Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science

Session: Computer

77 articles
Proceedings Article

A Human Body Posture Identification Algorithm Based on Kinect

Tong Wang, Xiaoliang Liu, Meng Wang, Tongyao Wang
This study was performed to improve the computer identify of the human body posture more accurately during human-computer interaction. In order to get a better algorithm, the author applies Kinect for Xbox device, Hausdorff Distance theory and Joint Angle measurement method to identify the human body...
Proceedings Article

Design and Realization of Ancient Fabric Information System Based on SSH

Feng Zheng, Senlin Zhang, Meiqin Liu, Zhen Fan
Ancient fabrics are of high importance to the modern fabric industry, and have attracted large amounts of amateurs. Therefore, they should be protected properly while accessible. In order to solve the problem, this paper designed and implemented a system to provide services for ancient fabric managers,...
Proceedings Article

Time Delayed Feedback Control of Internet Congestion Control Model with Compound TCP under RED

Han Wang, Dawei Ding, Tianren Cao, Rui Sun
This paper is concerned with controlling of chaotic behavior in Internet congestion control model with Compound TCP under RED. Compound TCP (CTCP) is currently the default transport layer protocol in the Windows operating system. Firstly, this paper briefly analyzes the nonlinear dynamics of the CTCP...
Proceedings Article

Schedulability Analysis of Fixed Priority Systems with Scheduling Overheads

Yanfeng Zhai, Fengxiang Zhang
In this paper, the author extends the traditional exact schedulability analysis for fixed priority (FP) preemptive scheduling by taking into account the extra scheduling overhead that may be induced by context switching. Then the author develops a necessary and sufficient scehdulability test for fixed...
Proceedings Article

Building A SMP2-based Operational Effectiveness Simulation Model Framework for UAV Systems

Ning Zhu, Xiaobo Li, Yonglin Lei, Yifan Zhu
Operational effectiveness assessment is one of the most important warrants for UAV Systems demonstration and design, and simulation is a key method. Operational effectiveness simulation relies on large quantity of simulation applications, and composable modeling is an approach to support rapid development...
Proceedings Article

Study of Path Planning Algorithm Based on Fuzzy Logic

Dianhua Zhang, Yimin Chen, Chen Huang, Mingke Gao
The path planning problem is an important problem in the research area of robot, games and group animation. However, the current path planning algorithms don't consider practical problems such as roughness, gradient, and barrier height etc. This paper shows a 2.5-dimensional terrain grid which can reduce...
Proceedings Article

A Three-dimensional Scene Simulation System for Evaluating Textures of Fabrics

Ruyuan Dun, Huilin Yao, Zhen Fan, Senlin Zhang
In this paper, a method of displaying 3D model on the web end based on Three.js library which can simulate the wrinkle and distortion of fabric and support the replacement and modification of texture is realized. The visual effect of a specific fabric texture can be evaluated after texture mapping from...
Proceedings Article

Modeling for Comment Trust Recommendation Based on Collaborative Filtering

Xinkao Liao, Lisheng Wang, Xiaojian Liu, Xiaojie Xu
Asymmetry in the parties of the transaction leads to uncertainty in the transaction. Trust problem has been one of the bottlenecks restricting the development of e-commerce. For e-commerce product review issues, comment trust recommendation model was proposed based on comment credibility degree and user...
Proceedings Article

Dynamic Characteristics of Fan Impeller Combines C Ross-flow

Wenmin Liu, Housen Yang, Xinwen Luo, Xingmei Dai
Cross-flow fan with its large volume, the export flow distribution uniformity and other advantages, has been widely used in joint harvesting. In this paper, a type of grain combines cross-flow fan be analyzed, using ANSYS Workbech finite element analysis platform, and the flow field of the cross flow...
Proceedings Article

Vibration Characteristic Analysis of Axial Fan Shell Based on ANSYS Workbench

Lichun Gu, Lichang Chen, Zhiqun Guo
Axial fans with the advantages of its simple structure, large amount of wind, widely used in agriculture that respect, but agricultural cross flow fan in the size range of big, prone to resonance problems. In this paper, to a certain type of agricultural pipeline fixed shaft flow fan shell as the research...
Proceedings Article

Analysis of Bottom Frame Structure on Seismic Performance

Hongyu Deng, Baitao Sun
In order to study the seismic performance of masonry buildings with frame and seismic-wall in the lower stories, a serious damaged bottom frame structure in Wenchuan earthquake was taken as the research object in this paper. The eccentricity of each layer of the structure was calculated, and seismic...
Proceedings Article

Numerical Simulation and Theoretical Modeling of Transverse Compressive Failure in Fiber Reinforced Composite Materials

Takeaki Nadabe
This study investigates numerical simulation and theoretical modeling of transverse compressive failure in fiber reinforced composite materials. Firstly, numerical simulation of transverse compressive failure is conducted in order to understand the physical mechanism of the transverse compressive failure....
Proceedings Article

A Smart Configuration Mechanism for Ontogenetic Hardware

Nantian Wang, Yue Li, Yanling Qian, Xiubin Liu
Ontogenetic hardware, as a branch of bio-inspired hardware, mainly refers that the hardware can develop based on some basic blocks and genetic material similar to the development of cellular organism. An ontogenetic artificial organism is composed of organelles, each of which consists of a cluster of...
Proceedings Article

The Grinding Simulation Analysis of Rake Face of Ball End Mill’s Circumference Blade

Shuai Li
The ball end mill, as an important tool to process the complex three-dimensional curved surface, is helpful to achieve high efficiency and high precision machining when was used with nc machine tool, which is highly demanded in the manufacturing factory. Based on the grinding principle of ball end mill,...
Proceedings Article

Human-Computer Interaction-Based Foreign Language Instruction

Chunying Zhang, Weihong Zhang
To describe a best and effective teaching model at the higher education level, the current situation of foreign language instruction in colleges and universities in China is presented first, then the feasibility and advantages of human-computer interaction-based foreign language teaching model are elaborated....
Proceedings Article

Indoor Positioning Algorithm of Wireless Sensor Based on RSSI Ranging Correction

Junjie Zhou, Qinqin Shi
With the growing popularity of the application of wireless sensor network, the demand to the accuracy of wireless network is increasingly strict, the traditional location algorithm has been difficult to fulfill the needs of practicable applications. This paper proposes a new RSSI positioning algorithm...
Proceedings Article

A GBVS Based Object Recognition Algorithm

Faxu Wang, Xiaonian Wang, Zhuping Wang, Jin Zhu
Object recognition has always been regarded as hot research area in image field; especially there are many research difficulties of recognition in multiple objects scene. This paper puts forward an object recognition algorithm based on hierarchical decomposition GBVS. Firstly, get saliency map of current...
Proceedings Article

Global Dilemma and Contemporary Educational Reform

Naizhu Huang, Lijuan Ye
With the rapid development of the global economy and technology, the global connections and interactions become even higher, and globalization has become a consensus. In the meantime of creating wealth, globalization also brings dilemma to human beings, and poses a threat to sustainable human development....
Proceedings Article

Power System Reconfiguration Using Graph Trace Analysis and Multi-agent System

Anli Shang, Shengmao Yan
This paper presents a multi-agent system that performs shipboard power system reconfiguration. If shipboard electric power supply interruption is caused by a fault, it is important to restore the power system as soon as possible to a target network configuration after the fault. The system views the...
Proceedings Article

Research on Control Structure of Controllable Network System

Zengguang Wang, Liyun Chen, Yu Lu, Wenxin Qiao
The basic control structures and their structural characteristics of the controllable network system are proposed based on the introduction of controllable network. The basic control structures consist of the centralized control structure, the decentralized control structure and the hierarchical control...
Proceedings Article

Study on Pre-stressed Concrete Grain Silo Based on Non- cohesive Properties

Hairong Huang, Runrun Dong
For the design of grain silo, the amount of steel bar used in structure will be very large. And with the height and diameter of bulkhead increasing, there will be a serious problem that the requirement of crack will not meet the demand according to the code even though using much more steel bar. Using...
Proceedings Article

Research on Tibetan News Sites’ Web Crawler and Search Engine

Zhiqiang Han, Guixian Xu, Wei Sun
In this paper, researchers detailedly introduce the features of Tibetan language and related technologies that researchers use to deal with Tibetan news web pages with computers. To get the content of the Tibetan news, researchers used web crawler to download Tibetan news pages which are the bases of...
Proceedings Article

Decoding and Conversion of TFD Logging Data Format Based on Java

Mingxing Liang, Peipei Zhang
Matrix logging system is widely used in coal-bed methane (CBM) reservoir. TFD is the extension of Matrix output file which is a structured format comprised a mix of ASCII and binary. WellCAD is the only logging software which can be used because of the confidentiality format, so that the processing and...
Proceedings Article

A General Direct Arc Interpolation Method

Zefan Cai, Daoping Huang
Circular interpolation methods are mostly introduced based on CNC machines, and point by point judgment methods are used to determine the end of the arcs, but these methods are less common and less efficient. This paper introduces a universal direct arc interpolation method. Using this method, all the...
Proceedings Article

A Method of On-Line Signature Verification with Consistent Spectral Features

Xinghua Xia, Fangjun Luan, Zhili Chen
Consistency analysis of signature features has significant effect on the performance and robustness of on-line signature verification. In order to improve the performance of on-line signature verification, this paper proposes a method of on-line signature verification based on spectral consistent features,...
Proceedings Article

Study on Application and Design of Honeypot Technology

Tian Bin, Changhong Yu
This paper introduces the history of honeypot technology and its classification according to different criterions, and then gives the design principles of honeypot. The building principles of application and investigation honeypots are explained and a typical honeypot –DTK is given. Finally, this paper...
Proceedings Article

UTAUT Theory based User Acceptance Model of the Internet Financial and Empirical Study

Yan Lu, Bing Hu
Exploring the key factors that influence users to accept the internet financial can help to promote the development of the internet financial business. In this paper, based on UTAUT (the Unified Theory of Acceptance and Use of Technology) theory, the author constructs the internet financial business...
Proceedings Article

The Solution of Single Index Portfolio Selection Model with Transaction Cost by Genetic Algorithm

Xinling Feng, Cuiqing Zhu, Sheng He
The key to the portfolio optimization problem is to achieve effective income risk allocation. Using single index model brings forward portfolio model with transaction costs and reduces the calculation of the investment portfolio covariance matrix. At the same time, use genetic algorithm to solve objective...
Proceedings Article

Study on Management System of Chinese Software Outsourcing

Wengeng Shi
Chinese government is rapidly developing software outsourcing, but the backwardness of the management system has become a major constraint to optimize its industrial structure of the predicament. This article is discussing about provincial software outsourcing from the current level of management system,...
Proceedings Article

A Multi-source Data Oriented Framework of Vehicle Monitoring System

Shuaiqi Liang, Yuntao Qian, Hao Liu, Zhiqiang Wei
A framework for monitoring system of vehicles is introduced in this paper. The system is applied for real-time monitoring of vehicles. It mainly includes vehicular hardware, remote servers and application terminals. The hardware part consists of various sensors, MCU chips, interface converting modules...
Proceedings Article

Research on Evaluation Method of Contiguous Sense of Linen Fabrics

Caiyuan Kuang
(1) Objective: To test the feasibility of the proposed method that evaluates the contiguous sense of linen fabrics by using experimental paradigm of behavioral experiment. (2) Methods: The experimental program is written with E-Prime 2.0, while the expression of the experimental stimulus material is...
Proceedings Article

Analysis of Security Routing Protocol for Wireless Sensor Networks

Yi Wang, Xue Bai, Zhenjie Cao
Wireless sensor network routing protocol security objective is to ensure data integrity, authentication and availability. In this paper, the characteristics and applications of routing protocols for wireless sensor networks are analyzed. This paper presents the analysis of security routing protocol for...
Proceedings Article

Chinese Higher Education in the Time of MOOCs

Chunying Zhang, Weihong Zhang
The present study intended to search for a way for Chinese higher education to have a better development with the help of MOOCs and survive in the time of MOOCs. This study gave a general introduction to MOOCs and described the global development of MOOCs, pointing out the strong points of MOOCs and...
Proceedings Article

Research on Service System of Medical Library Technology based on Multimedia Data Mining

Haitao Li
Objective: This paper aims to solve the current problems faced by university library, which is raised with the rise of the development of network and digital library. Methods: This paper first introduces the development of libraries in Medical College and University in China. Then it analyzes the current...
Proceedings Article

Design and Implementation of Mobile Commerce Security System Based on SMS

Yan Li, Lan Bai
With the popularity of mobile communication technology and mobile terminals, a new e-commerce model---mobile commerce emerges as time requires which has become the focus of e-commerce development research. M-commerce develops rapidly nowadays, yet its security problem has become an important factor which...
Proceedings Article

An Algorithm for Fairing Data Points Based on Genetic Algorithm

Zizhi Lin, Ding Yun, Sihui Shu, Mincheng Hu
An algorithm for faring data points is presented in the paper. In this algorithm, researchers split data point set into several smaller point sets according to the number of data point set and features points of the point set, then genetic algorithm will be applied to fair each small point set. Details...
Proceedings Article

Study on Wireless Sensor Network Services Model in Basis of IPv6

Jianlan Liu
Wireless sensor network is an intelligent sensor network system collected with data acquisition, data processing and communication in one, IPv6, as the core protocol of next-generation internet, has ample of address space, address auto-configuration and mandatory safety measures, and provides the feasibility...
Proceedings Article

Research of Safety Hazards of Online Personal Information and Protective Measures

Yanjie Zhou, Li Ma, Min Wen
With the popularity of the Internet in the lives, while researchers are enjoying the convenience brought by the Internet, researchers may also find that the personal information are becoming increasingly vulnerable to theft, and then is quickly spread and abused, causing a serious violation to the privacy....
Proceedings Article

Design and Study of Logistics Management System Based on E-Commerce

Li Zhu, Lan Bai
This paper carries out analysis from the development situation of logistics management which highlights the process, technique of electronic commerce logistics, logistics management and techniques, logistics system transit lines. Besides, this paper specifically explains relevant software techniques...
Proceedings Article

Self-destructing Data Method Based on Privacy Cloud

Hao Wu, Xiao Fu, Zhijian Wang, Yu Wang
Cloud Data Security is gaining more and more attention from enterprises and users. Email security may be the most highlighted, since the past and archived cloud data is under risk of compromising privacy. However, the traditional cryptology method cannot meet the security demand in privacy protection....
Proceedings Article

Computer Numerical Simulation of Sluice Structure on Deep Overburden Foundation

Xuan Wang, Weiping Hu, Xuanmao Peng
This paper adopts the space combination finite element method to calculate the whole displacement and stress of chamber structure and foundation, calculates the overall stability against sliding and anti-floating stability safety coefficient of the lock chamber structure via the rigid body limit equilibrium...
Proceedings Article

A Collaborative Filtering Algorithm Combined with User Habits for Rating

Min Li, Kai Zheng
Collaborative filtering is one of the most successful and widely used technologies in personalized recommendation systems. This paper proposed a novel algorithm combined with user habits for rating as the conventional method leads lower accuracy relatively. In order to reveal the hidden relationship...
Proceedings Article

Set Cooperative Cache for Virtual Machine Relocation

Cong Hu
With cloud computing models gaining significant momentum, data centers are increasingly employing virtualization as a means to support a large number of heterogeneous workloads running simultaneously on a multicore server. In such environments, contention for shared cache space can have a destructive...
Proceedings Article

A Lifecycle Controlling Method of Documents Based on Deadline and Access Times

Jiaqi Yang, Zhijian Wang, Xiao Fu, Yu Wang
With the growing popularity of the online-service in cloud, users' data security protection has gradually become a new challenge. After one user sends his documents to the other, the files are no longer under the user's control. Once he needs the receiver to destroy data, he cannot ensure that the data...
Proceedings Article

Model the P2P Attack in Computer Networks

Wei Wang, Wenhong Zhao
To analyze the distributed attack actions in computer networks, different models are discussed. Firstly, the Hybrid P2P, Pure P2P and Super P2P structures of attack are presented. The, the broadcast mechanisms of every structure are introduced. The attack methods mainly focus on the index poisoning and...
Proceedings Article

Model the Flow Control Attack in Wireless Networks

Wei Wang, Wenhong Zhao
To analyze the attack on mechanisms of confliction in wireless networks, a new method based on the system stability is introduced. Firstly, the theoretic basis for flow control attacks is discussed, which shows that the flow control attack may destroy data stream and network system at a low speed. Then,...
Proceedings Article

Low Electromagnetic Noise Squirrel Cage Motor Analysis and Optimization of Slot Coordination

Changqi Liu, Yufa Xu, Gong Pu, Jinquan Feng
The electromagnetic noise of motor is mainly caused by the main magnetic fluxing into the air gap along the radial direction, generating radial force in the tooth of stator and rotor, which causes electromagnetic vibration and noise. The paper analyzes the theory of the production principle of electromagnetic...
Proceedings Article

BPM-driven Educational Informationization Technology

Xiaohui Gao, Zhiqiang Liu, Yao Zhao, Zhi Chen, Ang Li, Bo Xu, Bo Shen
Education informationization is an important part of the reform and development of education. Based on the re-usable and executable “task” and “sub-process” in BPMN elements, a supporting platform for education information system driven by Business Processes is proposed in this paper to meet the characteristics...
Proceedings Article

Substation Remote Viewing Image Mosaic based on Canny Operator and Harris Corner Detection

Yufan Wang
In order to improve the effect of substation operation remote video monitoring system, a new image mosaic method based on Canny operator and Harris corner detection is presented. Firstly, the edge feature points from two images are extracted by Canny edge detection; secondly, the corner feature points...
Proceedings Article

Application of Image Compression Based on Discrete Cosine Transform

Hongmei Zhang, Zhigao Zhang, Zhili Pei
Image compression encoding is one of the key techniques in modern multimedia and communication field. DCT is one of the most widely used in image compression processing. It uses the symmetry of the Fourier transform and performs a folding operation on the boundary of the image. It transforms the image...
Proceedings Article

Design and Implementation of Image Processing System Based on MATLAB

Hongmei Zhang, Zhigao Zhang, Zhili Pei
Digital Image Processing can be mentioned as computer image processing. It refers to a process within which image signals are transformed into digital ones and computers will be applied to the process of transformation so as to generate images that should be received by human vision or receiving devices...
Proceedings Article

Information Sharing System of Ad Hoc Networks: Based on Data Access Service

Bo Su, Junhan Yang, Bin Wang, Hao Wu
Based on high speed Ad hoc networks, researchers build a kind of information sharing system using data access service for a variety of operating system and different types of hardware source. Information sharing system using service-oriented software architecture that supports localization of operating...
Proceedings Article

Rock Casting Slice Image Based 3D Digital Core Reconstruction

Na Liu, Wei Liu, Guojian Cheng, Xinjian Qiang
For the reason of high costing on 3D core reconstruction by using CT scanning method, a new method named 3D digital core reconstruction based on rock casting slice images under optical microscope is proposed in this paper. Firstly, the collected casting slice images are processed to acquire the reconstructed...
Proceedings Article

Construction of Personalized Expert Yellow Page based on Fuzzy Linguistic Method

Ming Li, Dan Xu, Yanchun Zhu
Expert yellow page is the knowledge map of experts. When selecting experts for consulting, besides expertise, learners take personalized factors such as trust, background and familiarity into consideration. In order to fulfill personalized requirements of learners, the construction approach of personalized...
Proceedings Article

Stability Analysis and Treatment Measure of the Mining Stope Slope

Qinglan Qi, Xie Shaoxiong
This Based on the stope in HeBei province, the sliding failure mode and treatment measure after the excavation of the stope is discussed. The RMR methods and the GSI methods are both used to estimate the mechanical parameters of the rock mass, and the smaller parameters are selected for the stability...
Proceedings Article

The Research on IoT System Construction Method to Support Collaborative Awareness Service

Huaizhou Yang, Liumei Zhang
The current IoT (Internet of Things) systems lack the ability of collaborative awareness. Therefore, an IoT system architecture supporting collaborative awareness service is presented. First, in order to hide the heterogeneous factors of IoT, a SOA (Service-Oriented Architecture) based IoT middleware...
Proceedings Article

Research on Automatic Test of Rulestream Function Based on IBM RFT

Jian Jiang, Xiaolong Shi, Wenlu Qi, Canglong Chen
How to improve the efficiency of software testing to ensure software quality and thus shorten the period of the software development, has become a very urgent task needing to handle. On the basis of the study of automated testing technology, and combined with the existed software system, this paper employs...
Proceedings Article

Improving Suffix Tree Clustering Algorithm for Web Documents

Yan Zhuang, Youguang Chen
Web document clustering results can help users quickly locate the information they need among the results search engines returned. According to the characteristics of the suffix tree structure and the flaws of similarity calculation in STC algorithm's cluster merging, this paper proposes an improved...
Proceedings Article

Workflow Model with Version Change Based on Task-relationships

Xuezi Yang, Xiaodong Zhu, Yuanning Liu, Fei He, Siyuan Chen
The version change, which cannot be considered as an independent process, is a fundamental factor for designing the workflow model. Due to that the traditional workflow model is unidirectional, it could not identify the range of version change and restart the tasks which are need to be changed. This...
Proceedings Article

Detection of Object Carried Using Spatio-temporal Pattern and Local Directional Pattern Descriptor

Han Su, Wenjie Wang
A novel method of carried object detection based on silhouette width and spatio-temporal analysis is proposed in this paper. The width vector of silhouette is calculated to characterize the spatial feature and the width image is adopted to preserve the temporal features. The width image which is considered...
Proceedings Article

Construction of “O2O Type” Organic Ecological Learning System Based on MOOC

Jing Wang
This paper tries to combine the flexible, free and rich learning resources and environment of the Internet with the unique cultural and spiritual atmosphere of colleges and universities in the era context with the prospering development of the Internet technology, striving to make the best of both sides...
Proceedings Article

A New Method for Numerical Calculation of Pressure Gradient of Unsteady Flow of a Viscoelastic Fluid in Eccentric Annulus

Nan Li
Finite Volume Method (FVM) was used to discrete governing equations of unsteady flow of second-order fluid with variable coefficients in eccentric annulus with the inner cylinder reciprocating axially, in which a fully implicit scheme was taken on time integral, and Alternating Direction Implicit (ADI)...
Proceedings Article

Analysis for the Indicator Light Indicating Abnormality of the Electronic Programmable Controller

Desheng Huang, Guopeng Deng, Hengxin Cai
During installing the seat on fighter, the electronic programmable controller of the seat can receive the atmosphere data, but the indicator light indicates abnormally. The phenomenon is considered, the atmos­phere data signal from the electronic programmable controller is analyzed and the cause is gotten...
Proceedings Article

Analysis for the Fault Caused by Two Different Formats of Bus Data Delivery

Rui Shen, Hengxin Cai
The electronic programmable controller of a fighter can receive the RS429 signal from atmospheric system, meanwhile it can transform the signal to RS422, but the indicator light indicates abnormal. The fault caused by the electronic programmable controller is found when it transforms the signal from...
Proceedings Article

Electromagnetic Protection of Airborne Data Transmission System

Zhenwei Chen
The data transmission of aircraft data link is always interfered by other electronics or electrical equipments, which easily cause a glittering array of data error and effect the normal operation of airborne products. This paper analyzes possible electromagnetic interference of the airborne data system...
Proceedings Article

Research on the Dimension Management of Computer Lab

Ji Meng
With the increase of the business which computer labs undertake, the conflicts between its use and management are increasingly acute. It becomes an important issue to realize scientific management of laboratory. By analyzing the necessity and significance of scientific management of the laboratory, researchers...
Proceedings Article

The Research on Network Measurement

Wenju Gao, Yueou Ren, Hongbo Yu, Qiuyan Li
Nowadays, the network and communication technology are developing rapidly, while the network Quality of Service (QoS) are often not satisfied, because of the overburdened network and the overloaded routers and switches. Therefore, regular measurement and evaluation to the relative parameters and indexes...
Proceedings Article

Routing Technology of Publish/Subscribe System Based on Subscription Partition

Liuyang Jia, Zhiwen Zou
A routing algorithm based on subscription partition of publish/subscribe is presented in this paper. This algorithm achieves the clustering partition of subscription by the common attribute of subscription predicates’ distribution. Each agent manages different subset of the subscription. It greatly reduced...
Proceedings Article

The Method and Its Application of Project Management Modeling in Whole Life Cycle

Huan Zhao, Xi Chen
Project management is the application of knowledge, skills, tools and techniques to project activities, in order to meet the project requirements. As long as the project requirements become more complex and volatile in the university, the ability to optimize and integrate costs, schedule, effort and...
Proceedings Article

Context-Awareness Technology for Intelligent Sensor Networks Based on Active Mechanism

Jinhui Chen
With the emergence of intelligent sensors which have certain kinds of computing and wireless communication ability, more and more Internet of Things applications can be implemented to sense, judge and react locally according to the environment and its changes. However, mechanisms that can support context-aware...
Proceedings Article

The Study on the Superposition of Mechanical Wave

Jie Wang, Lina Guo, Yingji He
The mechanical wave is emphases and difficult content in physical university course. Using the plane simple harmonic wave as an example, the physical meaning of the wave equation is clarified; the phase difference between the two particles in medium of coherent wave sources is also discussed. Analyzed...
Proceedings Article

A Publish/Subscribe-based Programming Language for Sensor Networks

Biao Dong, Jinhui Chen
Sensor networks constitute an efficient solution for gathering data on such events and feeding the evacuation simulation. Sensor networks software(SNS) is considered as a new software paradigm in the sensor networks environment, with the characteristics of cooperation and flexibility. SNS brings challenges...
Proceedings Article

Design and Simulation of A Rectifier Controller Based on Fuzzy PID

Yunfeng Ni, Junliang Zhang
With the disadvantages of large time-varying, non-linearity and uncertainty, it is hard to establish a precise mathematical model for the current DC thyristor rectifier equipment load which results in conventional PID control performance degradation. A control strategy based on fuzzy PID advanced control...
Proceedings Article

Some Discussion Based on My School Software Engineering Profession Excellence Program Implementation

Yihe Liu
The author links to unit's reality, analyzed in my school software engineering profession excellence program implementation to be urgently needed the solution the question. The possibility of the implementation of the order form training mode of the software engineering profession excellence program,...
Proceedings Article

A New Method of View-Invariant Human Activity Recognition

Han Su, Wenjie Wang
We present a new method to recognize human activity under uncertain view. The activity width image which is extracted from the sequence of silhouette is used to represent the activity features. It converts the spatial and temporal pattern to a grey-level image. View difference causes the deformation...
Proceedings Article

Methods of Alignment for On-Line Signature Verification

Xinghua Xia, Fangjun Luan, Shoujin Wang, Dafang Yang
Size, location and rotation angle of on-line handwritten signature will have effects on the performance of verification. Methods of alignment for on-line signature verification are proposed in this paper, the size, location and rotation angle of test and reference signatures are aligned effectively to...
Proceedings Article

Object Search via Random Context

Wei Liu, Yunxing Ruan, Xia Cai
Accurately object searching plays an important role in computer vision. Retrieving and locating target objects in images are object searching’s two sub-tasks. Aiming to promote the precision and recall of object searching, selecting appropriate image representation methods is the core issues. The representation...