Proceedings of the 2018 International Conference on Network, Communication, Computer Engineering (NCCE 2018)

+ Advanced search
201 articles

Relationship of Lane Width to Speed for Urban Expressway: A Case Study in Shanghai

Jian Sun, Taoning Li
In order to mitigate traffic congestions caused by the rapidly increased private car ownership in Shanghai, the transportation agencies implemented several strategies, such as narrowed the lane width to create additional lanes. To investigate the relationship of the lane width to speed, two month of...

Research on Airport Security Based on Virtual Queuing Theory

Yaxin Liu
Airport screening process takes too long time and people take more attention to this phenomenon and hope it to be solved. In this paper, we propose virtual queuing model in order to minimize the average waiting time, minimum waiting time variance and to ensure the airline's maximum revenue. By establishing...

Parameter Calibration of CT System

Yurui Peng
In this paper, we use the known template to calibrate the parameters of the two-dimensional CT system. The calibration of CT system includes three aspects: the location of the center of the system in the square pallet, the distance between the detector units, and the 180 directions of the X-ray used...

Study on Bottlenecks in Airport Security Process Based on Simulation

Yaxin Liu
Based on the advanced experience at home and abroad, this paper discusses the bottleneck identification method of airport security inspection process with airport security process as the research object. Firstly, we use MATLAB to establish a simulation model and introduce the number of passenger, the...

Research on How to Measure the Success of Smart Growth of a City

Yurui Peng
In this paper, we construct an evaluation metric of sustainable development called ‘Smart Growth Score’ (SGS) combining with the 3E’s and the ten principles of smart growth. This provides a clearer description of how successful a city develops smartly. We build a scoring model called “Smart Growth Score”...

Static Routing Algorithm of Nano-satellite Constellation

Yilong Shi, Xiujie Jiang, Ping Zhu, Yufeng Zhang, Meng Liu
According to the work characteristics of Nano-satellite constellation, this paper studies the configuration of it and the static routing algorithm of it. Firstly, the coverage rates of different constellation configuration are given and the constellation configuration with the best coverage is confirmed....

Research on Prevention Strategies of General Aviation Flight Accidents Based on Regression Analysis Method

Liang Zhang, Yantao Wang
Flight safety is important for the development of general aviation; this paper first analyzed the main accident types of general aviation, obtained various factors that cause general aviation flight accidents, regression analysis method was used to analyze factors data, prevention strategies of general...

Modeling the Evaluation of Human-Vehicle Interaction with Multiple Indices

Pu Li, Chunming Li, Zhiyou Fan
We herein try to improve the human-machine interaction of military vehicles, which need the evaluation model of designing user interface (UI). Current evaluation of UI depended on the measured data of a large number of users, which were time-consuming as well as lacking quantitative evaluation. And there...

Building networks with MIMO and OFDM Technology

Chengwei Hu
A multiple input multiple output (MIMO) system provides multiple independent transmission channels, thus, under certain conditions, leading to a channel capacity that increases linearly with the number of antennas. Orthogonal frequency division multiplexing (OFDM) is known as an effective technique for...

On Bipolar Possibility Fuzzy Soft Sets

Congcong Meng, Bo Hai, Hailong Yao
The concept of bipolar possibility fuzzy soft sets is proposed and some basic operations on them are defined such as complement, extended union, extended intersection, restricted union, restricted intersection, "AND","OR". Then their properties are investigated . An application of bipolar possibility...

Summary of Non-rigid 3D Shape Data Retrieval and Description

Meizhen Liu, Chunmei Duan
Non-rigid 3D shape retrieval and descriptors has become an active and important research topic in content-based 3D object . The aim of this paper is to compare and sythesize the performance of methods for non-rigid 3D shape retrieval and descriptors.This paper reviews the application of non-rigid three-dimensional...

Multimodal Image Fusion for Brain Image Based on Nonsubsampled Shearlets Transform

Na Zhang, Peiguang Wang
Multi-modal medical image fusion has been emerging as a new and promising research area due to the increasing demands in clinical application. A novel fusion rule for medical brain image fusion is proposed in this paper based on the Nonsubsampled Shearlets Transform (NSST). The functional image is converted...

Asynchronous Data Recognition Research Based on Interval Association Degree

Jing Zhao, Xin Guan, Guidong Sun, Haiqiao Liu
Aiming at the problem that the sequence data can’t be fused with the interval data in the database directly, the sequence-interval asynchronous data recognition algorithm based on interval association degree was proposed. First of all, reduce the dimension of the sequence data, use the maximum and minimum...

Research on Auto-Drawing Technology of Orthogonal Network Topological Graph with High Degree Nodes

Zhongyan Liang, Jie Hu, Qiaojin Guo
Automatic network topology drawing technology has been studied by many scholars, including straight-line layout and orthogonal layout. There are lots of toolkits to do this task, such as GraphViz and OGDF (The Open Graph Drawing Framework). However, the automatic layout results for some drawings are...

Autonomous Upper and Lower Elevator Security Robot Based on Machine Vision

Haoyang Xu, Zheming Yang, Qiuhong Jia
The security robot realizes the detection of the elevator contour and key by the machine vision algorithm, and realizes the control of the elevator door with the manipulator, so as to realize the independent elevator. On the same floor, it achieves the best path and then cruises through path planning,...

Survey of Convolutional Neural Network

Xv Zhang, Chenxi Xv, Ming Shen, Xin He, Wei Du
In recent years, the breakthrough of deep learning in the field of artificial intelligence algorithms has triggered an academic upsurge which attracted more and more researchers. As a multi-layer perceptron, the key to its success lies in the local link and weight-sharing method. On the one hand, it...

A Survey of Network Measurement in Software-Defined Networking

Lu Wang, Yan Lu
The huge size of network and diversified business characteristics make network traffic difficult to predict and manage. Network measurement is an effective way which can ensure QoS (Quality of Service) and network optimization. However, due to the differences in the implementation rules of equipment...

Big Data Privacy Protection Model Based on Multi-level Trusted System

Nan Zhang, Zehua Liu, Hongfeng Han
This paper introduces and inherit the multi-level trusted system model that solves the Trojan virus by encrypting the privacy of user data, and achieve the principle: "not to read the high priority hierarchy, not to write the hierarchy with low priority”. Thus ensuring that the low-priority data privacy...

Multi-Step Wind Speed Forecasting Using Signal Decomposing Algorithms, Bat Optimization Algorithm and Least Squares Support Vector Machine

Zhou Li, Chunxiang Li
Accurate forecasting of short term wind speed has been widely applied in the disaster early warning of civil engineering. Considering the characteristics of non-stationary and nonlinear of wind speed, the actual wind speed time series need to be decomposed first and then predicted. In this paper, a set...

Research and Implementation of Blockchain Warehouse Receipt Trading Platform Based on BFT

Jianfeng Li, Zhihong Zhang, Yuehan Zhang
For the problems of excessive centralization in information flowing, low performance in business extension, and being difficult to guard against the risk of the bill market in the traditional warehouse receipt trading system, this paper proposes a warehouse receipt trading platform based on block chain...

Study on Road Condition Recognition Method Based on Convolutional Neural Network

Feng Jiang, Ning Wei, Yan Zhou, Hengjun Niu
In recent years, frequent traffic accidents, traffic accidents captured countless people's lives, so the road safety problem attracts more and more attention of common people. This paper studies the problem of automatic recognition of road condition, the purpose is to improve the traffic information...

Mathematical Derivation and Analysis of Success Probability of Bitcoin Attack

Yingyu Pan
By using block chain technology, bitcoin has realized a real de centralization and point to point digital currency system, which effectively solved the problems of "double payment" and "curbing inflation". Bitcoin has the value and function of money, therefore, in practical application, we need to consider...

ETL Transformation Function Modeling Approach Based on Model Transformation

Yu Zhou, Yue Zhang
ETL is Extract-Transform-Load, which cleans, transforms, and integrates data according to uniform rules. At present, most of the methods for constructing ETL transformation function adopt a graphical representation method and lack precise semantic representation, which cause the computer to not automatically...

Semi-Transparent Checkerboard Calibration Method for KINECT’s Color and Depth Camera

Zhengyang Wu, Wenzhe Zhu, Qing Zhu
This article describes a method for manually calibrating KINECT color and depth cameras using a semi-transparent checkerboard, and at the same time, the two images can be modeled by 3D projection. A detailed comparison of the resulting images and data is given for the specific experimental procedure...

Continuous speech recognition model based on CTC Technology

Yumeng Wang, Jianmin Zhao
In end to end speech recognition,the linguistic knowledge such as pronunciation 1exicon is not essential??,and therefore the performance of the ASR systems based on CTC is weaker than that of the baseline.Aiming at this problem,a strategy combining the existing linguistic knowledge and the acoustic modeling...

Research on the Construction of Unstructured Data Center Based on Cloud Storage in Universities??"??"Taking Shaanxi Normal University as a Case

Qi Xu
In view of the large number of scattered and unstructured data problems in the process of comprehensive informatization in higher education, the article proposes to build a cloud storage platform to provide users with private cloud storage with high capacity and high reliability, and to exert aggregate...

Application of adaboost algorithm and immune algorithm in telecommunication fraud detection

Bing Wu, Mengtao Li, Chunlai Zhou
Fraud detection is one of the biggest challenges facing the telecommunication industry now and in the future,The fight against fraud and anti-fraud has also reached a new stage. Finding a time-sensitive fraud detection method is an important way for operators to solve this problem. In this article, To...

Recommender System for Books in University Library with Implicit Data

Guang Liu, Xu Zhao
Recommender system is a very important tool to help customers make choices more easily in a large variety of offered products. However, it is difficult to make directly use of the recommender system to provide suggestion for the traditional books in a library because of the shortage of the explicit feedback,...

Auto-Scaling Web Application in Docker Based on Gray Prediction

Shuangyan Wu, Dong Zhang, Bingheng Yan, Feng Guo, Dongpu Sheng
The on-demand use and the elastic scaling feature of cloud computing make more and more companies deploy web applications on cloud platforms. True elasticity and cost-effectiveness in the pay-per-use cloud business model, however, have not yet been achieved. To address this challenge, we propose an algorithm...

A Review of Visual tracking Technology based on Infrared Image

Shijie Ren, Xiaogang Yang, Naixin Qi
Visual tracking is a hot topic in the field of computer vision, this paper firstly describes the classification and application of visual tracking, and highlights the advantages of object tracking based on infrared image by simple comparison. Combined with the research of this technology, tracking technology...

Overview of Reverberation Chamber

Ting An, Guizhou Lv, Zhuangzhi Han, Zhiyong Liu
This paper introduces the basic concept and basic structure of the Reverberation Chamber, as well as its development process. Present situation of the theoretical research and application research on Reverberation Chamber are also introduced. It is emphasized that the Reverberation Chamber has inherent...

The Solution and Simulation of Air-to-air Missile Launch Envelope Based on Cooperative Air Combat of Manned/Unmanned Formation

Yinghao Li, Rong Fan
Considering the new air combat scenario involving manned/unmanned aerial vehicle cooperative combat formation, a simulation of air-to-air missile launch envelope based on cooperative air combat of manned/unmanned formation is built to resolve the new problem of cooperative air combat. Based on the mechanism...

Comparative Research on Automatic Classification Algorithms Based on Chinese Medical Literature

Kai An, Yunqiu Zhang, Xiaoyang Wang, Zhe Jiang, Chenglong Wang, Xiang Zhu
With the development of electronic periodicals, it is unavoidable that there are some classification management problems. But currently the classification management of papers basically majors in manual classification. Based on Chinese medical literature, this essay compares and analyzes these automatic...

Application of Improved Fireworks Algorithm Optimized SVM in Intrusion Detection

He Li, Xiang Ji, Jingmei Li
In order to further improve the effectiveness and accuracy of intrusion detection and avoid the security risks brought by network attacks, this paper proposes an intrusion detection strategy based on improved fireworks algorithms??"TFWA-SVM. This algorithm first optimizes the fireworks algorithm, constrains...

Research on the Factors of Frequent Itemset Mining Based on Dynamic Hashing

Hanyu Hu, Yunli Chen
In order to improve the efficiency of association rules mining frequent itemsets, some people proposed using hashing techniques to mine association rules, it can greatly improve the time and space efficiency of frequent item sets. the space-time efficiency of the classical Apriori algorithm and the use...

Self-healing Model Construction and Simulation of Power SDH Transmission Network

Yang Wang, Qiusheng Yu, Yidan Ren, Jianhua Cui, Lei Liu
With the rapid development of Synchronous Digital Hierarchy (SDH) technology, it has been more and more widely used in power communication networks. The power communication network has high requirements on the reliability of data transmission, and the self-healing ring has the advantages of automatic...

Research on Influence Maximization Based on Microblog Network

Yuxin Zhou, Yufeng Liu, Huanhuan Zhi
Influence maximization is an important research focus in our social network. It mainly aims at searching the most influential user node quickly and accurately in the social network. Most studies are based on the quantity of the influenced parties rather than the influence propagation scope in traditional...

A Greedy Optimization Algorithm Based on QoS in UAV Cluster Network

Wei Fu, Xinli Zhou
Due to the strong mobility of nodes, the possibility and randomness of network holes were increasing in UAV network, and the limited energy-carrying capacity of nodes leads to the limitation of cruising ability. The general geographic assistant routing protocols often failed to satisfy demand in the...

Record 579.5 km Unrepeatered 2.5Gb/s Transmission with a Span Loss of 96.8 dB by Coherent Receiving Technology

Jian Xu, Ming Li, Shujuan Sun, Han Long, Liyan Huang, Min Xiang, Qing Luo, Guoliang He
In this work we experimentally demonstrate record 579.5km commercial unrepeatered 2.5G transmission, with the first application of 2.5Gb/s polarization multiplexed quadrature phase shift keyed (PM-QPSK) format combined with a coherent receiver. Such ultra-long haul is enabled by use of Forward Error...

The Study of Mixed Storage Scheme of Private Cloud Platform Based on Ceph

Zuoyang Qu, Chenhui Xie, Chengliang Liu
Ceph is a unique unified system that supports object storage, block storage, and file storage with the characteristic of high available, manageable, and free. To build a distributed storage system based on Ceph in a private cloud environment with a high level of data privacy, it can support object storage,...

Research and application of active noise control system in vehicle

Fuchen Ding, Mingjiang Wang, Xing Wu
With the improvement of living standard, riding comfort has become an important indicator of choosing a car, but the noise in the car is the key factor affecting the ride comfort. The traditional passive noise reduction technology has a good inhibitory effect on high frequency noise, but the effect of...

Fast Affine Projection Algorithms for Simplified Structure of Multichannel Active Noise Control

Jiaming Liu, Binwen Fan, Fuchen Ding
This article focuses on the application of AP algorithms in active noise control systems. The active noise control system is a real-time tracking noise signal, which is then cancelled with an opposite signal to achieve noise reduction. Therefore, the active noise control system requires high real-time...

An Improved Hybrid Active Noise Control System

Xing Wu, Jiaming Liu, Binwen Fan
In order to achieve a good noise reduction effect in a closed space, an active noise control system was built. Hybrid control systems have faster convergence and better stability than feedforward control systems and feedback control systems. We will study feedforward, feedback and hybrid control systems....

Combining Radiomics and CNNs to Classify Benign and Malignant GIST

Tianqi Zhuo, Xin Li, Hong Zhou
This paper studies the classification of gastrointestinal stromal tumor (GIST) with machine learning and radiomics methods. The highlight of the paper is that combining features extracted from computed tomography (CT) images by radiomics and convolutional neural networks (CNNs) are used in classification...

Research and Optimization of Multichannel Wide Dynamic Compression Algorithm in Hearing Aids

Hu Chen, Mingjiang Wang, Mengyan Li, Sixue Xiang
This paper proposes a non-equal width multi-channel loudness compensation algorithm for digital hearing aids. This method achieves a non-equal width multi-channel loudness compensation scheme based on the sensitivity of the human ear to the frequency and the perception of sound intensity. First, the...

Mobile Intelligent Terminal Based on SD Card Trusted Module Credibility Enhancement and Application Mode Research

Fei Wang, Jie Qiang, Xinlai Dang
Based on the security threats faced by mobile intelligent terminals in the Internet of Things, this paper proposes a trusted enhancement framework for Android mobile intelligent terminals based on the SD card trusted module. A trustworthy computing environment including Trusted Security Management Center...

Design of the key Structure of Convolutional Neural Network Reconfigurable Accelerator Based on ASIC

Hongli Pan, Mingjiang Wang, Jingqun Li
In this paper, we propose a reconfigurable architecture that supports various convolutional neural networks (CNNs) such as GoogLeNet and AlexNet. The proposed architecture mainly includes 24 parallel PEs (processing engines) for image data convolution processing, each engine containing 9x4 MAC (multiplier-accumulator)...

Realization of Music Fountain Control system based on single Chip Microcomputer

Biqing Li, Zhao Li, Suping Jiang
With the development of society, people's living standards improve, on the side of entertainment have become increasingly demanding, musical fountain as a highly ornamental recreational facilities, increasing the public's favorite subject. According to the current development of musical fountain, this...

An Automatic Construction Approach for Sentiment Dictionary Based on Weibo Emoticons

Xiaohong Hao, Yifan Jia, Qun Gu
Different from common texts, microblog texts have large amount of emotions and net-words. Its words and sentences expression are more colloquial and network popular, so traditional sentiment dictionary does not suit for the context of modern microblog short texts. This article puts forward an approach...

Fuzzy Soft Set Multi-Attribute Decision Making Method Based on TOPSIS with Improved Entropy Weight

Yangfan Liu, Xiaohua Liu
In the process of fuzzy soft set multi-attribute decision making, and It is difficult to determine the weight of the attribute parameters which results in low efficiency of decision making. Therefore, a new method of determining the entropy weight which is calculated by the notion of the importance degree...