Proceedings of the 2015 2nd International Workshop on Materials Engineering and Computer Sciences

Session: Computer Science and Applications

44 articles
Proceedings Article

Learning Hierarchical Representations for Face Recognition using Deep Belief Network Embedded with Softmax Regress and Multiple Neural Networks

Haijun Zhang, Nanfeng Xiao
In face recognition and classi cation, feature extraction and classi cation based on insuf cient labeled data is a well-known challenging problem. In this paper, a novel semi-supervised learning algorithm named deep belief network embedded with Softmax regress (DBNESR) is proposed to address this problem....
Proceedings Article

Modeling research on wheat grain in different quality categories using multilayer support vector machine

Guangyan Hui, Laijun Sun, Shang Gao
Near Infrared Reflectance (NIR) spectroscopy is a ‘green’ nondestructive testing technology and it has been widely used in grain crop analysis. The experimental data were collected using 161 wheat samples from the major wheat-producing area in China. The original spectral data was represented by four...
Proceedings Article

Design and Implementation of the Evaluation System of the Post Practice in Higher Vocational Colleges Based on AHP

Wen Lin
For the Higher Vocational Colleges, post practice is not only the key link of the training of talents, but also an important part of Higher Vocational Education plan. In order to have a more holistic understanding of the post practice, it must be realized by a specific evaluation system of internship....
Proceedings Article

A Generic Model for Trojan Horse Attacks Prevention and Handling

Dan Tang, Xiao-Hong Kuang
Malicious payloads and computer codes have conventionally strived to gain access to target systems for aims which the affected end user experiences as unwanted functions or loss of data. This paper will examine the major types of Trojan horses, their mode of operation, and consequently, propose a framework...
Proceedings Article

Log Real-time Management Scheme Based on LEK

Xiafei Lei, Zhe Wang, Yuzhen He
Logstash, Elasticsearch, Kibana, log management, LEK
Proceedings Article

Adaptive Tracking Algorithm of Weak GNSS Signal

Faqin Gao
The receiver of a global navigation satellite system (GNSS) is likely to lose tracking for a GNSS signal in some degraded environments. To solve this problem, this paper designs a new adaptive tracking algorithm for GNSS signals. First, we design an error extraction module to extract phase errors so...
Proceedings Article

The Translation Invariant Solution to Quadratic Metric Learning

Bing Sun, Jufu Feng, Beilun Shen
Metric learning has drawn great interests for the last decade in the field of computer vision and machine learning. In this paper, we address the importance of the translation invariance (TI) of a metric. Intuitively, translation invariance should be a fundamental requirement for any reasonable image...
Proceedings Article

An Efficient Method to Outsource Applications among Multiple Clouds

Feng Huang
Cloud computing, as a novel scalable and on-demand computing service, is emerging as a leading solution for deploying on-demand application or data storage services. This paper studies the problem how to outsource applications to multiple clouds by a cost-effective way. We first formulate the process...
Proceedings Article

Realization of High-level Human Coaching System of RoboCup Middle Size League

Qingwu Fan, Jiaming Li, Sihan Li, Xudong Liu, Jing Huang
Robocup middle size league has a relatively perfect autonomous decision-making system. To strengthen the human coach’s role in grasping of the field situation, a high level human coaching system is presented by committee. This paper studies high level human coaching methods by QR code and human voice,...
Proceedings Article

Study on data encryption technology in network information security

Jianliang Meng, Tao Wu
The progressive development of computer technology, network information security trend to increasing tensions, as well as all kinds of theft, tampering with and destruction of social development have a higher level of network and information security requirements. Data encryption is to protect the core...
Proceedings Article

Image Matching Algorithm for Remote Sensing based on FAST-9 and SURF

Hao Wu, Wei Yang, Jun Liu
A novel remote sensing image matching algorithm based on FAST-9 and SURF is proposed. Firstly, the FAST-9 is employed to detect feature points for remote sensing images, and the ID3 algorithm and non maximum method are used to determine the correct corners. And then, main orientation is assigned by the...
Proceedings Article

An Available and Simple Android-Based Short Video Processing Method

Junlin Lu
This paper introduces an available method, which displays the short video production processing on Android. Including three such steps as raw video recording, video editing, and video exporting. The general method those short-video-processing apps like Meipai, Duopai and Miaopai use need NDK to develop...
Proceedings Article

Research on Library Management System Based on VBA

Tao Sui, Weiqiang Zhu, Huanhuan Li, Yongxin Feng
For the provincial and universities’ libraries, the management of books and materials are generally based on complex and huge database, such as: SQL Server, Access, and Oracle. The cost of maintenance and management is very high, even though its safety and reliability can be effectively protected. Meanwhile,...
Proceedings Article

A Mobile Web-based Ontology Editor for Smartphone

Mingzhe Zhang
Nowadays, smartphones have become indispensable to modern human life. One of benefits of smartphones is that most places on the earth are widely covered by the signal of mobile phones, which means people can connect to the Internet wherever he wants via a mobile phone. It also means a mobile web-based...
Proceedings Article

An Effective Cards Management Solution Using Smart Bracelet Based on NFC

Huafeng Shi, Haiyun He, Tianwei Wang
Radio frequency identification devices (RFID) and business cards emerge as technology develops and it becomes hard to manage them or find a needed one from a piles. A smart bracelet aiming at providing an effective way to manage these cards is proposed in this paper, consisting of a near field communication...
Proceedings Article

Research on the Impacts of Quantitative Factors on Sentimental Classification of Weibo of Different Topics

Ruoxi Zhang
Different numbers of terms and texts of training set are involved to optimise the performance of sentiment classification for Weibo repost. The experiment utilises CHI-square test to extract terms and uses support vector machine (SVM) to classify the different sentimental categories. By measuring the...
Proceedings Article

Research on the Wireless Sensor Network System Based on Internet of Things

Huang Di, Yongxing Jiang, Ziyue Wang
As the third information industry after the computer and Internet revolution, the Internet of Things is coming which brings us into a new era in which everything can be identified and connected and things can exchange information and make decisions by themselves. As a core technology of the Internet...
Proceedings Article

A recursive update cubature Kalman filter

Yonggang Zhang, Gang Wang, Ning Li
This paper investigates the use of recursive update and proposes a recursive update cubature Kalman filter (RUCKF). Merit of recursive update is a better assimilation of measurement information and realization of nonlinear update on the state. The proposed algorithm is shown to achieve superior performance...
Proceedings Article

Overlapping Signal Separation in DPX Spectrum Based on EM Algorithm

Chuandang Liu, Luxi Lu
Overlapping signal separation in spectrum is a difficult problem. We use Gamma Mixture Model to formulate the distribution of signal power in each frequency bin of digital phosphor technology (DPX) spectrum. Then Expectation Maximization (EM) Algorithm is used to solve the model. Simulation results show...
Proceedings Article

An Adaptive Diagonal Loading Covariance Matrix Estimator in Spatially Heterogeneous Sea Clutter

Yanling Shi, Xiaoyan Xie
The most typical method to estimate the covariance matrix of sea clutter by secondary samples is the sample covariance matrix (SCM), implying secondary samples with the same statistical property. The hypothesis established or not depends on whether or not sea clutter is spatially homogeneous. In order...
Proceedings Article

Research on Efficient SPARQL Query Processing for RDF Data

Yi Zhang
Semantic Web can add explicit semantics to data so that machines can not only simply display these data, but also the machines can understand, process and even integrate them. In recent years, with the comprehensive development of the Linking Open Data (LOD)project and the DBpedia project, Semantic Web...
Proceedings Article

Research on the selection and design of power safety training system database with the combination of virtuality and reality

Xiaopeng Zhang, Jiwen Sun, Peng Cheng, Jianhua Gong
With the development of virtual reality technology, the power safety training system which is convenient to carry out and reduce power accidents provides a safe training platform for power enterprises. This paper proposed the scheme of electrical safety training system database selection and design based...
Proceedings Article

The design principle and architecture design of micro electrical safety training learning system

Xuanzhen Duan, Ying Du, Li Hou, Yu Zhang
Electrical safety training is one of the important parts of securing the grid operators’health and lives. Micro learning system provides a new way for electrical safety training anytime and anywhere. This paper analyses the design principle of micro electrical safety training system, an then details...
Proceedings Article

The Numerical Simulation of flow pattern in Horizontal Mutation Pipe

Shupeng Cai, Binwen Luo, Yaode Qiu, Peng Gao
In order to explore the flow characteristics in Horizontal Mutation Pipe, an SIMPLEC algorithm was used to simulate the flow field in horizontal mutation pipe by using the computational fluid dynamics software of Fluent. The variation of the length of entrance zone and the local resistance coefficient...
Proceedings Article

FRLDM: A Self-Optimizing Algorithm for Data Migration in Distributed Storage Systems

Tao Wang, Shihong Yao, Zhengquan Xu, Shan Jia, Lizhi Xiong
In distributed storage systems, data migration is an efficient method for improving system resource utility and service capacity, and balancing the load. However, the user accessing is changing over time and the state of a distributed system is in an unpredictable stochastic fluctuation, hence traditional...
Proceedings Article

Explosive Risk Evaluation of LPG Tank under Fire Based on Comprehensive Evaluation Algorithm

Hong gang Cai, Bin Zhao, Ming shuo Yang
The explosive risk evaluation of LPG tank under fire is important for putting forward the safety measurement, in order to improve the evaluation correctness, and the fisher fishing algorithm and the grey relational analysis are applied in it. Firstly, the explosion characteristics of LPG tank under fire...
Proceedings Article

Improved Traffic Lane Edge Detection Algorithm Based on Mathematical Morphology

Liying Wu, Qiang Yu, Tongqiang Xu, Shuo Zhang
In view of the limited anti-noise of traditional traffic lane edge detection algorithm, the paper put forward to a new traffic lane edge detection algorithm based on traditional mathematical morphology. For solving the problem of uneven road surface caused by illumination and rainy, this paper combine...
Proceedings Article

The application of Multiwave method of shallow earthquake of barite ore exploration in Guizhou district

Huiguo Liu
Through the analysis of velocity, spectrum of the multiwave methods of shallow earthquake exploration, this paper makes analysis on the barite ore nearby the downstream river bank of Xialuotuo River in Qianxi County Stone Township of Guizhou province. The research shows that (1) When the wave velocity...
Proceedings Article

Study on the mining based on the improved DBSCAN algorithm in pick-up hotspots areas

Zhipu Tang, Xiaodong Wang, Hao Liu, Xiaowen Wang, Zhiqiang Wei
The main business model of taxies called "Roadside Beckon" adopted widely is inefficient. Passengers and drivers are ignorant of the location information of each other. The rise of various types of taxi Apps also have made an effort to solve the problem of "difficult to take a taxi". However, these methods...
Proceedings Article

Research of TDOA NLOS error compensation interpolation positioning

Yi Yang, Zhongliang Deng
In the base station positioning system, complex environment will cause reflection and refraction, etc. When using ordinary TDOA positioning algorithm will lead to an inaccurate positioning result in NLOS (Non Line of Sight) environment. In order to improve the positioning accuracy, this paper introduces...
Proceedings Article

Some New Dual hesitant fuzzy power aggregation operator

Jiayong Xing, Rui Yu, Guangchun Zhang
Multi-criteria decision making (MCDM) has been a hot topic in decision making and systems engineering. The Dual Hesitant Fuzzy Sets (DHFSs) is a useful tool to deal with vagueness and ambiguity in the MADM problems. In this paper, we propose some new dual hesitant fuzzy power aggregation operator for...
Proceedings Article

The research on post processing algorithm of B-C five-axis

Qingting Li, Bing Yan, Wei Zhao
According to the structure and motion transformation characteristics of five coordinate of machine tool through the establishment of mathematical model, get the coordinate transformation formula of rear processing, tool path, by using CATIA and other CAM software, tool path converted to machine tool...
Proceedings Article

Research of Image Enhancement Algorithm under Inclement Weather

Zhenyu Liu, Hairong Jiang, Wen Xu
To make the image details in smoggy and dusty weather clear without reducing the quality of clear parts, is the key point of outdoor static image restoration. This paper put forward an image enhancement algorithm that can handle haze and dust image at once. First, use self-adaptive white balance algorithm...
Proceedings Article

Fluid-Structure Interaction Simulation of Simply Supported Plate With Large Deformation Subjected to Axial Flow

Fan Wang, Chang-qing Guo, Kun Zheng
The dynamic behavior and flow field characteristics of freely supported structure elastic plates with large deformation subjected to axial flow are studied numerically. The structural dynamics equation is discretized by isoparametric displacement-based finite elements, and the motion of a continuous...
Proceedings Article

Study on the Architecture about Equipment Support Information System based on Cloud Computing

Huimin Zhang, Zeya Zhang, Jing Jing, Hairong Hu
Cloud computing is a new computing model of network services. As the inheritance and development of SOA, it has become a hot issue in the internet field. Firstly, this article supposed the questions in the Equipment Support Information System Architecture based on SOA. Secondly, this paper analyzed the...
Proceedings Article

Numerical Analysis of Nozzles’ Energy Loss Based on Fluent

Xian’ an Cui, Kai Wu, Jiangfei Shen, Yu Sun
Energy loss during the formation of high pressure water jet was investigated theoretically. Computational fluid dynamics software was used to simulate the high pressure water jet flow field produced by three kinds of nozzles, including cylindrical, conic and cosine nozzles. And the influence of the nozzle’s...
Proceedings Article

Discussion on classification problems in machine learning

Yao Han
In the research about machine learning, classification is the problem of identifying to which of a set of categories a new observation belongs, on the basis of a training set of data containing observations whose category membership is known. In this study, the procedure and principle of resolving classification...
Proceedings Article

A New Genetic Algorithm considering diversity of gene locus

Jun Liu, Jie Fu, Xue Bai
a new genetic algorithm is proposed in the paper. Different from other genetic algorithms, the diversity of gene locus is considered and a new mutation operator is proposed. The operator can suppress the survival rate of modes which tends to prematurity, and effectively ensure the diversity of populations....
Proceedings Article

Planar Mechanism Incidence Matrices and Main Diagonal Spectrum

Kai Zhao
This paper applied the matrix theory and graph theory to the properties of planar mechanisms and constructed incidence matrixes. A construction method of characteristic matrices was proposed, and links incidence and pair incidence matrices were also defined. Meanwhile, through the concept of main diagonal...
Proceedings Article

Study on the Time-Scale Similarity of Bouc-Wen Hysteresis Model

Ning Dong, Jia Gao, Xiangdong Liu, Xuefei Mao
This paper will focus on Bouc-Wen hysteresis model to study the time-scale similarity of the hysteresis. Considering different hysteresis characteristics of Bouc-Wen model, this paper studies the time-scale similarity between the output curves of different hysteresis characteristics under the excitation...
Proceedings Article

Changes in the Network Eigen Entropy of resting-state functional brains across the lifespan

Yiming Fan, Hui Shen, Ling-li Zeng, Jian Qin, Zhiguo Luo, Dewen Hu
The brain is a dynamic and complex network formed by hierarchical interconnections among functional regions and neural systems across lifespan. Recent studies using graph theory explore the functional organization of resting-state brains have coherently indicated many non-random topological properties...
Proceedings Article

Logistic recommendation algorithm based on collaborative filtering

Xiaoyu Zhang, Chaofan Dai, Yanpeng Zhao
Traditional collaborative filtering recommendation technology has lower accuracy and couldn't meet the actual needs. So we convert the recommendation problem into the classification problem. We introduce Logistic classification methods based on the collaborative filtering technology and determine whether...
Proceedings Article

A Novel Research on Real-Time Intrusion Detection Technology Based on Data Mining

Julan Yi
with the wide application of network technology and the continuous development of network economy, network security issues are also increasingly prominent, it gives the network itself and the information system based on network has brought great threat. Adaptive detection based on data mining is the...
Proceedings Article

Key Technology Research for Unstructured Data Cloud Storage: New Exploring

Julan Yi
From traditional to today's data network text documents, pictures, audio and video mainstream, the Internet is gradually changing the structure of the data, the data from the non-structured data, which are growing and a wide variety of unstructured data, the Internet data Storage management has brought...