Proceedings of the 2015 International Conference on Materials Engineering and Information Technology Applications
Session: Information Technology and Applications
149 articles
Proceedings Article
The Research of Lane Marker Detection Algorithm Based on Inverse Perspective Mapping
Jinghong Xu, Changsheng Cheng, Yan Wan
This paper presents a robust and fast algorithm for lane marker detection. It is based on generating an inverse perspective mapping image of the road, computing line abstracted regions and the class points from IPM image, which is followed by a post processing step using rectangular approximation to...
Proceedings Article
Study on Water Engineering based on Mathematical Models
Guanqun Zhang
Fresh water is the limiting constraint for development in much of the world. As we know, China is a water-shortage country, where the water available for each person is only a quarter of the world’s average level. Author put forward five water strategies to help the government meeting the water demands...
Proceedings Article
Research on Corn Cost and Benefit in Heilongjiang Province Based on Grey Correlation Analysis
Ya Gao
Grey correlation model is adopted for analyzing corn output value per mu in Heilongjiang Province and influencing factors from 2006 to 2013 aiming at status quo of corn cost and benefit in Heilongjiang Province. Results showed that influencing factors of corn output value per mu can be sequenced as follows...
Proceedings Article
The Analysis and Design of the Object-oriented System
Xin Li
The object-oriented system analysis and design (OOA and OOD) is an effective technology widely used by the modern software enterprise, the OOAD method requires specified in the design to map the real world problem domain objects and entities. The object-oriented analysis is found in problem areas and...
Proceedings Article
Legal Protection of Cyberspace Infrastructure and Information Safety in China -- A Response to Cyberspace Challenges to China’s National Security
Hongyu Fu
In recent years, with the standardization of key infrastructure control system, intelligent, network development, the network attacks against the critical infrastructure is increasing. Electricity, petrochemical, rail transportation and other key infrastructure involving the national economy and the...
Proceedings Article
Application of Petrel Software in Reserve Estimation in Xinli-Xinbei Oilfield, Jilin Province, China
Songze Li, Wangshui Hu
Volumetric estimates provide a valuable check on the estimates derived from material balance and decline analysis methods. Xinli-Xinbei oilfield, Jilin Province-China is an ascertained and developed oilfield. It is affluent in geological reserves, and has greatly development potentiality. Based on the...
Proceedings Article
The Evaluation of Parameter M in the Big M Method of Linear Programming
Zhenzhen Song
In the simplex method of linear programming, there is a big M method (the penalty factor method) for finding an initial feasible basis. The current textbooks of operations research only explain that the big M method is efficient when M is large enough, and never give precise evaluation to the parameter...
Proceedings Article
A Novel QR Code and mobile phone based Authentication protocol via Bluetooth
Sha Liu, Shuhua Zhu
Password based authentication schemes are widely used in our daily life when we log into websites. However, there are varieties of problems with the simple methods, including susceptibility to unintentional exposure via phishing and cross-sites password reuse. We present a novel mobile phone based authentication...
Proceedings Article
Design principles of mobile products based APP
Zhenbo Qu, Tianguang Yu
With the advent of information technology era, more APP into people's daily lives. This article choose its design principles as the starting point of several different dimensions, from product UI, interactive, functional deployment, iterative, user experience, strategic planning and other aspects of...
Proceedings Article
Full-parallax Colorful 3D Imaging Using Orthogonal-stacked Lenticular Sheets and Computer-generated Stereogram
Yuguo Wang
This paper proposes a true-color full-parallax three-dimensional (3D) imaging method based on OLS. The optical imaging effects of OLsS and micro-lens array (MLA) are analyzed using optics simulation software, and the OLS is used to realize the stereoscopic display instead of MLA. 2D multi-view images...
Proceedings Article
Modeling Analysis of Advanced Persistent Threat–Based on UML
Bin Dong, Wentao Zhao, Jianglong Song
This paper reveals the inherent features of advanced persistent threat (APT), and summarizes its general attacking processes, attacking means and methods. The attacking steps model of APT which is based on UML effectively describes the application principles of APT and its behavior features, mode features...
Proceedings Article
Study on Strategy of Cloud Computing Data Storage Security
Sha Liu, Shuhua Zhu
With the popularization and application of cloud computing services, cloud storage has become a typical representative of cloud computing services. But meanwhile, we must also recognize that the problem of storing data in a cloud environment can be brought to us. In this paper, we propose a cloud data...
Proceedings Article
Functions and General Structure of Fault Diagnosis System Software
Peidong Du, Fuchao Liu, Jingjing Zheng, Qingling Wang
Referred to in the fault diagnosis of power grid mainly refers to the transmission network and transmission network bears an important task of power transmission, power plant and terminal user ties, is one of the most important parts of the power system. Long term exposure to natural environment in the...
Proceedings Article
The Design and Implementation of the Project Accounting System
Yuwen Liu
In this paper, in order to meet the management and business requirements of project management in the engineering company, the project accounting system is developed. While designing the system, we absorb the advantages of the rules for the preparation of accounting subject divide the project accounting...
Proceedings Article
Study on Mobile Large Data Storage Security in Cloud Computing Environment
Xianwei Li
In this thesis, data security in cloud computing is regarded as the research object. First of all, the definitions, model, structure, application, research organization and related knowledge of cloud computing is introduced. Then, the data security assurance methods which used in this thesis including...
Proceedings Article
Design of Data Secure Storage for Cloud Compute ring
Wenhu Yang
With its great power to integrate resources, Cloud Computing can offer individuals and organizations the convenient and on-demand computing and storage service. As the increasingly influence on everyday life, its structural safety problem emerges. Due to the loss of physical control towards data, the...
Proceedings Article
Technical Implementation of Visual Steganography in Structured Document based on CSS
Zhijie Liu
This paper addressed the visual redundancy of typeface in a structured document. Achieving information embeds through modifying the appearance of words by CSS. The idea combines encryption and hiding, has widely application. Meanwhile it has high density and safety in information hiding and is easy to...
Proceedings Article
Cloud Learning Platform Design and Implementation Under Wed2.0 Environment
Changcheng Wu, Hongte Chen
Taking education as an example of discovery learning community to explore web2.0 environment design and build cloud learning platform. Based on the principles of SLL design, display SLL cloud learning platform system architecture, technology adoption Wordpress2.7 for supporting, relying on the "mix"...
Proceedings Article
Mobile Data Management Structure Design based on Mobile Database
Xin Hu
The mobile database is using SQL Server CE mobile database engine. Data conversion layer provides backup restore function (fully backup and restore, table with import and export) of SQL Server CE' local database, and to provide similar interface functions of storage procedure (it include: function of...
Proceedings Article
Research on Hierarchical Storage System based on Wireless Mesh Network
Xin Hu
This thesis according to this hot technique of Wireless Mesh Network day by day mature background, on the foundation of comprehending the basic theories of Wireless Mesh Network, we emphasizes a rightness how to keep enough bandwidth and band rate in much jump of the Mesh environment in certain analysis...
Proceedings Article
Research on Translation Based on Semantic Triangle Theory
Junming Xiao
Semantic triangle theory is one of the important theories of linguistics. This paper begins with a brief introduction to the connotation of semantic triangle theory, and then analyzes the concrete thinking process of translators in the translation process and the reading process of readers, finally gives...
Proceedings Article
Application of Physical System Simulation Technology in volleyball Multimedia Courseware
Yipai Jiang, Yanxiu Wang
In this paper, the characteristics of Volleyball were demonstrated and analyzed, which shows professional, normative and contingency Volleyball Volleyball is tremendous room for growth, because volleyball with flexible teaching diversity, therefore multimedia technology into the volleyball classroom...
Proceedings Article
Research and Application of Computer Network Remote Control System
Yuling Zhang
With the rapid development of computer network applications and the growing popularity of computer technology, computer network remote control technology widely used. Users unrestricted geographical conditions, different locations via the network control network devices, network devices to obtain information....
Proceedings Article
Image Registration Using SIFT and Canonical Correlation Analysis
Wei Zhao, Zheng Tian, Lijuan Yang, Weidong Yan, Jinhuan Wen
To improve the quality of SIFT feature matching, a mismatches removal method is proposed based on the collinearity property of the canonical correlation features. The influence of each match on the collineartiy degree is analyzed to find false matches. Firstly, a putative set of matches is obtained based...
Proceedings Article
A Multi-modulus Blind Equalization Algorithm Based on Memetic Algorithm
Yecai Guo, Xing Wu, Miaoqing Zhang
In view of slow convergence speed, large steady mean square error (MSE), and existing blind phase for the constant modulus blind equalization algorithm(CMA), a multi-modulus blind equalization algorithm based on memetic algorithm(MA-MMA) is proposed, which combines the basic idea of intelligent optimization...
Proceedings Article
An Orthogonal Wavelet Transform Multi-modulus Blind Equalization Algorithm Based on Tabu Search DNA Genetic Optimization Algorithm
Yecai Guo, Lu Lu, Binglong Zhang
For the disadvantages of orthogonal wavelet transform multi-modulus blind equalization algorithm(WTMMA), such as slow convergence rate, large mean square error, and immerging in partial minimum easily, an orthogonal wavelet transform multi-modulus blind equalization algorithm based on Tabu search DNA...
Proceedings Article
Effect of main part size and disparity distribution on visual comfort of Stereoscopic images
Zhibin Su, Fangju Zou, Ren Hui
Visual comfort is one of the important indexes to evaluate the image quality and viewing experience in the process of viewing stereoscopic video and images. This paper mainly investigated the effect of the main part size and disparity distribution type of stereoscopic images on visual comfort through...
Proceedings Article
Research on Scheduling Emergency Supplies Featuring Hierarchical Linkage Based on Genetic Algorithm
Feihu Hu, Weihao Bai, Chaohui Tian
This paper presents the hierarchical linkage scheduling emergency supplies problem. A mathematical description is provided and a model of the hierarchical scheduling emergency supplies with multiple supplies and multiple vehicles is formed in order to acquire the shortest scheduling time and the lowest...
Proceedings Article
A Multiple Tent Maps Based Image Encryption Scheme with Plain-image Dependent Permutation and Diffusion
Ruisong Ye, Yuting Xi, Ming Ye, Xiaoyun Shi, Wenhao Ye
A novel multiple tent maps based image encryption scheme with plain-image content dependent permutation-diffusion mechanism is proposed. The permutation is realized by swapping the gray values at different part of the considered image; it is performed with the help of pseudo-random sequence yielded by...
Proceedings Article
Research on Three Typical Methods of Infrared Weak Small Targets Background Suppression under Cloud Background
Zhongmin LI, Guowei Zou, Lifei Mei
Background suppression of weak small targets in infrared image is the key of image tracking and monitoring, especially under the cloud background. In the area of image signal processing, there are a lot of background suppression methods can be used to image filter by combining the characteristics of...
Proceedings Article
Research on the Teaching Evaluation Model Based on BP Neural Network
Xi Zhang, Xianggen Gan, Ren Wu
Education evaluation has become increasingly important along with the deepening educational reform. Only through evaluation will the teachers further enhance their teaching methods and teaching level. Considering the many factors influencing the teachers, it is difficult to simply adopt one model to...
Proceedings Article
Research On Structure Modification Based Data Transmission And Security Enhancement Techniques For The Internet Of Things (Iot)
Wen-zhun Huang, Xin-xin Xie, Shan-wen Zhang
Proceedings Article
Region-Based Conditional Random Fields For Medical Image Labeling
Yan Yang
Concerning the high time complexity of medical image labeling in graph model, we proposed a region-based CRF method for medical image labeling. This method first over segmented the image into small homogeneous regions by using over-segmented method, and then the graphical model was constructed with regions...
Proceedings Article
The Energy Consumption Forecasting in China Based on ARIMA Model
Junwei Miao
China's energy consumption will continue to rise rapidly. It is necessary to forecast China's energy consumption to formulate energy and economic policy. This study establish a ARIMA model and forecast the energy consumption in future. The results show ARIMA model performs high prediction accuracy. It...
Proceedings Article
Research on Computer Network Optimization Model Based on Neural Network Algorithm
Yanhui Wang
The rapid development of computer networks is urgently need to improve and optimize the overall performance of the network.With the characteristics of large scale parallel processing and distributed information storage, Hopfield neural network has a unique advantage of associative memory and optimization....
Proceedings Article
The Design of Wireless Communication System Based on STC12+CC1101
Zhijian Yin, Kun Xiang, Wang Fan
Wireless data transmission in short distance is a kind of technology instead of cable, which is widely used in many current fields. And it solved the problem that it is difficult for cable wiring due to the limit of environment and condition. For the problem that the length of control command is different...
Proceedings Article
Design of Simulation Model on the Battlefield Environment
Jianli Zhang, Lin Zhang, Lijian JI, Zhongwei Guo
In order to implement the informatization under the condition of forces global training requirements, the paper constructed the basic process of the battlefield environment simulation model, including geographic simulation model, simulation models of meteorological and electromagnetic environment simulation...
Proceedings Article
A Low Complexity Subspace-Based Blind Channel Estimation For MIMO-OFDM
Yankui Zhang, Daming Wang, Song Chen
The current subspace-based blind channel estimation for MIMO-OFDM system has the problems of high complexity due to matrix decomposition. In this paper, we proposed an improved subspace-based channel estimation algorithm, which is based on the method of the permutations and combinations on the transceiver...
Proceedings Article
Algorithm Of Eye Location With Gray Projection And Hough Transform Based On ARM Platform
Caixia Liu
Image processing system based on ARM is a faster, smaller and more flexible application. Based on the analysis of human face and eye features, a new eye location algorithm based on ARM embedded system is presented. Firstly, the methods of histogram equalization and median filtering are used for the image...
Proceedings Article
DAIMD: An Improved Multimedia Stream Congestion Control Algorithm
Fuzhe Zhao, Yuqing Huang, Zhiyong Tan, Bingxin Xue
In this paper,we analyzethe problems of current congestion control algorithm based on TCP protocol and UDP protocol for transmitting multimedia stream, and proposed an improved multimedia stream congestion control algorithm DAIMD.DAIMD adoptTCP-like congestion control algorithm to transmit multimedia...
Proceedings Article
The Study of Periodic Tight Framelets and Wavelet Frame Packets and Applications
Shiheng Wang
Information science focuses on understanding problems from the perspective of the stake holders involved and then applying information and other technologies as needed. A necessary and sufficient condition is identified in term of refinement masks for applying the unitary extension principle for periodic...
Proceedings Article
The Characterization for Symmetric Tight Frames and Periodic Gabor Frames and Applications in Computer Engineering
Deyou Yuan
Materials science is an interdisciplinary field applying the properties of matter to various areas of science and engineering. In this paper, we discuss a new set of symmetric tight frame wave -lets with the associated filterbanks outputs downsampled by several generators. The frames consist of several...
Proceedings Article
Improved Active Frequency Drift Anti-Islanding Detection Method
Yangyang Ge, Junjie Sun, Gang Wang, Zhiqiang Gao, Yu Li
Since passive anti-islanding detection have largely blind spots, easily fluctuation and so on shortcomings, moreover active frequency drift have Some drawbacks too. For example distortion of current and fluctuation of active power injecting into grid associated with islanding detection. a based on variable...
Proceedings Article
Optimal Search Plan Model OnThe Sea
Luyao Zhu
In this passage, we intend to determinate the specific searching plan for lost aircraft on the basis of big data application. First, we cope with Maximum Flow Problem by BFS, in order to the determination of cruise route. Then, in the determination of numbers of search planes and warships along each...
Proceedings Article
Impacts Of Ramadan On European Islamic Finance Stock Volatility Based On EGARCH-M Model And Empirical Analysis Of EIIB Stock
Luyao Zhu
The thesis firstly introduces the features of Ramadan and Islamic Finance and GARCH model. Then it analyzes the EIIB stock, the representative of Islamic Finance stock via EGARCH-M model, which is applied to data fitting and forecasting, and illustrates the economics meaning of the model. Finally, it...
Proceedings Article
A Seedling Tray Conveying Device And Kinematic Analysis
Yi Guo, Jiwei Liu
A seedling tray conveying device has been designed for conveying seedling trays for the production line during industrial cultivation of sprouts. The composition, working process and primary structural parameters of this device have been determined and virtually designed with SolidWorks. A kinematics...
Proceedings Article
Study on Allocation Efficiency of Agricultural Flood and Drought Disaster Reduction Project
Jia Liu
Evaluating the allocation efficiency of agricultural flood and drought mitigation project is to investigate that whether the benefit brought by the project is effective from the economics angle of input-output. For the non-standardized weight distribution of the input-output indicators in the data envelopment...
Proceedings Article
The Dynamic Programming TBD Algorithm Based On Morphological Characteristic
Jian Zheng, Yuhan Chen
Based on the fact that target emerged by ground clutter or noise problem usually results in a low SNR or SCR and degrade the detecting ability, a dynamic programming algorithm and track before detect (TBD) algorithm is proposed to detecting the weak target. By analysis the target moving modal, the algorithm...
Proceedings Article
Grassroots information service station performance appraisal system based on cloud computing environment
Chun-mei Deng, Mao-fen Li, Wei Luo, Zheng-hui Xie
In order to promote rural informatization, it is necessary to measure the information service management work scientifically. Effective performance evaluation and scientific incentive system for evaluating the work of grassroots service stations, is not only the basis of the grassroots service station...
Proceedings Article
Recovery of Initial Conditions of Time-Varying CML with Symbolic Dynamics
Minfen Shen, Qiong Zhang, Lisha Sun
A novel computationally efficient algorithm in terms of time-varying symbolic dynamics method is proposed to estimate the unknown initial conditions of coupled map lattices (CML). The presented method combines symbolic dynamics with time-varying control parameter to develop a time-varying scheme for...
Proceedings Article
A Secure Scheme Based on Three-Dimension Location for Hierarchical Wireless Heterogeneous Sensor Networks
Yuquan Zhang, Lei Wei
A pairwise key establishment strategy based clusters for hierarchical wireless heterogeneous sensor networks (HWHSNs) is presented in this paper through investigating how heterogeneous sensor nodes enhance network performance. The HWHSNs have some sensor nodes that have greater power and transmission...
Proceedings Article
A Secure and Efficient Routing Protocol for Heterogeneous Wireless Sensor Networks
Yuquan Zhang, Lei Wei
A secure and efficient routing protocol for heterogeneous wireless sensor networks is proposed to deal with some issues in the LEACH arithmetic. The wireless sensor networks have some sensor nodes that have greater power and transmission capability than other nodes have. Both ordinary nodes and heterogeneous...
Proceedings Article
Indoor optimal path planning based on Dijkstra Algorithm
Yicheng Xu, Zhigang Wen, Xiaoying Zhang
Providing optimal path information and the personal navigation path is the open issue for the pedestrian guided system. In order to solve the problems existing in the pedestrian guided system nowadays, such as the jagged paths which probable exist in the shortest path, and the lack of the considerations...
Proceedings Article
A Study on the Dependability of Software Defined Networks
Jianqing Wu, Yan Huang, Jiaming Kong, Qin Tang, Xin Huang
In this paper, we demonstrate how probabilistic model checking can be applied to a study of dependability analysis for a Software-Defined Network with the PRISM tool for probabilistic model checking. Based on probabilistic model checking, the Software-Defined Network is modelled using large and complex...
Proceedings Article
Decision Model of Engineering Bid Evaluation and Its Application under Uncertain Information Environment
Zhili Xiong
In this paper, the decision problem of engineering bid evaluation is studied, and a decision model of engineering bid evaluation is presented based on the method of grey correlation analysis. In this model, all evaluation attribute values are transformed into interval numbers, then a grey correlation...
Proceedings Article
Simultaneous Optimization of Start Up Scheme and Pipe Network for Multi-source Water Injection System Based on Improved Genetic Particle Swarm Optimization Algorithm
Jianjun Yang, Zhiyuan Zhang, Qingtang Li
In order to improve the system operating efficiency furthest, the simultaneous optimization of pump start up scheme and pipe network is necessary. Aiming at the multi-source and looped water injection system, the mathematical model for simultaneous optimization is established, in which the operating...
Proceedings Article
Security Scheme for Digital Watermarking
Jun Xiao, Ying Wang, Dengyu Li, Ying Zhang, Li Zhu
Digital watermarking technology is one of the main means to realize the copyright protection and authentication of digital works in the information age, and many excellent watermarking algorithms have been proposed to achieve different performances in different application. But, attackers also can make...
Proceedings Article
Secure Digital Watermarking Model with Side Information Theory and Cryptography
Jun Xiao, Dengyu Li, Ying Wang
The idea of side information is introduced into secure watermarking, and a secure watermarking model with side information theory and the idea of cryptography is proposed. In the proposed model, the side information from the cover work, the attack and the detector are considered and fully used in both...
Proceedings Article
An Improved Fuzzy Comprehensive Evaluation for the Quality Evaluation of Enterprise Logistics Service
Mengyang Wu, Zhengwei Huang, Zhengying Cai
Since the e-commerce enterprise change from the price-driven to the service-driven, the logistics service quality has become the key factor to enhance the customer’s satisfaction. In the quality evaluation of logistics service, there is an apparent subjectivity in the traditional method to determine...
Proceedings Article
An Optimal Algorithm for a Strategy Game
Daxin Zhu, Xiaodong Wang
A single player strategy game is studied in this paper. We are interested in algorithms which, given integer n, generate the corresponding move sequences to reach the final state of the game with smallest number of steps. In this paper we present an optimal algorithm to generate an optimal move sequence...
Proceedings Article
The Research on PGP Virtual Disk Password Cracking
Qingbing Ji, Lijun Zhang, Fei Yu
PGP virtual disk encryption technology is a double-edged sword, on the one hand it is helpful to prevent the user’s sensitive information on the disk from being stolen or tampered. On the other hand, some criminals take advantage of PGP virtual disk encryption to engage in illegal activities. This paper...
Proceedings Article
The Discussion of the Possibility and Development pattern for Constructing the Public Security Management System based on Big Data
XueHeng Gong, Jing Sun, YiPing Zhang
The key purpose of this paper aims to discuss the possibility of constructing the public information system based on the Big data. Especially, the public security information system is chosen as the objective for details. Then the significance and difficulties which we will face when the corresponding...
Proceedings Article
The research and development of energy consumption detection and analysis management systems based on the digital slurry pipeline
Hongwei Liu, Xingxing Yao, Chunlei Pan
Detection and analysis of energy consumption is the information management systems, which not only help producers to expand production, but also rationally plan and use the energy, reduce energy consumption per unit of product, improve economic efficiency. The company managers can have an accurate grasp...
Proceedings Article
Implementation of G.729E Speech Coding Algorithm based on TMS320VC5416
Xiaojin Yang, Jinjin Pan
Implementation of G.729E Speech Coding Algorithm based on TMS320VC5416 G.729E algorithm is an excellent speech coding algorithm. G.729E designed to speech with background noise and even music, it will be widely used in multimedia communication. This paper introduce the base algorithm, and it is emphasized...
Proceedings Article
Framework and key technologies for big data based on manufacturing
Shan Ren, Xin Zhao
Data type and amount in human society is growing in amazing speed which is caused by emerging new services such as cloud computing, internet of things (IoT) and social network, the era of big data has come. Data is a fundamental resource from simple dealing object. In order to fully understand the connotation...
Proceedings Article
A predictive maintenance method for products based on big data analysis
Shan Ren, Xin Zhao
Recently, withmanufacturing enterprises have begun to widely useadvanced information technology to real-time monitor of their business and product, a large amount of data related to product lifecycle were produced. Typical challenges for maintenanceunder the environment of big data is facing now are...
Proceedings Article
Study on Cerebral Vascular Image of SD-OCT Via Orthogonal Matching Pursuit
Ping Xu, Ying-Jie Chang
This paper proposes the compressed method of Orthogonal Matching Pursuit to retrieve cerebral vascular image of spectral-domain optical coherence tomography (SD OCT). Discrete wavelet transform is used to sparse the signal. Original cerebral vascular image of spectral-domain optical coherence tomography...
Proceedings Article
A Key Management Scheme Based on Multi-Dimension Location for Clustered Heterogeneous Wireless Sensor Networks
Yuquan Zhang, Lei Wei
A key scheme based on multi-dimension location is presented for heterogeneous wireless sensor networks (HWSNs). The wireless sensor networks consist of some nodes that have greater power and transmission capability than other sensor nodes. All kinds of nodes are deployed evenly in sensing space. The...
Proceedings Article
An improved particle swarm algorithm for heterogeneous fleet vehicle routing problem with two-dimensional loading constraints
HaiFeng Sun, KaiTai Dong, Qun Zhang, Rui Yan
This paper concerns the heterogeneous fleet vehicle routing problem with two-dimensional loading constraints (2L-HFVRP), which is a more complicated version of the vehicle routing problem as it combines heterogeneous vehicles and two-dimensional loading constraints. We give a detailed description of...
Proceedings Article
A Key Management Scheme for Heterogeneous Wireless Sensor Networks
Yuquan Zhang, Lei Wei
A key management strategy is presented for heterogeneous wireless sensor networks. The wireless sensor networks have some sensor nodes that are more powerful than other nodes. Both ordinary nodes and heterogeneous nodes are evenly distributed respectively in a sensing area that is divided into a number...
Proceedings Article
A Security Strategy Based on Two-Dimension Location for Hierarchical Wireless Heterogeneous Sensor Networks
Yuquan Zhang, Lei Wei
A cluster-based secure strategy for hierarchical wireless heterogeneous sensor networks(HWHSNs) is proposed. The HWHSNs consist of some normal sensor nodes and heterogeneous sensor nodes that have greater power and transmission capability than other normal nodes. Their structure is a two-layer structure....
Proceedings Article
The Realization of the Design and Processing of Ladies' Shoes Pictures on Web
Zhi-Liang Xia, Qi-Ming Tian
This thesis take pictures for the products and processed the pictures that need to be uploaded, combine the relative features of Josiny ladies' shoes and the requests for the commodity display pictures that come up on by TMALL, make the product template that is up to the requests of TMALL and the display...
Proceedings Article
Clothing Poster Design Based on Computer Vision Image
Li-zhen Liu
This paper briefly introduces the clothing poster, explains the process of making this poster and simply talk about the inspiration origin of clothing designer. It points out that the corresponding poster background is produced according to related topics and images. It focuses on the poster image processing,...
Proceedings Article
Food Expired Date Reminder Research in the Kitchen
Xiaoguang Huang, Jiaci Xie
Food waste has become a common phenomenon in a family who has children need to bring up, the reason cause that happen is family normally would buy more food and keep in the fridge and easily forget the food expired date. To help the family solve this problem not only in finance but also from a moral...
Proceedings Article
Research on Selection of Business Enterprise Distribution Model Based on AHP
Yang Chen, Qingying Zhang, Yongbin Tan, Jing Liu
Distribution plays an important role in electric enterprises. This article analysis characteristics of distribution model of business enterprises, sorts out three major factors which influence the distribution model of the business enterprise, constructs the distribution model selection model using the...
Proceedings Article
Research on C2C Logistics Distribution Network Planning
Yongbin Tan, Qingying Zhang, Yang Chen
In recent years, with the rapid development of the e-commerce, C2C (Consumer to Consumer) as a kind of the transactions on the Internet named “private to private” will become the main force for the future development of the e-commerce. This paper analyzed the significance of mass logistics distribution,...
Proceedings Article
The Research on Analyzing Risk Factors of Type 2 Diabetes Mellitus Based on Improved Frequent Pattern Tree Algorithm
Zhe Wei, Guangjian Ye
urpose: We do it to improve the low efficiency in analyzing risk factors of type 2 Diabetes Mellitus by Apriori Algorithm. Method: We use the patients’ data from the information department of one tertiary referral hospital in Lanzhou which include course note of disease and their health record form January...
Proceedings Article
Simulation of Amphibious Vehicle Water Resistance Based on FLUENT
Xiaochun Pan, Kai Yao, Ling Duan, Zhongming Hou, Xinmin Tian, Xiaowen Zhao
Amphibious vehicle shape changing shape structure, compared with the hull, its water resistance factors more and more computationally complex. Calculated using the traditional theory it is difficult to accurately estimate their water resistance force and distribution. In this paper, the water resistance...
Proceedings Article
Hybrid PSO-SQP Algorithm for Solving System Reliability Allocation Optimization
Cheng Tang, Shu-xiang Guo, Yan-yu Mo
System reliability allocation is an important ingredient in system reliability design, and it is also a decision-making issue of reliability engineering. To achieve the optimization of system reliability allocation, an optimization model for system reliability allocation, which takes the system cost...
Proceedings Article
An Adaptive Image Segmentation Method Based on the Level Set
Aili Zhang, Sijia Li, Tuanning Liu, Zhiyong Li, Yu Zhang
An adaptive gray value of image segmentation method aimed at uneven gray-level image segmentation was proposed. The innovative method combined target image with the gray value of background information according to level set theory with the adaptive linear fitting of global and local information. And...
Proceedings Article
Programming Realized Based on the Block Model for Grounding Grids Corrosion Diagnosis
Hongli Cheng, Kuaikuai Zhang, Zhao Yang
In order to solve the problem of corrosion diagnosis of grounding grids, related program modules of modeling and corrosion diagnosis of grounding grids is developed based on the block model on the platform of Matlab. The programming to realize the block model of a grounding grids is described. The programming...
Proceedings Article
Application of Spatial Analytic Geometry in the Calculation of Adjacent Well Separation Factors
Binbin Diao, Deli Gao
With the design distance between cluster well and infilling well continuously decreasing, the calculation of separation factor is of great significance in the adjacent well anti-collision problem. This paper contrasts the differences between the currently common pedal curve separation factor and the...
Proceedings Article
Research on Failure Behavior of 35CrMnSi based on Ballistic Experiment
Yongjie Xu, Zhijun Wang, Shouli Pan, Shuo Li
Failure behavior of metal materials under impact loading has become key research content in industrial manufacturing field. Especially in the field of weapon research, 35CrMnSi dynamic figure behavior in the serving process attracts relevant weapon manufacture researchers’ extensive attention. In order...
Proceedings Article
Establishment and simulation analysis on internal ballistics equations for artillery shrapnel
Shouli Pan, Ling Tong, Yucong Ma
Internal ballistic equations of artillery shrapnel are established on the basis of theoretical analysis, and equivalent method used for dealing with semi-combustible cartridge case, calculation program selects the Matlab software. The simulation results are accord with the experimental data, it shows...
Proceedings Article
Numerical Simulation of the Longitudinal Movement of a SSB Catamaran in Regular Waves
Hanbing Sun, Yi Jiang, Jiayuan Zhuang, Jin Zou
In order to improve seakeeping performance of the slender catamaran, Semi Submerged Bow (SSB) anti-pitching techniques is applied. Based on CFD method to forecast the longitudinal motion of the original catamaran (without SSB) in regular waves, and the calculation results and the ship model test results...
Proceedings Article
Multi-functional Intelligent Car With Wireless Communications
Mengtao Huang, Lu Wei
With the development of human science and technology, modern life rhythm speeding up, people's demand for intelligent in improving. Using intelligent machines instead of manpower, reduce human labor burden and improve the work efficiency has been becoming the current hot. Taking STC12C5A60S2 single-chip...
Proceedings Article
Research on Design Scheme of the Bridge Crossing Mekong River
Yun Zuo
A bridge will be built across the Mekong River in Luang Prabang Laos to maintain and enhance a vital transport link in the country, and to achieve successful development of road networks in northern region. Considering the topography, geology, hydrologic, navigation, construction and transportation conditions,...
Proceedings Article
The Mobile Technology Acceptance Mechanism of Ningbo Electronic Commerce Enterprise under Government Intervention
Songjie Gong
Electronic commerce enterprises adoption and usage of mobile information technologies currently is one of the most fashion trends in information systems research field. In the present research on electronic commerce enterprises, the research of mobile technology acceptance mechanism in Ningbo context...
Proceedings Article
Research on Web Service Composition Based on QoS Constraint
Liangda Yan
Recently, there has been a growing fashion for businesses to outsource parts of their processes, so as to emphasis more on their core activities. In addition, Web operators often need to compose different services to achieve a more complex task that cannot be fulfilled by an individual service. Web services...
Proceedings Article
An Improved Optimal Control Model of HIV Based on Treatment and Screening
Zhaofu Qun
In this paper, an optimal control model based on an improved HIV model is considered. Using of condom, screening of unaware infectives and incentive for treatment of the infected are used as the control items. Base on the same objective functional to minimize the unaware individuals and the cost of three...
Proceedings Article
The Study on the Test Mode of Cyber Countermeasure
Luan Yang, Dengwei Chen, Linying Geng
Cyber space has important position as traditional combat field like land, ocean, air and space as a new field. The paper research the classification of cyber countermeasure equipment range test based on the analysis of cyber countermeasure equipment and its technical architecture. Put forward a new test...
Proceedings Article
Building Fire Evacuation model research Based on an Improved Fruit Fly Optimization Algorithm
Lijie Zhang, Jianchang Liu, Shubin Tan, Xia Yu
We take into account to find a set of rapid evacuation routes during a building fire. We construct a three-dimensional building structure of the network, an evacuation route is a sequence of movements of people away from the threat of fire, to a safe exit in the network. The fire can stress crowds, cause...
Proceedings Article
An experimental study on multi-slices CT angiography of the basilar artery in rabbit model of cerebral vasospasm
Rui Li, Jinjin Liu, Weijian Chen, Yuxia Duan, Yunjun Yang, Zilong Hu, Xianxi Tan, Ming Zhong, Qichuan Zhuge
Background: Current methods for diagnosing cerebral vasospasm (CVS) include transcranial Doppler (TCD) ultrasonography and the current gold standard of digital subtraction angiography (DSA). The diagnosis of CVS is straightforward, but DSA is limited in its ability to quantify cerebral blood flow or...
Proceedings Article
Gene Exchange Operators of Partheno-Genetic Algorithm for Permutation Flowshop Scheduling with Maximum and Minimum Time Lag Constraints
Bailin Wang, Haifeng Wang, Tieke Li
Permutation flowshop scheduling problem with maximum and minimum time lag constraints to minimize the makespan is considered, and a framework of partheno-genetic algorithm for the problem is presented. Based on the algorithm framework, two gene exchange operators are discussed, including single-point...
Proceedings Article
IDFraIP:A Novel Protein Identification Algorithm Based on Fragment Intensity Patterns
Simin Zhu, Huamei Li, Kai Zheng, Xiaozhou Chen
A Identifying peptides for their fragmentation spectra by database search sequencing method is crucial to interpret LC-MS/MS data, widely used algorithms had not been fully exploited the intensity patterns in fragment spectra, SQID incorporated intensity information and identified peptides significantly...
Proceedings Article
Management of Intelligent Library Wireless Sensor Networks Based on Runtime Model
Ping Zhang, Jianzhong Wang
To quick customize, develop and extend intelligent library internet of things system more efficiently, in this paper an approach based on runtime model to managing intelligent library wireless sensor networks is proposed. Firstly, manageability of intelligent library wireless sensors is abstracted as...
Proceedings Article
A Multiple Indexes Quality Assessment for Fingerprint
Sheng Chang, Qijun Huang, Hao Wang, Jin He
The performance of fingerprint recognition relies heavily on the quality of fingerprint images. In this paper, a multiple indexes fingerprint quality assessment is proposed for poor fingerprints. This method fuses seven indexes from three kinds of typical fingerprint features (gray features, local features...
Proceedings Article
Cryptanalysis of Vaidya et al.’s User Authentication Scheme with Key Agreement in Wireless Sensor Networks
Jiping Li, Yaoming Ding, Zenggang Xiong, Shouyin Liu
User authentication in wireless sensor networks (WSN) is critical due to their unattended and even hostile deployment in the field. The open environment of WSN requires mechanisms which prevent unauthorized user from accessing the information from WSN. Recently, M.L.Das proposed a two-factor user authentication...
Proceedings Article
The Research on the 2D mobile game Platform Based on the Android System
Xiye Feng, Meihui Xu
With the rapid development of smartphones, Android system by its unique openness, rich hardware selection, convenient application development, is accepted by more and more people. The mobile game based on Android, is gradually popular in the crowd. The game in the research with a beautiful picture and...
Proceedings Article
Research on the architecture of e-government sharing platform
Gang Li, Qingpu Zhang, Wei Wang, Ming Jiang
At present, the resources integration and sharing efficiency between the government systems is not high in China. The phenomenon of repeated system development is common, which results in a tremendous waste of resources and cannot be adapt well to the information exchange, sharing and unified management...
Proceedings Article
The Application of Computational Geometry Algorithms in Discriminating Direct Injection-Production Connections
Jiqun Zhang, Chungjin Hu, Baorong Deng, Xinhao Li, Dongmei He, Hua Li, Junhua Chang
It is necessary to analyze direct connections between injection wells and production wells for discovering superior water channels, researching water flooding effectiveness and flow directions in a single well group. A new method of discriminating the direct connections by applying computational geometry...
Proceedings Article
Research of Intrusion Protection System using correlation policy
Shuo Li, Quan Zhang
Aimed at the limitations of single technology in network security defense, an Intrusion Protection System using correlation policy was proposed. This system consists of firewall, Intrusion Detection System and honeypot. The system extends the firewall redirection rules, sets up honeypot host monitors,...
Proceedings Article
A Fuzz system of the SMS module on cellphones
Zidan Fu, Quan Zhang
Since the mobile network become popular, threats and challenges upon the security of cellphone are more serious than ever. However, the vulnerability testing methods are limited in the old white box testing which the manufacturers adopt basing on the knowledge from the original information of designing...
Proceedings Article
Impact Analysis of Complex on Urban Special Structure in Linyi
Jinyi Wu
Urban complex is a highly effective entity integrating many functions. Based on the analysis of complex development status of Linyi, the growth pole theory is used to explain the mechanism which urban complex exerts on the spatial structure. The development of complex influences the urban spatial structure...
Proceedings Article
A unified framework for keywords distillation and summarization
Wei Yang
Keywords distillation and document summarization are important task for many text applications. Existing methods have been conducting these two tasks separately without considering the relationship between the two tasks. In order to capture and make better use of their relationships between these tasks,...
Proceedings Article
Security Weaknesses of Li’s Remote User Password Authentication Scheme Using Smart Card
Jie Ling, Guang-Qiang Zhao, Yi Liu
User authentication is an important technology to guarantee that only the legal users can access resources from the remote server. The advantages of smart cards are storage and computation abilities. Recently, Li et al. pointed out the security problems of Chen et al’s password authentication scheme...
Proceedings Article
Robust Kernel Estimation in Blind Deconvolution
Zhiming Wang, Xing Li
Due to the loss of information about image and the interference of noise, blind deconvolution is an ill-posed problem. In this paper, we study this problem based on the algorithm of Krishnan et al.[1], which uses a normalized sparsity measure to solve the problem. By assuming the random high frequency...
Proceedings Article
Image Noise Level Estimation by Neural Networks
Zhiming Wang, Guobin Yuan
Aiming at the problem of image noise level estimation, this paper proposes an algorithm for noise estimation by singular value decomposition and neural network. The larger (head) parts of the singular values of an image are mainly affected by main structure of the image, and the rest (tail) parts of...
Proceedings Article
Pupil location algorithm combing VFC Snake model with Grayscale Features
Peipei Lv, Zhiming Wang
Pupil location is one of the key steps for iris location as pupil boundary corresponds to iris inner boundary. But uneven illumination affects the segmentation result heavily. The pupil region is the darkest part in most of the images, but it’s not the only part. The proposed algorithm is based on the...
Proceedings Article
The Production Management System Based on Digital Pulp Pipeline Design and Development
Hongwei Liu, Ke Xiao, Chunlei Pan, Guangyue Pu
In light of the present condition of the enterprise production management system and single management means, management is not standard, most people are involved in the production management, production management standard is not unified, the production management problems such as difficult maintenance....
Proceedings Article
Automatic elongated object segmentation in CT image using Stroke Width Transform and Levelset
Zhi-peng Pi, Zhi-ming Wang
In this paper, we propose a full-automatic algorithm for extracting elongated object from CT image. Given an input image, we use the SWT(Stroke Width Transform) and MM(Mathematical Morphology) to locate the coarse location of target. Thus leading to over-segmentation. In order to refine the segmentation...
Proceedings Article
Harmonic Analysis and Simulation Study Using Triple-spectrum-line interpolation FFT Algorithm
Xiao-wan Song, De-min Li, Zhen-hua Li, Wen-zhang Guo
There is hard to obtain the harmonic parameters exactly for the fast Fourier transform in situation of non-synchronous sampling. The cosine window and triple-spectrum-line interpolation FFT algorithm is presented to reduce spectral leakage and improve the accuracy of harmonic analysis. The windowed FFT...
Proceedings Article
Research on Condition Monitoring of Power Big Data Based on Rough Sets
Yulong Yan, Jilai Wu, Shejun Wu, Jian Zhang
The urgency of demanding for large data in power industry will greatly exceed that of in other basic energy industries in the future. Through analyzing the power equipment condition monitoring data, we can assess more accurately the operating condition of power equipment, predict the life span of the...
Proceedings Article
Study on Distribution Network Reconfiguration with Various DGs
Shengsuo Niu, Yi Ding, Zhirui Liang
In order to research the influence of distributed generation access to distribution network, a mathematics model of distribution network reconfiguration with distributed generation is presented in this paper. Fireworks Algorithm is used to solve this problem. According to the characteristic of distributed...
Proceedings Article
Animated Space-Filling Hierarchy Views for Security Risk Control and Visualization on Mobile Devices
Paul Craig, Xin Huang
This paper looks at using a space-filling hierarchy view to control and visualize security settings on a mobile device. The view is optimized for readability and navigation with limited display space and provides a more fluid user-experience with a color-coded overview of security risks and buttons to...
Proceedings Article
Research and Apply Language Rhythm in Topic Tracking
Fan Chen
Language Rhythm is an important characteristic in language. Research and analysis the Language Rhythm, those four kinds of language rhythms prompted: language nature rhythm, language grammar rhythm, language logic rhythm and language emotion rhythm. Each language rhythms reflect the language characteristic....
Proceedings Article
A New Method to QoS Global Optimal Service Selection Driven by Credit
Xiaohua Guo, Jing Jiang, Xuefei Li
Aiming at the current Web service selection methods do not take into full consideration the effect of service component’s dynamic on the performance of service-oriented application system, a credit-aware per-service method to service selection is proposed in our paper, which introduces credit level into...
Proceedings Article
The Design and Implementation of Yu-County Water Supply Payment Management Information System
Tiantian Guo, Rongqiang Liu
In order to comply with the development direction of the water supply system of domestic and foreign, the use of SQL Server 2005 as a database development tool, Visual Studio.NET 2005 as a development tool for C # as the programming language, design and development of computer-based information processing...
Proceedings Article
Improved Models for the Spread of Ebola
Liye Xie
The Ebola epidemic is more and more severe. To optimize the eradication of EVD, we take Liberia, Guinea and Sierra Leone as the object of research, first we build suspected- exposed-I nfectious-dead (SEID) model based on the popular SEIR model, since there are no effective medicine till now and the mortality...
Proceedings Article
Research on Mining Association Behavior of Smart Home Users Based on Apriori Algorithm
Yongjun Zhang, Tingting Qi
This paper mainly studies the improvement of Apriori algorithm based on smart home system. Association rule algorithm has the promotion effect to the analysis of the smart home user behavior. Apriori algorithm is one of the classical algorithms of association rules. However, the efficiency of the Apriori...
Proceedings Article
Analysis of nonlinear parametric vibration of sling considering sling-girder coupling effect
Huihong Shentu, Zhou Li
Cable has strong nonlinear characteristics under the static or dynamic force, and if the frequency ratio of the boundary excitation meet some conditions, cable under force will perform a vibration amplitude much more than the initial value. The sling of a long-span suspension bridge may perform a parametric...
Proceedings Article
The periodic structure topology optimization using improved genetic algorithm
Dongyue Qu, Yangyang Huang, Jinyu Song
This paper combine improved genetic algorithm with bi-directional evolutionary structural optimization algorithm to optimize structure in dual coding way. The new algorithm not only has solved the genetic algorithm (GA) problem which is easy to appear premature, but also has solved the bi-directional...
Proceedings Article
Air Switch Remote-control System Based on GSM network
En Zou, Qing Huo, Shuihong Huang, Shengchuang Chen
TO solve the problem of air switch cannot be controlled remotely, an air remote control switch system is designed based on GSM network. Specific content information issued by the emission module of mobile terminal of system and received by GSM module, then decoded by the STC12C5052AD to make a real-time...
Proceedings Article
CEC2.0-Based Detection Event Relation for Chinese Text
Xianchuan Wang, Zongtian Liu, Tao Liao, Qiang Li
Event is the basic unit of knowing, remembering and understanding the real world. Event is regarded as the basic unit of knowledge representation. We detect event relation between two events for some Chinese texts by matching event relation pair table, which are constructed based on the CEC2.0 (called...
Proceedings Article
Research on transportation scheduling algorithm for special fuel of high frequency task
Jie Zhang, Liangcai Liao, Jinyuan Liu
Special fuel transportation scheduling is an important part of the space launch. Because of the lack of fuel transport train and limited production capacity of manufacturers having become the main limiting factors for special fuel transportation scheduling in space launch, it is very necessary to research...
Proceedings Article
Research of Big data and data security
Qiong Ren, Zhongyuan Xu
With the rise of blogs, social networks, and the vigorous development of cloud computing and Internet technology, the data is increasing at an unprecedented speed and cumulative, the big data era has come. The basic concept of big data, key techniques and the use of there are a lot of doubt and controversy....
Proceedings Article
An Improved BP Neural Network Algorithm for Evaluating Food Traceability System Performance
Weiya Guo
BP neural network algorithm has powerful calculation ability, but the algorithm has some shortages such as low convergence which limits its application, so improving BP algorithm has become a matter of concern in the fields related. Based on analyzing improvement methods wildly used today, the paper...
Proceedings Article
A Kind of Exchange System for Product Conceptual Design Based On the Enterprise Network Community
Dianting Liu, Quanyong Zhang
On the basis of the analysis on product conceptual design, four problems have been found. In order to solve the problems, the article puts forward a kind of communication system for the product conceptual design based on enterprise network community. In the system the Internet users are divided into...
Proceedings Article
Study on Agricultural Products Logistics Cost Control Based on the Internet of Things
Wenfeng Liu
In recent years, agricultural prices rising, one reason is the high cost of logistics. With more and more widely the application scope of the Internet of things technology, it brings to reduce logistics cost. Based on the analysis of development situation of the Internet of things and agricultural products...
Proceedings Article
Computer Network Security Research under Cloud Computing Environment
Qiong Ren, Jun Tao
Cloud computing is a new trend of the Internet which has changed the users habits on the computer and transformed more users’ work environments from desktop to Web. This paper introduces the concepts of cloud computing and its features and network security implications of cloud computing and its security...
Proceedings Article
A Novel Ordinal Regression Method with Minimum Class Variance Support Vector Machine
Jinrong Hu, Xiaoming Wang, Zengxi Huang
In the paper, we propose a novel ordinal regression method called minimum class variance support vector ordinal regression (MCVSVOR). MCVSVOR is derived from minimum class variance support vector machine (MCVSVM) which is a variant of SVM, and so inherits the latter’s characteristics such as taking the...
Proceedings Article
The Application of Chaos in Digital Water-marking and Information Hiding
Jing Chang, Dong Liu
This paper gives a brief introduction of chaos, digital water-marking and the application of chaos digital water-marking and information hiding. Then it analyzes the main difficulty in corresponding research that hidden information should have strong robustness and invisibility which contradict each...
Proceedings Article
Improvement of ORB algorithm
Xue Leng, Jinhua Yang
In this paper, According to the idea SIFT algorithm, proposed an improved algorithm ORB. Based on the multi-scale space, detecting scale space extreme points, then use the ORB descriptors to describe the feature points, generated descriptors having rotating invariability. Using Hamming distance to achieve...
Proceedings Article
The street lamp intelligent management system based on elastic compute service
Jing Liu, Yulin Qi, Zimeng Wang, Zeli Qi
Urban lighting systems as a sign of urban civilization, is becoming more and more important role. But the planning and management of urban street lighting equipment in most parts of our country is still in a very backward state. In order to improve the backward situation, save energy, increase the efficiency...
Proceedings Article
The Design of Signal Control Software and Intersection Traffic Simulation
Hongke Xu, Xiaoqing Hou, Rixing Zhu
The current traffic signal lights often do not have flexible revise function, so it can’t reach the real-time control requirements, and leads to increasingly serious urban traffic congestion, this control software presents an effective method to solve it by researching intersection traffic signal control....
Proceedings Article
The technology of variable message format simulation in software testing
Fei Gao, Xuejun Bi, Xiaozhen Wang
The complexity of software upgraded is the inevitable result of the deepening of social information, and then to put forward higher requirements of software testing. Because of technology, co-ordination, geopolitical, or other non-technical factors these factors the tested software and related hardware...
Proceedings Article
Research on Computer network multimedia transmission system
Chunxi Zhao
With the development of computer network, there are more and more multimedia real-time transmission methods. The traditional stand-alone multimedia synchronization method is unable to solve out of the sync problems due to the unstable factors in the network transmission. Therefore synchronization method...
Proceedings Article
An algorithm to solve the draw issue of number depth recognition
Zhenhui Li, Xia Zhang
This paper discussed that an algorithm solves the draw issue of number depth recognition. Depth recognition methods have used many fields and have wide development prospect. Many scientific research institutions and scholars are studying the depth recognition. When user writes in an MR system, a depth...
Proceedings Article
Spacecraft Relative State Tracking Based on Genetic Algorithm-embedded Particle Filter
Wenhua Cheng, Yasheng Zhang, Hong Yao
Spacecraft Relative State Tracking is not only the application foundation of space-based space surveillance system, but also the important prerequisite for space autonomous rendezvous and on-orbit servicing. Through making genetic algorithm (GA) embedded PF resampling process, the particle degradation...
Proceedings Article
Computer simulation implementations and optimization of the right atrium of the heart based on GPU
Chunxi Zhao
For heart right atrium electrophysiology simulation computation huge, time-consuming problem, a method based on high-performance graphics processing unit (GPU) to achieve parallel computing and optimization. First, consider the differences between right atrial heart cell center and the edge of the constructed...
Proceedings Article
Performance Research of China’s Listed Commercial Banks Based on Factor Analysis
SanXing He
Financial firms play a crucial role in the economic development, and commercial banks are important parts in the financial system. Commercial banks' competitiveness is reflected on their business performance. Therefore, measuring the performance of commercial banks has become an urgent task. In this...
Proceedings Article
A Parallel Algorithm Using Perlin Noise Superposition Method for Terrain Generation Based on CUDA architecture
Huailiang Li, Xianguo Tuo, Yao Liu, Xin Jiang
A parallel algorithm for terrain generation based on CUDA architecture is proposed in this paper, which aims to address the problems of high computational load and low efficiency when generating large scale terrains using the Perlin noise superposition method. The Perlin noise superposition method is...
Proceedings Article
A model of time management based on tree in Product Data Management
Biao Huang, Yuanning Liu, Xiaodong Zhu, Liangyu Li, Fei He
According to the distribution characteristics of workflow time node, this paper studies the time node representation of a structured workflow and describes in detail the definition of workflow time node in Product Data Management, then puts forward a tree design model. From the time property of different...
Proceedings Article
A Role-Based Access Control Model that Supports Authorization with The Combination of Static and Dynamic
Liangyu Li, Yuanning Liu, Xiaodong Zhu, Biao Huang, Youwei Wang
The traditional Role-Based Access Control(RBAC) model[1] is widely used in enterprises, but it's control granularity is too single and it's permissions configuration is too complex. This paper introduces the concepts of coarse-granularity and fine-granularity[2], and puts forward a RBAC model that supports...
Proceedings Article
A real-time vehicle-terramechanics model for visual simulation
Dong-bo Sun, Yan-qiang Di, Hao-hao Cui
The vehicle-terrain interaction model plays a critical role in off-road vehicle driving visual simulations. This paper present a new terrain deformation model for simulating vehicle-terrain interaction. The model simplifies the Bekker’s classic terramechanics model, and calculates terrain deformation...
Proceedings Article
Structural topology optimization based on improved genetic algorithm
Dongyue Qu, Yangyang Huang, Jinyu Song
This article aim at solving the problem of local optimal solution easily appear in structural optimization by the algorithm of bi-directional evolutionary structural optimization (BESO), and importing improved genetic algorithm (GA), put forward a new algorithm named bi-directional evolutionary structural...
Proceedings Article
Research on the Cloud Acceleration Method for the Compressed Sensing Algorithm under the Internet of Things
Wenzhun Huang, Shanwen Zhang
In this paper, we conduct research on the cloud acceleration method for the compressed sensing algorithm under the environment of Internet of Things. On the Internet of things perception layer, an important part of the sensor network have been put forward a lot of security mechanisms. Now about access...
Proceedings Article
The Application and Research of Information Technology of Cloud Computing in Colleges and Universities
Ying Luo, Miaomiao Li
As an emerging technology, cloud computing has a profound impact on Internet. This paper introduces the concept and characteristics of cloud computing, then studies the current status of university information technology, and analyzes how cloud computing promote the development of university information...
Proceedings Article
A New Research Approach on the Application of Virtual Reality Technology in Civil Engineering
Changchang Fu
Virtual reality technology is constantly developing, dedicated to computer graphics and multimedia information processing, high-performance chip can increase a hundred times the processing power, three-dimensional graphics algorithms and parametric modeling algorithm enables virtual reality technology...