Proceedings of the 2017 2nd International Conference on Modelling, Simulation and Applied Mathematics (MSAM2017)

Session: Computational Intelligence Technology and Application

18 articles
Proceedings Article

The Deployment of Sensor Nodes Based on the Internet of Things for Intelligent Agricultural Monitoring

Zeping Mu
Sensor networks can be applied to the deployment of intelligent monitoring of ecological environment with the fewest sensor nodes. First, determine the factors under monitoring and the critical points of relevant factors. Next, build the optimized mathematical monitoring model in terms of the monitored...
Proceedings Article

The System Design of Vision-Based Intelligent Robots

Yuanqin Zhang, Xiangjun Zou, Shaofeng Luo, Lufeng Luo, Weiming Situ
Equipping with a vision system for robot is an important tendency for the development of intelligent robots. To explore the applications problems of visual robot in wood processing, we have designed vision-based wood stacking robot system, the system has combined visual system and industrial robots,...
Proceedings Article

Face Recognition Based on Deep Autoencoder Networks with Dropout

Fang Li, Xiang Gao, Liping Wang
Though deep autoencoder networks show excellent ability in learning feature, its poor performance on test data go against visualization and classification of image. In particular, a standard neural net with multi-hidden layers typically fails to work when sample size is small. In order to improve the...
Proceedings Article

GIS-based Remote Sensing Analysis and Disaster Pre-warning Method of Complicated Geologic Structure in Highway Corridor Zone

Hao Lei, Junling Qiu, Jinxing Lai, Xiuling Wang
In order to realize the efficient organization of the engineering geological information, the GIS management platform was proposed, which can realize the comprehensive management of RS interpretation results and GPS positioning. Based on a highway, the management pattern of multi-source, multi-date and...
Proceedings Article

Intelligent Self-learning System of AMT Gear Position

Yulong Lei, Xiaoxin Gang, Yao Fu, Jianlong Hu
This essay makes an analysis of shift principle and the location distribution of the gear of the AMT system without shift actuator. According to the self-study theory, we exploit an intelligent gear position self-study system and try to figure out the problems of finding the certain gear position because...
Proceedings Article

Development and Application for Intelligent Monitoring System of Concrete Temperature Control

Lei Zhang, Guoxin Zhang, Yi Liu, Xiangming Deng, Liying Yang
The temperature control and crack prevention of the high dam is with very much difficulties. One important reason is that the unsmooth information causes improper measures and management, that is "four don't" for obtaining the information- not timely, not accurate, not true, not systematic; furthermore,...
Proceedings Article

The Existence of Periodic Solutions for Planar Multi-parameter Autonomous Perturbed Systems

Zhimin Luo
This paper studies the existence of periodic solutions of autonomous multi- parameter perturbation system by using Liapunov second method when the critical point of the plane autonomous system is the real center. We obtain a necessary condition and a sufficient condition which extend those in references....
Proceedings Article

Estimation of Storm-centered ARF Using Radar Rainfall by Duration and Return Periods

Eunji Kim, Boosik Kang
Design flood estimation, the application of the Areal Reduction Factor (ARF) is essential to convert the point rainfall to areal rainfall for the reference area. ARF calculation methods are largely divided into fixed-area method and storm-centered method. Since ARF is calculated by independent frequency...
Proceedings Article

A System to Identify the Terrorism Tendency from Objective and Psychological Aspects

Anrui Fu, Sheng Han, Ruixiang Li, Jianyong Zhang
This paper figures out a system to identify whether a person has the tendency to be a terrorist. The system, which is used to inspect the terrorism tendency of the monitored people mainly from two aspects: objective and psychological conditions, is more objective and comprehensive than before to some...
Proceedings Article

The Method of Separate Phase Adjusting for Dual-Channel Monopulse Tracking System

Fu'an Sun, Junchao Li, Sanwen Li, Cheng Li
Aimed at the limitation of the phase adjusting method now available for the tracking system, the paper puts forward the method of separate phase adjusting. Based on the full testing of signal conveying character, the phase value of any frequency and any channel configuration can be gained by the method...
Proceedings Article

Research and Implementation on Microwave Power Online Measurement and Compensation of Automatic Test System

Liang Qin, Zhen Wang, Yuhang Kang, Xianjun Shi
Aiming at the problem of microwave cable power attenuation of automatic test system, this paper puts forward to a microwave power online measurement and compensation method and designs power measuring equipment. Before the test process, it is controlled by automatic test program, the measurement cable...
Proceedings Article

Application of Artificial Neural Networks on Predicting Corrosion Rates of Carbon Steel in Taiwan Industrial Zones

Hsiang-Teng Lin, Chien-Ming Lo, Min-Der Lin
This study employed artificial neural network (ANN) to develop a regional forecasting model to predict atmospheric corrosion rates of carbon steels within general industrial zones and coastal industrial zones in Taiwan. Analyzed data are based on the results of metal atmospheric corrosion rates monitoring...
Proceedings Article

Research on Computer-Assisted Translation in the "Internet Plus" Era

Liangping Zhang, Xiangxin Liu
In the "Internet +" era, computer-assisted translation can not only improve the efficiency of translation, but also ensure the improvement of translation quality. This paper attempts to design a computer - aided translation system based on the Internet + era by combining the functions of dictionary support,...
Proceedings Article

Remote Registration and Log-in Scheme for Mobile Networks with PIN Number

Binbin Yu, Liang Hu, Jianfeng Chu, Ling Chi, Hongtu Li
In this paper, based on Scott's PIN scheme and Hu's private key distribution scheme, we proposed a new effective remote registration and log-in scheme for mobile networks and devices. In our article, we can guarantee the performance of the protocol for mobile networks and ensure the security of the private...
Proceedings Article

Evaluating the Postgraduate Examination Database Based on Analytic Hierarchy Process

Yehan Sun, Ping Zhang
Analyzing and evaluating the examination database quality is very important for test management, and the results of its analysis are also essential to estimate the work of test and teaching. This research has built up an evaluation model through the method of Analytic Hierarchy Process (AHP), which included...
Proceedings Article

Soil Moisture and Crop Evapotranspiration Forecast for Winter Wheat Based on Weather Information in North China Plain

Zhandong Liu, Anzhen Qin, Aiwang Duan, Jiyang Zhang, Jingsheng Sun, Dongfeng Ning, Ben Zhao, Zhaorong Mi, Zugui Liu
Soil moisture and crop evapotranspiration (ETc) forecast based on weather information is a basis for realizing precise irrigation, which could be an innovative technique for water–saving strategy in irrigated district. Combined with long–term experimental data in People's Victory Canal irrigated district,...
Proceedings Article

Degree Centrality, Betweenness Centrality, and Closeness Centrality in Social Network

Junlong Zhang, Yu Luo
Social network theory is becoming more and more significant in social science, and the centrality measure is underlying this burgeoning theory. In perspective of social network, individuals, organizations, companies etc. are like nodes in the network, and centrality is used to measure these nodes' power,...
Proceedings Article

Research on the Hidden Technology of Troy Trojan-Horse

Ting Mao, Shengbing Che, Wei Deng
The hidden technology of Trojan horses was investigated. Through the analysis of the original Trojan hiding technology, it improved the local hiding ability of the Trojan horse and construe randomly selected octed the Trojan horse which embodied the collaborative hiding ability. I put forward a Trojan...