng Peng, Lili Zhao, Shaoge Yang
Edible oil quality is related to people healthy,existing technology can't realize the convenient and fast detection.This paper studied on the basis of the interdigital capacitance sensor,based on the dielectric constant measurement principle ,used to detect edible oil electrical parameter.Useing capacitance...
Proceedings Article

Image Mosaic Algorithm and Its Application to the Microimage of Grass Seeds

Lina Ning, Xin Pan, Lin Zhai, Fan Han
This paper presents an image mosaic algorithm and its application to the microimage of grass seeds. The following main steps are involved, firstly in the registration stage, the scale invariant feature transform (SIFT) is employed to obtain initial matches. Then the Random Sample Consensus (RANSAC) is...
Proceedings Article

Bayesian Network Structure Learning Based On Rough Set and Mutual Information

Zuhong Feng, Xiujuan Gao, Long Wang
In Bayesian network structure learning for incomplete data set, a common problem is too many attributes causing low efficiency and high computation complexity. In this paper, an algorithm of attribute reduction based on rough set is introduced. The algorithm can effectively reduce the dimension of attributes...
Proceedings Article

Sensor Technologies for Prognostics and Health Management of Electronics

Wenxue Yang, Zhe Chen, Feng Yang
This paper introduces the sensors and their sensor technologies. The required attributes of sensors for the development for PHM of electronics are discussed. Finally, their trends in sensor systems are presented.
Proceedings Article

The Phoenix-based Parallel Algorithm for Constructing Extremal Graphs

Ruijun Zheng, Yongqi Sun, Yali Wu, Rui Zhang
Phoenix is an implementation of MapReduce on shared memory, aiming at supporting parallel computing based on multi-core/multi-processor efficiently. The extremal graph is a graph with the maximum number of edges without some given subgraphs. In this paper, by allocating the data of tasks appropriately...
Proceedings Article

VIRE and Recursive-Verify Based RFID Location Algorithm

Chang Wan, Wenhua Zeng, Lvqing Yang
Currently RFID is a widely used technique in indoor location. Some related technology and algorithms using active tag for indoor location is studied in this paper. Based VIRE algorithm, an improved location algorithm is proposed by the introduction of a correction mechanism called recursive-calibrate...
Proceedings Article

Design of video acquisition identification system based on Zynq-7000 Soc Platform

Weikang Qian, Junhui Mei
This paper Introduced to a practical design method of video acquisition system. It took Zynq-7000 SoC platform's FPGA as the main control chip, OV7670 video sensor as the video source, initialized it by the Serial Camera Control Bus (SCCB) to achieve image acquisition and using edge detection algorithm...
Proceedings Article

An Image Adaptive Steganogaphy Algorithm Based on Sparse Representation and Entropy

Chunmei Yu, Jianjun Wang
According to the image processing theory, complex texture image regions have larger entropy values, an adaptive steganography algorithm in the sparse domain is proposed here. The algorithm first divides an image into nonoverlapping image blocks, then computes the entropy of each block and chooses the...
Proceedings Article

Modeling for Vibrio fischeri quorum sensing phenomenon based on Multicompartmental Gillespie algorithm

Ji Hu, Xiaoping Wang, Xiaoping Xue
Our research purpose is abstracting computational model from the structure and function as well as collaboration among the biolo58gical cells. Quorum sensing P system means bacteria produce specific signaling molecules spontaneously and sense the change in their concentration. In this paper, we use multicompartmental...
Proceedings Article

An Experience-Feedback Algorithm of D-S Evidence Theory

Baowen Hu, Bo Shen, Qing Liu
D-S evidence theory is a kind of important method of data fusion to get accurate prediction. In this paper, we propose an improved method in which we build an experience-feedback mechanism for reasoning process. Then prediction accuracy is fed backed to a new round of fusion process in the form of weights...
Proceedings Article

Research on Operational Architecture Modeling and Validation Method Based on DoDAF

Jing Wang, Chenhan Wu, Rui Xu, Huisan Zhang
Military information system has the tendency of larger scale, more complicated component, on the contrary of shorter and shorter developing cycle. Aiming at these, this paper puts forward an operational architecture modeling method based on DoDAF, and gives the detailed steps of operational architecture...
Proceedings Article

The Research and Design of Personalization preferences Based on Signaling analysis

ZhiQiang Wei, YiYan Zhang, Hao Liu, YanXiu Sheng, Xi Wang
With the development of electronics, especially that of semiconductor, integrated circuit and computer technology, mobile communication has developed greatly. The rapid development of mobile communication makes people turned their attention to signaling system which has rich user personalization data....
Proceedings Article

An ontology based agile C2 organization model

Tingting Yang, Baoxin Xiu, Weiming Zhang, Jie Liu
Agility is arguably one of the most important characteristics of successful Information Age organizations. The study of agility organizations is currently one of the hottest topics in the organization study field. In this paper, we put forward an agile command and control (C2) organization model and...
Proceedings Article

Research on The Key Technology of Embedded Linux Logistics System

Jianli Chu, Xia Liu, Jun Li, Xiaoji Chen
Embedded Linux has a very wide range of applications, but also for the field of logistics information provides a powerful and flexible solution, this paper makes research on the key technology. First of all, research embedded Linux systems build, including the system components, the typical hardware...
Proceedings Article

Research of Boiler Fault Diagnosis Based on Fuzzy Neural Network

Yifeng Wu, Xiaoqi Lin
Boiler system has the characteristics of high complexity, strong simultaneity, multiple measuring points, multiple faults, and the traditional fault diagnosis method can not meet the requirements. A fault diagnosis model based on fuzzy neural network is built by the combination of fuzzy logic technology...
Proceedings Article

An Improved KNN Algorithm in Text Classification

Xiaoni Wang, Zhenjiang Zhang, Wei Cao
In Ad Hoc network, AODV routing protocol is an on-demand routing protocol of relative maturity and extensive application. Due to the fact that AODV routing protocol doesn’t consider the residual energy and the load situation of the nodes when choosing routes, its efficiency declines sharply in the case...
Proceedings Article

Camera Calibration with Accuracy Evaluation and Real-time Evaluation in the Use of Vision Robot

Zhen Fan, Lei Zhang, Fengbing Luo
In order to calibrate a wide-angle camera in real-time and find the precious position of the target object which could help the robot to find to location where they are, new method which uses the center iteration method and the regional interpolation method based on the distortion correction table is...
Proceedings Article

Risk Assessment Research of college students online entrepreneurship based on Disturbing Fuzzy Comprehensive Evaluation

Binye Wu, Xuejiao Wu, Xiaolong Ma, Xufeng Tao, Jiawei Fang
The current situation of college graduates employment is severe and complex, college  students entrepreneurship has attracted more and more attention, andonline entrepreneurship has  been a fashion but existing risks. This paper presents apattern and method of disturbing fuzzy  comprehensive evaluation method of collegestudents’ online entrepreneurship risk. For entrepreneurial risk are analyzed and the optimal discriminant, and finding the main factors that lead to risk so ...
Proceedings Article

A wireless sensor network DV-Hop localization algorithm

Huami Yang, Qi Wang, Zhuang Liu
This paper first introduces wireless sensor networks self-positioning classical algorithm DV-Hop (distance vector-hop) algorithm, then analyze its shortcomings, Finally, a new improved algorithm and through improved algorithm matlab simulation verify the situation after the positioning accuracy.Comparative...
Proceedings Article

Intelligentized Dispatching Control of Railway Transport of Molten Iron in Metallurgical Enterprise

Xiaoyan Yang, Bingmou Cui, Jie Chen
Focusing on railway transport of molten iron in steel enterprise, this paper tries to meet the demand and supply of molten iron between blast furnace and steel mill through TPC (torpedo car) transport. Taking mill railway as a network, based on path selection of molten iron transport and automatic collision...
Proceedings Article

Design and Implementation of Vehicles Monitoring System Based on Android Mobile Terminals

Nuan Sui, Chunhai Zhang, Hao Liu, Yanxiu Sheng, Xi Wang, Zhiqiang Wei
With the popularity of android smartphone and the increasing number of the vehicles the problems of obtaining real-time vehicle status information and historical trace information have attracted considerable attention. For these two problems, the vehicle monitoring system client running on android smartphone...
Proceedings Article

Markov Decision Process Parallel Value Iteration Algorithm On GPU

Peng Chen, Lu Lu
This paper defines an Out Of Play model based on Markov Decision Process. The best path for playing can be found and recommended by using this model, and a value iteration algorithm of Markov Decision Process is used to implement the model. In this paper, the implementation of this model with CPU is...
Proceedings Article

Applications of Clonal Selection Algorithm Based on Tabu Criteria in Combinatorial Optimization

Yongfei Miao, Yufu Yin, Yunpeng Wang
Clonal selection algorithm has a shortcoming when solving the problem of combinatorial optimization which is that the antibody diversity of population evolution declines in later stage. Therefore, this paper has improved the selection operator of this algorithm and introduced tabu criteria. What’s more,...
Proceedings Article

The application of Information Management in Construction Contracts Management

Hua Liu, Chunqiao Zhao
After the reform and opening up, China's market economy gradually recovered its prosperity, and information technology industry has also been developed following the reform. Till the 21st century the era of information explosion is formed and every industry cannot live without information management....
Proceedings Article

Regression Testing for Automatic Fare Collection System of Rail Transit

Mo Cheng, Maolin Zhang
Since regression testing technologies are mainly for software systems, there are few research about the access detecting of the auto fare collection system in rail transit. This paper study the multi-level functional modeling, the source code importing of detected object, the historical test information...
Proceedings Article

Two-Dimensional Barcode Image Super-Resolution Reconstruction Via Sparse Representation

Gaosheng Yang, Liu Ningzhong, Yuan Gao
To solve the problem of super-resolution reconstruction in the two-dimensional barcode image, this paper applies the technique of super-resolution reconstruction based on sparse representation into this area. Given the characteristics of the two-dimensional barcode image, this paper presents a new approach...
Proceedings Article

Algorithm for Map/Reduce-based association rules data mining

Wenqi Wang, Qiang Li
In order to realize massive information data mining, the traditional Apriori algorithm is updated into a Map/Reduce-based frequent itemsets generating method, so as to distribute the massive data into several servers for parallel processing. The construction of Hadoop platform helps to realize this method...
Proceedings Article

A Method to Reduce Correction Error for Electromagnetic Wave Propagation Model

Tiegang Zou
Electromagnetic wave propagation model needs to be corrected before it is used to predict wireless signal coverage. Control of the correction error will directly affect the accuracy of coverage prediction. A method to reduce the correction error is introduced in this paper. In this way, we carry out...
Proceedings Article

A Weighted ML-KNN Model for Predicting Users’Personality Traits

Xianglin Zuo, Baoping Feng, Yuan Yao, Tianyi Zhang, Qian Zhang, Mengmeng Wang, Wanli Zuo
Gaining insight into human personality and its impact on human behavior is very valuable in many applications, such as web information credibility prediction. In this paper, we explore using weighted ML-kNN model for automatic recognition of personality traits of web users, based on a given composition...
Proceedings Article

A Secure Localization Algorithm in Wireless Sensor Networks with Mobile Anchor Nodes

Jifeng Cui, Feng Xu, Wei Zhou
In process of localization in wireless sensor networks (WSNs) to improve localization precision, lower network cost and reduce network consumption, mobile anchor node-based localization algorithms for WSNs are ceaselessly put forward and improved. In WSNs localization algorithm with a few mobile anchor...
Proceedings Article

Hyperspectral Remote Sensing Images Classification Method Based on Learned Dictionary

Min Li, Jun Shen, Lianjun Jiang
A novel hyperspectral image classification method based on learned dictionary is presented in this paper. Firstly, the sampled image pixel and its classification vector are combined as sample pair. Secondly, defined as a sample vector, the sample pair are used for sparse coding and dictionaries learning....
Proceedings Article

Research on Map Matching Algorithm Based on Nine-rectangle Grid

Li Cai, Bingyu Zhu
Map matching is the key problem of floating car technology. On Shenzhen taxi GPS data pre-processing of the premise, using “Divide and Conquer”methodology for reference, the map matching algorithm based on nine palaces has been proposed, which can overcome the problem of low computing efficiency in common...
Proceedings Article

Use OWC Control to Achieve Lamp Energy Consumption Comparison

De-yan Wang
When develop a B/S management system for the LED lamp company, there are many data need analysis on WEB Page. How to directly display lamp energy consumption, we use OWC control to draw the picture. The experimental results prove that the method is simple, effective.