Proceedings of the 2015 International Symposium on Computers & Informatics

+ Advanced search
348 articles

An improved shuffled frog leaping algorithm and its application

Suonan Lengzhi, Yueguang Li
In order to enhance the performance of shuffled frog leaping algorithm in solving optimization problem, this paper added the mutation operator to original shuffled frog leaping algorithm, an improved shuffled frog-leaping algorithm of solving TSP was proposed. Simulation results show that the improved...

Analysis and Comparison of Carbon Emissions of Different Asphalt Mixing Process

Yi Cao, Xiaoming Huang, Jing Ding
The thesis firstly defines the studying types of greenhouse gases. Then according to calculation method, we get the carbon emissions of common energies as calculation base. The thesis uses thermodynamic method to calculate the diesel consumption of HMA and WMA and gets the electricity cost according...

Research on Finger Vein Acquisition Based on Wavelength Choice

Desen Yin, Zengxi Ding
Finger vein biometric is a novel technology for personal identification, and acquisition of finger vein image is difficult in finger vein recognition. In this paper, scattering and absorption characteristics of skin, muscle, phalanx and vein of finger under near infrared light are analyzed, and the mathematical...

A Novel Method for Minimum Comprehensive Cost Network Coding in Wireless Network

Yaohui Wu, Pengfei Shao
Existing minimum cost network coding algorithms are basically optimized by a single indicator. This paper proposed a novel network coding method for minimum comprehensive cost, by the integration of multiple cost indicators. In the process of solving the problems by genetic method, the proposed algorithm...

Design and Implementation of an Intelligent System for Seafarers’ “Cargo stowage and securing” Assessment

Qingwu Wang, Weifeng Li, Jian Zhao
Cargo operation is of great importance as far as the Chief Officer’s duties are concerned. “Cargo stowage and securing” is therefore one of the most important assessment courses for seafarers. The traditional assessment is however based on the subjective judgment by the assessors, which makes unfair...

Small shortwave whip antenna broadband research

Li Yin, Zhi-Gang Zhang, Jin-Peng Zhu
It is designed a pair of 5 m whip antenna for antenna arrays, the integrated use of a centralized method of loading and top loading, which is reducing the sensitivity of the antenna impedance versus frequency and using the moment method and genetic algorithm to load the network number so that the location...

Attention Region Latent SVM for Image Classification

Shengan Zhou, Peng Liang, Jiangwei Qin
This paper presents a new method for image classification based on image saliency region. The proposed attention region latent SVM (ARLSVM) is highly distinctive by training in a weakly-supervised manner which without requiring objects position or bounding boxes in training images. We use a latent SVM...

Combining Forecast of Electricity Price with Adaptive Weights Selected by SOM Clustering

Yi Feng
This paper proposes an efficient method of combining modelling to forecast day-ahead electricity price. The basic idea of this method is to develop a robust technique to select the proper combining weights of individual models according to their historical performance on similar circumstances. Firstly...

Distribution and homogeneity of petroleum hydrocarbon in Jiaozhou Bay

Dongfang Yang, Fengyou Wang, Sixi Zhu, Xiaoli Zhao, Jiaolian Luo
Based on investigation dada on petroleum hydrocarbon (PHC) in April, June, Juny and October 1982 in Jiaozhou Bay, this paper analyzed the content, distribution and seasonal variations of PHC. Results showed that PHC contents in April, June, July and October in surface waters ranged from 0.03-0.07 mg.L-1,...

Research of Distributed Virtual Agents Based on Queuing Theory

Guangxuan Chen, Huiyun Jin, Yanhui Du, Panke Qin, Lei Zhang
In order to find a better solution to predict the incoming traffic, grasp the customers’ demand in a short time and design a more scientific and reasonable and adjustable schedule for the online customer service center, this paper proposed a new model based on Erlang algorithm. The algorithm can effectively...

The Measurement of Remaining Capacity of the Battery Based on C8051F022

Zuojun Song
A remaining capacity system based on C8051F022 was introduced. Architecture of the system was described, and hardware circuit was introduced in details, especially anaysed the electronic capacity acquisition circuit, and the design of the software was presented. The system had the fuction of parameter...

The Firing Method for Naval Gun to Fire on Shore Based on UAV

Qiang Gai, Jiang Hu
The firing method for naval gun to fire on shore based on UAV (Unmanned Aerial Vehicle) extends observation range of warship, and it is a remote firing method that can be widely used. At first, this paper describes the flow for naval gun to reconnaissance and firing correction based on UAV. And then...

Design of intelligent university management services information platform based on large data

Liu Hao
"Long-term education reform of the nation and development plan outline (2010-2020)" promulgated in July 2010,has put forward: "The information technology has revolutionary influence on the development of education, so it must be attached great importance to".With the rapid development of information...

Novel Crossover Genetic Artificial Fish Swarm DNA Encoding Sequence Based Blind Equalization Algorithm

Hui Wang, Yecai Guo
A novel crossover genetic artificial fish swarm DNA encoding sequence based weighted multi-modulus blind equalization algorithm(ncGAFS-DNA-WMMA) is proposed to solve the defect that error function doesn’t match with the signal constellation model in the multi-modulus blind equalization algorithm(MMA)....

Application analysis of financial indicators

TuYun You, Xing Wei
This article applied financial index analysis method, combining with the concrete enterprise financial indicators to evaluate the financial position and operating results of enterprise, through detailed analysis to the enterprise operation ability, debt paying ability, profit ability and development...

Organization and management system based on workflow and web technology

Xueqin Liu, Huarui Wu
Workflow technology[1] is a business process modeling , process management and integration, and ultimately implement business process executing automatically. It is crucial to improve business process efficiency. With the popularity of the Internet and Web technologies, the traditional c/s mode is designed...

Research on the logistics distribution model of RT Mart supermarket chain

Yan Liu, Lijie Xie, Hu Zhao
Supermarket chains as a profitable business model and organizational form is a mode of operation the world's most widely used. With the rapid development of supermarket chains in our country, the role of logistics distribution becomes more and more important. In this paper, based on the research of the...

Weibull Distribution Parameter Estimation of the Algorithm Based on the Improved Flies

Xiu Ji, Hui Wang, Chuan-qi Zhao, Yuan Si
Based on weibull distribution model parameters of maximum likelihood estimation process trival, is obtained by using the Newton method and adopting the particle swarm optimization algorithm is easy to fall into premature and program variables is more complicated problems in the implementation, put optimization...

Improving Image Segmentation Quality Via Graph Theory

Xiangxiang Li, Songhao Zhu
Image segmentation is a fundamental process in many image, video, and computer vision applications. It is very essential and critical to image processing and pattern recognition, and determines the quality of final result of analysis and recognition. This paper presents a semi-supervised strategy to...

An Application of Mobile Cloud Computing in the GPS of Taxi

Wen-qing Zhao, Yu-xin Dong, Jian-jun Chen, Yao Li
This paper is designed for the filtering algorithms of taxi GPS data, as well as vehicle trajectory statistics and prediction algorithm which based on the theory of spatial-temporal data mining algorithm. On the basis of these algorithms, we developed intelligent taxi forecasting system based on mobile...

Research of BM Algorithm in Character Match

Baofeng Zhu, Bing Zhao
Character match is more and more applied in computer application field. BM algorithm belongs to an algorithm based on bad sign and good suffix rules. It has high match efficiency, which is widely applied. In the paper, some application fields of BM algorithm are firstly analyzed and discussed. Several...

Study on human Action Recognition Algorithms in videos

Chun-Lin He, Wei Pan
Human action recognition algorithms are the one of the effective schemes to analyze the action of the people in the surveillance environment. It is one part of the event recognition algorithm. There are many types of action recognition algorithms, and in this paper, some classical methods are surveyed....

Application of dual threshold image processing technology in the android Chinese font recognition system

Ming Xu, Caikou Chen, Chensheng Ji
This paper analyzes the design solutions and realization process of mobile phone font recognition software based on Android platform. The article mainly describes the key technology of font recognition, image processing technology, and how to use dual threshold technology automatic searches for the suitable...

Communication Interface Design of Data Acquisition System Based on AT90CAN128

Bin-bin Pang, Yu Xiang, Zi-xu Zhao
Communication interface of data acquisition based on AT90CAN128 was designed. Given the system hardware frame diagram and program flow charts. 8-channel analog acquisition and 8-channel digital reading were implemented in the system. It succeeded in communicating with the other modules by RS232 and CAN...

Design and Implementation of Comprehensive Anti- Electric Larceny Remote Online Monitoring System

Shengli Xie, Guoliang Zhou, Ying Zhu, Lizong Wang, Jing Cang, Mengyuan Zhang, Haichao Gao, Shengjiang Ma
Aiming at the control line loss and anti electric larceny requirements faced by the electric power company, a comprehensive anti electric larceny remote online monitoring system has been developed. A special transformer electric remote inspection device based on the principle of the electric larceny...

An Active Noise Control Algorithm Simulation Results and Discussion without Secondary Path Identification Based on Kalman Filter

Can Chen, Ru He
To illustrate the effectiveness of the proposed MECKF (model error compensatory Kalman filter) algorithm, its higher performance is demonstrated by comparing with DSLMS algorithm, and the feasibility of the model noise determination by comparison with MECKF-S-H method. In the simulation experiments compared...

A New Video Stabilization Method for Airship Surveillance

Xiaozhou Xu, Jing Yu, Weidong Sun
Video Stabilization is one of the most important tasks in video surveillance on boarded of airship platforms. Facing the new problems that airship platforms usually have strong low-frequency vibration caused by wind and low-frequency wobble in video streams could not be effectively reduced by those method...

Irregular Partitioning Method Based k-Nearest Neighbor Query Algorithm Using MapReduce

Qingqing Zhang, Changyun Li, Pinjie He, Xu Li, Haojie Zou
With the dramatic increase of available data, the process of data processing should get higher and higher performance. Most researches on k-Nearest Neighbor (kNN) query algorithm are based on the regular partitioning method which is easy to cause the imbalance of load, even influence the overall performance...

Design And Implementation Of Remote Digital Oscilloscopes Calibration System

Hongping Wang, Jun Dai
This paper proposed an implementation scheme of networked oscilloscope remote control system. Based on LabView platform, combined with remote control technology and network data transmission, an oscilloscope remote control system could be established. This paper analyzed the remote control system hardware...

Application research on 3D reconstruction based on Kinect

Zhiguo Xiao, Junhai Jiang, Han Jiawei, Li Nianfeng
3D reconstruction technology is widely used in computer teaching and rehabilitation of virtual reality, robot autonomous navigation, interactive, film and television animation, etc. The core problem is to achieve a scene with different Angle of view of information and effective registration of fusion,...

A Service-based Congestion Control Strategy for Content Centric Networking

Chengchen Zhang, Lei Wang, Zhenfa Wang, Song Wang
Congestion control for Content Centric Networking is one of the hottest research point.Existing solutions mostly reference TCP congestion control.Most solutions didn’t distinguish the traffic classes,which reduce some services’ QoS.In order to address this problem,we propose in this paper a service-based...

The analysis and management of Wärtsilä engine control system-9520

Renmin Yuan
In recent years, Wärtsilä RT-flex series electronic control diesel engine are increasingly applied to the ship.In order to make more safely and effectively to use, maintenance and management of the diesel engine, this paper mainly take 6RT-flex48T-D diesel engine as an example to introduce the RT-flex...

Optimization of Logistics Network Configuration for Fresh Agricultural Products

Yingfeng Ji, Hualong Yang, Yong Zhou
In order to optimize the logistics networks configuration of fresh agricultural products, the minimum cost related to the process, in which goods are delivered from original points, pre-cooling station, distribution center to demand points, was taken as the object function. By collecting the empirical...

Improved Rate Allocation Algorithm for DVC without Feedback Channel

Yuan-yuan Wu, Rui Cai, Deng-yin Zhang
In the light of the high decoding complexity and large transmission delay caused by the bit rate allocation of Distributed Video Coding (DVC) scheme with feedback channel, this paper proposes an improved bit rate control algorithm without feedback. The algorithm uses the division of macro block to simplify...

A Novel Overcomplete Dictionary Training Based on Empirical Mode Decomposition and Its Performance Analysis

Shikui Wang, Yufeng Shao
In this paper, a novel overcomplete dictionary training method which is based on empirical mode decomposition is presented. The IMFs by empirical mode decomposition take part in the training of overcomplete dictionary, and K-SVD algorithm is adopted in the training process. Simulation results show that,...

Research on the Fuzzy Clustering of Communication Data

Ting Gong, Hui Yan
The ever-accelerated of communication technology narrows the distance among people. Telephone, as the main communication tool, has connected us quietly, and a huge social network is formed. The current call log data is used to summarize and analyze so as to make a reasonable decision, and thus to improve...

Research on Gravity Interpolation Technology for RAPINS/Log/Gravity Matching Integrated Navigation System

Fenglin Wang, YingHong Yang, Dongxia Wang
Rate azimuth inertial platform/Log/Gravity matching is a simple passive navigation system, the high resolution digital gravity anomaly map is essential for this system. The five kinds of gravity anomaly interpolation are introduced, which include bilinear interpolation, Shepard method, gravitational...

Research on the Spatial Distribution Characteristics of b-value in Southwest Yunnan

Zhuojuan Xie, Yuejun Lu
Southwestern YUNNAN is located in the southeast edge of the Tibetan plateau, is one of strong continental tectonic activities and frequent earthquake area in our country. In this paper, spatial difference of distribution b values along the fault belt, reflect the level of stress accumulation and activity...

Impact Assessment of Seafaring Occupation using Fuzzy Aggregation Method

Leilei Xia, Pengjun Zheng, Geren Gao
The worldwide shortage of quali ed seafarers indicates that occupational attraction of seafaring career is dropping. The importance of seafarer rights protection is increasingly recognized by the international communities. The Maritime Labour Convention, 2006, which is widely recognised as the “seafarers’...

Study on Computer Network Technology of Digital Library

Yanming Sui
With the development of information and communication technology, the concept of libraries has changed dramatically. The traditional libraries are gradually getting digitized. Modern digital library can not be separated from the computer network technology. The potential safety hazard of library computer...

Design and Implementation of Smartphone Rapid Triage APP in Emergency Medical Rescue System

Yu Chen, Zhi-hao Zheng, Jia-shun Ren, Shang-kun Chen, Yu Xiang
Objective: To explore the new methodto improve the efficiency of mass wounded rapid triage in emergency rescue system. Methods: Develop the Smartphone rapid triage client (APP)in emergency medical rescue system. Results: Smartphone triage APP costs 2/3 shorter time than the writing paper mode, and shorten...

Research of Clothing Sales Prediction and Analysis Based on ID3 Decision Tree Algorithm

Fangshuai Sun, Yi Liu, Saiyin Xurigan, Qing Zhang
This paper begins with the introduction of the classical algorithm of ID3 decision trees, which is widespread used into data mining. Through a study on the information gain of the noisy data, ID3 algorithm is used to create a corresponding model and an analysis model of prediction that applies to the...

The Research and Implementation of 3DES Encryption Algorithm Based on Chaos System

Heyuan Wang, Jian-nan Xu
This paper introduces the DES encryption algorithm and the characteristics of chaotic encryption algorithm, and propose a kind of hybrid encryption algorithm based on Rossler chaos equations and 3DES. The algorithm generate 3DES cryptographic key by Rossler chaos equations, and expand the 3DES encryption...

VL-mac: Enabling Multiple Battery-free Users in Visible Light Cognitive Radio Systems

Youling Zhou, Yongqin Yang
This paper introduces VL-mac, a media access control (MAC) protocol for visible light communication (VLC)-based cognitive radio systems. VL-mac provides a full stack of access control primitives for users that operate at visible light frequencies to access the base station and for the base station to...

Research on Coal Seam Spontaneous Combustion Mutation and Precise Detection Technology

Zhongping Cui, Xianfeng Liu, Jinxin Huang, Jiabin Zhang, Yangyang Meng
The cusp catastrophe theory was used to establish the mine spontaneous combustion mutation model. Factors of spontaneous combustion were processed in quantization. Important conclusions were obtained about the mine combustion prevention and control.The application effect of cusp catastrophe theory and...

An IMPROVED FCM-POSSIBLE CLUSTERING ALGORITHM FOR INTERVAL DATA

Qing Li, Jianlu Luo, Xiaodong Tan, Xiaoyan Deng, Bing Lu
In order to overcome the disadvantages of Fuzzy c-Means(FCM) and possible clustering algorithm in the practical application of interval data, an improved FCM-possible clustering algorithm for interval data is proposed in this paper by combing their merits. The improved clustering algorithm introduce...

On the Security of a Public Auditing Protocol for Shared Data with Efficient User Revocation in the Cloud

FangChao Ma, Hechao Li, Hua Guo, ChunHe Xia
Recently, Wang et. al. proposed a public auditing protocol with efficient user's revocation for shared data in the cloud storage (InfoCom 2013, 2904-2912). By taking a careful look at the scheme, we noticed that their scheme has inherent limitations. In short, In short, the auditor cannot find the correct...

Design of smart printing System based on cloud computing

Haizhong Qian, Lili Cai, Chishe Wang
Much applications based on cloud computing has emerged. This cloud print, such as HP ePrint, Google print is one of the typical. Archiving the vision of cloud print must solve two key problems. One is supporting the variety of the printing format; the other is how to locate the print devices on the INTERNET....

Software project risk probability assessment based on dynamic Bayesian network

Junguang Zhang, Lihong Guo, Zhenchao Xu
Traditional Bayesian network (BN) can only have static analysis which could not reflect the impact of time factors on project risk adequately. For this reason, a software project risk probability assessment model based on dynamic Bayesian network (DBN) is proposed, which combines time series theory and...

Research on Relationships between Network Structure and Cluster Innovation Performance Based on SEM Simulation

Peng Zhao, Fuzhou Luo
Network organizational structure lays a solid organizational innovation platform and provides a high-speed network channel for flow and diffusion of innovation cluster resources. First, the article discusses the mechanism of network organization structure characteristics and industrial cluster innovation...