Proceedings of the 2017 2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017)

+ Advanced search
140 articles

A Generation Method For Chinese Equipment Name Abbreviations Based On Rules

Jiwei Qin, Liangli Ma, Yanping Wang
In the field of CALS, Chinese equipment name abbreviations are widely used, and recognizing these abbreviations named entities has an important significance in the CALS knowledge discovery, but there are less research on it. A generation method based on rules is proposed for Chinese equipment name abbreviations....

An Asynchronous Control Method For Reducing Inconsistency In DVE

Wei Zhang, Hangjun Zhou
Maintaining the consistency of each node is the key factor to preserve system usability in a distributed virtual environment (DVE) system. However, due to the existence of communication delay between nodes, it is hard to sustain the absolute consistency of the system while providing acceptable responsiveness...

An Exploration Of Improved Design Of Biomass Pyrolysis Liquefaction Device

Yue Xia
With people's long-term exploitation, reserves of fossil fuels are continuously reducing, then in order to meet demand of social development for energies, developing renewable clean energies has attached with more and more importance. Biomass energy is renewable and environmentally friendly, so it has...

A Novel Blocked Winner Sequence Feature Extraction Method Based SOM For Large Set Chinese Character Recognition

Lei Wang, Wenjuan Zhang, Lianming Wang
A novel feature extraction method named blocked winner sequence feature extraction (BWS) method based on SOM is proposed for recognizing large set of Chinese characters. Firstly, a Chinese character sample is blocked to make sub block set according to certain principles; Secondly, every sub-block is...

DYPSOKM: A Dynamic Union Of PSO And K-Means, A Better Cluster

Qin Ke, Liusheng Huang, Hongli Xu
As one of the most famous clustering algorithms, K-means is simple and effective but easily falls into local optimal solution. Aimed at this flaw, many methods including PSO had been applied to optimize K-means. As a typical swarm intelligence optimization algorithm, PSO(particle swarm optimization)...

A Novel Android Application Penetration Analysis Method

Hao Zengshuai, Meng Leizi, Zhan Xiong, Wang Jie, Yu Jianbo
As the Android craze spread through the world, even the rapid development of mobile technology can not prevent applications from vulnerability abuse. The existing detection system mostly applied static analysis techniques to single application, which make a limited standard of accuracy and efficiency....

Research On Optimal Picking Route Of Storage Robot Based On Large Scale Logistics Warehouse

Yi-peng Li, Di Wang
In the distribution center, picking operation time is about 40% of the total operating time. Therefore, optimizing the order picking operation has an important influence on the improvement of the efficiency of the distribution center. The advent of storage robots essentially breaks the efficiency problem...

Cooperative Coevolutionary Genetic Algorithm For Water Resources Optimization Model And Its Application

Wei Xu, Zengchuan Dong, Zhenchun Hao, Dunyu Zhong, Hongze Wang
To solve the complexity of multi-public sources water allocation, the optimization model using the multi-objective function and multi-constrained conditions of the cooperative coevolution genetic algorithm (CCGA) was proposed for water resources management. The objective function was the highest benefit...

An Improved Algorithm For Conceptual Semantic Similarity In Domain Ontology

Yaya Zhen, Xian Zhong, Lin Li, Luo Zhong
With the extensive application of ontology in many fields, the semantic similarity computation based on domain ontology has been a hot research topic. At present, taking advantage of the upper and lower layer structure of ontology to calculate the semantic similarity is the most common approach. But...

Multilayer Video Semantic Feature Extraction Method

Xian Zhong, Tianbao Yu, Yansheng Lu
To solve video semantic retrieval, the key problem is the difficulty of analyzing, searching and processing the massive video data. In this paper, we propose an innovative multilayer video semantic feature extraction method. The whole method can achieve automatic extraction, label of the concept ontology...

A Robust Watermarking Algorithm For JPEG Images

Baosheng Sun, Daofu Gong, Fenlin Liu
This paper proposes a robust and blind watermarking algorithm based on matrix Singular Value Decomposition (SVD) perturbation theory for JPEG image copyright protection. First, the quantized DCT coefficient blocks are extracted from the JPEG image, then SVD is performed on each block, and finally the...

Three-Stage Lossless Compression Technique For Processing PMU Big Data In Modern Smart Grid

Li Baojie, Chen Shuo, Lu Yuxin, He Weisheng, Zeng Xiaoming
With the widespread proliferation and application of high data sampling rate device- Phasor Measurement Units (PMUs) in modern smart grid, large volumes of data are produced in the wide-area monitoring system, which results in increasing challenge in real-time analysis, data storage and data transmission....

Quantitative Assessment Of General Cyber-Attack And Optimal Strategy-Selection Modelling In CPPS

Li Baojie, Lu Yuxin, Zeng Xiaoming, Chen Yufei, Zeng Xiangfeng, He Weisheng
Recent years, an explosion of cyber-attack accidents once more sound the alarm on the significance of cyber-security issue. For the sake of establishing robust panoramic defense architecture in modern Cyber-Physical Power System (CPPS), an effective and quantitative vulnerability assessment of CPPS is...

Transmit Beamspace Design For Unitary ESPRIT In Two Dimensional Hybrid MIMO Phased-Array Radar

Shuaiqi Liu, Buhong Wang, Jiwei Tian
In this paper, a transmit beamspace design method for two dimensional Hybrid MIMO phased-array radar in application of direction of arrival (DOA) estimation is proposed. A new method to construct the virtual array rotational invariance property that enables the use of search-free DOA estimation techniques...

Research On SMS Filtering Algorithm Based On User Personality

Wenli Gong, Guojiang Fu
In this paper, a short message filtering model based on the user characteristic model is proposed to solve the problem that the short message filter model is not constructed from the user's needs. The model analyzes the information of App category and user's existing SMS in the user's mobile phone, and...

Low Power Consuming Arm Exoskeleton Design Using Force Sensitive Resistors

S.y. Leong, Y.h. Goh, C.y. Teoh
Exoskeleton as a wearable robotic machine has a huge potential to be used in medical, industrial, civilian and military field as it can increase the user's strength and endurance. The scope of this paper covers three major engineering fields which are mechanical, electronic and programming engineering....

The Comparison Between T*_Tree And B+_Tree On Modern Hardware Revisited

Ahmad Abdullah, Qingfeng Zhuge
Database indexes have a significant impact to speed up access to particular item or items. While B+Tree is the most important index structure for disk-based database management systems (DBMS), T*-Tree is optimized for main memory access and widely used for in memory database system (IMDB). however, the...

Attitude Adaptive Control Of Combined Spacecraft

Qian Wang, Xinhong Li, Guanghong He, Zhibin Zhang, Jiping An
Aiming at the attitude adaptive control of spacecraft after docking, an adaptive attitude control method is proposed.Firstly, the dynamic modeling and spatial disturbance torque modeling of the combined spacecraft are carried out using the modified Rodriguez parameters to describe the attitude of the...

SWOT Analysis Of Patent Information Service Strategy Of University Libraries For Enterprises

Pengfei Ji, Xiaozhu Zou, Zhi Li
In recent years, university libraries have stepped out of the campus and began to focus on scientific research departments. University library information resources, the use of specialized subject in the premise of service for teaching and research, from the collection of information to the network information,...

Design And Implementation Of Information Representation System For Intelligence Acquisition

Ru Liu, Menghui Li, Huina Zhang, Yurong Huang, Jingyan Zhou
Information Representation System (IRS) is to transform data information and knowledge into a type of visual information for intelligence officers reading, where the natural ability of mankind to identify visual mode quickly will be made most of. Information representation combines human brains with...

Technical Research On CAN Bus Software Decode And Performance Index Measurement Of Inter-Frame Space

Huiming Wu, Ling Li, Hao Li
In order to monitor CAN bus device and network real-time and effectively, performance index scheme on CAN bus software decode as well as precisely measure performance index CAN bus inter-frame space is designed by the method of collecting physical layer wave form directly, so as to provide new solving...

Evolutionary Game Simulation: A Case In Water Resources Management

Xianshi Li
In this paper it simulates the dynamic evolution of water ecosystem by the evolutionary game theory. Through analyzing the theoretical hypothesis and model simulation, it finds that strategic choices of players are decided by payoffs of actions when water quality under certain conditions, there exist...

In Thing Networking RFID System Node Communications Security Research

He Weigang, Zhang Fan, Li Zhenglin, Zhang Yin, Wu Qiqi
The thing networking unceasing development and the application, while take to us to live convenient, also gave the informationsecurity to bring the challenge.Communications security question faces which in view of the networking architecture and the RFID system; Has studied in with emphasis the networking...

The Application Study On The Customer Service Chatting Robot Based On Bot Framework

Chuanwei Qi
with the rapid development of speech recognition technology, the speech chatting robot has become as the breakthrough of the artificial intelligence. The voice chatting robot shall be such a typical application field in customer service, it can provide the customer with efficient and convenient service...

Design Of Intelligent Home System Under Wifi Environment

Miao Yingkai
The traditional intelligent home system is mostly ZigBee wireless technology network, with home gateway as the control center. The design of this essay takes the mobile phone as the control terminal, takes the WiFi as the communication means, removes the home gateway, carries on the long-distance control...

Research On The Construction Of Scientific And Technological Service Mode And Service Platform Based On O2O

Shengju Yang, Jianbing Wei, Jie Meng, Dekui Lv
The interaction between the virtual world on the Internet and the off-line real life gives birth to a new business model- the O2O business model. This paper expounds the relevant theory of O2O mode, analyzes the relevant literature and advances some ideas about the scientific and technological service...

Integrating Global Open And Satellite-Based Information For Major Disaster Damage Assessment

Suju Li, Haixia He, Yan Cui, Ming Liu, Shirish Ravan
Major disasters usually impact large area and cause massive damages to variety physical elements resulting into heavy economic losses. Timely and accurate assessment of disaster damages is critical for better understanding the situation and further supporting the emergency response activities. Geo-information...

The Simulation Study Of Ultrasonic Signal From Multiple Measurement Points Based On The Radial Pipe

Wang Yueming, Wang Peng, Yao Guodong, Jia Hua, Li Wentao, Zhang Yaoyao
Gas-solid two-phase flow widely exists in industrial production. A simulation model is made by the finite element software, and is used to study the ultrasonic signals from multiple measurement points in the radial pipe. Through the research we found different voltage signals from the receiving end are...

A Novel Processing Model For Scds In ETL

Li Sun, Jiaoyan Zhang, Jiyun Li
ETL(Extract-Transform-Load) which populates data from various data source systems to data warehouses (DWs) is an important part of building data warehouse. Nowadays, as the data growing rapidly, it is a big challenge for ETL to process such huge data quickly. MapReduce is a programming model for large-scale...

Realtime Mobile Video Conference Design Based On Reactive Architecture

Haidong Lv, Yongkang Deng, Yuexing Zhong, Rui Xiao, Wenbo Li
Due to the traditional software architecture can not meet the performance requirements of large concurrent real-time applications, using the SocketCluster real-time transmission frame of the new non blocking asynchronous mode of Node.js platform and on the basis of the realization of the function of...

Incremental Maximum Gaussian Mixture Partition For Classification

Xianbin Hong, Jiehao Zhang, Sheng-Uei Guan, Di Yao, Nian Xue, Xuan Zhao, Xin Huang
In the field of classification, the main task of most algorithms is to find a perfect decision boundary. However, most decision boundaries are too complex to be discovered directly. Therefore, in this paper, we proposed an Incremental Maximum Gaussian Mixture Partition (IMGMP) algorithm for classification,...

Research On Auto Wiper Rubber Cutting Machine

Zhexiang Zou, Qian Wang, Wenxiu Lai
Wiper rubber is an important part of car wiper. And mold forming is the key to have the suitable rubber brush mould specification during wiper rubber molding process. Based on the rubber molding technology and the GRS-750 rubber-cutting machine's cutting requirements. Focused on the GRS-750 car wiper...

YA-JOP:Yet Another Java Object Profiler On Art Virtual Machine

Fei Wang, Xiaohua Shi, Chao Li
In this paper, we design and implement an efficient and low overhead Java object profiler called YA-JOP on Android 6.0 and its ART virtual machine, which uses an AOT(ahead-of-time) compiler. YA-JOP records the allocation site, the class information, the object size, the birth time and death time, the...

Architectural Design Of Data Stream-Based Big Data Real-Time Analysis System

Qiang Liu, Junmin Lv, Xun Yuan, Renyi Luo, Dekui Lv
Conducting the RT analysis of large-scale data stream severely challenges the IT hardware facilities and system Architecture. To cope with the needs of large-scale RT analysis, the article analyzes and compares the mainstream open-source technology and then designs the system architecture that consists...

Research On Intelligent Test Paper Generating Strategy Based On Genetic Algorithm And BP Neural Network

Chao Liu, Yan Hu
The prevalence of MOOC (Massive Open Online Course), while providing us with a new efficient way of learning, demands an evolved online test system for certificating attended students properly. As examination of each course still being the simple and powerful way to check out, generating test paper as...

Finite Element Modal Analysis Of FSC Racing Frame

Yu Baojun, Sun Lunjie, Bian Yahui, Si Sumei, Yu Wenhan
The natural frequencies and modes of a structure can be determined by the modal analysis. In this paper, the CATIA software based on the FSC car frame to carry out a three-dimensional modeling, save as STP format. In the Workbench ANSYS, the modal of the frame is solved by the finite element method,...

System Matching Design And Control Optimization Of Extended-Range Electric Vehicle

Wang Hongyu, Zhang Chun, Liu Huandong, Xi Fuqiang, Zhao Yue
By using a light bus prototype, this article discusses system design with vehicle dynamic demand, driving environment, cost and etc., proposes a self-adapt control method to adjust start and stop time of the range extender based on the vehicle's average output power demand and battery SOC status. The...

Image Classification And Recognition Based On The Deep Convolutional Neural Network

Yuan-yuan Wang, Long-jun Zhang, Yang Xiao, Jing Xu, You-jun Zhang
With the development of the information age, there were a lot of data whose features couldn't be extracted or predicted effectively in real life. One of the core function of computer vision technology is to classify and recognize, with classification and recognition as its summit mission of object detection...

Design Of Automatic Test System For Transmitter Controller

Fangfang Liu, Hongshe Dang
In the transmitter, the controller is used to realize the transmitter real-time monitoring and control.In order to guarantee the quality of the transmitter controller, for manual testing, high repetition rate, low efficiency and low accuracy problem, a set of automatic test system based on LabVIEW and...

Research And Implementation Of Integrated Operational Monitoring System Based On Secondary System Security Protection

Dekui Lv, Miao Yu, Jianyu Song, Zifeng Cui, Qiang Liu, Ningxin Liu
With the development of network and information technology, the system network equipment structure is more and more complex and the system is more and more difficult to manage. Facing such complex equipment and network architecture, current automation systems and network management methods are still...

Research On The Service Of Subject Librarian In University Library Under The New Media Environment

Xiu Li-li
This paper investigates the subject librarian service of 211Academic Libraries in 6 universities of Northeast region, and points out that in the new media era, the existing duties and services need to be changed in order to adapt to the new environment. Human communication technology, has never stopped,...

A Simple And Efficient Design Of Instantaneous Frequency Measurement Encoder With Phase Comparison Method

Feng Zhang, Peng He, Anhui Liang
This paper presents a simple and efficient design of instantaneous frequency measurement encoder with phase comparison method. Firstly, in order to improve the accuracy of the sampling data, the software filter module is added in the encoder. Secondly, the encoder uses hierarchical lookup table to reduce...

Design And Research Of A High Precision Σ-Δ A/D Converter

Jingjin Fan, Wenjie Qiu, Zihao Li, Qisheng Zhang
A high-precision Σ-Δ analog-to-digital converter is designed in this paper in order to meet the accuracy requirement of analog to digital signal conversion in the area of high-frequency and low-voltage seismic wave. In the analog part, a second-order Σ-Δ modulator is used to realize oversampling and...

A Novel Miniaturized Vivaldi Antenna Using Resonant Structure For Ultra-Wideband Applications

Dongdong Geng, Deqiang Yang, Jiafeng Qu, Hua Xiao
A Novel Miniaturized Vivaldi Antenna utilizing resonant structure to extend the low-end bandwidth limitation is presented in this paper. The low-end bandwidth limitation of the proposed antenna has extended to 2.45 GHz from the original 3.07 GHz. In addition, the gain of the proposed modified antenna...

Light Touch Power Supply Switch Using For Portable Device

Zhao Liangliang, Hao Shaojie, Sun Jiawen, Zhang Feng, Zhou Hao, Han Junhui
With the development of science and technology, modern electronic products are becoming more and more lightweight, and tend to miniaturization. Switch the equipment also put forward higher requirements, the use of light touch switch to replace the traditional mechanical switch has become a trend, that...

Study Of On-Line Inspection Method Of Oversize And High Precision Bearing

Zhuangya Zhang, Mingli Li, Xiangdong Chen, Yumin Bao
According to high precision and oversize bearing's characteristics of large size, heavy weight and high precision, on-line inspection method based on contact measuring method is proposed. This inspection method uses contact double rotation probe and separates rotation error of machine tool through error...

A Membrane-Type Acoustic Metamaterial With Self-Similar Structure

Yingxu Fan, Zhimin Xie, Yuhong Qie
The locally resonant membrane-type metamaterial has a unique feature of narrow frequency band-gaps where the waves can't propagate, therefore it would be not suitable for broadband noise reduction. To broaden the frequency band-gap, we proposed a self-similar structure with ring mass for the membrane-type...

A New Method Of VPN Based On LSP Technology

HaiJun Qing, ChaoXiang Liang, LiPing Chen
With the rapid development of mobile Internet and intelligent terminal, the demand of the remote access network is more intense than before. The virtual private network is a common solution to this problem, with its traditional technology realized by a security protocol and tunnel mechanism. But this...

Association Analysis Of Cyber-Attack Attribution Based On Threat Intelligence

Qiang Li, Zeming Yang, Zhengwei Jiang, Baoxu Liu, Yuxia Fu
This paper presented an association analysis method in cyber-attack attribution based on threat intelligence. The method used the local advantage model to analyse the data related to threat intelligence in cyber-attack attribution by combining the intrusion kill chains model and F2T2EA model. Then, this...

Research On Government Websites Information Security Regulatory Mechanism And Countermeasure

Yu Yao, Runze Gao
There are many hazards such as Trojans, back doors and other attack means all the time threatening the development of government websites. This paper firstly collects the latest data to introduce the grim situation of information security faced by the government websites in our country. Secondly, this...