Proceedings of the 2015 International Conference on Intelligent Systems Research and Mechatronics Engineering

Session: Information Science and Industrial Engineering

197 articles
Proceedings Article

An Innovative Design of Vibratory Feeding System for Teaching Purpose

Liang Han, Ye Guo
Vibratory feeding plays a key role in assembly automation. However, there is still no effective professional instrument to explain and demonstrate the principle of the parts conveying. Thus an innovative vibratory feeding system for teaching purpose is designed in this paper, which includes the demo...
Proceedings Article

Input and transfer processes of Cu in bay waters

Yang Dongfang, Miao Zhenqing, Cui Wenlin, Zheng Lin, Chen Shengtao
This paper analyzed the input and transfer processes of Cu in waters of Jiaozhou Bay, Shandong Province, eastern China. Results showed that the input of Cu was stream flow discharge and atmospheric deposition; while the major transfer processes of Cu was vertical sedimentation and horizontal diffusion....
Proceedings Article

Research on the distributions and migrations of Zn in marine bay

Yang Dongfang, Chen Shengtao, Li Baolei, Geng Xiao, Liu Xing
This paper analyzed the vertical distribution and seasonal variations of Zn in waters of Jiaozhou Bay, Shandong Province, eastern China. Results showed that the Zn contents in Jiaozhou Bay waters were highest in spring and then decreasing from summer to autumn. There was an accumulation process of Zn...
Proceedings Article

Research on Self-adaptive Algorithm in Self-adaptive Web System

CaiFeng Cao, YaoZu Luo, Jing Gong
With the development of Internet and Web technologies, Web system is quickly applied to all walks of life. At the same time, it produces a variety of different terminal types and different user demands. How to make the Web system adapt to the access of PC, smart phones, tablet computers and other devices...
Proceedings Article

Research on Dynamic Software Architecture of Self-adaptive Web System

CaiFeng Cao, YaoZu Luo
With the development of Web application, users hope Web application system can provide with high quality services for them. Thus,we have proposed a self-adaptive Web system and its three-tier architecture. Then, we have designed dynamic software architecture for it.The DSA has been applied to the development...
Proceedings Article

Research of File Recovery in Windows FAT32

Na Zhang, Jia Wang
Files missing in file system often results in serious consequences. To solve this problem on Microsoft Windows, the file recovery solutions in FAT32 was proposed. File system structure in FAT32 was introduced. The specific processes of DBR recovery in FAT32 were illustrated. On the basis of file storage...
Proceedings Article

A Genetic Search Algorithm for Linear-Phase Filter Banks

Chen Li
A genetic algorithm is presented for searching optimization parameters in the factorization matrices in linear-phase filter banks. The genetic algorithm is combined with the simplex algorithm to accelerate the design process. The newly algorithm alleviates the problem of being trapped in local minimums,...
Proceedings Article

The prediction research of tool VB value based on Principal Component Analysis and SVR

Peng Nie, Chao He, Liang Xu, Kai-qi Cui
According to the amount of tool wear prediction problems, online prediction of tool wear model is established based on the theory of support vector regression (SVR) regression. The acoustic emission signals and current signals are, respectively EEMD decomposedand wavelet packet decomposed to get the...
Proceedings Article

An Image Encryption Scheme Based on Permutation-subsitution Architecture at Half Pixel Level

Ruisong Ye, Junqin Zhao
An image encryption scheme using permutation-substitution mechanism at half pixel level is proposed. One round of permutation and one round of substitution achieve desirable results. In the permutation process, the image sized is expanded to one sized . The generalized Arnold map is applied to generate...
Proceedings Article

Design and Implementation of Embedded Web Server Based On SOA

Liu Zheng, An Feng
SOA, which means Service-Oriented Architecture, is a component that could connect different terminals or devices without caring about the difference of each platform. Meanwhile, an embedded web server is a server within embedded systems. In this paper, we proposed a new idea to build the embedded web...
Proceedings Article

A Novel Virus Detection and Active Defense Algorithm Based on SVM Optimized by Differential Evolution Algorithm

Jieqing Ai, Zhenyue Long, Shang Gao
This paper proposes a novel active defense strategy focuses on users’ behavior patterns which to classify the behaviors accurately by SVM for virus detecting. Differential evolution was introduced to improve the precision of SVM and turns it into an optimization problem which object is the classification...
Proceedings Article

Software Behavior Model Based on Functional Slicing

Binglin Zhao, Yinhao Wang, Zheng Shan, Chao Fan
According to the problem that the accurate and efficiency of the software model, this paper proposes a new method to describe the software behavior. The method using program slicing to dynamic analysis the system calls of the running software, help the system to capture the key system calls. And then...
Proceedings Article

The Image Retrieval Based on the Hybrid Algorithm of the Primary Color and Color Layout Descriptor

Denghui Li, Yanhong Wang
The image retrieval technology based on content is become a hot research field with the images used widely. The primary color and color layout are both the characteristic in the international standard.Each characteristic factor has its advantages and disadvantages. In this paper, image retrieval based...
Proceedings Article

Weighted Least-squares Color Digital Halftoning

Zifen He, Yinhui Zhang
In this paper, we propose a weighted least-squares based color halftoning model from human vision system(HVS) model and an efficient iterative strategy using color image statistical information. The statistics of the mean and variance of the color pixel of each clustering are calculated. The energy function...
Proceedings Article

The application of NoSQL database in Air Quality Monitoring

Mei Han
In air quality monitoring system, various monitoring devices generated tremendous amount of date which make traditional relational database very inefficient in reading and storing it. In order to solve this issue, this paper compares the characteristics of various NoSQL databases and selected MongoDB...
Proceedings Article

Research on Risk Assessment Model of Industrial Park Earthquake Disaster Chain

Danxiang Ma, Jianyu Chu, Lingli Chen
The factors influencing disaster chain risk were analyzed, and the risk assessment model of earthquake disaster chain was established. The methods to determine relevant parameters in the model were given. An example that analyzed the risk of earthquake-fire disaster chain in a petrochemical system was...
Proceedings Article

Distributed GIS framework design based on XML and Web Service

Xinying Li, Feng Li, Xianjun Chen
Network WebGIS geographic information system is a solution which is more open and conform to the trend of distributed GIS application , the paper discusses the technology and face WebGIS, elaborated the XML Web Service this new dynamic distributed computing model of technology. It put forward to Supermap...
Proceedings Article

A Segmentation Method for Mammogram X-ray Image Based on Image Enhancement with Wavelet Fusion

Zhengyou Liang, Xiaoshan Gou
A segmentation method based on image enhancement method with wavelet fusion was proposed to segment X-ray mammogram images with low pixel and unclarity. Firstly, a breast X-ray image was pretreated by histogram equalization and median filtering. Then a wavelet fusion algorithm with the rule of taking...
Proceedings Article

The Design of the Integrated Training Information System for Equipment Maintenance Management

Xin Shi, Shusen Zhang, Zheng Zhou
The construction of equipment maintenance management integrated training information system goal is to use engineering method of military information system requirement, need to closely around demand of the equipment maintenance management integrated drills, maintenance business relations as the basis,...
Proceedings Article

Research on Wargaming for Equipment Support Based On Computer

Zheng Zhou, Hongyu Zhao, Xin Shi
Computer wargaming for equipment support is to improve the strategy and intelligence level of equipment support commander, and emergency flexibility and strain capacity, can achieve the purpose of setting a better decision. This article elaborates on the computer wargaming, divided into the system platform...
Proceedings Article

Efficient XML Document Compressing Method Based on Internet of Things

Jiajia Lv, Yuanli Wang, Yi Zhong
XML data have been widely used in the Internet of Things. However, there are some problems that XML is of huge massive data and high information redundancy. Currently, XML document compression methods proposed by many researchers only focusing on compressing one single document, they have not considered...
Proceedings Article

Apriori Improved Algorithm and its Application in Tmall

Jianhua Xiao, Shaoyu Luo
In view of the large data volume and fast update feature of Tmall transaction database, the original Apriori algorithm is not suitable for Tmall transaction data mining due to its frequent scan of the database, so improved the search efficiency of original Apriori algorithm combining Apriori nature,...
Proceedings Article

Influence of M2M Solution on Multimedia Communication Technology Development

Chaoyan Wu
The application of M2M solution has been a focus in the multimedia communication technology development in many fields such as electric power, transportation, safety and environmental protection and so on. The goal of this paper is to interpret the development process of multimedia communication technology...
Proceedings Article

An Efficient Curve Extraction Algorithm for Massive Data

Zhongwen Li, Long Li, Guoxin Li, Yan Li
An efficient curve extraction algorithm for massive time-series data based on extreme value of periods is proposed. By dividing into periods, then calculate the number of sampling points within a time period according to extreme value of the each time period’s data. Uniformly take the sampling points...
Proceedings Article

A Method of Designing Interpretable Genetic Fuzzy Classification System Based On Mutating Parameters

Hong JI, Ming Ma
This paper discusses the application of generating fuzzy rules with word computing in genetic fuzzy classification system, and proposes a new method to design genetic fuzzy classification system. The new algorithm generates initial fuzzy rules population with expertise of the randomly selecting samples,...
Proceedings Article

Analysis Method of the Terrain Navigable Performance Based on Isotropy Parameter

Zhe Rao, Jingyuan Zhang, Hui Liu, Wei Feng
Because of using the distribution characteristics of submarine topography of correlation matching operation to estimate the current position, the navigation and positioning accuracy of the underwater terrain matching navigation depends largely on the terrain feature. In order to satisfy the requirements...
Proceedings Article

An improved shuffled frog leaping algorithm and its application

Junju Liu, Yueguang Li
In order to enhance the performance of shuffled frog leaping algorithm in solving optimization problem, this paper added the mutation operator to original shuffled frog leaping algorithm, an improved shuffled frog-leaping algorithm was proposed. Simulation results showed that the improved algorithm in...
Proceedings Article

An improved Shuffled frog leaping Algorithm for solving nonlinear equation group

Dejun Xue, Yueguang Li
This paper proposes a shuffled frog leaping algorithm based on population diversity feedback. Through the optimization experimental of testing on the standard function, the results show that the improved shuffled frog leaping algorithm has reliable convergence, high convergence rate and solution precision.
Proceedings Article

An artificial fish swarm algorithm and its application

Shuguang Liu, Yueguang Li
In order to enhance the performance of artificial fish swarm algorithm in solving optimization problem, this paper added the membrane computing to artificial fish swarm algorithm, an improved artificial fish swarm algorithm of solving Time-table Problem of Universities was proposed. Simulation results...
Proceedings Article

An artificial fish swarm algorithm based on membrane computing and its application in permutation flow shop scheduling problem

Ping Liu, Yueguang Li
In order to enhance the performance of artificial fish swarm algorithm in solving optimization problem, this paper added the membrane computing to artificial fish swarm algorithm, an improved artificial fish swarm algorithm of solving permutation flow shop scheduling problem was proposed. Simulation...
Proceedings Article

Research on data storage system of geographical spatial information based on grid

Chunhua Zhang, Yueguang Li
This paper proposes and constructs a network storage engine of spatial data based on grid. Realize storage of spatial data that is located in different places and effective management using grid, server cluster, spatial data division and data distribution to the storage devices linked by high-speed network.
Proceedings Article

Research and implementation of HEVC distributed parallel

Yuwen Chen, Ju Zhang, Jin Zhang, Kunhua Zhong, XueLiang Zhao, Qilong Sun
High Efficiency Video Coding (HEVC) standard achieves double compression efficiency compared to H.264/AVC with the adoption of more flexible coding structure and advanced coding tools. On the other hand, the coding mode space is too large and it’s very time consuming. With the development of many-core...
Proceedings Article

Reconstruction of high-resolution Depth Map using Sparse Linear Model

Hanqi Fan, Dexing Kong, Jinhong Li
In this paper, we propose a method that constructs a high-resolution depth image with high quality from a low-resolution depth image that is noisy and contains holes. We believe that the high-resolution depth map is generated by sparse linear combination of atoms from an over-complete dictionary, and...
Proceedings Article

Efficient processing and utilizing Big Data in E-commerce

Xiaohui Pan
Today Big Data is a business imperative and is providing solutions to long-standing business for companies of various domains around the world. Despite of its potential benefits, the efficiency and effectiveness to process and utilize Big Data are still challenging. In this paper, we summarize existing...
Proceedings Article

The Study and Development of E-kanban Management in MES for Hardware Plastics Production Workshop

Liping Zhang, Zhiping Wang, Baojian Wu, Jun Li
This paper introduces the development of Kanban management. Combined with the characteristics of hardware plastics industry’s production process, it studies deeply e-kanban management system in MES. And it focuses on the architecture, data flow, production control, information collection and other key...
Proceedings Article

A General Framework Protocol for Indoor and Outdoor Location-Based Service

Yan Li, Liping Zhu
To satisfy the requirement of the increasing location-based service, there have been a lot of solutions on indoor and outdoor locating. The general data protocols for transferring outdoor location data are also mature. However, there still lack general data format and transferring protocol for indoor...
Proceedings Article

Estimation of unknown function of a class of retarded iterated integral inequalities

Jiting Huang, Wusheng Wang, Yun Ouyang, Yongzhou Qin
It is well known that differential equations and integral equations are important tools to discuss the rule of natural phenomena. Various generalizations of the Gronwall-Bellman inequality are important tools in the study of existence, uniqueness, boundedness, stability, continuous dependence on the...
Proceedings Article

Dynamic of behavior spread driven by information on weighted networks

Wenyu Chen, Zhen Jia
In this paper, a new behavior-spread model is proposed, which incorporate the analysis the degree of closely connects, preference for things, and the reciprocal interaction and collaborative spreading of information and behavior on a weighted networks. Comprehensive consideration for the mutual influences...
Proceedings Article

A Hybrid Low-Cost PLL Test Scheme based on BIST Methodology

Zhikuang Cai, Shixuan Que, Tingting Liu, Haobo Xu
In this paper, a hybrid built-in self-test (BIST) scheme is firstly proposed for phase-locked loop (PLL) production test and performance characterization. The scheme combines the structure test and function test in production test operation. The former is to detect hard faults and the latter is used...
Proceedings Article

A Fault Tolerant Scheme for Ad-hoc Networks

Zhenpeng Xu, Weini Zeng, Weiwei Li
Different from the traditional distributed computing system, ad-hoc networks have many new features. The transient failure probability of the computing process increases with the increase of system scale in ad-hoc networks. To reduce the loss of computation upon the transient process failure event, a...
Proceedings Article

Novel Query Expansion Method based on User Interest Context and Ontology

Lizhou Feng, Wanli Zuo, Youwei Wang
We proposed a novel query expansion method by combining user interest and ontology. Firstly, users’ interests are described by contextual words which are generated based on ontology, and the user interest degree with respect to each contextual word is calculated. Secondly, the contextual words are organized...
Proceedings Article

The underwater bubbles image’s acquisition and processing based on Binocular Stereo Vision

Guishui Yu, Tao Liu
Binocular Stereo Vision was used to observer and measure the underwater bububles.There are several ways have been taken to solve many difficulties in the process of the acquisition to get the image. Such as the equipment selection, the light sources selection, the approach to images and the feature extraction...
Proceedings Article

Analysis on the Application of Campus Network Firewall And Intrusion Detection System

Jinying Wang, Pengfei Yan
In recent years,when the ample network information, brought about by rapid developing network technology, is changing the campus’s learning and living problems, network security problems, such as stealing data information and attack the network equipment of, is becoming more and more serious. As a part...
Proceedings Article

Research on the IBE Encryption Scheme and It’s Existing Problems

Qinghai Bai, Ying Zheng, Linna Zhao, Hua Chun, Jing Chen
This paper introduces the concept of identity-based encryption IBE and the algorithm, briefly explains the mathematical principles of algorithm, discusses the constraints set of algorithm parameters, choice of algorithm, etc. In terms of efficiency and security issue, key escrow, and key update, this...
Proceedings Article

Testing for multivariate normality of disturbances in the multivariate linear regression model

Yan Su, Shao-Yue Kang
We suggest a characteristic test for testing the multivariate normal distribution of the disturbances in the multivariate linear regression model(MLRM). The test is based on the goodness-of-fit test for uniformity on the surface of a unit sphere. The asymptotic null distribution of the transformed residuals...
Proceedings Article

Image Matching Algorithm on Wavelet-Edge-SIFT

Xun Sun, Shun-hua Liu, Zhi-rong Luo, Wei Li
Aiming at excessive feature points to be extracted in the SIFT algorithm widely applied in image matching, the paper proposes the following solution strategy: obtaining image edge by wavelet transform, subsequently, applying SIFT algorithm for image matching on the basis of the detected image edge. The...
Proceedings Article

Research on Energy Efficiency Evaluation in the Cloud

Ke Han, Xiaobo Cai, Xin Zhang, Chaogang Wang
High energy consumption issue is one of the major obstacles for the new cloud era. The energy efficient cloud environment with high performance and low power consumption has received extensive attention. In this paper, the definition of energy efficiency of cloud and the principles for implementing high...
Proceedings Article

Coverage-Enhancing algorithm for video sensor network based on improved particle swarm optimization

Xiang Fu, Jiexian Zeng
The parameters of traditional particle swarm optimization (PSO) methods are unchangeable, which may lead to the iterations have slow convergence speed or unable to converge to global optimum. In this paper, improved PSO algorithm is applied to the coverage of video sensor network. Through improving inertia...
Proceedings Article

An Improved Adaptive Federal Kalman Filter Algorithm For Integrated Navigation

Ying Zhai, Xisheng Li, Yibo Feng, Xiaojuan Zhang
Integrated navigation system has become an important navigation system. On the basis of previous research about the federal Kalman filter, this paper mainly studied the key technologies of low-cost SINS/GPS/Magnetic compass integrated navigation system, an adaptive federal filter method of vector-form...
Proceedings Article

Illumination Threshold Study of Retinal Security by LED light

Shuyan Ren, Liu Lu, Li Zhao, Yong Sun
Medical experiments using white LED had been done to explain influence on visual function and Electroretinography (ERG) test results have been obtained under different illumination. From the experiments, different character of ERG was changed under different illumination. Compared with the control group,...
Proceedings Article

Efficient Parameter Tuning of Support Vector Machine Based on Nesting Particle Swarm Optimization

Pin Liao, Sensen Wang, Xin Zhang, Kunlun Li, Mingyan Wang
Parameter optimization of Support Vector Machine (SVM) is an important research problem, because it is critical for establishing an effective SVM with excellent generalization. This study develops a novel and efficient method to solve this problem by nesting two particle swarm optimization (PSO) algorithms...
Proceedings Article

The Algebraic and Ordering Construction of Lattice

Hongying Mi, Kunlong Zhang
Based on the order theory, a study of the differences between the preordering and the ordering and a discussion of the isotone map and homomorphism map are obtained. According to the differences of the constructions of the algebraic lattice and the ordering lattice, we prove the algebraic sublattice...
Proceedings Article

Design and Implementation of Air Quality Monitoring System based on Lab-View and Related Techniques

Danian Li, Chongzhi Zhai, Jiayan Yu, Lei Bao
With STC89C51 as the core controller, the distributed wireless monitoring system for air quality has been designed and implemented in this paper. With the improvement of human material civilization, increasing economic benefits, the nature of the human damage is aggravating. Environmental pollution is...
Proceedings Article

The Analysis Research of Hierarchical Storage System Based on Hadoop Framework

Yan Liu, Tianjian Zheng, Mingjiang Li, Jinpeng Yuan
With the rapid development of data science and computer technology, hierarchical storage system based on Hadoop is being research. In this paper, we propose a novel methodology of hierarchical storage system based on Hadoop framework. This way the Hadoop cluster will not reach the stage where the NameNode...
Proceedings Article

Research on Character Mosaic and Paper Scrap Recovery based on Simulated Annealing Algorithm

DaSheng Pan
With the rapid development of machine learning and document analysis techniques, the research on the character mosaic and paper scrap recovery based on simulated annealing algorithm is urgent needed. In this paper, we approach is proposed based on pieces of text line features, form line semi-auto stitching...
Proceedings Article

Research on Principle Techniques for Network Intrusion Detection based on Data Mining and Analysis Approach

Shan Jiang, Changai Chen
The security of software applications, from web-based applications to mobile services, is always at risk because of the open society of internet. With the increase in the number of network throughput and security threats, intrusion detection system has attracted much attention in recent years. In this...
Proceedings Article

Data-Guided Image Retrieval System under Big Data Environment: Design and Implementation

Chao Huang
In Bag-of-Words based image retrieval, the SIFT visual word has a low discriminative power, so false positive matches occur prevalently. The research on data-guided image retrieval system is a hot topic. Its innovation is using PCNN and ICM in image feature extraction with translation, rotation, scale...
Proceedings Article

A New Approach on Network System Design And Implementation Based On ZigBee

Jing Niu
With the microelectronics technology, computer technology and wireless communication technology advances, promoted the rapid development of low-power multifunctional sensor, in the tiny volume can integrate information acquisition, data processing and wireless communication and other functions. This...
Proceedings Article

Design and development of devices based on digital slurry pipeline management system

Guangyue Pu, Xingxing Yao, Xueyong Wang, Chunlei Pan
In recent years, development of mineral pipeline is rapid, which is one of the best way to solve the question fine iron ore output in the complex terrain of the western china. Application practice shows that the method of mineral pipeline transportation solved a series of defect from other transportion...
Proceedings Article

Electricity sales forecasting of Z province based on SARIMA model and temperature correction

Hao Feng, Jiao Fan, Guo-rong Zhu, Hui Xu, Dong-xiao Niu, Xiao-dan Guo
The sales of electricity have great effect on operation decisions and budget arrangement of power grid companies directly, so the accuracy of electricity sale forecasting is quite crucial. Since the sales of electricity data has obvious increase trend with time and seasonal variation characteristics,...
Proceedings Article

A Novel Scheme for Particle Swarm Optimization

Wei He, Yuanming Xu, Yaoming Zhou, Zhijun Meng, Yuankai Li
Particle Swarm Optimization (PSO) is one of the most popular optimization algorithms, but it suffers from the contradiction between the exploitation ability and the exploration ability. This paper presents a scheme that introduced main swarm to search for global solution and sub-swarm which was named...
Proceedings Article

Research on Methods of Microblogging Sentiment Feature Extraction Based on Dependency Parsing

Yonggan Li, Xueguang Zhou, Wei Guo, Huanguo Zhang
Microblogging emotional elements extraction recall rate is extremely low without opinion words expansion. Aiming at the feature extraction of Microblogging sentiment, a sentiment feature extraction method based on dependency parsing for the Microblogging emotional has been proposed in this paper, abbreviated...
Proceedings Article

The fire wireless communication technology based on Mesh

Caijiao Xue
Fire wireless communications is an important guarantee for achieving fighting and rescue. The particularity of the fire rescue field needs higher request of the fire wireless communication. Considering Chinese fire wireless communication situation and the problem of fire site communication, Mesh wireless...
Proceedings Article

Outlier-tolerant K Charts Based Tendency Analysis with Variable Fineness of Big Telemetry Data

Bo Qin, Shaolin Hu, Yumin Yang, Xiaohong Guo
The spacecraft telemetry data is the only way for operation managers to understand the spacecraft’s real working state in space. In face with the increasing amount of telemetry data growing day by day, it is hard to overcome the long data time span, large data volume, dirty data and etc. It is very necessary...
Proceedings Article

Research on Defects Positioning Method of Barrel Based on L(0,2) Mode

Wang Gao, Jin Zhang
Guns, especially new type guns play an important role in modern warfare. As an important part of gun, the barrels’ damage detection is of great significance. After studying and comparing the characteristics of L mode and T mode ultrasonic guided waves, this paper puts forward a nondestructive detection...
Proceedings Article

Short text model based on Strong feature thesaurus

Wentao Lu, Yongfeng Huang, Xing Li, Zhuo Zhang, Yingkun Li
Data Sparseness, the evident characteristic of short text, is caused by the diversity of language expression and the short text length. The previous text models represented by Bag of Word (BOW) only considers the statistical feature of words, and thus always underperformed when it comes to short texts....
Proceedings Article

Research on City Fire Station Layout Optimization Based on LINGO

Limin Zhang
Based on the analysis of city fire station layout influencing factors, this thesis studied of common fire station layout optimization method and model, finally brought forward the advantage of LINGO and studied a certain city fire station layout by using LINGO, in the hope of providing some reference...
Proceedings Article

A New Saliency Based Video Coding Method with HEVC

Zhengrong Xu, Mei Yu, Shuqing Fang, Shengyang Xu
In saliency based video coding, the salient parts of the each frame are encoded with higher quality than non salient areas to improve the signal to noise ratio and get higher compression ratio. In this paper, the background of the saliency based video perceptual coding technology is introduced first....
Proceedings Article

A Watermarking Algorithm for 3D Videos Stream Based on Spatiotemporal Correlation

Wenfeng Li, Gangyi Jiang, Ting Luo
When embed watermark into compressed video stream, distortion drift, including intra-frame and inter-frame, is of the first important problem that must be taken into consideration. With the analysis of hierarchical b-picture (HBP) coding structure and drift-level mechanism, a new watermarking algorithm...
Proceedings Article

A target tracking method based on feature fusion

Dan Li, Xiangying Dang
The paper presented a adaptive template update method of multi feature fusion based on Camshift algorithm. When one feature to distinguish the foreground and background is not obvious, other features can be complement each other. The algorithm combines texture, edge and color features, using the different...
Proceedings Article

Research on SIFT Algorithm Base on Complex Environment

Dan Li, Xiangying Dang
A new algorithm of feature matching was presented by this paper. In the new algorithm, Curvelet first used to denoise, then RANSAC optimized SIFT algorithm used to stitch images. Experiments show that the new algorithm is better to remove error matching points. It improved the accuracy of local invariant...
Proceedings Article

Image Edge Detection Algorithm Based on The Parallel Genetic and Otsu dual-threshold

Xiangying Dang, Dan Li
The traditional genetic algorithm is used to search some function extreme value, but it has low precision and poor stability. For this shortage, A kind of parallel genetic algorithm based on Otsu double threshold algorithm of image edge detection, the design into a line of two columns of the vector population,...
Proceedings Article

A Simulation System of Snow Based on Particle System

Zhuo Tian, Baicheng Li
The simulation of snow in virtual scene can greatly of particles will make both simulation and real-time of system more difficult. A method for simulating snow is presented in this paper based on the analysis of particle system and texture mapping technology. The basic idea of the method is using texture...
Proceedings Article

An Application of Fuzzy C-Means Based Clustering Technique in Smart Farming

Zhuo Tian, Baicheng Li
Customised farming has seen ever increasing interest of next level farming practices across the globe by the modern agronomist of the age. Customized Management practices (CMP) make use of creating management zones (MZs’), leading to precision farming through application of variable rate technology for...
Proceedings Article

An Opportunity Networks Routing Algorithm Based On Social Model

Zhuo Tian, Baicheng Li
In this paper, an opportunity networks routing algorithm, which is suitable a certain social model, is proposed based on social. In this algorithm, the relationship degree between nodes is computed based on the social nature; and the central of nodes is computed based on the level of activity in opportunity...
Proceedings Article

Design and Implementation of Web-based Workflow Form

Zhuo Tian, Baicheng Li
Aimed for the problems of changeable demand for form in workflow management system based on web, a form designer based on Html was designed, which realized the function of custom form. A model of process promotion based on the form is devised, which put forward the method of integration of workflow and...
Proceedings Article

Emergency Evacuation Simulation Model in a Large Building Based on GIS

Zhuo Tian, Baicheng Li
To meet the requirements of emergency evacuation in a large building, this paper introduces design and implementation of emergency evacuation simulation model in a large building based on GIS in detail. Firstly, three-tire architecture and functions of the simulation model are designed in the paper....
Proceedings Article

The Study on Anomaly Index Mining Research of Coronary Heart Disease with Unstable Angina Pectoris with Qi-stagnation and Blood-stasis Syndrome Based on Co-occurrence Analysis

Xing Zhai, Youliang Huang, Zhongzheng Jin, Fengying Guo
purpose: This research focused on unstable angina pectoris of Qi-stagnation and blood-stasis coronary heart disease, discussed the feasibility of seeking biological markers associated with the syndrome with literature mining methods. Method: using a combination methods of literature research and the...
Proceedings Article

A Novel Ant Colony Algorithm with Mutation Operations of Genetic Algorithm for TSP

Bencan Gong, Peng Chen
Ant colony algorithm (ACA) is a very effective way for traveling salesman problem (TSP) due to the positive feedback and the distributed parallel computing mechanism. But it has many drawbacks, for example, long search time, precocity and stagnation. In order to speed up convergence rate and ensure the...
Proceedings Article

Study on the Dot Gain and Tone Reproduction of Tissue Paper

Ying Li, Haishan Li
The rate, quality and economics of printing process are tightly linked to the characteristics of printing technology and materials used. Paper printability is variable property which is according with press conditions and printing characters. A kind of tissue paper used in industrial applications for...
Proceedings Article

Network Security Situation Prediction Based on Adaptive Clustering RBF Network

Fangwei Li, Bo Zheng, Jiang Zhu, Zhuxun Peng
Proposed is an algorithm for network security situation prediction (NSSP) based on adaptive clustering radical basis function (RBF) neural network. Experiment results show that, the proposed method not only reflects the general trend of network security situation, but also improves the prediction accuracy.
Proceedings Article

A Wireless Image Transmission System Based on Visible Light Communication

Mingsong Chen, Guowei Mao, Yonghui Wang
In this letter, a wireless image transmission system is proposed and presented based on the visible light communication (VLC). This system consists of OV7670 image acquisition module, STM32, encoding module based on FPGA, modulation driving circuit and LED. IPPM, which has advantages of high average...
Proceedings Article

IC card-based bitcoin payment design and implement

Weihong Wang, Peng Li
Bitcoin is a virtual currency based on the P2P network. Because of decentralization, anonymity, stability and other advantages, Bitcoin develops rapidly. In order to cope with increasingly wide application fields of bitcoin, this research designs bitcoin’s payment based on the IC card, which improves...
Proceedings Article

The Realization of Wi-Fi Network for a Monitoring System of Building Energy Consumption

Yunhong Liu, Zuopeng Liu
With the change of energy conservation and emissions reduction situation, the universal application of building energy consumption monitoring system become increasingly important. After the current situation of public building energy monitoring analyzed, the hardware and software of energy monitoring...
Proceedings Article

An Improved Image Retrieval Based on Color Histogram

Denghui Li, Yanhong Wang
Image retrieval based on the color histogram is one of the technologies based on the content. The processing time of the method is shorter and easy to implement, but its precision need to be improved. In this paper, the algorithm is improved. The same image library is retrieved by the image retrieval...
Proceedings Article

Context-aware Load Balancing for Heterogeneous Smart-Grid Communication Networks

Yintao Li, Weiguo Yuan, Hongfei Xu, Wei Song, Rui Yang, Zhibin Zang, Dapeng Lin, Yeshen He
The network of smart grid communications (SGC) is expected to be heterogeneous for providing diverse access interfaces. Load balancing is one of the key technologies in such heterogeneous networks, which can increase the system throughput as well as quality of service (QoS). In this paper, a context-aware...
Proceedings Article

Interval estimation of reliability parameters in reliability engineering

Ming Han
For the reliability evaluation of such expensive and high quality products as those used in aviation and spacecraft, this study gives the two-sided confidence limits estimation of reliability parameters for exponential distribution: average life, reliability and reliability life, in the case of zero-failure...
Proceedings Article

An Optimization Strategy for Mobile Ad-hoc Networks

Jianlu Luo, Juan Yang, Fang Cheng, Dandan Fu
For MANETs , topology control can enhance the stability of network topological structure. This paper proposes a hybrid strategy to construct a MANETs hierarchical structure, so as to enhance the stability of network topological structure. Simulation experiments show that our strategy performs better...
Proceedings Article

A stability routing protocol for the Solar Blind Ultraviolet Ad-Hoc Network

Juan Yang, Jianlu Luo, Fang Cheng, Dandan Fu
In this paper, we propose a stability routing protocol to support the stable routing for the solar blind ultraviolet Ad-Hoc network, and to guarantee the efficiency of routing process. The performance simulation analysis confirms the availability and superiority of our routing protocol.
Proceedings Article

Design and visualization of virtual sunshine greenhouse

Yingying Yin
For the aim that designing greenhouse structure on computer and simulation virtual environment condition in accordance as reality, in the basis of reality greenhouse basic structure, constructing virtual model of sunshine greenhouse, its main part is decided by several important parameters. The experimental...
Proceedings Article

Application of Improved Adaptive UKF Algorithm on Aircraft Attitude Estimation System

Jun-hui Zheng, Fei-fei Ning
For the problem of aircraft attitude estimation system, Unscented Kalman Filter (UKF) algorithm is easy to be disturbed. Therefore, an improved adaptive UKF algorithm which can overcome disturbance well by introducing adaptive factors to adjust the state gain matrix is proposed in this paper. The simulation...
Proceedings Article

A Fuzzy Measurement Model of Mobile Internet Security

Hong Chen, Chen Wang, Zhengying Cai
This article discusses the security assessment methodology of mobile internet. Above all, the impact of risk environment on network security is analyzed. In accordance with the actual situation of mobile internet, each risk factor is identified and measured by 3 dimensional indexes including its probability,...
Proceedings Article

On the Joint Synchronization of Clock Offset and Skew in PBS-Protocol

Wenjing Liu, Zhi Wang
Joint estimation of clock offset and skew is a very important research for time synchronization. In this paper, we develop a set of energy-efficient clock synchronization algorithms of Wireless Senor Networks(WSNs) based on Pairwise Broadcast Synchronization Protocol(PBS). We formulate the clock offset...
Proceedings Article

Design and Implementation of Electronic Textbook Resources based on Cloud Service

Biao Dong
Electronic textbook(E-textbook) resources include reading resources in the field of digital reading, and learning resources in the field of digital learning. The emergence of cloud service efficiently supports the construction of the e-textbook resource management. Cloud service is a suitable architecture...
Proceedings Article

Research on the Simulation of Automobile Welding Production Line Based on eM-Plant

Jun Lu, PengDan Dai
This paper simulates the assembly and processing of automotive body based on eM-Plant platform, considering the characteristics of the layout of integrated automobile processing station and the machining time arrangement of workers. It analyzes the bottleneck problem of the producing process and finds...
Proceedings Article

Optimization of Order-Picking Routes Based on Hybrid Particle Swarm Algorithm

Junsong Liu
Order-picking is a common operation in AS/RS (Automatic Storage and Retrieval System), and it is an effective method to optimize the order-picking for improving the efficiency of the automated warehouse. In this paper, we use a hybrid particle swarm optimization (Hybrid PSO) algorithm to optimize the...
Proceedings Article

Study on Railway Container Station Efficiency Analysis

Shouwen Ji, Huiting Wang, Yanbin Yao
As rapid development of economy and IT in China, logistics facing new environment, railway container freight station is bound to the large-scale, centralized, large-scale, modern direction. However, development of container transport is restricted due to excessive freight station, limited investment...
Proceedings Article

An Adaptive Genetic Wavelet Neural Network and Its Application in Risk Assessment for Controlled Flight into Terrain

Xusheng Gan, Dengkai Yao, Yarong Wu, Zhe Dai
In order to improve the level of safety management and decision-making of Controlled Flight Into Terrain (CFIT), a CFIT risk assessment model based on an adaptive genetic algorithm and wavelet neural network technology is propose. In the model, wavelet neural network can dynamically adjust the parameters...
Proceedings Article

A New Phase Space Reconstruction Method for Prediction of Public Transit Passenger Volume

Xue Xiang-hong Xuex, Xiao-feng Xue, Xu Lei Xu X.
This article proposes a new method for prediction of public transit passenger volume based on phase space reconstruction and support vector machine (SVM); applies mutual information method in calculating the optimal time delay of time series of public transit passenger volume; applies Cao’s method in...
Proceedings Article

Design and Implementation of Internship Evaluation System Based on ASP.NET

Ying Zhang
In this paper, we designed an internship evaluation system by ASP.NET technology, conducted a detailed analysis and design of the proposed development system function, the establishment of ER model diagram, database structure, analysis of the B / S three-tier architecture model framework to build a model...
Proceedings Article

Design and Implementation of Management System Based on JSP Technology

Ying Zhang
The article introduces the total design and implementation of teaching management system based on JSP technology. The system took Brower/server as web access model, Tomcat as Web server and SQL Server 2000 as data access software. The web function implement of system was developed by using the technique...
Proceedings Article

An Ontology–Based adaptive Topical Crawling Algorithm

Jinxing Shen
In order to solve the problems of the veracity of the topical web crawler which can not get the information interrelated with the given topical. A design framework and algorithm of the ontology-based adaptive topical crawling is brought forwards. We use the ontology technology to reduce the topical web...
Proceedings Article

On Archimedean of t-norms

Kun-Long Zhang, Li-xia Song
In this paper, we consider the Archimedean properties of t-norms. We summarize some Archimedean properties and characterize some new Archimedean properties of triangular norms on [0,1].
Proceedings Article

Definitions of BCK algebras and BCI algebras

Kun-Long Zhang, Li-xia Song
In this paper, we consider the definitions of the BCK and BCI Algebra. We put out four examples in order to prove that any one of the four conditions in the definition of BCK algebra cannot be proofed by other three conditions. Next we simplify the definitions of the BCK and BCI Algebra by giving new...
Proceedings Article

Container Shipping Routes Optimisation and Internal Packing Solutions from a Sustainable View

Liangyong Chu, Shuo Dang
This paper chooses rice container transportation as the case, studies on the relationship between container packing and container shipping, analyse the main operation players, such as packaging provider, cargo owners, port & shipping company, to find its impact on container supply chain’s KPI, identify...
Proceedings Article

Exploitation of remote maintenance system based on constructional element

Ping Lu, Min Li, Yunhui Zhen
Based on the reusable components, this article developed a remote maintenance system software. Essence of the process is a reusable component extraction process and development. Under the guidance of the field of engineering analysis in the field of remote systems, identify reusable components, and achieve...
Proceedings Article

A safe trading model based on encryption hybrid algorithms for mobile electronic commerce

Hong Li, Guoyou Shi
With the rapid development of mobile communication technology, mobile electronic- commerce as a new type of electronic-commerce is attracting widespread attention and use because of his advantages, such as simple, usable, fast, convenient and suitable cost. but how to ensure fast and convenient transactions,...
Proceedings Article

An overall design of network security situation assessment system

Yuxin Zhao, Yuan Hu
In order to help network managers better grasp the situation of network security, and timely respond to major network security incidents, as well as reduce the loss of network attacks bring to the target network, network security situation analysis system has been studied and the overall design is proposed,...
Proceedings Article

Face Hallucination via Semi-Kernel Partial Least Squares

Qiang Zhang, Fei Zhou, Fan Yang, Qingmin Liao
In this paper, a patch-based super-resolution (SR) method is proposed to hallucinate facial images. Two steps are involved in this method. In the first step, semi-kernel partial least squares (semi-KPLS) algorithm is used to generate a nonlinear correlative space. In the second step, we use collaborative...
Proceedings Article

Adaptive Single-Block Hash Function for Short Message

Zhen-zhen Wang, Yong-zhen Li
An adaptive single-block hash function was designed and realized for short message in this paper to effectively solve the drawbacks of MD5 or SHA, such as the padding redundancy and fixed message digest. It took 128, 256 or 512 bits as input, and 128, 160, 192, 224 or 256 bits as output. Its characteristic...
Proceedings Article

Research on the Architecture of Future Library Based on Big Data

Ming Li, Yongcheng Luo
With the maturing of big data, big collaboration, large platform technology, the library' pattern becomes one of the hot issue in the library domain experts. This article reviews the main idea about the future library at home and abroad. Then, based on the trends of big data, big collaboration, large...
Proceedings Article

Research on Confirming the Weighted Value in Software Quality Model Based on Analytic Hierarchy Process

Ruibing Shi, Hongyuan Tian, Wei Du, Hongquan Wu, Anyu Xie, Qingwei Li
Some problems are existed in confirming the weighted value in the software quality model, for example, the method is relatively rough and how the abnormal value is rejected while judging the weighted value. Aiming at these problems, it is pointed out that the scientific hierarchy structure of quality...
Proceedings Article

Research on the Mobile Internet Security

Lei Yue
With the development of economy, the level of science and technology has improved greatly. People’s demand of the Internet information is increasing in their daily work and life, so people’s demand of the Internet technology is even higher. The current mobile Internet technology is developing, as a result...
Proceedings Article

The design and implementation of a dynamic news release system based on ASP.NET

Shuhong Sun
Based on ASP.Net technology and SQL Server 2000 database ,Press release management system development of three layer architecture. The paper introduces the ASP.Net technology characteristic, The realization process of system architecture design, function module design and system are introduced in detail....
Proceedings Article

Design and Implementation of J2EE-based Online Examination System

Yingjie Fu
The paper presents the design and implementation of Online-test System Based on J2EE, the application of B/S and C/S model to a combination of design, and divides the system based on module. Then the paper provides the design of data program, followed by a discussion of the ap-proach of automatically...
Proceedings Article

Design of a Missile Test Simulation and Training System

Xin He, YaLang Xing
In this paper, a missile test simulation and training system based on CPLD is designed to implement the test and other training mission of a missile. The implement project is given; the hardware structure and software of the system are introduced. The research of this system has greatly developed the...
Proceedings Article

Crack Texture Generation Algorithm Based on Process

Guangming Yang, Yupeng Hao, AoShuang Dong, Chunyang Yu
In order to complete a realistic strong body crushing process and has some high ground real-time, simulation methods was proposed to simulate impact on the destruction of the object-based process. Firstly, the physical properties of different materials of glass, concrete and marble, through continuous...
Proceedings Article

Network traffic prediction algorithm research based on PSO-BP neural network

Wei Cheng, Peng Feng
We Propose PSO-BP network traffic prediction algorithm which based on BP neural network and improved by the particle swarm optimization. Use PSO algorithm to optimize the initial weight and threshold values of BP network, and use history to train BP neural network and realize the simulation by MATLAB....
Proceedings Article

Analysis of the mainstream technology of mobile payment

Weiwei Lang
With the development of mobile payment is more and more widely applied, as mobile payment technology mainstream NFC technology, has gradually been concerned because of its advantages compared with Bluetooth and infrared payment technology, is widely used in the field of mobile payment. This paper mainly...
Proceedings Article

Design and Implementation of an Automatic Test Paper Generation System Based on ant colony optimization

Yingjie Fu
The paper proposed a model of automatic test paper generation system since the traditional test was time-consuming, labor-intensive and unstable. Based on the demand of the automatic test paper generation system the model explored the setting of the initial value information of the ant colony optimization...
Proceedings Article

Translation Style Semantics and Type System of Control Capturing

Shohei Matsumoto, Shin-ya Nishizaki
Many programming languages provides non-local exit. In C language, it is implemented by setjump and longjump functions in its standard library. In Java, a try-catch-finally statement is equipped as non-local exit with control capturing. The try-catch-finally mechanism can be categorized into two parts:...
Proceedings Article

Artifacts Reduction in Image Rendering of the Focused Plenoptic Camera

Peng Liu, Rumin Zhang
Plenoptic camera provides us with the capability of refocusing photograph and extending the depth of field(DOF) after exposure. But when we render image patch by patch, the output image is rendered with visible artifacts because of mismatch of the adjacent patch boundaries. The paper introduce a novel...
Proceedings Article

Study of a certain type of missile maintenance training system

Xin He, YaLang Xing
In this paper, the maintenance training characteristics and rules of a certain type of missile equipment is researched, and a framework for integrated maintenance training system for enhancing maintenance training effectiveness is constructed. The system can be equipped for teaching, information querying,...
Proceedings Article

A One-Stop BSS Analysis Method of Integrated System Signals Based on Wavelet Transform, FastICA and SOM

Hongyi Li, Liantao Ma, Bin Chen, Di Zhao
This paper proposes a new one-stop blind source separation analysis method by combining wavelet transform, FastICA and self-organization mapping network. Firstly, we suppress the Gauss noises by using wavelet transform. Secondly, we separate the mixed signals utilizing FastICA to get the independent...
Proceedings Article

System Design based on Moodle

Xiaojun Shen, Jiugen Yuan, Ruonan Xing
Moodle is open source software and it can build course management and teaching platform for teachers. This paper, according to the latest network teaching theory and teaching practice, discusses the development and implementation of teaching system based on Moodle platform. Based on combination with...
Proceedings Article

Research on the Multicast Trickle Algorithm Based on Redundant Touting Technique

Rong Nie, Yi-Fa Meng
In the power information collection networking, the design of the routing protocol has a great impact on network performance. This paper proposes increase routing redundancy tree in the basis of low-power lossy network RPL routing protocols, and study the multicast trickle algorithm and complete the...
Proceedings Article

A Parking Management System Based on Embedded System for Stereo Garage

Beiping Yang, Hongming Shen, Lele Han, Yongjie Yang
A parking management system based on embedded system and GSM network for stereo garage is proposed to solve the current parking problems in the cities. This system, using an ARM processor, advanced RFID and GSM communication technology, achieves effective automation management of the stereo garage. Moreover,...
Proceedings Article

A simulation of air-lift artificial upwelling in vertical pipe

Qingsong Zhang, Li Xu, Wen Yu
The development of Computational Fluid Dynamics (CFD) technology make people found the good point of compromise on the conflict of experiment and analysis,and air-lift artificial upwelling for deep ocean water efficiency is simulated with a simplified CFD model of two-phase flow in an upward pipe. The...
Proceedings Article

Image Segmentation Analysis based on Maximum Entropy Algorithm

Rong Chen
This paper introduces the definition of maximum entropy,the principle of one-dimensional and 2-D maximum entropy. This paper solves the image segmentation problem by using the maximum entropy algorithm.The image gray value is divided into two regions of the background and the object.The key problem associated...
Proceedings Article

The technical research of achieving the internet of things based on cloud computing platform

HaiYan Huang
Analyzed the relationship between cloud computing and the internet of things,Cloud computing has unique advantages, so it becomes the main supporting technologies of large-scale, cross regional development,and study on network framework based on cloud computing, and proposed the key technology to realize...
Proceedings Article

Study on the multiple diffraction for UWB signals under NLOS environment in WSNs

Tao Han, Zhaoxuan Kuang, Hongcheng Wang, Xiuping Li
A time domain (TD) hybrid solution based on uniform theory of diffraction-physical optics (UTD-PO) is presented to analyze the multiple diffraction under nonline-of-sight (NLOS) environment where an obstacle causes shadowing of the transmitter from the receiver in wireless sensor networks (WSNs). The...
Proceedings Article

Research on the application of train communication network technology

Wen Yuan
with the high speed EMU project of technology import in our country, and the vigorous development of the urban rail transit construction, puts forward higher requirements for the reliability of the vehicle. Urgent need in order to realize the normal operation of the train in the rolling stock fast real-time...
Proceedings Article

Information Technology and Digitization of Information Media

Hongbing Zhang
The role of technology is becoming increasingly apparent during the development of education. Development of education has experienced many processes in the history of human social development, which affect the development of information technology to education has brought the most obvious. Further analysis,...
Proceedings Article

Design and Realization of Supervision and Inspection of Fire System Based on .net

Chenying Yang
With the rapid development of Chinese economic, the effect of supervision and inspection of fire has become more and more important. According with the workflow and requirements of supervision and inspection, this system is from the actual needs of firefighting work, operated easily and is suitable for...
Proceedings Article

Watermarking Hiding in Halftoning Image

Zifen He, Yinhui Zhang
This paper proposes a novel approach but efficient algorithm for the edge details and regional characteristics preserving halftoning. While the gray image turns to halftone image using proposed algorithm, binary watermark is embedded in the edge position. In order to enhance the ability to resist cropping...
Proceedings Article

Termination Analysis of Programs with Periodic Orbit on the Boundary

Jingmin Chen, Yi Li, Guang Zhu, Chuancan Li, Fangjian Huang
The termination problem of a class of simple while program: While (constraints) do {updates} end is proven to be decidable by computing periodic orbit of nonlinear updating function over the reals. The termination problem of such a program with open constraint domain which have periodic orbit on the...
Proceedings Article

A Quadratic Equilibrium Entropy Based Virtual Machine Load Balance Evaluation Algorithm

Chao Wang, Zhou-Yi Zhou, Xue-Gang Mao, Si-Ming Lin
Aiming at virtual machine load balance evaluation, this paper proposes an evaluation algorithm based on quadratic equilibrium entropy. Firstly, we propose the computational methods for linear equilibrium and quadratic equilibrium entropy. Secondly, we analyze the physical meanings of linear equilibrium...
Proceedings Article

An Integrated Communication Jamming Simulation Training System

Youhua Ding, Jinfeng Zhu, Hanyan Huang
As the consumption of the true radio set is high and the communication interference grade is undistinguishable, a set of communication jamming simulation training system was developed in this paper. A broad-band communication module is used in this training system, and through the frequency domain equivalent...
Proceedings Article

Least-squares color Halftoning Algorithm Based on Clustering Analysis

Zifen He, Yinhui Zhang
We presents a new method for color printers. Our algorithm applies to both a color printer model and a model for the human visual system (HVS). The method strives to minimize the perceived error between the continuous original image and the halftone image. The color printer models can account for a variety...
Proceedings Article

Dynamic Scenario Segmentation based on Target Assumption Sort

Zifen He, Yinhui Zhang
This paper enables robust foreground segmentation by sorting target proposals over a assumption space to achieve consistent target candidates and binary segmentation of a video sequence. This is followed by sorting the target candidates over a specific hypothesis space to yield consistent and dense object...
Proceedings Article

Research of Evaluation of Economic Model of Equipment Based on BP Neural Network

Ying Pan, Kuo Yang
The accuracy of economic evaluation on equipment demonstration projects directly affects the selection of development schemes and the amount of the investment.By analyzing the influencing factors of equipment economy,this paper established the evaluation index system and comprehensive evaluation model...
Proceedings Article

An Applied Research of Equipment Procurement Bidding Based on Fuzzy Syntheticism—A Case of Purchasing of a Certain Type of Command Vehicle Equipment as Example

Chao Wang, Kuo Yang
According to the feasibility and necessity of our military equipment procurement bidding,and also the limitation of the traditional equipment procurement bidding method,this paper describes in detail the basic principle and the main steps in the bidding by using fuzzy comprehensive evaluation method.And...
Proceedings Article

Delphi Analysis Method and Its Application in Qualitative Prediction of Aircraft Collision Unsafe Event for Air Traffic Control

Xusheng Gan, Jingshun Duanmu, Huanbin Wang
To predict the safety situation of air traffic control, it is inadequate to only use some quantitative prediction method, which can not take into account the knowledge and experience of the experts. We should also pay attention to the important role of some qualitative prediction method. Delphi analysis...
Proceedings Article

Model of independent component analysis with reference curve and its application in removing artifact from electroencephalograph

Lizhi Cui, Zhihao Ling, Josiah Poon, Simon K. Poon
This paper proposes a model named Independent Component Analysis with Reference Curve (ICARC) to extract and remove artifact signal from Electroencephalogram (EEG). Firstly, an additional requirement and a priori information are introduced directly into the contrast function of the traditional ICA model....
Proceedings Article

Research Status and Development Trend of Internet of Things Technology

Yan Qian, Jie Zhang
In this paper, the current situation of research on Internet of things technology to carry on the analysis, the RFID technology, sensor network and detection technology, intelligent technology, nanotechnology, address of the IPv6 technology are summarized, analysis of existing problems in the development...
Proceedings Article

Research On Design and Application of Mobile Learning Platform Based On Cloud Computing

Huiyu Nie
With the wide application of cloud computing and mobile technology, there has been a Innovative modes of learning, m-learning.Based on the analysis of status quo of mobile learning And cloud computing support based on mobile learning, set up a mobile learning platform, cloud computing,Mobile learning...
Proceedings Article

Experimental study of two-dimensional turbulence in square domains

Long Ding
We built the square structure model of two-dimensional turbulence experiments, using of PIV measured velocity field and the vortices field of the two-dimensional turbulent and analyzed to obtain an energy spectrum, you can clearly see the double-scaling law characteristic in the energy spectrum, and...
Proceedings Article

Design and Presentation of Wine Packaging Based on Interactive Digital Technologies

Zhi-qiang Wang, Jia Wei
The advancement of digital technology is offering more and more possibility for the presenting of packaging designs. The maturing internet technology has managed to provide technical support for remote interactive experiences. Digital modeling and interactive virtual presentation of packaging products...
Proceedings Article

The application architecture research of Internet of things based on Web

Liang Feng
With the development of embedded devices and in-depth research and extensive application of networking technology, smart objects and types, increasing the number of networking devices continue to be popular in the people's daily lives. Development of digital and network technologies enables the controller...
Proceedings Article

Discussion of the Digital City Management Information System Construction

Xue Chen
Recently, with the complete propulsion of digital development zone construction, the information-based instruments and city informatization level in the city have been improved gradually and obviously. Especially, the successful implementation of engineering project like the basic information resources...
Proceedings Article

Data mining Technology-Based Design and Implementation of University Library Personalized Service

Lipeng Ye, Yongfu Wang
With IT and network technology becoming more and more mature, the application of database technology is deeper, university library data storage and management also significantly increase during this process, how to expand the space and scope of university library services so that readers can access information...
Proceedings Article

The Research on Related Scheduling Model and Algorithm for Logistics Matching Problem

DanTing Cao, JinZhan Feng
The rapid development of business activities to accelerate the development of logistics industry. As the global economy and the advancement of electronic business logistics costs in the proportion of the whole cost is more and more big, the effectiveness of the logistics problems have become more and...
Proceedings Article

Target maneuver onset time estimation via significance test of acoustic feature difference

Jiansheng Tang, Yongxin Zhang, Xiangdong Jiang
An acoustic feature change detecting based method is proposed in the paper to estimate the target maneuver onset time. Form the statistical analysis of many acoustic features of different targets, the distribution of a certain estimated feature value in a single motion state is approximately normal....
Proceedings Article

Summary of the Underwater Information Understanding Methods

Kejia Yi, Yue Pan, Li Zhang, Xiaoliang Zhang, Kun Gao
This paper meets the needs of underwater information warfare under development trends of knowledge centre war, starts from the concept of information understanding, combines with the characteristics of underwater information, deeply describes the underwater information understanding technology, lays...
Proceedings Article

A New Method of Text Feature Selection for Knowledge Discovery

Li Zhang, Xing Liu, Rong An, Xin Zhao, Kejia Yi
In the paper, we considered the problem to model the text document for knowledge discovery. It is urgent problem to find valuable information knowledge in the mass text documents. Data mining based on eigenvector is widely used to mine association between information of mass documents as much as possible...
Proceedings Article

The Analysis and Simulation of Remote Underwater Communication Method Based on Airgun Source

Xiaoliang Zhang, Song Xu, Kejia Yi
This paper presents a long-distance underwater acoustic communication remote control method in which airgun is used as the source. This method expands the range of underwater remote and supports underwater robots to work together. The pulse signal (produced by airgun) source level, frequency and consistency...
Proceedings Article

A Case Study for Outlier Detection Efficiency Based on M estimations of Different Weight Functions and Models

Xian-qin Tu, Dong-yun Yi, Hai-yin Zhou
The effects of the model and weight function on outlier detection are evaluated by the simulated optical and radar observations. The iterative reweighted M-estimation based on different iterative reweighted functions is used for the outlier detection test. Three typical models of the optical and radar...
Proceedings Article

Research on Multi-objective Algorithm of Air Defense Missile Fire Unit

Jianjun Gao, Qi Ma, Lipo Huang, Qiang Guo, Jianting Huang
Intercept sorting is by targets recognition and the threat judgment, targets is determined as the intercept object, which not only reflects the target threat degree, but also reflects the degree of emergency for interception target, target interception order can provide a basis for objective optimization,...
Proceedings Article

Research on Air Defense Missile Target Assignment Algorithm

Qi Ma, Jincheng Han
By analyzing the main factors of target threat degree, combined with existing interception sorting criteria, firstly considering the dynamic target case. Secondly, take the total loss as the objective function, establishs a decision-making model to intercept targets under higher specified targets without...
Proceedings Article

The Design and Implementation of Documents System for Law Application

Yan Zhao
Along with the successful application of office automation technology in the public security system, the traditional office mode gradually is digital, networked replaced by way of the modern office. Through the analysis of the content and format of legal documents, we can find the rule of legal documents,...
Proceedings Article

Capacity Analysis of Route Sink Networks Based on Time-sharing Transmission Protocol

Nan Lin
A capacity analysis of route sink networks based on time-sharing transmission protocol is proposed to solve the problem. Firstly, the effects of energy constraints on the capacity of wireless ad hoc networks are studied. The network has route sink function, and the node transmission process is based...
Proceedings Article

The Design of Dormitory Management System for College Students Based on Android Platform

Manman Peng, Xinni Xie
The students' dormitory is the main place to college students' daily life, so the students' dormitory management is an important part of school management. As the growth of the school recruitment of students scale, the growing number of students, make the student dormitory management faced with multiple,...
Proceedings Article

The Study on Features of Computational Thinking and Its Common Operation Mode Methods

Juan Zhong, Hua Liao
The computational thinking is the current international computer widely attention an important concept, is also the current computer education need to key research important topic. Computer industry at home and abroad in the field of philosophy and social science and the general scholars on this subject...
Proceedings Article

The Research on Network Platform for Information Processing Based on Public Management

Lili Xu
Along with the speeding up of the international network, the wide application of Internet, make people's learning and profound changes have taken place in the way of life, but the Internet information security management issues are also increasingly prominent, along with the network transmission of all...
Proceedings Article

The Financial Enterprise Electronic Commerce System Design Based on WEB

Xiangying Ren, Yongmao Wang
With the development of world economy and the business model and change, this concept is applied to the reality of enterprise e-commerce transactions, through the network communication technology, achieve the e-commerce mode of the enterprise, the enterprise's economic business has an important value,...
Proceedings Article

The Research on Electronic Data Backup and Recovery System Based on Network

Wei Xu, Juan Luo
With the widely application of the computer system and the continuous development of information technology, the rapid increase of data quantity also in these data has become an indispensable factor in our work and life; To transfer the data resources, processing, analysis, processing, thus constituted...
Proceedings Article

The Key Techniques of the Network Anomaly Detection Based on Data Mining

Xiaobo He
Network realized the information sharing, including individuals, businesses and the government and the whole society. With the expanding of network application scope, for all kinds of network attack and destruction is growing. Computer network security is an international problem, worldwide each year...
Proceedings Article

Detecting Computer Network Anomaly with Data Mining Technology

ZhiYu Hu, Li Li
With the rapid development of machine learning and Internet technology, the combination of the two methods is well appreciated recently. An anomaly and intrusion detection system is a mechanism that monitors network or system activities for malicious activities. Intrusion detection and prevention systems...
Proceedings Article

The Research of Data Stream Technology in Computer Network Security Monitoring

Li Li, ZhiYu Hu
Network attack in a wide range of complex and require monitoring system can real-time detection under high-speed network traffic found various security events. Data stream management system is a kind of high speed and large flow data stream of the real-time response to query requests database model....
Proceedings Article

The Key Technology in Digital Preservation and Communication for Re-gong Thangka

Rong Fan
With the era coming of digitization and informatization, it is necessary to modernize Chinese folk cultures which show distinct ethnic features, such as Re-gong Tangka. Therefore, the establishing of framework, based on the internet, of integrated digitization in intangible cultural heritage is demanded....
Proceedings Article

Study on Internet Financial Risk Early Warning Based on Big Data Analysis

Yu Shen
Big data analysis and Internet financial are currently the most fiery words. The perfect use of big data and Internet in the financial industry will undoubtedly bring a huge change to the entire financial industry. But the opportunities and risks of Internet financial are coexist, whose risk is greater...
Proceedings Article

Research of Wechat Network Information Transmission based on the Complex Network

Jun Zhu, Qidong Wang, Jing Yang
In the recent three years, Wechat quickly developed into the most popular social networking platform. The topology structure of Wechat is analyzed through description of the basic data of the Wechat network and complex network analysis method. When building social networks Tencent Wechat, we get statistical...
Proceedings Article

The Internal Control Research of Accounting Information System Based on OPM3 Model

Sheng Zong
The development of the network and the application of information technology makes the enterprise to establish the enterprise information system, when the information system is applied to the finance department, the accounting information system can develop and implement the business integration enterprise...
Proceedings Article

The Analysis and Research on Food Safety Risk Assessment Based on Data Mining

LiJuan Li, YuanYing Shen, Zhiqiong Yuan, Jie Li
With the improvement of living standard, people more and more high to the requirement of food, the food safety problems emerge in endlessly, aroused the concern of the people for food safety and urgently need to establish a set of risk evaluation system, scientific and reasonable food for export food...
Proceedings Article

Application of two-dimensional detection based on the background subtraction in badminton Hawkeye system

Li Li
With the development of computer technology, computer vision technology was getting more mature. The two-dimensional detection in the badminton Hawkeye system was studied with background subtraction. The mass center coordinates of the badminton were obtained after eliminating the influence of the isolated...
Proceedings Article

Research on Security Analysis of PHP based Websites

Shijia Ling
The PHP as an open-source coding language is becoming more and more popular for companies, web developers and researchers. It is frequently adopted when building up a server. Protecting PHP code from being plagiarized is also a hot research issue especially with the rapid development of dynamic web industry...
Proceedings Article

The Perceptual Environment Security Mechanism Research for Internet of Things

Shideng Ma, Hai Huang
The Internet of things has become the computer and the Internet after the wave of new information technologies. The goal of the Internet of things is a comprehensive perception, on the basis of Internet technology and platform, to build a person connected to the object, content and the content of the...
Proceedings Article

Research on Data Stream Technology in Computer Network Security Monitoring

Wei Xiong
With the rapid and bursting development in the subject of computer science and data mining technology, the combination of data analysis and network security is indeed needed. In response of the fact that traditional intrusion detection systems are not able to fulfill the requirements for specific network...
Proceedings Article

The Design of Interactive Multi-media System for Wireless Environment

Danpeng Sun, Rui Jiang
The study on the design of interactive multimedia system is a requirement of the development of information technology and satellite communications. In this paper, the author tries to explore the design of system for wireless environment with RTP agreement for the sake of solving the problems wired network...
Proceedings Article

The Security and Management of Computer Network Database in Coal Quality Detection

Jianhua Shi, Jinhong Sun
This paper research the results of quality management information system at home and abroad, through the analysis of the domestic coal enterprises coal quality management links and management information system development present situation and existing problems, combining with related theory and system...
Proceedings Article

The Application Research of Computer Database Technology in Information Management

Qiang Han
With the rapid growth of domestic economy, science and technology level unceasing enhancement, the rapid development of electronic information technology, the computer database technology is widely used in various fields, playing an increasingly important role. Computer database technology in the application...
Proceedings Article

The Research of Computer Database Technology Application in Information Management

XiaoJun Jiang, Yuye Zhao
as the core technology and an important foundation of computer database system, the construction of data model for the development of a variety of data management software provides effective reference for the design. Structure mode in the construction of the database structure, different data model to...
Proceedings Article

The Application of Web Services in the Monitoring System of Internet of Things

Qiong Guo
For large monitoring objects, often require tens of thousands of concurrent report data monitoring sensor, and often involve the high-speed data acquisition frequency, resulting in high speed large concurrent real-time transmission of data flow, the design of the monitoring system of communication service...
Proceedings Article

A Modified Natural BEM for Exterior Problems of the Helmholtz Equation

Quan Zheng, Yue Gao
In this paper, a modified natural boundary element method (MNBEM) by using a modified DtN operator to improve the natural boundary element method (NBEM) is proposed for Neumann BVPs of the Helmholtz equation on unbounded domains. We prove the existence and the uniqueness of the solution of its variational...
Proceedings Article

Ant Colony Algorithm for Solving the Multicast Routing Problem with QoS Constraints

Shengli Du
With the development of multimedia network, more and more real-time multimedia applications require a network capable of satisfying QoS constraints such as delay and bandwidth bound so that the messages reach each destination node at almost the same time within a certain specified time limit. Therefore,...
Proceedings Article

Evaluation of Communication Command Effectiveness Based on Fuzzy Analytic Hierarchy Process

Weixi Cao, Jisheng Zhu, Xuejun Ren
Forces carries out the task to improve effectiveness of communication command, is the important guarantee of communication support ability to ascend, the fuzzy analytic hierarchy process (AHP) to evaluate communication command efficiency, to a certain degree of communication security work guide role....
Proceedings Article

Study of Atmospheric Particulates’ Fractal Feature Based on Fractal Combined with Bior 3.7 Wavelet

Yan Wang, Xuezhen Cheng, Peng Wang, Aying Wei
A method based on fractal combined with Bior 3.7 wavelet is proposed to analyze atmospheric particulates’ fractal feature. By the use of microscope, atmospheric particulate samples were taken into digital images. After a series of image processing including Bior 3.7 wavelet decomposition and reconstruction,...
Proceedings Article

A Kind of Improved Data Clustering Algorithm in Web Log Mining

Jin Guo, Shengbing Zhang, Zheng Qiu
Aiming at the user clustering and page clustering in Web log mining and based on the analysis of K-means clustering algorithm and matrix clustering algorithm, the paper presented an improved clustering algorithm that combining fuzzy matrix algorithm with K-means algorithm. Extract compressed sub-matrix...
Proceedings Article

Dynamic Virtual Network Embedding Based on Service Request Aware

Ningning Liang, Julong Lan, Peng Wang, Kun Long
Aiming at the virtual network embedding problem under dynamic service request, Service Request Aware-based Dynamic Virtual Network Embedding (SRAD) algorithm is proposed. We first present virtual network embedding model, and then define virtual network construction cost according to the dynamic characteristic...
Proceedings Article

Research on the Multi-scale Fuzzy Entropy based on Index Energy

Zhonglin Wei, Liyuan Ma, Xinhan Cui
In order to improve the accuracy of feature extraction, a Multi-scale Fuzzy Entropy algorithm is proposed based on Entropy theory. The new algorithm combines the concept of Fuzzy Entropy and Multi-scale Entropy. Aimed at the shortage of Empirical mode decomposition (EMD), Index Energy is selected as...
Proceedings Article

A Nearest Neighbor Searches(NNS) Algorithm for Fast Registration of 3D Point Clouds based on GPGPU

Fangfang Wu, Fei Wang, Peilin Jiang, Chen Zhao, Jianhua Cheng
For a large set of data points, registration is time-expensive. In order to deal with this problem, we propose an improved Nearest Neighbor Searches(NNS) algorithm for 3D point clouds registration based on Graphic Processing Unit(GPU). In order to maximize the storage of data points in the memory, we...
Proceedings Article

Species and composition of phytoplankton in Fushan Bay

Yang Dongfang, Xu Zijun, Zhang Qi, Liu Yiting, Ma Zhaodong
This paper analyzed the species and composition of phytoplankton in Fushan Bay based on investigation data on June to August 2002. Results showed that there were 4 phyla, 39 genera and 102 species, including Bacillariophyta, Pyrrophyta, Chlorophyta and Chrysophyta. There were 29 genera and 75 species...
Proceedings Article

Simulation Platform on Flow and Heat Transfer of Aero-engine Secondary Air System

Guo-zhe Ren, Zhen-xia Liu, Peng-fei Zhu, Ya-guo Lyu
In order to analyze the flow and heat transfer characteristics of the secondary air system, a general simulation block library was developed and a characteristic analysis platform of secondary air system was constructed based on the tool box of MATLAB/Simulink. This platform could simulate all kinds...
Proceedings Article

Application Research of Multi-Software Collaboration Based on Complex Surface Design

Hua Zhang
Bas-relief is widely used as it expresses people’s yearning and good wishes to the future life, and gives people a sense of subtle elegance with its beautiful lines and color. Since it is hard for traditional bas-relief design to meet the demand of rapid developing science and technology, the research...
Proceedings Article

Wavelet Transform-based Remote Sensing Image Compression

Mei-shan Li, Yue Liu, Hong Zhang
After analyzing characteristics of remote sensing images, the Fourier transform and wavelet transform are studied in this paper. It is found that the wavelet transform provides excellent properties and is more suited for image compression. Therefore, the wavelet transform is used to perform three-level...
Proceedings Article

The Research and Realization of A Localization Algorithm in WSN Based on Multidimensional Scaling

Li Xiang, Qianzhi Hong, Liuxiao Hui
A new locating algorithm NMDS-TDOA is proposed, which attempts to improve the performance of node localization in wireless sensor networks. As the ranks of the nodes based on TDOA should be monotonic with their ranks based on true distance, we can combine TDOA and MDS-MAP. As a result, positioning error...
Proceedings Article

The Study on the Image Thresholding Segmentation Algorithm

Yue Liu, Jia-mei Xue, Hua Li
Image segmentation is an important branch of image processing. Among numerous segmentation techniques, thresholding is a very important and effective one which segments different objects using a threshold. This paper discusses workings of several common thresholding segmentation methods and summarizes...