Proceedings of the 2017 2nd International Conference on Modelling, Simulation and Applied Mathematics (MSAM2017)
Session: Computational Intelligence Technology and Application
18 articles
Proceedings Article
The Deployment of Sensor Nodes Based on the Internet of Things for Intelligent Agricultural Monitoring
Zeping Mu
Sensor networks can be applied to the deployment of intelligent monitoring of ecological environment with the fewest sensor nodes. First, determine the factors under monitoring and the critical points of relevant factors. Next, build the optimized mathematical monitoring model in terms of the monitored...
Proceedings Article
The System Design of Vision-Based Intelligent Robots
Yuanqin Zhang, Xiangjun Zou, Shaofeng Luo, Lufeng Luo, Weiming Situ
Equipping with a vision system for robot is an important tendency for the development of intelligent robots. To explore the applications problems of visual robot in wood processing, we have designed vision-based wood stacking robot system, the system has combined visual system and industrial robots,...
Proceedings Article
Face Recognition Based on Deep Autoencoder Networks with Dropout
Fang Li, Xiang Gao, Liping Wang
Though deep autoencoder networks show excellent ability in learning feature, its poor performance on test data go against visualization and classification of image. In particular, a standard neural net with multi-hidden layers typically fails to work when sample size is small. In order to improve the...
Proceedings Article
GIS-based Remote Sensing Analysis and Disaster Pre-warning Method of Complicated Geologic Structure in Highway Corridor Zone
Hao Lei, Junling Qiu, Jinxing Lai, Xiuling Wang
In order to realize the efficient organization of the engineering geological information, the GIS management platform was proposed, which can realize the comprehensive management of RS interpretation results and GPS positioning. Based on a highway, the management pattern of multi-source, multi-date and...
Proceedings Article
Intelligent Self-learning System of AMT Gear Position
Yulong Lei, Xiaoxin Gang, Yao Fu, Jianlong Hu
This essay makes an analysis of shift principle and the location distribution of the gear of the AMT system without shift actuator. According to the self-study theory, we exploit an intelligent gear position self-study system and try to figure out the problems of finding the certain gear position because...
Proceedings Article
Development and Application for Intelligent Monitoring System of Concrete Temperature Control
Lei Zhang, Guoxin Zhang, Yi Liu, Xiangming Deng, Liying Yang
The temperature control and crack prevention of the high dam is with very much difficulties. One important reason is that the unsmooth information causes improper measures and management, that is "four don't" for obtaining the information- not timely, not accurate, not true, not systematic; furthermore,...
Proceedings Article
The Existence of Periodic Solutions for Planar Multi-parameter Autonomous Perturbed Systems
Zhimin Luo
This paper studies the existence of periodic solutions of autonomous multi- parameter perturbation system by using Liapunov second method when the critical point of the plane autonomous system is the real center. We obtain a necessary condition and a sufficient condition which extend those in references....
Proceedings Article
Estimation of Storm-centered ARF Using Radar Rainfall by Duration and Return Periods
Eunji Kim, Boosik Kang
Design flood estimation, the application of the Areal Reduction Factor (ARF) is essential to convert the point rainfall to areal rainfall for the reference area. ARF calculation methods are largely divided into fixed-area method and storm-centered method. Since ARF is calculated by independent frequency...
Proceedings Article
A System to Identify the Terrorism Tendency from Objective and Psychological Aspects
Anrui Fu, Sheng Han, Ruixiang Li, Jianyong Zhang
This paper figures out a system to identify whether a person has the tendency to be a terrorist. The system, which is used to inspect the terrorism tendency of the monitored people mainly from two aspects: objective and psychological conditions, is more objective and comprehensive than before to some...
Proceedings Article
The Method of Separate Phase Adjusting for Dual-Channel Monopulse Tracking System
Fu'an Sun, Junchao Li, Sanwen Li, Cheng Li
Aimed at the limitation of the phase adjusting method now available for the tracking system, the paper puts forward the method of separate phase adjusting. Based on the full testing of signal conveying character, the phase value of any frequency and any channel configuration can be gained by the method...
Proceedings Article
Research and Implementation on Microwave Power Online Measurement and Compensation of Automatic Test System
Liang Qin, Zhen Wang, Yuhang Kang, Xianjun Shi
Aiming at the problem of microwave cable power attenuation of automatic test system, this paper puts forward to a microwave power online measurement and compensation method and designs power measuring equipment. Before the test process, it is controlled by automatic test program, the measurement cable...
Proceedings Article
Application of Artificial Neural Networks on Predicting Corrosion Rates of Carbon Steel in Taiwan Industrial Zones
Hsiang-Teng Lin, Chien-Ming Lo, Min-Der Lin
This study employed artificial neural network (ANN) to develop a regional forecasting model to predict atmospheric corrosion rates of carbon steels within general industrial zones and coastal industrial zones in Taiwan. Analyzed data are based on the results of metal atmospheric corrosion rates monitoring...
Proceedings Article
Research on Computer-Assisted Translation in the "Internet Plus" Era
Liangping Zhang, Xiangxin Liu
In the "Internet +" era, computer-assisted translation can not only improve the efficiency of translation, but also ensure the improvement of translation quality. This paper attempts to design a computer - aided translation system based on the Internet + era by combining the functions of dictionary support,...
Proceedings Article
Remote Registration and Log-in Scheme for Mobile Networks with PIN Number
Binbin Yu, Liang Hu, Jianfeng Chu, Ling Chi, Hongtu Li
In this paper, based on Scott's PIN scheme and Hu's private key distribution scheme, we proposed a new effective remote registration and log-in scheme for mobile networks and devices. In our article, we can guarantee the performance of the protocol for mobile networks and ensure the security of the private...
Proceedings Article
Evaluating the Postgraduate Examination Database Based on Analytic Hierarchy Process
Yehan Sun, Ping Zhang
Analyzing and evaluating the examination database quality is very important for test management, and the results of its analysis are also essential to estimate the work of test and teaching. This research has built up an evaluation model through the method of Analytic Hierarchy Process (AHP), which included...
Proceedings Article
Soil Moisture and Crop Evapotranspiration Forecast for Winter Wheat Based on Weather Information in North China Plain
Zhandong Liu, Anzhen Qin, Aiwang Duan, Jiyang Zhang, Jingsheng Sun, Dongfeng Ning, Ben Zhao, Zhaorong Mi, Zugui Liu
Soil moisture and crop evapotranspiration (ETc) forecast based on weather information is a basis for realizing precise irrigation, which could be an innovative technique for water–saving strategy in irrigated district. Combined with long–term experimental data in People's Victory Canal irrigated district,...
Proceedings Article
Degree Centrality, Betweenness Centrality, and Closeness Centrality in Social Network
Junlong Zhang, Yu Luo
Social network theory is becoming more and more significant in social science, and the centrality measure is underlying this burgeoning theory. In perspective of social network, individuals, organizations, companies etc. are like nodes in the network, and centrality is used to measure these nodes' power,...
Proceedings Article
Research on the Hidden Technology of Troy Trojan-Horse
Ting Mao, Shengbing Che, Wei Deng
The hidden technology of Trojan horses was investigated. Through the analysis of the original Trojan hiding technology, it improved the local hiding ability of the Trojan horse and construe randomly selected octed the Trojan horse which embodied the collaborative hiding ability. I put forward a Trojan...