Proceedings of the 2015 International Conference on Materials Engineering and Information Technology Applications

Session: Information Technology and Applications

149 articles
Proceedings Article

The Research of Lane Marker Detection Algorithm Based on Inverse Perspective Mapping

Jinghong Xu, Changsheng Cheng, Yan Wan
This paper presents a robust and fast algorithm for lane marker detection. It is based on generating an inverse perspective mapping image of the road, computing line abstracted regions and the class points from IPM image, which is followed by a post processing step using rectangular approximation to...
Proceedings Article

Study on Water Engineering based on Mathematical Models

Guanqun Zhang
Fresh water is the limiting constraint for development in much of the world. As we know, China is a water-shortage country, where the water available for each person is only a quarter of the world’s average level. Author put forward five water strategies to help the government meeting the water demands...
Proceedings Article

Research on Corn Cost and Benefit in Heilongjiang Province Based on Grey Correlation Analysis

Ya Gao
Grey correlation model is adopted for analyzing corn output value per mu in Heilongjiang Province and influencing factors from 2006 to 2013 aiming at status quo of corn cost and benefit in Heilongjiang Province. Results showed that influencing factors of corn output value per mu can be sequenced as follows...
Proceedings Article

The Analysis and Design of the Object-oriented System

Xin Li
The object-oriented system analysis and design (OOA and OOD) is an effective technology widely used by the modern software enterprise, the OOAD method requires specified in the design to map the real world problem domain objects and entities. The object-oriented analysis is found in problem areas and...
Proceedings Article

Legal Protection of Cyberspace Infrastructure and Information Safety in China -- A Response to Cyberspace Challenges to China’s National Security

Hongyu Fu
In recent years, with the standardization of key infrastructure control system, intelligent, network development, the network attacks against the critical infrastructure is increasing. Electricity, petrochemical, rail transportation and other key infrastructure involving the national economy and the...
Proceedings Article

Application of Petrel Software in Reserve Estimation in Xinli-Xinbei Oilfield, Jilin Province, China

Songze Li, Wangshui Hu
Volumetric estimates provide a valuable check on the estimates derived from material balance and decline analysis methods. Xinli-Xinbei oilfield, Jilin Province-China is an ascertained and developed oilfield. It is affluent in geological reserves, and has greatly development potentiality. Based on the...
Proceedings Article

The Evaluation of Parameter M in the Big M Method of Linear Programming

Zhenzhen Song
In the simplex method of linear programming, there is a big M method (the penalty factor method) for finding an initial feasible basis. The current textbooks of operations research only explain that the big M method is efficient when M is large enough, and never give precise evaluation to the parameter...
Proceedings Article

A Novel QR Code and mobile phone based Authentication protocol via Bluetooth

Sha Liu, Shuhua Zhu
Password based authentication schemes are widely used in our daily life when we log into websites. However, there are varieties of problems with the simple methods, including susceptibility to unintentional exposure via phishing and cross-sites password reuse. We present a novel mobile phone based authentication...
Proceedings Article

Design principles of mobile products based APP

Zhenbo Qu, Tianguang Yu
With the advent of information technology era, more APP into people's daily lives. This article choose its design principles as the starting point of several different dimensions, from product UI, interactive, functional deployment, iterative, user experience, strategic planning and other aspects of...
Proceedings Article

Full-parallax Colorful 3D Imaging Using Orthogonal-stacked Lenticular Sheets and Computer-generated Stereogram

Yuguo Wang
This paper proposes a true-color full-parallax three-dimensional (3D) imaging method based on OLS. The optical imaging effects of OLsS and micro-lens array (MLA) are analyzed using optics simulation software, and the OLS is used to realize the stereoscopic display instead of MLA. 2D multi-view images...
Proceedings Article

Modeling Analysis of Advanced Persistent Threat–Based on UML

Bin Dong, Wentao Zhao, Jianglong Song
This paper reveals the inherent features of advanced persistent threat (APT), and summarizes its general attacking processes, attacking means and methods. The attacking steps model of APT which is based on UML effectively describes the application principles of APT and its behavior features, mode features...
Proceedings Article

Study on Strategy of Cloud Computing Data Storage Security

Sha Liu, Shuhua Zhu
With the popularization and application of cloud computing services, cloud storage has become a typical representative of cloud computing services. But meanwhile, we must also recognize that the problem of storing data in a cloud environment can be brought to us. In this paper, we propose a cloud data...
Proceedings Article

Functions and General Structure of Fault Diagnosis System Software

Peidong Du, Fuchao Liu, Jingjing Zheng, Qingling Wang
Referred to in the fault diagnosis of power grid mainly refers to the transmission network and transmission network bears an important task of power transmission, power plant and terminal user ties, is one of the most important parts of the power system. Long term exposure to natural environment in the...
Proceedings Article

The Design and Implementation of the Project Accounting System

Yuwen Liu
In this paper, in order to meet the management and business requirements of project management in the engineering company, the project accounting system is developed. While designing the system, we absorb the advantages of the rules for the preparation of accounting subject divide the project accounting...
Proceedings Article

Study on Mobile Large Data Storage Security in Cloud Computing Environment

Xianwei Li
In this thesis, data security in cloud computing is regarded as the research object. First of all, the definitions, model, structure, application, research organization and related knowledge of cloud computing is introduced. Then, the data security assurance methods which used in this thesis including...
Proceedings Article

Design of Data Secure Storage for Cloud Compute ring

Wenhu Yang
With its great power to integrate resources, Cloud Computing can offer individuals and organizations the convenient and on-demand computing and storage service. As the increasingly influence on everyday life, its structural safety problem emerges. Due to the loss of physical control towards data, the...
Proceedings Article

Technical Implementation of Visual Steganography in Structured Document based on CSS

Zhijie Liu
This paper addressed the visual redundancy of typeface in a structured document. Achieving information embeds through modifying the appearance of words by CSS. The idea combines encryption and hiding, has widely application. Meanwhile it has high density and safety in information hiding and is easy to...
Proceedings Article

Cloud Learning Platform Design and Implementation Under Wed2.0 Environment

Changcheng Wu, Hongte Chen
Taking education as an example of discovery learning community to explore web2.0 environment design and build cloud learning platform. Based on the principles of SLL design, display SLL cloud learning platform system architecture, technology adoption Wordpress2.7 for supporting, relying on the "mix"...
Proceedings Article

Mobile Data Management Structure Design based on Mobile Database

Xin Hu
The mobile database is using SQL Server CE mobile database engine. Data conversion layer provides backup restore function (fully backup and restore, table with import and export) of SQL Server CE' local database, and to provide similar interface functions of storage procedure (it include: function of...
Proceedings Article

Research on Hierarchical Storage System based on Wireless Mesh Network

Xin Hu
This thesis according to this hot technique of Wireless Mesh Network day by day mature background, on the foundation of comprehending the basic theories of Wireless Mesh Network, we emphasizes a rightness how to keep enough bandwidth and band rate in much jump of the Mesh environment in certain analysis...
Proceedings Article

Research on Translation Based on Semantic Triangle Theory

Junming Xiao
Semantic triangle theory is one of the important theories of linguistics. This paper begins with a brief introduction to the connotation of semantic triangle theory, and then analyzes the concrete thinking process of translators in the translation process and the reading process of readers, finally gives...
Proceedings Article

Application of Physical System Simulation Technology in volleyball Multimedia Courseware

Yipai Jiang, Yanxiu Wang
In this paper, the characteristics of Volleyball were demonstrated and analyzed, which shows professional, normative and contingency Volleyball Volleyball is tremendous room for growth, because volleyball with flexible teaching diversity, therefore multimedia technology into the volleyball classroom...
Proceedings Article

Research and Application of Computer Network Remote Control System

Yuling Zhang
With the rapid development of computer network applications and the growing popularity of computer technology, computer network remote control technology widely used. Users unrestricted geographical conditions, different locations via the network control network devices, network devices to obtain information....
Proceedings Article

Image Registration Using SIFT and Canonical Correlation Analysis

Wei Zhao, Zheng Tian, Lijuan Yang, Weidong Yan, Jinhuan Wen
To improve the quality of SIFT feature matching, a mismatches removal method is proposed based on the collinearity property of the canonical correlation features. The influence of each match on the collineartiy degree is analyzed to find false matches. Firstly, a putative set of matches is obtained based...
Proceedings Article

A Multi-modulus Blind Equalization Algorithm Based on Memetic Algorithm

Yecai Guo, Xing Wu, Miaoqing Zhang
In view of slow convergence speed, large steady mean square error (MSE), and existing blind phase for the constant modulus blind equalization algorithm(CMA), a multi-modulus blind equalization algorithm based on memetic algorithm(MA-MMA) is proposed, which combines the basic idea of intelligent optimization...
Proceedings Article

An Orthogonal Wavelet Transform Multi-modulus Blind Equalization Algorithm Based on Tabu Search DNA Genetic Optimization Algorithm

Yecai Guo, Lu Lu, Binglong Zhang
For the disadvantages of orthogonal wavelet transform multi-modulus blind equalization algorithm(WTMMA), such as slow convergence rate, large mean square error, and immerging in partial minimum easily, an orthogonal wavelet transform multi-modulus blind equalization algorithm based on Tabu search DNA...
Proceedings Article

Effect of main part size and disparity distribution on visual comfort of Stereoscopic images

Zhibin Su, Fangju Zou, Ren Hui
Visual comfort is one of the important indexes to evaluate the image quality and viewing experience in the process of viewing stereoscopic video and images. This paper mainly investigated the effect of the main part size and disparity distribution type of stereoscopic images on visual comfort through...
Proceedings Article

Research on Scheduling Emergency Supplies Featuring Hierarchical Linkage Based on Genetic Algorithm

Feihu Hu, Weihao Bai, Chaohui Tian
This paper presents the hierarchical linkage scheduling emergency supplies problem. A mathematical description is provided and a model of the hierarchical scheduling emergency supplies with multiple supplies and multiple vehicles is formed in order to acquire the shortest scheduling time and the lowest...
Proceedings Article

A Multiple Tent Maps Based Image Encryption Scheme with Plain-image Dependent Permutation and Diffusion

Ruisong Ye, Yuting Xi, Ming Ye, Xiaoyun Shi, Wenhao Ye
A novel multiple tent maps based image encryption scheme with plain-image content dependent permutation-diffusion mechanism is proposed. The permutation is realized by swapping the gray values at different part of the considered image; it is performed with the help of pseudo-random sequence yielded by...
Proceedings Article

Research on Three Typical Methods of Infrared Weak Small Targets Background Suppression under Cloud Background

Zhongmin LI, Guowei Zou, Lifei Mei
Background suppression of weak small targets in infrared image is the key of image tracking and monitoring, especially under the cloud background. In the area of image signal processing, there are a lot of background suppression methods can be used to image filter by combining the characteristics of...
Proceedings Article

Research on the Teaching Evaluation Model Based on BP Neural Network

Xi Zhang, Xianggen Gan, Ren Wu
Education evaluation has become increasingly important along with the deepening educational reform. Only through evaluation will the teachers further enhance their teaching methods and teaching level. Considering the many factors influencing the teachers, it is difficult to simply adopt one model to...
Proceedings Article

Region-Based Conditional Random Fields For Medical Image Labeling

Yan Yang
Concerning the high time complexity of medical image labeling in graph model, we proposed a region-based CRF method for medical image labeling. This method first over segmented the image into small homogeneous regions by using over-segmented method, and then the graphical model was constructed with regions...
Proceedings Article

The Energy Consumption Forecasting in China Based on ARIMA Model

Junwei Miao
China's energy consumption will continue to rise rapidly. It is necessary to forecast China's energy consumption to formulate energy and economic policy. This study establish a ARIMA model and forecast the energy consumption in future. The results show ARIMA model performs high prediction accuracy. It...
Proceedings Article

Research on Computer Network Optimization Model Based on Neural Network Algorithm

Yanhui Wang
The rapid development of computer networks is urgently need to improve and optimize the overall performance of the network.With the characteristics of large scale parallel processing and distributed information storage, Hopfield neural network has a unique advantage of associative memory and optimization....
Proceedings Article

The Design of Wireless Communication System Based on STC12+CC1101

Zhijian Yin, Kun Xiang, Wang Fan
Wireless data transmission in short distance is a kind of technology instead of cable, which is widely used in many current fields. And it solved the problem that it is difficult for cable wiring due to the limit of environment and condition. For the problem that the length of control command is different...
Proceedings Article

Design of Simulation Model on the Battlefield Environment

Jianli Zhang, Lin Zhang, Lijian JI, Zhongwei Guo
In order to implement the informatization under the condition of forces global training requirements, the paper constructed the basic process of the battlefield environment simulation model, including geographic simulation model, simulation models of meteorological and electromagnetic environment simulation...
Proceedings Article

A Low Complexity Subspace-Based Blind Channel Estimation For MIMO-OFDM

Yankui Zhang, Daming Wang, Song Chen
The current subspace-based blind channel estimation for MIMO-OFDM system has the problems of high complexity due to matrix decomposition. In this paper, we proposed an improved subspace-based channel estimation algorithm, which is based on the method of the permutations and combinations on the transceiver...
Proceedings Article

Algorithm Of Eye Location With Gray Projection And Hough Transform Based On ARM Platform

Caixia Liu
Image processing system based on ARM is a faster, smaller and more flexible application. Based on the analysis of human face and eye features, a new eye location algorithm based on ARM embedded system is presented. Firstly, the methods of histogram equalization and median filtering are used for the image...
Proceedings Article

DAIMD: An Improved Multimedia Stream Congestion Control Algorithm

Fuzhe Zhao, Yuqing Huang, Zhiyong Tan, Bingxin Xue
In this paper,we analyzethe problems of current congestion control algorithm based on TCP protocol and UDP protocol for transmitting multimedia stream, and proposed an improved multimedia stream congestion control algorithm DAIMD.DAIMD adoptTCP-like congestion control algorithm to transmit multimedia...
Proceedings Article

The Study of Periodic Tight Framelets and Wavelet Frame Packets and Applications

Shiheng Wang
Information science focuses on understanding problems from the perspective of the stake holders involved and then applying information and other technologies as needed. A necessary and sufficient condition is identified in term of refinement masks for applying the unitary extension principle for periodic...
Proceedings Article

The Characterization for Symmetric Tight Frames and Periodic Gabor Frames and Applications in Computer Engineering

Deyou Yuan
Materials science is an interdisciplinary field applying the properties of matter to various areas of science and engineering. In this paper, we discuss a new set of symmetric tight frame wave -lets with the associated filterbanks outputs downsampled by several generators. The frames consist of several...
Proceedings Article

Improved Active Frequency Drift Anti-Islanding Detection Method

Yangyang Ge, Junjie Sun, Gang Wang, Zhiqiang Gao, Yu Li
Since passive anti-islanding detection have largely blind spots, easily fluctuation and so on shortcomings, moreover active frequency drift have Some drawbacks too. For example distortion of current and fluctuation of active power injecting into grid associated with islanding detection. a based on variable...
Proceedings Article

Optimal Search Plan Model OnThe Sea

Luyao Zhu
In this passage, we intend to determinate the specific searching plan for lost aircraft on the basis of big data application. First, we cope with Maximum Flow Problem by BFS, in order to the determination of cruise route. Then, in the determination of numbers of search planes and warships along each...
Proceedings Article

Impacts Of Ramadan On European Islamic Finance Stock Volatility Based On EGARCH-M Model And Empirical Analysis Of EIIB Stock

Luyao Zhu
The thesis firstly introduces the features of Ramadan and Islamic Finance and GARCH model. Then it analyzes the EIIB stock, the representative of Islamic Finance stock via EGARCH-M model, which is applied to data fitting and forecasting, and illustrates the economics meaning of the model. Finally, it...
Proceedings Article

A Seedling Tray Conveying Device And Kinematic Analysis

Yi Guo, Jiwei Liu
A seedling tray conveying device has been designed for conveying seedling trays for the production line during industrial cultivation of sprouts. The composition, working process and primary structural parameters of this device have been determined and virtually designed with SolidWorks. A kinematics...
Proceedings Article

Study on Allocation Efficiency of Agricultural Flood and Drought Disaster Reduction Project

Jia Liu
Evaluating the allocation efficiency of agricultural flood and drought mitigation project is to investigate that whether the benefit brought by the project is effective from the economics angle of input-output. For the non-standardized weight distribution of the input-output indicators in the data envelopment...
Proceedings Article

The Dynamic Programming TBD Algorithm Based On Morphological Characteristic

Jian Zheng, Yuhan Chen
Based on the fact that target emerged by ground clutter or noise problem usually results in a low SNR or SCR and degrade the detecting ability, a dynamic programming algorithm and track before detect (TBD) algorithm is proposed to detecting the weak target. By analysis the target moving modal, the algorithm...
Proceedings Article

Grassroots information service station performance appraisal system based on cloud computing environment

Chun-mei Deng, Mao-fen Li, Wei Luo, Zheng-hui Xie
In order to promote rural informatization, it is necessary to measure the information service management work scientifically. Effective performance evaluation and scientific incentive system for evaluating the work of grassroots service stations, is not only the basis of the grassroots service station...
Proceedings Article

Recovery of Initial Conditions of Time-Varying CML with Symbolic Dynamics

Minfen Shen, Qiong Zhang, Lisha Sun
A novel computationally efficient algorithm in terms of time-varying symbolic dynamics method is proposed to estimate the unknown initial conditions of coupled map lattices (CML). The presented method combines symbolic dynamics with time-varying control parameter to develop a time-varying scheme for...
Proceedings Article

A Secure Scheme Based on Three-Dimension Location for Hierarchical Wireless Heterogeneous Sensor Networks

Yuquan Zhang, Lei Wei
A pairwise key establishment strategy based clusters for hierarchical wireless heterogeneous sensor networks (HWHSNs) is presented in this paper through investigating how heterogeneous sensor nodes enhance network performance. The HWHSNs have some sensor nodes that have greater power and transmission...
Proceedings Article

A Secure and Efficient Routing Protocol for Heterogeneous Wireless Sensor Networks

Yuquan Zhang, Lei Wei
A secure and efficient routing protocol for heterogeneous wireless sensor networks is proposed to deal with some issues in the LEACH arithmetic. The wireless sensor networks have some sensor nodes that have greater power and transmission capability than other nodes have. Both ordinary nodes and heterogeneous...
Proceedings Article

Indoor optimal path planning based on Dijkstra Algorithm

Yicheng Xu, Zhigang Wen, Xiaoying Zhang
Providing optimal path information and the personal navigation path is the open issue for the pedestrian guided system. In order to solve the problems existing in the pedestrian guided system nowadays, such as the jagged paths which probable exist in the shortest path, and the lack of the considerations...
Proceedings Article

A Study on the Dependability of Software Defined Networks

Jianqing Wu, Yan Huang, Jiaming Kong, Qin Tang, Xin Huang
In this paper, we demonstrate how probabilistic model checking can be applied to a study of dependability analysis for a Software-Defined Network with the PRISM tool for probabilistic model checking. Based on probabilistic model checking, the Software-Defined Network is modelled using large and complex...
Proceedings Article

Decision Model of Engineering Bid Evaluation and Its Application under Uncertain Information Environment

Zhili Xiong
In this paper, the decision problem of engineering bid evaluation is studied, and a decision model of engineering bid evaluation is presented based on the method of grey correlation analysis. In this model, all evaluation attribute values are transformed into interval numbers, then a grey correlation...
Proceedings Article

Simultaneous Optimization of Start Up Scheme and Pipe Network for Multi-source Water Injection System Based on Improved Genetic Particle Swarm Optimization Algorithm

Jianjun Yang, Zhiyuan Zhang, Qingtang Li
In order to improve the system operating efficiency furthest, the simultaneous optimization of pump start up scheme and pipe network is necessary. Aiming at the multi-source and looped water injection system, the mathematical model for simultaneous optimization is established, in which the operating...
Proceedings Article

Security Scheme for Digital Watermarking

Jun Xiao, Ying Wang, Dengyu Li, Ying Zhang, Li Zhu
Digital watermarking technology is one of the main means to realize the copyright protection and authentication of digital works in the information age, and many excellent watermarking algorithms have been proposed to achieve different performances in different application. But, attackers also can make...
Proceedings Article

Secure Digital Watermarking Model with Side Information Theory and Cryptography

Jun Xiao, Dengyu Li, Ying Wang
The idea of side information is introduced into secure watermarking, and a secure watermarking model with side information theory and the idea of cryptography is proposed. In the proposed model, the side information from the cover work, the attack and the detector are considered and fully used in both...
Proceedings Article

An Improved Fuzzy Comprehensive Evaluation for the Quality Evaluation of Enterprise Logistics Service

Mengyang Wu, Zhengwei Huang, Zhengying Cai
Since the e-commerce enterprise change from the price-driven to the service-driven, the logistics service quality has become the key factor to enhance the customer’s satisfaction. In the quality evaluation of logistics service, there is an apparent subjectivity in the traditional method to determine...
Proceedings Article

An Optimal Algorithm for a Strategy Game

Daxin Zhu, Xiaodong Wang
A single player strategy game is studied in this paper. We are interested in algorithms which, given integer n, generate the corresponding move sequences to reach the final state of the game with smallest number of steps. In this paper we present an optimal algorithm to generate an optimal move sequence...
Proceedings Article

The Research on PGP Virtual Disk Password Cracking

Qingbing Ji, Lijun Zhang, Fei Yu
PGP virtual disk encryption technology is a double-edged sword, on the one hand it is helpful to prevent the user’s sensitive information on the disk from being stolen or tampered. On the other hand, some criminals take advantage of PGP virtual disk encryption to engage in illegal activities. This paper...
Proceedings Article

The Discussion of the Possibility and Development pattern for Constructing the Public Security Management System based on Big Data

XueHeng Gong, Jing Sun, YiPing Zhang
The key purpose of this paper aims to discuss the possibility of constructing the public information system based on the Big data. Especially, the public security information system is chosen as the objective for details. Then the significance and difficulties which we will face when the corresponding...
Proceedings Article

The research and development of energy consumption detection and analysis management systems based on the digital slurry pipeline

Hongwei Liu, Xingxing Yao, Chunlei Pan
Detection and analysis of energy consumption is the information management systems, which not only help producers to expand production, but also rationally plan and use the energy, reduce energy consumption per unit of product, improve economic efficiency. The company managers can have an accurate grasp...
Proceedings Article

Implementation of G.729E Speech Coding Algorithm based on TMS320VC5416

Xiaojin Yang, Jinjin Pan
Implementation of G.729E Speech Coding Algorithm based on TMS320VC5416 G.729E algorithm is an excellent speech coding algorithm. G.729E designed to speech with background noise and even music, it will be widely used in multimedia communication. This paper introduce the base algorithm, and it is emphasized...
Proceedings Article

Framework and key technologies for big data based on manufacturing

Shan Ren, Xin Zhao
Data type and amount in human society is growing in amazing speed which is caused by emerging new services such as cloud computing, internet of things (IoT) and social network, the era of big data has come. Data is a fundamental resource from simple dealing object. In order to fully understand the connotation...
Proceedings Article

A predictive maintenance method for products based on big data analysis

Shan Ren, Xin Zhao
Recently, withmanufacturing enterprises have begun to widely useadvanced information technology to real-time monitor of their business and product, a large amount of data related to product lifecycle were produced. Typical challenges for maintenanceunder the environment of big data is facing now are...
Proceedings Article

Study on Cerebral Vascular Image of SD-OCT Via Orthogonal Matching Pursuit

Ping Xu, Ying-Jie Chang
This paper proposes the compressed method of Orthogonal Matching Pursuit to retrieve cerebral vascular image of spectral-domain optical coherence tomography (SD OCT). Discrete wavelet transform is used to sparse the signal. Original cerebral vascular image of spectral-domain optical coherence tomography...
Proceedings Article

A Key Management Scheme Based on Multi-Dimension Location for Clustered Heterogeneous Wireless Sensor Networks

Yuquan Zhang, Lei Wei
A key scheme based on multi-dimension location is presented for heterogeneous wireless sensor networks (HWSNs). The wireless sensor networks consist of some nodes that have greater power and transmission capability than other sensor nodes. All kinds of nodes are deployed evenly in sensing space. The...
Proceedings Article

An improved particle swarm algorithm for heterogeneous fleet vehicle routing problem with two-dimensional loading constraints

HaiFeng Sun, KaiTai Dong, Qun Zhang, Rui Yan
This paper concerns the heterogeneous fleet vehicle routing problem with two-dimensional loading constraints (2L-HFVRP), which is a more complicated version of the vehicle routing problem as it combines heterogeneous vehicles and two-dimensional loading constraints. We give a detailed description of...
Proceedings Article

A Key Management Scheme for Heterogeneous Wireless Sensor Networks

Yuquan Zhang, Lei Wei
A key management strategy is presented for heterogeneous wireless sensor networks. The wireless sensor networks have some sensor nodes that are more powerful than other nodes. Both ordinary nodes and heterogeneous nodes are evenly distributed respectively in a sensing area that is divided into a number...
Proceedings Article

A Security Strategy Based on Two-Dimension Location for Hierarchical Wireless Heterogeneous Sensor Networks

Yuquan Zhang, Lei Wei
A cluster-based secure strategy for hierarchical wireless heterogeneous sensor networks(HWHSNs) is proposed. The HWHSNs consist of some normal sensor nodes and heterogeneous sensor nodes that have greater power and transmission capability than other normal nodes. Their structure is a two-layer structure....
Proceedings Article

The Realization of the Design and Processing of Ladies' Shoes Pictures on Web

Zhi-Liang Xia, Qi-Ming Tian
This thesis take pictures for the products and processed the pictures that need to be uploaded, combine the relative features of Josiny ladies' shoes and the requests for the commodity display pictures that come up on by TMALL, make the product template that is up to the requests of TMALL and the display...
Proceedings Article

Clothing Poster Design Based on Computer Vision Image

Li-zhen Liu
This paper briefly introduces the clothing poster, explains the process of making this poster and simply talk about the inspiration origin of clothing designer. It points out that the corresponding poster background is produced according to related topics and images. It focuses on the poster image processing,...
Proceedings Article

Food Expired Date Reminder Research in the Kitchen

Xiaoguang Huang, Jiaci Xie
Food waste has become a common phenomenon in a family who has children need to bring up, the reason cause that happen is family normally would buy more food and keep in the fridge and easily forget the food expired date. To help the family solve this problem not only in finance but also from a moral...
Proceedings Article

Research on Selection of Business Enterprise Distribution Model Based on AHP

Yang Chen, Qingying Zhang, Yongbin Tan, Jing Liu
Distribution plays an important role in electric enterprises. This article analysis characteristics of distribution model of business enterprises, sorts out three major factors which influence the distribution model of the business enterprise, constructs the distribution model selection model using the...
Proceedings Article

Research on C2C Logistics Distribution Network Planning

Yongbin Tan, Qingying Zhang, Yang Chen
In recent years, with the rapid development of the e-commerce, C2C (Consumer to Consumer) as a kind of the transactions on the Internet named “private to private” will become the main force for the future development of the e-commerce. This paper analyzed the significance of mass logistics distribution,...
Proceedings Article

The Research on Analyzing Risk Factors of Type 2 Diabetes Mellitus Based on Improved Frequent Pattern Tree Algorithm

Zhe Wei, Guangjian Ye
urpose: We do it to improve the low efficiency in analyzing risk factors of type 2 Diabetes Mellitus by Apriori Algorithm. Method: We use the patients’ data from the information department of one tertiary referral hospital in Lanzhou which include course note of disease and their health record form January...
Proceedings Article

Simulation of Amphibious Vehicle Water Resistance Based on FLUENT

Xiaochun Pan, Kai Yao, Ling Duan, Zhongming Hou, Xinmin Tian, Xiaowen Zhao
Amphibious vehicle shape changing shape structure, compared with the hull, its water resistance factors more and more computationally complex. Calculated using the traditional theory it is difficult to accurately estimate their water resistance force and distribution. In this paper, the water resistance...
Proceedings Article

Hybrid PSO-SQP Algorithm for Solving System Reliability Allocation Optimization

Cheng Tang, Shu-xiang Guo, Yan-yu Mo
System reliability allocation is an important ingredient in system reliability design, and it is also a decision-making issue of reliability engineering. To achieve the optimization of system reliability allocation, an optimization model for system reliability allocation, which takes the system cost...
Proceedings Article

An Adaptive Image Segmentation Method Based on the Level Set

Aili Zhang, Sijia Li, Tuanning Liu, Zhiyong Li, Yu Zhang
An adaptive gray value of image segmentation method aimed at uneven gray-level image segmentation was proposed. The innovative method combined target image with the gray value of background information according to level set theory with the adaptive linear fitting of global and local information. And...
Proceedings Article

Programming Realized Based on the Block Model for Grounding Grids Corrosion Diagnosis

Hongli Cheng, Kuaikuai Zhang, Zhao Yang
In order to solve the problem of corrosion diagnosis of grounding grids, related program modules of modeling and corrosion diagnosis of grounding grids is developed based on the block model on the platform of Matlab. The programming to realize the block model of a grounding grids is described. The programming...
Proceedings Article

Application of Spatial Analytic Geometry in the Calculation of Adjacent Well Separation Factors

Binbin Diao, Deli Gao
With the design distance between cluster well and infilling well continuously decreasing, the calculation of separation factor is of great significance in the adjacent well anti-collision problem. This paper contrasts the differences between the currently common pedal curve separation factor and the...
Proceedings Article

Research on Failure Behavior of 35CrMnSi based on Ballistic Experiment

Yongjie Xu, Zhijun Wang, Shouli Pan, Shuo Li
Failure behavior of metal materials under impact loading has become key research content in industrial manufacturing field. Especially in the field of weapon research, 35CrMnSi dynamic figure behavior in the serving process attracts relevant weapon manufacture researchers’ extensive attention. In order...
Proceedings Article

Establishment and simulation analysis on internal ballistics equations for artillery shrapnel

Shouli Pan, Ling Tong, Yucong Ma
Internal ballistic equations of artillery shrapnel are established on the basis of theoretical analysis, and equivalent method used for dealing with semi-combustible cartridge case, calculation program selects the Matlab software. The simulation results are accord with the experimental data, it shows...
Proceedings Article

Numerical Simulation of the Longitudinal Movement of a SSB Catamaran in Regular Waves

Hanbing Sun, Yi Jiang, Jiayuan Zhuang, Jin Zou
In order to improve seakeeping performance of the slender catamaran, Semi Submerged Bow (SSB) anti-pitching techniques is applied. Based on CFD method to forecast the longitudinal motion of the original catamaran (without SSB) in regular waves, and the calculation results and the ship model test results...
Proceedings Article

Multi-functional Intelligent Car With Wireless Communications

Mengtao Huang, Lu Wei
With the development of human science and technology, modern life rhythm speeding up, people's demand for intelligent in improving. Using intelligent machines instead of manpower, reduce human labor burden and improve the work efficiency has been becoming the current hot. Taking STC12C5A60S2 single-chip...
Proceedings Article

Research on Design Scheme of the Bridge Crossing Mekong River

Yun Zuo
A bridge will be built across the Mekong River in Luang Prabang Laos to maintain and enhance a vital transport link in the country, and to achieve successful development of road networks in northern region. Considering the topography, geology, hydrologic, navigation, construction and transportation conditions,...
Proceedings Article

The Mobile Technology Acceptance Mechanism of Ningbo Electronic Commerce Enterprise under Government Intervention

Songjie Gong
Electronic commerce enterprises adoption and usage of mobile information technologies currently is one of the most fashion trends in information systems research field. In the present research on electronic commerce enterprises, the research of mobile technology acceptance mechanism in Ningbo context...
Proceedings Article

Research on Web Service Composition Based on QoS Constraint

Liangda Yan
Recently, there has been a growing fashion for businesses to outsource parts of their processes, so as to emphasis more on their core activities. In addition, Web operators often need to compose different services to achieve a more complex task that cannot be fulfilled by an individual service. Web services...
Proceedings Article

An Improved Optimal Control Model of HIV Based on Treatment and Screening

Zhaofu Qun
In this paper, an optimal control model based on an improved HIV model is considered. Using of condom, screening of unaware infectives and incentive for treatment of the infected are used as the control items. Base on the same objective functional to minimize the unaware individuals and the cost of three...
Proceedings Article

The Study on the Test Mode of Cyber Countermeasure

Luan Yang, Dengwei Chen, Linying Geng
Cyber space has important position as traditional combat field like land, ocean, air and space as a new field. The paper research the classification of cyber countermeasure equipment range test based on the analysis of cyber countermeasure equipment and its technical architecture. Put forward a new test...
Proceedings Article

Building Fire Evacuation model research Based on an Improved Fruit Fly Optimization Algorithm

Lijie Zhang, Jianchang Liu, Shubin Tan, Xia Yu
We take into account to find a set of rapid evacuation routes during a building fire. We construct a three-dimensional building structure of the network, an evacuation route is a sequence of movements of people away from the threat of fire, to a safe exit in the network. The fire can stress crowds, cause...
Proceedings Article

An experimental study on multi-slices CT angiography of the basilar artery in rabbit model of cerebral vasospasm

Rui Li, Jinjin Liu, Weijian Chen, Yuxia Duan, Yunjun Yang, Zilong Hu, Xianxi Tan, Ming Zhong, Qichuan Zhuge
Background: Current methods for diagnosing cerebral vasospasm (CVS) include transcranial Doppler (TCD) ultrasonography and the current gold standard of digital subtraction angiography (DSA). The diagnosis of CVS is straightforward, but DSA is limited in its ability to quantify cerebral blood flow or...
Proceedings Article

Gene Exchange Operators of Partheno-Genetic Algorithm for Permutation Flowshop Scheduling with Maximum and Minimum Time Lag Constraints

Bailin Wang, Haifeng Wang, Tieke Li
Permutation flowshop scheduling problem with maximum and minimum time lag constraints to minimize the makespan is considered, and a framework of partheno-genetic algorithm for the problem is presented. Based on the algorithm framework, two gene exchange operators are discussed, including single-point...
Proceedings Article

IDFraIP:A Novel Protein Identification Algorithm Based on Fragment Intensity Patterns

Simin Zhu, Huamei Li, Kai Zheng, Xiaozhou Chen
A Identifying peptides for their fragmentation spectra by database search sequencing method is crucial to interpret LC-MS/MS data, widely used algorithms had not been fully exploited the intensity patterns in fragment spectra, SQID incorporated intensity information and identified peptides significantly...
Proceedings Article

Management of Intelligent Library Wireless Sensor Networks Based on Runtime Model

Ping Zhang, Jianzhong Wang
To quick customize, develop and extend intelligent library internet of things system more efficiently, in this paper an approach based on runtime model to managing intelligent library wireless sensor networks is proposed. Firstly, manageability of intelligent library wireless sensors is abstracted as...
Proceedings Article

A Multiple Indexes Quality Assessment for Fingerprint

Sheng Chang, Qijun Huang, Hao Wang, Jin He
The performance of fingerprint recognition relies heavily on the quality of fingerprint images. In this paper, a multiple indexes fingerprint quality assessment is proposed for poor fingerprints. This method fuses seven indexes from three kinds of typical fingerprint features (gray features, local features...
Proceedings Article

Cryptanalysis of Vaidya et al.’s User Authentication Scheme with Key Agreement in Wireless Sensor Networks

Jiping Li, Yaoming Ding, Zenggang Xiong, Shouyin Liu
User authentication in wireless sensor networks (WSN) is critical due to their unattended and even hostile deployment in the field. The open environment of WSN requires mechanisms which prevent unauthorized user from accessing the information from WSN. Recently, M.L.Das proposed a two-factor user authentication...
Proceedings Article

The Research on the 2D mobile game Platform Based on the Android System

Xiye Feng, Meihui Xu
With the rapid development of smartphones, Android system by its unique openness, rich hardware selection, convenient application development, is accepted by more and more people. The mobile game based on Android, is gradually popular in the crowd. The game in the research with a beautiful picture and...
Proceedings Article

Research on the architecture of e-government sharing platform

Gang Li, Qingpu Zhang, Wei Wang, Ming Jiang
At present, the resources integration and sharing efficiency between the government systems is not high in China. The phenomenon of repeated system development is common, which results in a tremendous waste of resources and cannot be adapt well to the information exchange, sharing and unified management...
Proceedings Article

The Application of Computational Geometry Algorithms in Discriminating Direct Injection-Production Connections

Jiqun Zhang, Chungjin Hu, Baorong Deng, Xinhao Li, Dongmei He, Hua Li, Junhua Chang
It is necessary to analyze direct connections between injection wells and production wells for discovering superior water channels, researching water flooding effectiveness and flow directions in a single well group. A new method of discriminating the direct connections by applying computational geometry...
Proceedings Article

Research of Intrusion Protection System using correlation policy

Shuo Li, Quan Zhang
Aimed at the limitations of single technology in network security defense, an Intrusion Protection System using correlation policy was proposed. This system consists of firewall, Intrusion Detection System and honeypot. The system extends the firewall redirection rules, sets up honeypot host monitors,...
Proceedings Article

A Fuzz system of the SMS module on cellphones

Zidan Fu, Quan Zhang
Since the mobile network become popular, threats and challenges upon the security of cellphone are more serious than ever. However, the vulnerability testing methods are limited in the old white box testing which the manufacturers adopt basing on the knowledge from the original information of designing...
Proceedings Article

Impact Analysis of Complex on Urban Special Structure in Linyi

Jinyi Wu
Urban complex is a highly effective entity integrating many functions. Based on the analysis of complex development status of Linyi, the growth pole theory is used to explain the mechanism which urban complex exerts on the spatial structure. The development of complex influences the urban spatial structure...
Proceedings Article

A unified framework for keywords distillation and summarization

Wei Yang
Keywords distillation and document summarization are important task for many text applications. Existing methods have been conducting these two tasks separately without considering the relationship between the two tasks. In order to capture and make better use of their relationships between these tasks,...
Proceedings Article

Security Weaknesses of Li’s Remote User Password Authentication Scheme Using Smart Card

Jie Ling, Guang-Qiang Zhao, Yi Liu
User authentication is an important technology to guarantee that only the legal users can access resources from the remote server. The advantages of smart cards are storage and computation abilities. Recently, Li et al. pointed out the security problems of Chen et al’s password authentication scheme...
Proceedings Article

Robust Kernel Estimation in Blind Deconvolution

Zhiming Wang, Xing Li
Due to the loss of information about image and the interference of noise, blind deconvolution is an ill-posed problem. In this paper, we study this problem based on the algorithm of Krishnan et al.[1], which uses a normalized sparsity measure to solve the problem. By assuming the random high frequency...
Proceedings Article

Image Noise Level Estimation by Neural Networks

Zhiming Wang, Guobin Yuan
Aiming at the problem of image noise level estimation, this paper proposes an algorithm for noise estimation by singular value decomposition and neural network. The larger (head) parts of the singular values of an image are mainly affected by main structure of the image, and the rest (tail) parts of...
Proceedings Article

Pupil location algorithm combing VFC Snake model with Grayscale Features

Peipei Lv, Zhiming Wang
Pupil location is one of the key steps for iris location as pupil boundary corresponds to iris inner boundary. But uneven illumination affects the segmentation result heavily. The pupil region is the darkest part in most of the images, but it’s not the only part. The proposed algorithm is based on the...
Proceedings Article

The Production Management System Based on Digital Pulp Pipeline Design and Development

Hongwei Liu, Ke Xiao, Chunlei Pan, Guangyue Pu
In light of the present condition of the enterprise production management system and single management means, management is not standard, most people are involved in the production management, production management standard is not unified, the production management problems such as difficult maintenance....
Proceedings Article

Automatic elongated object segmentation in CT image using Stroke Width Transform and Levelset

Zhi-peng Pi, Zhi-ming Wang
In this paper, we propose a full-automatic algorithm for extracting elongated object from CT image. Given an input image, we use the SWT(Stroke Width Transform) and MM(Mathematical Morphology) to locate the coarse location of target. Thus leading to over-segmentation. In order to refine the segmentation...
Proceedings Article

Harmonic Analysis and Simulation Study Using Triple-spectrum-line interpolation FFT Algorithm

Xiao-wan Song, De-min Li, Zhen-hua Li, Wen-zhang Guo
There is hard to obtain the harmonic parameters exactly for the fast Fourier transform in situation of non-synchronous sampling. The cosine window and triple-spectrum-line interpolation FFT algorithm is presented to reduce spectral leakage and improve the accuracy of harmonic analysis. The windowed FFT...
Proceedings Article

Research on Condition Monitoring of Power Big Data Based on Rough Sets

Yulong Yan, Jilai Wu, Shejun Wu, Jian Zhang
The urgency of demanding for large data in power industry will greatly exceed that of in other basic energy industries in the future. Through analyzing the power equipment condition monitoring data, we can assess more accurately the operating condition of power equipment, predict the life span of the...
Proceedings Article

Study on Distribution Network Reconfiguration with Various DGs

Shengsuo Niu, Yi Ding, Zhirui Liang
In order to research the influence of distributed generation access to distribution network, a mathematics model of distribution network reconfiguration with distributed generation is presented in this paper. Fireworks Algorithm is used to solve this problem. According to the characteristic of distributed...
Proceedings Article

Animated Space-Filling Hierarchy Views for Security Risk Control and Visualization on Mobile Devices

Paul Craig, Xin Huang
This paper looks at using a space-filling hierarchy view to control and visualize security settings on a mobile device. The view is optimized for readability and navigation with limited display space and provides a more fluid user-experience with a color-coded overview of security risks and buttons to...
Proceedings Article

Research and Apply Language Rhythm in Topic Tracking

Fan Chen
Language Rhythm is an important characteristic in language. Research and analysis the Language Rhythm, those four kinds of language rhythms prompted: language nature rhythm, language grammar rhythm, language logic rhythm and language emotion rhythm. Each language rhythms reflect the language characteristic....
Proceedings Article

A New Method to QoS Global Optimal Service Selection Driven by Credit

Xiaohua Guo, Jing Jiang, Xuefei Li
Aiming at the current Web service selection methods do not take into full consideration the effect of service component’s dynamic on the performance of service-oriented application system, a credit-aware per-service method to service selection is proposed in our paper, which introduces credit level into...
Proceedings Article

The Design and Implementation of Yu-County Water Supply Payment Management Information System

Tiantian Guo, Rongqiang Liu
In order to comply with the development direction of the water supply system of domestic and foreign, the use of SQL Server 2005 as a database development tool, Visual Studio.NET 2005 as a development tool for C # as the programming language, design and development of computer-based information processing...
Proceedings Article

Improved Models for the Spread of Ebola

Liye Xie
The Ebola epidemic is more and more severe. To optimize the eradication of EVD, we take Liberia, Guinea and Sierra Leone as the object of research, first we build suspected- exposed-I nfectious-dead (SEID) model based on the popular SEIR model, since there are no effective medicine till now and the mortality...
Proceedings Article

Research on Mining Association Behavior of Smart Home Users Based on Apriori Algorithm

Yongjun Zhang, Tingting Qi
This paper mainly studies the improvement of Apriori algorithm based on smart home system. Association rule algorithm has the promotion effect to the analysis of the smart home user behavior. Apriori algorithm is one of the classical algorithms of association rules. However, the efficiency of the Apriori...
Proceedings Article

Analysis of nonlinear parametric vibration of sling considering sling-girder coupling effect

Huihong Shentu, Zhou Li
Cable has strong nonlinear characteristics under the static or dynamic force, and if the frequency ratio of the boundary excitation meet some conditions, cable under force will perform a vibration amplitude much more than the initial value. The sling of a long-span suspension bridge may perform a parametric...
Proceedings Article

The periodic structure topology optimization using improved genetic algorithm

Dongyue Qu, Yangyang Huang, Jinyu Song
This paper combine improved genetic algorithm with bi-directional evolutionary structural optimization algorithm to optimize structure in dual coding way. The new algorithm not only has solved the genetic algorithm (GA) problem which is easy to appear premature, but also has solved the bi-directional...
Proceedings Article

Air Switch Remote-control System Based on GSM network

En Zou, Qing Huo, Shuihong Huang, Shengchuang Chen
TO solve the problem of air switch cannot be controlled remotely, an air remote control switch system is designed based on GSM network. Specific content information issued by the emission module of mobile terminal of system and received by GSM module, then decoded by the STC12C5052AD to make a real-time...
Proceedings Article

CEC2.0-Based Detection Event Relation for Chinese Text

Xianchuan Wang, Zongtian Liu, Tao Liao, Qiang Li
Event is the basic unit of knowing, remembering and understanding the real world. Event is regarded as the basic unit of knowledge representation. We detect event relation between two events for some Chinese texts by matching event relation pair table, which are constructed based on the CEC2.0 (called...
Proceedings Article

Research on transportation scheduling algorithm for special fuel of high frequency task

Jie Zhang, Liangcai Liao, Jinyuan Liu
Special fuel transportation scheduling is an important part of the space launch. Because of the lack of fuel transport train and limited production capacity of manufacturers having become the main limiting factors for special fuel transportation scheduling in space launch, it is very necessary to research...
Proceedings Article

Research of Big data and data security

Qiong Ren, Zhongyuan Xu
With the rise of blogs, social networks, and the vigorous development of cloud computing and Internet technology, the data is increasing at an unprecedented speed and cumulative, the big data era has come. The basic concept of big data, key techniques and the use of there are a lot of doubt and controversy....
Proceedings Article

An Improved BP Neural Network Algorithm for Evaluating Food Traceability System Performance

Weiya Guo
BP neural network algorithm has powerful calculation ability, but the algorithm has some shortages such as low convergence which limits its application, so improving BP algorithm has become a matter of concern in the fields related. Based on analyzing improvement methods wildly used today, the paper...
Proceedings Article

A Kind of Exchange System for Product Conceptual Design Based On the Enterprise Network Community

Dianting Liu, Quanyong Zhang
On the basis of the analysis on product conceptual design, four problems have been found. In order to solve the problems, the article puts forward a kind of communication system for the product conceptual design based on enterprise network community. In the system the Internet users are divided into...
Proceedings Article

Study on Agricultural Products Logistics Cost Control Based on the Internet of Things

Wenfeng Liu
In recent years, agricultural prices rising, one reason is the high cost of logistics. With more and more widely the application scope of the Internet of things technology, it brings to reduce logistics cost. Based on the analysis of development situation of the Internet of things and agricultural products...
Proceedings Article

Computer Network Security Research under Cloud Computing Environment

Qiong Ren, Jun Tao
Cloud computing is a new trend of the Internet which has changed the users habits on the computer and transformed more users’ work environments from desktop to Web. This paper introduces the concepts of cloud computing and its features and network security implications of cloud computing and its security...
Proceedings Article

A Novel Ordinal Regression Method with Minimum Class Variance Support Vector Machine

Jinrong Hu, Xiaoming Wang, Zengxi Huang
In the paper, we propose a novel ordinal regression method called minimum class variance support vector ordinal regression (MCVSVOR). MCVSVOR is derived from minimum class variance support vector machine (MCVSVM) which is a variant of SVM, and so inherits the latter’s characteristics such as taking the...
Proceedings Article

The Application of Chaos in Digital Water-marking and Information Hiding

Jing Chang, Dong Liu
This paper gives a brief introduction of chaos, digital water-marking and the application of chaos digital water-marking and information hiding. Then it analyzes the main difficulty in corresponding research that hidden information should have strong robustness and invisibility which contradict each...
Proceedings Article

Improvement of ORB algorithm

Xue Leng, Jinhua Yang
In this paper, According to the idea SIFT algorithm, proposed an improved algorithm ORB. Based on the multi-scale space, detecting scale space extreme points, then use the ORB descriptors to describe the feature points, generated descriptors having rotating invariability. Using Hamming distance to achieve...
Proceedings Article

The street lamp intelligent management system based on elastic compute service

Jing Liu, Yulin Qi, Zimeng Wang, Zeli Qi
Urban lighting systems as a sign of urban civilization, is becoming more and more important role. But the planning and management of urban street lighting equipment in most parts of our country is still in a very backward state. In order to improve the backward situation, save energy, increase the efficiency...
Proceedings Article

The Design of Signal Control Software and Intersection Traffic Simulation

Hongke Xu, Xiaoqing Hou, Rixing Zhu
The current traffic signal lights often do not have flexible revise function, so it can’t reach the real-time control requirements, and leads to increasingly serious urban traffic congestion, this control software presents an effective method to solve it by researching intersection traffic signal control....
Proceedings Article

The technology of variable message format simulation in software testing

Fei Gao, Xuejun Bi, Xiaozhen Wang
The complexity of software upgraded is the inevitable result of the deepening of social information, and then to put forward higher requirements of software testing. Because of technology, co-ordination, geopolitical, or other non-technical factors these factors the tested software and related hardware...
Proceedings Article

Research on Computer network multimedia transmission system

Chunxi Zhao
With the development of computer network, there are more and more multimedia real-time transmission methods. The traditional stand-alone multimedia synchronization method is unable to solve out of the sync problems due to the unstable factors in the network transmission. Therefore synchronization method...
Proceedings Article

An algorithm to solve the draw issue of number depth recognition

Zhenhui Li, Xia Zhang
This paper discussed that an algorithm solves the draw issue of number depth recognition. Depth recognition methods have used many fields and have wide development prospect. Many scientific research institutions and scholars are studying the depth recognition. When user writes in an MR system, a depth...
Proceedings Article

Spacecraft Relative State Tracking Based on Genetic Algorithm-embedded Particle Filter

Wenhua Cheng, Yasheng Zhang, Hong Yao
Spacecraft Relative State Tracking is not only the application foundation of space-based space surveillance system, but also the important prerequisite for space autonomous rendezvous and on-orbit servicing. Through making genetic algorithm (GA) embedded PF resampling process, the particle degradation...
Proceedings Article

Computer simulation implementations and optimization of the right atrium of the heart based on GPU

Chunxi Zhao
For heart right atrium electrophysiology simulation computation huge, time-consuming problem, a method based on high-performance graphics processing unit (GPU) to achieve parallel computing and optimization. First, consider the differences between right atrial heart cell center and the edge of the constructed...
Proceedings Article

Performance Research of China’s Listed Commercial Banks Based on Factor Analysis

SanXing He
Financial firms play a crucial role in the economic development, and commercial banks are important parts in the financial system. Commercial banks' competitiveness is reflected on their business performance. Therefore, measuring the performance of commercial banks has become an urgent task. In this...
Proceedings Article

A Parallel Algorithm Using Perlin Noise Superposition Method for Terrain Generation Based on CUDA architecture

Huailiang Li, Xianguo Tuo, Yao Liu, Xin Jiang
A parallel algorithm for terrain generation based on CUDA architecture is proposed in this paper, which aims to address the problems of high computational load and low efficiency when generating large scale terrains using the Perlin noise superposition method. The Perlin noise superposition method is...
Proceedings Article

A model of time management based on tree in Product Data Management

Biao Huang, Yuanning Liu, Xiaodong Zhu, Liangyu Li, Fei He
According to the distribution characteristics of workflow time node, this paper studies the time node representation of a structured workflow and describes in detail the definition of workflow time node in Product Data Management, then puts forward a tree design model. From the time property of different...
Proceedings Article

A Role-Based Access Control Model that Supports Authorization with The Combination of Static and Dynamic

Liangyu Li, Yuanning Liu, Xiaodong Zhu, Biao Huang, Youwei Wang
The traditional Role-Based Access Control(RBAC) model[1] is widely used in enterprises, but it's control granularity is too single and it's permissions configuration is too complex. This paper introduces the concepts of coarse-granularity and fine-granularity[2], and puts forward a RBAC model that supports...
Proceedings Article

A real-time vehicle-terramechanics model for visual simulation

Dong-bo Sun, Yan-qiang Di, Hao-hao Cui
The vehicle-terrain interaction model plays a critical role in off-road vehicle driving visual simulations. This paper present a new terrain deformation model for simulating vehicle-terrain interaction. The model simplifies the Bekker’s classic terramechanics model, and calculates terrain deformation...
Proceedings Article

Structural topology optimization based on improved genetic algorithm

Dongyue Qu, Yangyang Huang, Jinyu Song
This article aim at solving the problem of local optimal solution easily appear in structural optimization by the algorithm of bi-directional evolutionary structural optimization (BESO), and importing improved genetic algorithm (GA), put forward a new algorithm named bi-directional evolutionary structural...
Proceedings Article

Research on the Cloud Acceleration Method for the Compressed Sensing Algorithm under the Internet of Things

Wenzhun Huang, Shanwen Zhang
In this paper, we conduct research on the cloud acceleration method for the compressed sensing algorithm under the environment of Internet of Things. On the Internet of things perception layer, an important part of the sensor network have been put forward a lot of security mechanisms. Now about access...
Proceedings Article

The Application and Research of Information Technology of Cloud Computing in Colleges and Universities

Ying Luo, Miaomiao Li
As an emerging technology, cloud computing has a profound impact on Internet. This paper introduces the concept and characteristics of cloud computing, then studies the current status of university information technology, and analyzes how cloud computing promote the development of university information...
Proceedings Article

A New Research Approach on the Application of Virtual Reality Technology in Civil Engineering

Changchang Fu
Virtual reality technology is constantly developing, dedicated to computer graphics and multimedia information processing, high-performance chip can increase a hundred times the processing power, three-dimensional graphics algorithms and parametric modeling algorithm enables virtual reality technology...