Proceedings of the 2015 4th National Conference on Electrical, Electronics and Computer Engineering

Session: Session 2: Computer Science and Engineering

186 articles
Proceedings Article

Analysis of Graduation Thesis Information Based on Decision Tree

Mengyi Li, Jiuru Dai, Zhigang Zhang
In order to improve the quality of graduation thesis, many colleges and universities carried out reforms on the thesis work according to their own actual situation. Through data mining method, this paper explores the main factors affecting the result of graduation thesis, and then classifies and predicts...
Proceedings Article

Calculation of Waxy Crude Pipeline Temperature Field

Sen Hu
Because of the characteristics of high pour point and high viscosity of waxy crude, pipeline temperature must be calculated accurately in order to guarantee the safety of the pipeline operation. Therefore it is a crucial technical problem to simulate the temperature field precisely. In this paper, unsteady-state...
Proceedings Article

Research on university data statistics service platform based on data warehouse

Jinlian He
Through the analysis of the whole structure and data warehouse modeling, the data warehouse star structure is used to analyze the data model, and the key technology of ETL is analyzed.
Proceedings Article

Application of open network knowledge in data mining and Information retrieval

Ruren Deng, Yinghuan Wu
With the development of science and technology, the use of computer simulation technology has become increasingly widespread, and has played an important role in the decision-making of enterprises in our country. In the traditional enterprise decision-making, because of the lack of data and the accuracy...
Proceedings Article

Study on Numerical Computation Method in Advanced Mathematics

Wei Li
Advanced mathematics is a required course in colleges and universities of China. It represents the basis for all natural sciences. Advanced mathematics is strongly abstract and has a very complex logicality. As such, some students in colleges and universities at present feel bored and even hate to study...
Proceedings Article

Chinese Text Classification Based on Ant Colony Optimization

Xin Luo
It's significance for us to study Chinese Text Classification, when we face so much dynamic information. The development of Text Classification has a close connection with Pattern Recognition. However, some peculiarity of Chinese Text Classification, such as it has many classes, much noise, and excessive...
Proceedings Article

Research on dynamic viewport display method for automatic generation of power flow diagram

Wenchong Fang, Taifeng Kang, Bin Zhang, Shouyu Liang, Ruipeng Zhang, Yonggang Li
Power flow diagram is an important tool of modern Energy Management System (EMS) for system operators to schedule the operation and maintenance plan, examine security situation and dispatch in real-time. Manually creation and maintenance of power flow diagram of large scale power grid is time consuming...
Proceedings Article

Chinese Text Classification Based on Particle Swarm Optimization

Xin Luo
For mass, heterogeneous and dynamic text information, it has important significance to the text classification. In recent years, the theory and method of Swarm Intelligence has been developed gradually, which provides a new method for text classification. In this paper, the intelligent algorithm of swarm...
Proceedings Article

Baseband Design of Broadband Wireless ad hoc Network and Cross-layer Optimization of Transmission Power Control

Chun Wei, Ming Li
The capacity and transmission power of the wireless ad hoc networks are limited, so the key to study in the field of ad hoc networks is how to use the capacity of the nodes and improve the performance of the network. Based on the research of traditional layered protocol, a new cross layer optimization...
Proceedings Article

Study of Platform Passenger Evacuation Simulation Based on GPU

Zhiyong Cai, Qianni Deng
Pedestrian Evacuation Simulation can be used to support developing the evacuation solutions for subway stations. Although the pedestrian evacuation based on general purpose processors acquire good effect when the simulation scale is very large. We investigated the effect of the layout of subway stations...
Proceedings Article

Design and Implementation of Fitness Engineering System Based on Big Data Analysis

Yongjian Li
In view of the perspective of public service, the paper analyzed its function and meaning in sports development, explained the current supply situation of public sports development in our country, raised and analyzed the reasons of the supply disparity of urban and rural public sports service, It emphasized...
Proceedings Article

Research on the Application of Physical Information Searching based on the Internet

Linwang Zhou
The main source of sports information in Chinese portal sites comes from self collection. Currently sport channels content construction has formed a good and interactive pattern of sports news information and material background. Sport information resource is composed of types of knowledge, skills, news,...
Proceedings Article

Two-dimensional code security image and its application in design of food traceability system

Hui Feng, Bin Luo
Two-dimensional code technology has been applied to all aspects of production and life, such as auto parts production line tracking, product traceability, medical emergencies, e-commerce, media and tourism. However, these two-dimensional code application generally concentrated in record numbers, letters...
Proceedings Article

Research on Applications of Information Technologies in Medical Image Area

Juan Zhong, Honghui Lai
Medical image plays an important role in the modern medicine. However, the medical images also have some shortages and limitations, which can be made up by some information technologies. This paper firstly introduces the common information technologies used in medical image area, such as the data mining...
Proceedings Article

Research of the Data Security Related Issues in Cloud Computing Services

Nan Hu
Cloud computing is a kind of data-intensive computing and it has a great advantage in the data storage, data calculation and data transmission. But in the practical application, the problems of data security of cloud computing is worrying, the security problem of centralized data storage and transmission...
Proceedings Article

The wireless networking research based on Zstack

QingXiu Wu, ShuQing Li, GuoFang Zhang
Zstack is an industry-leading ZigBee protocol stack launched by TI company, it includes protocol stack that covers almost all of the features of mesh and network topology, and occupies a very important position in the fierce competitive zigbee field. This paper describes software framework of Zstack...
Proceedings Article

Application and Design of New Media in Museum Exhibition and Display

Jinxiu Wang
In recent years, new media spring up suddenly compared with traditional media. However, the application of digital technology in exhibition and display of museum not only has great influence on the development of exhibition but also brings much attention on digital exhibition and display technology....
Proceedings Article

Development and Research of Data Acquisition System

Cen Li
The process of data acquisition system to obtain data information is carried out from a plurality of signals. The system is a high degree of automation equipment, it not only can real-time data acquisition, real-time control and status display, it also can be automatically stored, signal preprocessing...
Proceedings Article

Research on Algorithm of Frequent Subtree Mining

Xin Guo, ChangGuo Xiang
With the development of computer and information technology, frequent mine become important researching value, from subset mine to structured data mine, it includes frequent sub tree mining and frequent sub graph mining. In this paper, we introduces frequent sub tree mining and describes research status,...
Proceedings Article

Research of Graph Mining Base on Cloud

Cen Li
With respect to the problems of idle consumption and luxury consumption existing in the present cloud computing platform, and the current situation that the traditional graph mining method could not satisfy the massive data mining, A dynamic graph mining method for minimum energy consumption optimization...
Proceedings Article

Study on A Fast Algorithm for Mining Disorder Tree

Xin Guo
Unordered tree mining has important research value in the field of XML data, bioinformatics, Web structure. In this paper, we propose a disorderly tree mining algorithms-UTMiner (Unordered Trees Miner). Because the tree has a disordered mining property, so in order to avoid digging out the same sub-tree,...
Proceedings Article

Study on A Rapid Export Subtree Mining Algorithm

Xin Guo
Export subtree mining has important research value in the field of XML data, bioinformatics, Web structure. In this paper, vector and sub-tree pruning threshold two concepts are taken and take advantage of the sub-tree vector features, combined with a hash table structure, we proposed a sub-tree based...
Proceedings Article

A Novel Tree Cluster and Classification Approach Based on Least Closed Tree

Xin Guo
The extensive application of tree model has made tree mining become a hot field in data mining research. As an important branch of tree mining, tree cluster and tree classification plays a fundamental analysis role in many areas. In this paper, a tree cluster and classification algorithm was proposed...
Proceedings Article

The Analysis of Stroke Incidence Based on the Multivariate Successive Regression Analysis

Gaofeng Hui
Stroke is a common serious threat to human health and life. This article uses multivariate successive regression analysis methods discussed the relationship between incidence and average pressure, pressure difference, average temperature, temperature difference and the average humidity. Through statistical...
Proceedings Article

Research on the Mobile Communication Network Optimization Based on the Cloud Computing Model

Yan Guo
In order to maximize the use of existing mobile communication network resources and enhance the efficiency of mobile communication network optimization, we introduce the cloud computing model. Combined with the situation of mobile communication network optimization, this paper elaborated the characteristics...
Proceedings Article

Research on the Routing Protocol Analysis in Wireless Ad Hoc Networks

Yang Liu
Wireless MANETs with the features of flexible, high overall robustness and low system costs and it has attracted wide attention. In wireless ad hoc networks, routing protocol occupies an important position. The paper analyzes the routing protocol in wireless ad hoc network to achieve high-performance...
Proceedings Article

Design and implementation of food traceability system based on two dimensional code

Tingting Li, Bo Li, Dechang Huang
Food safety problem has become one of the most important topics of social concern, because of food from the acquisition of raw materials production to final consumption of intermediate links become more and more, traditional form filling, seal and other way is not easy to on these links were effective...
Proceedings Article

The Research on Big Data Security Architecture Based on Hadoop

Zhuang Miao
This paper will discuss the security of big data from two aspects: the first is the architecture, we will list some differences in handling and storing information in big data systems, and discuss how they can affect the security of data and databases. The second is the operation and maintenance management,...
Proceedings Article

Research of Application of MATLAB Numerical Analysis Methods on Electrical Engineering

Miao Li, Ran Jia
Now, the type of simulation software is varied, and because of its powerful functions, so MATLAB precisely has been widely used in many areas, this paper describe the value of MATLAB simulation applications in electrical engineering and automation industry. In the AC and DC speed control system, power...
Proceedings Article

Social Work in Teen Addiction Correction Services Research Under the New Situation

Shiyong Zheng, Weili Guan, Biqing Li, De-ze Qin
With the rapid development of science and technology, and better living standard of people, Internet having features of low cost, large information source and rapid speed, plays an important role in common people’s life. Internet brings a lot of convenience while at the same time it causes series of...
Proceedings Article

The Ramsey Type Model with Endogenous Birth Rate

Wang Donghan, Yang Jun, Zhu Huan
In this paper, a Ramsey type model with endogenous birth rate is set up to inquire the optimal birth rate choosing in the economic growth process. It is proved the model has a unique equilibrium which is saddle under some given conditions. Along the optimal growth path, the per capita capital, consumption...
Proceedings Article

A new processor design based on 3D cache

Shan Lei, Liu Guangbao, Xie Song
The interconnection is becoming one of main concerns in current and future microprocessor designs from both performance and consumption. Three-dimensional integration technology, with its capability to shorten the wire length, is a promising method to solve issues related the interconnection. In this...
Proceedings Article

Research on a Remote Sensing Image Classification Algorithm Based on Decision Table

Yang Dehui, Song Yong, Zhang Kai
A remote sensing image classification algorithm based on decision table is proposed in this study. Firstly, image segmentation of remote sensing image was performed to extract feature attribute of image object. Then several samples were selected from image objects in different categories to construct...
Proceedings Article

Intelligent Information Systems and Digital Libraries

Zhu Yuqing
Digital library information systems generate large amounts of complex, numeric content. A new category of digital libraries with supporting services for such content is important to advancing library research. Intelligent services likewise are required to automate scientific workflows. Simulation environments...
Proceedings Article

Benchmark Testing for Transwarp Inceptor—A big data analysis system based on in-memory computing

Chen Mingang, Liu Zhenqiang, Liu Wanggen
The high demand for data analysis and rapid development of big data technology and application has led to a variety of commercial and open source big data processing systems launched by industry and academia. So how to test and evaluate these systems objectively has become an important research topic....
Proceedings Article

A spectrum efficient node clustering method for WMSN

Xiong Zheyuan
In wireless multimedia sensor networks (WMSN), visual correlation exists among multiple neighboring sensors. Overlapping Field of View in dense networks leads to considerable redundancy in the collected images. A spectrum efficient clustering mechanism is proposed for efficiently gathering images in...
Proceedings Article

Single-phase-to-ground fault line selection in distribution networks based on similarity of wavelet energy spectrum

Zhong Mingjun, Zhu Qiang, Gong Liang, Leng Fangliang
In order to solve the problems of ground fault line selection in distribution network, the article presents a fault line selection method based on the similarity of the wavelet packet energy spectrum. After extracting a certain data of transient fault zero-sequence current by the wavelet packet decomposition,...
Proceedings Article

Joint Optimization of Smart Antenna System and Wireless Mesh Network

Xie Yulong
Various network architectures are evolved into the next generation wireless system to provide better services, such as wireless mesh networks (WMNs). However, single radio node mesh operating on a single channel suffers from capacity limiting. Multiple radio nodes mesh can obviously improve the network...
Proceedings Article

Cascaded Sigma-Delta modulator with dual quantization architecture and an inter-stage feedback path

Xie Yu
The conventional Sigma-Delta modulators have several drawbacks: e.g. the major problem with dual quantization architecture is that it can only be applied in a single loop topology, which causes the dynamic range (DR) problem; The inter-stage feedback topology only cancels nonlinear errors by introducing...
Proceedings Article

Liver Segmentation with Semi-Supervised Learning

Li Yonghui, Liu Xiaoxiao
Efficient liver segmentation from volume data provides important assistance for minimal invasive surgery and treatment. However, this task suffers from the special anatomy and topological changes. This paper presents a robust interactive method, which treats it as a semi-supervised learning task. An...
Proceedings Article

Research on Management Platform Construction of Users and Recourses Based on Multi-export Campus Network

JinG Qi, Sun Shan, Yang Runyuan
The campus network users have many kinds of types, and the network resource they access to is not certain. In order to improve the flexibility of the different needs for campus network users to access external resources, so campus network access multiple ISP network. This paper based on the multi-export...
Proceedings Article

An Influence Calculating Method based on Mobile Phone Data

Chen Yancui
In order to provide the personalized services, there is massive research about the mobile recommender system. The user influence plays an important role in the recommender system, so an influence calculation method based on mobile phone data is proposed in the paper. In the proposed method, we consider...
Proceedings Article

Segmentation of Noisy and Textured Images by an Expectation Maximization and Gradient Descent Iteration Method

Yang Zhenzhou
Segmentation of noisy and textured images remains challenging in both accuracy and computation efficiency.In this paper, we propose a new method for segmentation of noisy and textured images. The proposed method is based on the famous Expectation Maximization (EM) methodwhich calculates the global parameters...
Proceedings Article

Efficient Acoustic Modeling Method for Unsupervised Speech Recognition using Multi-Task Deep Neural Network

Haitao Yao, Maobo An, Ji Xu, Jian Liu
This paper proposes a method of acoustic modeling for zero-resourced languages speech recognition under mismatch conditions. In those languages, very limited or no transcribed speech is available for traditional monolingual speech recognition. Conventional methods such as IPA based universal acoustic...
Proceedings Article

Research on rumor early warning mechanism based on kinetic energy

Liu Li, Yang Fengming
Network rumors have become a severe scourge disturbing people’s network life, even endangering social stability and national security. The best way to control rumor propagation is to discover earlier, so as to take actions to govern rumor before it breaks out. In this paper, from the aspects of rumor...
Proceedings Article

An evaluation method of access capacity in distribution network

Nie Mingjun, Leng Fengchuan, Zhu Hua, Peng Liang
In order to publish access capacity, warnings and loads in distribution network regularly, the article presents a method to evaluate access capacity based on marketing – distribution - dispatching information fusion system. After extracting the relevant data from marketing – distribution - dispatching...
Proceedings Article

Research on the Classification of the Advanced Manufacturing Mode

Qinghui Dai, Hongmei Li
This paper presents a classification approach for advanced manufacturing mode (AMM). Firstly the concept and features of the advanced manufacturing mode are expounded in the paper. Then the advanced manufacturing modes are divided from three aspects: the manufacturing mode development concept, the manufacturing...
Proceedings Article

A frequency offset estimation algorithms for OFDM mixed signals

Wei-cheng Xue, Changjiang Huang, Jun Ju
The integer frequency offset and the fractional frequency offset estimation algorithms in SFN are improved and used for the Composite fractional frequency offset estimation in OFDM mixed signals in this paper The simulation results show that the performance of the Composite frequency offset estimation...
Proceedings Article

The Feasibility of Long Cycle Time Synchronization for Wireless Sensor Networks

Fuqiang Wang, Xiaoming Wu, Hong Liu, Yifan Hu, Xiangzhi Liu
Energy efficiency has received extensive attention in energy-constrained Wireless Sensor Networks (WSNs). As is known, radio communication accounts for major energy consumption of wireless device and the control of radio transmitter can make effective function with energy efficiency system. In this paper...
Proceedings Article

Neural network-based method for anti-glare glass preparation process parameters optimization

Jianli Yu, Hongqi Huang, Xiaojuan Niu
Along with the urban development, the application of anti-glare glass is more and more widely, high transmittance and low reflection of glass manufacturing technology research is of great significance. Because of the complexity of the anti-glare glass preparation technology, anti-glare glass transmittance...
Proceedings Article

Academic Libraries Data Analysis Using Data Mining

Yuqing Shi, Yuelong Zhu, Jinghong Su, Lanfang Zhu, Dongmin Wu, Chen Lin
Nowadays, the requirement to preserve user privacy has avoided the preservation of data that could be used to correlate library data to non library data. This paper used data mining and data detection to identify academic library use patterns and to judge whether students' the number of published papers...
Proceedings Article

Clutter Modeling Based on SIRP Principle

Bin Wang, Xin Song, Fengming Xin
With the development of science and technology, more extensive use of electromagnetic spectrum will make radar environment become more and more complex. So radar should develop towards intelligent direction and clutter modeling needs to be more accurate. In this paper, based on SIRP principle, we research...
Proceedings Article

The Research and Design of Remote MCU Learing Plaform Based on the Combination of Virtual and Reality

Chunrong Chen, KaiJin Qiu
Recently, there have been a great need in society for MCU learning especially in engineering and science. However, the environment development didn’t match the increasing demand for MCU teaching in fact. On the one hand, the costs of learning at their own expense are high. On the other hand, limits of...
Proceedings Article

Research on the Integration and Performance of Emotion Concept in Visual Communication Design

Huifang Li, Qi Wang
Visual communication design is an important part of modern design, which is the main form of information communication in modern society. The existing design is no longer only satisfied with the function and the surface of the visual experience, but to consumers and viewers through visual language to...
Proceedings Article

Research on Graphic Symbol Expression in Visual Communication Design

Xueqing Shi
Visual Communication Design unprecedented tremendous development, rich visual form also brings to the audience a sense of visual fatigue. Visual communication designers must be the most sensitive to understanding the audience's attention lying. Graphical symbols have vivid, expressive and appealing features....
Proceedings Article

The Research on QoS Routing Algorithm Based on Improved Optimization Sorting Ant Colony Algorithm

ChunHui Qiu, Yue Gong, KaiXi Zhou
In ordering to resolve the slow convergence problem of ant colony algorithm in QoS routing, this paper presents a sort of ant colony algorithm which based on optimized sequence. In global pheromone updating, this algorithm weakens the influence of a single iteration solution and adopt a combination of...
Proceedings Article

Performance Evaluation of Fire Alarm System Based on FPNN

Wei Gou, Na Qu, Zhenliang Lan
The type of fire alarm system and grades of standards exist fuzziness. fuzzy mathematics relative membership grade theory and probabilistic neural networks are combined to build a fuzzy probabilistic neural network (FPNN) evaluation model of fire alarm system. The method of constructing model is proposed...
Proceedings Article

An Adaptive K-nearest-neighbor Interference Alignment Algorithm Based on Minimizing Projection in Cellular System

Longzhen Dai, Ran Duan, Weijia Cui, Daming Wang
For the disadvantages that the high computational complexity and the heavy overheads of the system when interference alignment is applied to the cellular system for co-channel interference cancellation, this paper proposed an adaptive K-nearest-neighbor interference alignment algorithm based on minimizing...
Proceedings Article

High Accuracy Indoor Imaging Positioning Algorithm Based on Angle Feedback with Visible Light

Wenzuo Hou, Daming Wang, Yankui Zhang
Paper puts forward an imaging positioning algorithm , timely obtaining the acceleration parameters in the inertial frame of triaxial accelerograph of intelligent mobile terminal IMU (Inertial measurement unit) and then taking use of angle feedback principle to indirectly get attitude information of mobile...
Proceedings Article

Handlebar appearance inspection algorithm based on two-direction trace and check

Jingfei Zhang, KaiJin Qiu
High automatically industry production is an inevitable trend in the development of modern factory. Based on objects of precise, efficient and intelligent manufacturing and replacing heavy manual labor to lower the high error rate., this paper proposes a new product appearance dark grain detection algorithm....
Proceedings Article

Application of Price Discrimination in the Network Team Purchase

Yanqin Zhu, Jun Zhang, Jiajia Wang
With the development of the network team purchase(NTP), the analysis on the theory of NTP will be more and more important Since NTP is a new consume model, there are few researches on it up to now. Network team purchase in the development process from scratch, there have been a variety of modes, which...
Proceedings Article

A Novel Knowledge Modeling Framework POTMe and Its Application for Col-laborative Problem Solving

Jian Jiang
Collaborative efforts are inevitably demanded when solving a complex problem, which is often plagued with incomplete, ill-structured, and poor quality information. Therefore, a global knowledge modeling framework is required for cross-domain knowledge coordination. However, current knowledge modeling...
Proceedings Article

Research of Multiple-type Files Carving Method Based on Entropy

Jun Guo, Jingsha He, Na Huang
File carving is a technique of recovering data from disk without depending on the File System, and the key step is the extraction and reassembly of file fragments. Efficient recognition and extraction of file fragments is not only the prerequisite of recovering file, but also the guarantee of a low false...
Proceedings Article

Research on Logistic Management Quality Evaluation Based on Support Vector Machine

Ya-qing Deng, Shuang Yu, Ning Wang
For making feasible logistics management come true, fully using data resources, and establishing in line with the development of a healthy enterprise logistics management mode, this paper puts forward a new analysis model for evaluating the quality level of logistics management based on support vector...
Proceedings Article

A novel de-interlacing algorithm based on dynamic threshold motion detection

Ye Yuan
In order to solve the noise and blur in traditional de-interlacing algorithm, a novel de-interlacing algorithm based on dynamic threshold motion detection is proposed to detect still and motion parts. First the dynamic maximum and minimum are obtained according to different situations. Second, the motion...
Proceedings Article

Research on software safety growth testing method based on FTPM model

Zhongxiao Ji, Guohua Jiang
In the key areas of safety, the safety requirements of the software are becoming higher and higher. However, there are all kinds of safety testing methods, or the presence of state space explosion, or the test case is huge, and the safety testing efficiency is low. In order to solve this problem, this...
Proceedings Article

Information Services Model based on Publish/Subscribe for Large Scale Sensor Networks

Biao Dong, Jinhui Chen
This paper presented an approach for modeling and implementing the architecture of large scale sensor networks(LSSNs) information services applications using publish/subscribe (Pub/Sub) paradigm. Considering the high level abstraction and the dynamic characteristics which were necessary for large-scale...
Proceedings Article

Power Allocation Scheme based on System Outage Probability for Energy-Harvesting Cooperative Networks

Hao Wang, Qi Zhu
A power allocation scheme is proposed to improve the outage performance for a wireless cooperative network with multiple energy-harvesting relay nodes. The optimization problem is formulated to minimize the system outage probability under the constraints of both relay joint maximum transmit power and...
Proceedings Article

Optimization and Calculation of Pt-Sn Phase Diagram

Jieqiong Hu, Ming Xie, Shaoxia Sun, Jiming Zhang, Youcai Yang, Man men Liu, Song Wang, Saibei Wang
Optimization and calculation of the phase diagram of Pt-Sn binary system were presented by Pandat software.The Gibbs free energy of the pure component (Au and Pt) was described by the expression of the SGTE (Science Group Thermodata Europe) database, Using the solid solution phase thermodynamic model...
Proceedings Article

The Application Of Service-Oriented Information Sharing Program in Geographic Information System

Han Zhang, Jianhong Ma
Geospatial information with the feature of multi-source, multi-space-time, multi-semantics, multi-scale and diversity of data formats, makes geospatial information sharing a complex issue, For this reason, to resolve spatial information sharing is the key to spatial information applications and services....
Proceedings Article

TOPSIS Based Multi-radio Access Scheme in Heterogeneous Wireless Networks

Xuewen Zhu, Qi Zhu
With the rapid development of various kinds of radio access technology, the trend of future network will be the heterogeneous wireless networks environment, where all kinds of networks coexist for their complementary characteristics. On the other hand, the rise of smart terminal and software defined...
Proceedings Article

A study about the improvement of Ant colony algorithm

Wen-zhe Liang, Qing-yin Niu, Chao Fan
The ant colony algorithm is a new kind of simulated evolutionary algorithm for random searching, which converges to the optimal path by the accumulation of pheromone and updating. But it lacks the global searching ability, and easily falls into local minimum and appears the phenomenon of premature stagnation....
Proceedings Article

Weighted Immunization Strategy on Real Networks

Jia Zhao, Simeng Wang, Zixu Zhou, Zitong Zhou
In this paper, we propose a weighted immunization strategy on real networks with community structure. We first introduce the concept of bridge nodes on networks. It may be helpful for controlling the spread of epidemic to immunize the bridge nodes in the network with community structure. Then, we present...
Proceedings Article

Research and Implementation PaaS platform based on Docker

Xugang Yin, Yanlei Shang
With the development of Internet technology and the popularity of cloud computing technology, the organizations or companies try to build a private cloud platform. PaaS is a form of cloud computing service resources and provides application development environment. As the existing PaaS platform hosting...
Proceedings Article

Object Segmentation Using Structural Relationship between Super-pixels

Yonghui Gao, Lei Zhou, Xiaoxiao Li
We address the problem of describing and integrating long range information efficiently, such as the information demonstrated by super-pixels (patches), into conditional random field (CRF) model for object segmentation. For those purpose, a novel structural relationship between patches are defined for...
Proceedings Article

The Design and Implementation of the Service Hosting and Delivery Platform Based on Cloud

Yanqiao Sun, Yanlei Shang
With the arrival of big data and Cloud computing era, it is a huge issue of how to organize the application services. Organizations and companies usually have plenty of applications range from web, mobile or middleware, etc. Because the quantity and diversity of services, they are delivered through different...
Proceedings Article

Design of a SPR sensor for efficacy evaluation of traditional Chinese Medicine

Helin Zhang, Guolong Zhang, Kang Zhang
Objective to antibacterial effect of traditional Chinese medicine for real-time detection, analysis of quantitative efficacy evaluation. Methods the vacuum thermal evaporation plating layer metal film produced fiber SPR sensor, sensing changes in antimicrobial antigen and antibody of each parameter in...
Proceedings Article

An Adaptive Texture Synthesis Algorithm

Xuewen Ding, Subramaniam Ganesan, Jing Chen
Patch-based texture synthesis has proven to produce reasonable results for a wide variety of texture classes. In this paper, an effective adaptive texture synthesis method is proposed based on the popular Image Quilting and the general framework of Hybrid Texture Synthesis (HTS) algorithm. Our algorithm...
Proceedings Article

An Improved Trust Mechanism Based on the Similarity

Daoquan Li, Ruimin Guo
Aiming to the trust of C2Cnetwork, indirect trust is introduced when direct trust value is lower. On this basis, the comprehensive trust value is calculated which is used to select trading node. The satisfaction factor, transaction size, transaction time, transaction frequency and other factors are taken...
Proceedings Article

An Approach for Protecting the OpenFlow Switch from the Saturation Attack

Mingxin Wang, Huachun Zhou, Jia Chen, Bo Tong
Security is always a serious issue influencing the development of Software-Defined Network (SDN). The central control mechanism makes the SDN controller a bottleneck of the network which is vulnerable to network saturation attack. In this paper, we propose an approach to defense this kind attack. Firstly,...
Proceedings Article

Image Enhancement Based on Adaptive Median Filter and Wallis Filter

Dongjie Tan
Image enhancement has been an important technique for image analysis. The purpose of enhancement is suppressing noises and enhancing image details. However, most of algorithms only focus on the noise suppressing or detail enhancing. In this paper, an algorithm which could both suppressing noises and...
Proceedings Article

Approach for uncertain multi-attribute decision-making with interval numbers complementary preference relation on alternatives under partial weight information

Hong-an Zhou
The uncertain multi-attribute decision making (UMADM) problem that the information about attribute weights is known partly and the decision maker (DM) has preference information on alternatives in the form of interval numbers complementary judgment matrix is investigated. Firstly, based on interval numbers...
Proceedings Article

Virtual Machine Migration Strategy Based on the Load Evaluation and Prediction under the Cloud Environment

Yueqi Zi, Yongqiang Sun, Yi Sun
Concerning the centralized communication overloading of the virtual machine (VM) in the cloud computing center, this paper puts forward an adjustment strategy, that is, to build a model through the load evaluation of three threshold values in consideration of the load balancing and to achieve the objective...
Proceedings Article

Fuzzy Comprehensive Evaluation of Runway Incursion based on Fault Tree Method

Baoshun Xiong, Haolin Cui, Yihui Li
To overcome the traditional fault tree diagnosis techniques are difficult to resolve random uncertainty and complexity ambiguity. We choice the method of combine fuzzy comprehensive evaluation with fault tree analysis. First of all, we construct a runway incursion fault tree, comprehensive identification...
Proceedings Article

Preliminary Study on China’s Low-Altitude Airspace Operation Safety Evaluation Method

Qian-Rui Sun, Deng-Kai Yao, Yi-Ye Zhou
As the innovation of low-altitude airspace is advancing, the operating system is more mature, and the amount of aircraft increases rapidly, resulting in the increasing importance of the operation security. However, today’s research on safety evaluation of low-altitude airspace in China is lagging behind....
Proceedings Article

Application of plant growth simulation algorithm for permutation flow shop scheduling problem

Baohua Yan
Based on Plant Growth Simulation Algorithm, we propose a novel algorithm for solving permutation flow shop scheduling problems. Starting with the characteristic of permutation flow shop scheduling problems, combining disjunctive graph according to the sequence of scheduling, analyzing Scheduling options...
Proceedings Article

Task Scheduling Algorithm in Cloud Computing Based on Fairness Load Balance and Minimum Completion Time

Yizhen Wang, Yongqiang Sun, Yi Sun
Task scheduling is one of the key technology of cloud computing, its main goal is to satisfy the fairness of the system resources and tasks more effectively, and at the same time as much as possible to realize the load balance of system resources and reduce the completion time. Combined with the advantages...
Proceedings Article

Optimization and Design on Hotel Management Information System

Chen Guo
through the overall structure analysis and design of hotel management information system such as system software structure, system network structure and work procedure etc, this system realizes network management of hotel business, solves information communication and procession among departments. This...
Proceedings Article

Interference Detection Algorithm of Aircraft Components Assembly based on Measured Data

Wei Zhang, Luling An, Qilin Jiang, Ruiheng Xiao
Parts manufacture deviation may cause interference in aircraft components assembly, and the handling of interference is a complex work. In order to solve this problem, the paper proposes an interference detection method based on measured data. First, the assembly feature was obtained by fitting the point...
Proceedings Article

A new method for the diagnosis of power backbone communication network based on extension rating

Li Li, Tiantian Luo, Huiqi Shen, Runze Wu
Electric power communication network is an important part of power system, which plays a vital role in the operation of power network. This paper established an index system of electric power communication network and proposed a diagnostic method of electric power communication network system based on...
Proceedings Article

Research of cyberspace situational factors organization criterion

Zi juan Luo, Cong lin Wang
This paper proposes a cyberspace situational factors organizational methods, provide a unified framework for data organization, so that information from different sources can be organized between the host status information to be consolidated, abnormal event information, traffic information, topology...
Proceedings Article

Syntax Validation of the SQL Conditional Expression Based on Postfix-Expression Evaluation

Lijun Wei, Yang Pan, Hao Wang, Yan Zhang
The SQL conditional expression is not a constant expression, making it impossible to judge its legitimacy through the final value. However, there exists one alternative way where the elements in expression should be identified first to obtain the corresponding postfix data type expression, and the algorithms...
Proceedings Article

Research on Crowd Behavior Based on the Velocity Field

Fang Yuan, Ke Ma, Jia-hong Liang, Yong-Jing Chao
Data-driven modeling method has become an ideal research method in crowd behavior simulation fields. The basic idea of data-driven modeling method is that velocity field generated by the crowd behavior characteristic information. Because of the video data acquisition, the velocity field has its limitation,...
Proceedings Article

Research on Protocol Conformance Testing Method Based on Petri net

De Qin SHU, Hao Fang, Liang Zhang
Network protocol conformance testing is a functional black box testing. It tests whether that if the implementation of a protocol consistent with consists with the protocol standards according to the protocol text description. A method of network protocol conformance testing with Petri net is presented....
Proceedings Article

An Energy Efficient Node Scheduling Algorithm of Wireless Sensor Network

Jie Chen, Xiao-Yu Li, Hai-Feng Zhao, Yue-Tong Chen
After the wireless sensor network nodes deployed on the detection region. It needs scheduling algorithm to optimize nodes deployment and make full use of sensor nodes’ energy consequently. This paper proposed an energy efficient nodes scheduling algorithm. It could make better use of wireless network...
Proceedings Article

The Analysis of the Thickness-predictive Model Based on the SVM

Xiu-ming Zhao, Yan Wang, Zhimin Bi
This paper presents a method which improves the thickness of the prediction model. At the same time, it builds up a SVM prediction model based on MATLAB simulation experiment. By comparing the simulation curves of the mechanism model and SVM regression prediction, it apparently can be seen that thickness-output...
Proceedings Article

Research on process data communication theory in the EMU reconnection UIC gateway and Simulation

Tong Zhang, Changxian Li, Ke Zhao
UIC gateway built on UIC556 standard can realize inauguration, process and message data effective configuration and communication between different manufacturers EMUs. With valid configuration of node monitoring database, process data can be properly transferred to the WTB (MVB) bus through filtering...
Proceedings Article

Research on Feature Selection and kNN Classification Method in Chinese Text Classification

Chao Xiao, Ping Wu
Scholars at home and abroad have done lots of research on feature selection methods in Chinese text classification, such as document frequency (DF), information gain (IG), and a -test (CHI). On the basis of their work, we propose a new selection method of counting the unbalanced degree of term distribution,...
Proceedings Article

A New Watermarking Algorithm for Point Model Using Angle Quantization Index Modulation

Xiaoqing Feng
Point cloud models are widely used in industry. It is also faced with increasingly serious copyright protection issues. A new watermarking algorithm of 3D point cloud model using angle quantization index modulation is proposed. At first, a point cloud model is segmented into many patches according to...
Proceedings Article

Research on convexity-preserving of the weight factor of cubic NURBS interpolation curve

Jiyuan Liu, Shaoping Chen
This paper mainly discusses the weight factor that influence on cubic NURBS interpolation curve shape. Based on the existing curve and surface interpolation, the thought, the criterion and the concrete steps of the convexity-preserving of the weight factor of cubic NURBS interpolation curve are provided,...
Proceedings Article

Research on Identification and Control of Network Traffic Based on SDN Technology

YangQun Li
SDN technology implements network deployment/management flexibility and network resource virtualization by the separation of the control plane and forwarding plane of the network. However, SDN technology faces the same problems as the traditional network does, that is the network can’t recognize the...
Proceedings Article

Analyses of PHP Dynamic Website Development Technology in the Era of Internet +

Yan-xia Wu, Man-li Jiang
In the development of network dynamic website, PHP technology is comparatively more safe and convenient. In application, it is widely applied to update the stability of dynamic information. Through effective application operation, it can ensure effective information embedding, so as to realize the safety...
Proceedings Article

Image Processing and Analysis Based on Partial Differential Equation Method

YeYang Jiang, Tianfu Chai
This paper analyzes the characteristics of image processing method based on nonlinear evolution equations, expounds the advantages, mechanism and theoretical basis of nonlinear evolution equations model in image processing algorithm, and uses the method of partial differential equation for image denoising...
Proceedings Article

The Design Of Private Cloud Platform For Colleges And Universities Education Resources Based On Openstack

Guoxia Zou
There are some problems in using and managing the educational resources of colleges and universities, such as uneven distribution of resources, Inconvenient to use, data redundancy, more maintenance personnel and low efficiency. There is often a branch in colleges and universities; there are plenty of...
Proceedings Article

The Design Of Colleges And Universities Education Resource Platform Based On Cloud Computing

Guoxia Zou
With the rapid growth of colleges and universities education resources, people more frequently access to those resources on the network, but the distribution of resources is too loose and the repeat of resources is too high, people need a lot of time to get information from those resources and constantly...
Proceedings Article

Correlation power analysis for AES encryption device

Xiaoyu Zhang, Kaiyan Chen, Yang Zhang, Weilong Gui, Lei Li
This paper introduces the realization of correlation power analysis attack to decrypt the encryption equipment for AES encryption system. On the basis of analysis power leakage principle power models and data correlation to build the power information collection and data processing platform. Introducing...
Proceedings Article

Method Realizing both Protocol Performance Evaluation and Validation Based on Petri Net

De Qin SHU, Hao Fang, Liang Zhang
Due to its concise, simple and unambiguous qualities, the Petri net method has become a reliable and accurate way of analyzing protocol. However, with one model conducting one point, the required models of the key points of protocol analysis, namely, the protocol performance evaluation and the protocol...
Proceedings Article

Fast and Accurate Dynamic Power Estimation method based on Component

Zhao Li, Yede Li, Xinghua Wu
Dynamic power optimization is an important part of the power optimization for embedded parallel processing. Dynamic power estimation is the premise for dynamic power optimization. The evaluation model with fast calculating speed and high accuracy can improve the efficiency for dynamic power optimization....
Proceedings Article

Study on an information system of vegetable safety production and management

Yihua Zhang, Dongming Li, Yu Wang, Jun Liu, Liang Gao
Establishing complete quality supervision of vegetable production is an important measure and method to improve the quality of vegetables and ensure food safety. In this paper, an information system of vegetable safety production management has been designed, which has provided comprehensive information...
Proceedings Article

The data analysis of college campus media WeChat public platform --take “voice of NCIST” as an example

Dongmei Liu, Junsong Zhang
With the rapid development of Internet, WeChat public platform has became a fresh battle field in ideology. Being an important force on promoting advanced culture and core values of socialism, with the aid of WeChat public platform, college are required to enlarge public opinion fields and firmly seize...
Proceedings Article

Study and Application of Apriori Algorithm in Students’ Behavior of Taking Courses

Jing LiN
Association rule mining is the core technology of data mining. The Apriori algorithm is introduced and applied to the process of students taking courses and teaching themselves by a network teaching system. On the basis of large amounts of data, frequent itemsets will be found by the Apriori algorithm....
Proceedings Article

A Framework of APT Detection Based on Dynamic Analysis

Yunfei Su, Mengjun Li, ChaoJing Tang, Rongjun Shen
Advanced persistent threat (APT) is sophisticated cyber-attack and has attracted lots of attention in cyberspace. Traditional defense measures based on signature matching are insufficient to detect APT, such as Stuxnet, Operation Aurora, Duqu, Flame, Red October, Miniduke and so on. In this paper, we...
Proceedings Article

Efficient Regular Expression Grouping Algorithm Based on Label Propagation

Xi Chen, Shuqiao Chen, Ming Mao
Regular expression grouping is the practical way to address the state explosion problem of Deterministic Finite Automaton (DFA). Previous grouping algorithms have poor grouping time, and difficult to meet application needs. In this work, we present an efficient regular expression grouping algorithm based...
Proceedings Article

The First-Order Derivative of Atmospheric Electronic Field in an Optimal Time Window Improves the Accuracy of Lightning Warning

Fei Luo, Shuai Feng, YaJing Bian, Juan Liu
Lightning is a major threat to people’s daily activities. Therefore, to forecast its occurrence is very important to ensure the safety of life and property. Compared to a series of signals from instruments like the Doppler radar, the lightning locator and the meteorological satellite, the electromagnetic...
Proceedings Article

A Dynamic ID-based Authenticated Group Key Agreement Protocol

Jun Zheng, Cheng Yang, Jinrong Xue, Can Zhang
Through the group key agreement, all group members could negotiate a common session key which is used in later secure communication. While simple GKA cannot provide enough security to resist the adversary’s attack, and the malicious damage during the agreement makes the authenticated key agreement particularly...
Proceedings Article

An improved firefly algorithm for traveling salesman problems

Ming-bo Wang, Qiang Fu, Nan Tong, Mengmeng Li, Yiming Zhao
Firefly algorithm, a new type of swarm intelligence in optimization, has a good performance in combinatorial optimization problem. For Traveling Salesmen Problem (TSP), this process proposes an optimized path approach based on the modified firefly algorithm. In order to avoid a local optimum, an elitist...
Proceedings Article

An Efficient CPK-based Key Management Scheme in Wireless Sensor Networks

Jun Zheng, Zhifu Chen, Jinrong Xue, Fan Wu
In recent years, the rapid development and wide usage of wireless sensor networks, makes it a research hotspot at home and abroad. Wireless sensor network is an open network, the sensor nodes can easily be captured or tampered. Ensuring network security is a prerequisite for communication. So, establishing...
Proceedings Article

Survey of active learning for networked data

Xinlei Wang, Bo Yang, Jing Huang
Classification in networked data is a popular research of complex network. Because of the large scale of networked data and the shortage of training data, active learning, which is an effective classification method for sparse data in machine learning, is often applied to networked data classification...
Proceedings Article

The application of the Capon method to the parameter estimation of infrasound signals

Liang Meng, Xi-Hai Li, Wan-Gang Zhang, Dai-Zhi Liu
The Comprehensive Nuclear-Test-Ban Treaty adopted four technical means to monitor nuclear tests, which are the seismic, radionuclide, hydroacoustic and infrasound monitoring techniques. The infrasound monitoring technology is an effective tool for monitoring the atmosphere, ground or water nuclear explosions....
Proceedings Article

An Algorithm of the Time-delay Alignment Based on Iterative Estimation

Yang Li, Xiao-yi Zhang, Yun-peng Hu, Zhi-xiang Shen, Biao Zhao
A novel algorithm aligning the time-delay of each signal received by a uniform antenna array is presented. In order to solve the problem that time-delay alignment performance is poor at the low signal-to-noise ratio (SNR) value, the proposed algorithm makes use of iterative estimation. Then we analyze...
Proceedings Article

The Direction-finding Stations Scheduling Algorithm Based on BPSO

Tai-chuan Sun, Jing Zhang, Xiao-min Ran, Yao-dong Li
To solve the scheduling problems of stations in cooperative localization, binary particle swarm algorithm of scheduling direction-finding stations is proposed based on Fisher information matrix(FIM).This paper makes the trace of FIM matrix as positioning accuracy measure,constructs scheduling model that...
Proceedings Article

The Temporal and Spatial Positioning Model Based on the Principle of Analemmatic Sundial in Different Parameters

Yu Liu, Xuedong Zhu, Xuefa Xia
When analyzing the data of photos and videos, it’s very important to determine the shooting time and place. Usually, we can get the sun's shadow from the pictures and videos and establish different mathematical models to solve time and space positioning problems by the known parameters. Firstly, use...
Proceedings Article

Study on an Adaptive Coding and Decoding Scheme on Distributed Space-Frequency coding

Yu Li, Zemin Hou, Bao-long Zhang
A new adaptive coding and decoding scheme is proposed for distributed space-frequency coding system. Each relay node selects dispersion matrix and modulation type adaptively according to channel state and different detection methods are used according to the threshold of channel condition number adaptively....
Proceedings Article

Information Integration of Engineering Construction Project Based on Management Process

Bo Cui
n Chinese information field of engineering construction, the traditional information management is on the function-oriented and data-oriented base, and cannot provide comprehensive and complete process-oriented support in the process management. There is a big gap especially in the information integration...
Proceedings Article

Design of Construction Project Management Information System Based on CPR Theory

Bo Cui
Construction process reengineering (CPR) is used to reengineer the construction process of engineering project by using the thought and method of business process reengineering (BPR) to improve the efficiency of engineering construction. CPR theory provides improvement direction for construction project...
Proceedings Article

Cooperative Communication in Clustered Wireless Sensor Network Based on LDPC Codes

Yuling Zhang, Wenwei He
In this paper, considering a clustered wireless sensor network, we propose a cooperative transmission scheme based on virtual multiple antennas combining with advanced channel coding (such as low density parity check codes), and give the system performance under different conditions through simulation....
Proceedings Article

Intelligent Building Security System Design based on Internet of Things Technology

Bo Zhang
Network security system constructs unified management and communication software under the monitor of alarm management center to make the distribution network between each subsystem and central monitoring equipment. Under the control of alarm management center and central management, achieve automation...
Proceedings Article

Information Security Technology under Cloud Computing Technology

XiaoJin Zhao
With the coming of information era, cloud computing has become a strong pillar for important management, storage, etc. in modern society development. In people's development course, its application has also been in unprecedented development speed. In the process of this development, through collecting...
Proceedings Article

Fuzzy Principle Algorithm based on Mathematical Theory

Zhiliang Zhang
Fuzzy reasoning algorithm is the key content in fuzzy logic research, and is also the basic theory in fuzzy control. With the deepening of the research, currently a lot of fuzzy reasoning algorithms are proposed and applied in electrical appliances and many industrial productions. But its basic research...
Proceedings Article

The Design and Application of GIS Mathematical Model Database System with Meta-algorithm

Zhijiang Li
Meta-algorithm in GIS system changes the single and fixed mode of mathematical model creation in GIS system, which adapts to the new development demand. This paper focuses on analyzing mathematical model library system and GIS mathematical model library system under meta-algorithm, classifies models,...
Proceedings Article

Web Services Platform Architecture Machine and SOA Model Design

Hongtao Liang, Jianliang Xu, Mingtao Liu, Xiaohong Wang
Service-oriented new software system development has gradually been proposed and gets rapid development with the emergence of Web services. Service oriented architecture (SOA) makes changes in creation and development of deployment application system, and will become the effective way to solve enterprise...
Proceedings Article

A New Algorithm for Internet IP Level Topology Measurement

Shaolei Wang, Lei Zhang, ChaoJing Tang
Load balancing is one major cause of the false traceroute link problem in the Internet topology measurement field. In order to improve link inference correctness in the presence of load balancing, the impact of per-packet load balancing to link inference in the context of symmetric and asymmetric load...
Proceedings Article

Image Contour Extraction Method based on Computer Technology

Huanliang Li
Effectively apply computer technology in image contour extraction can not only automatically detect surface image defects, but can better process image contour and realize the function of extracting single pixel image edge profile with high precision. It can meet the measurement requirements based on...
Proceedings Article

The Design and Implementation of Real-Time Bus Monitoring Based on 4G Mobile Internet

Jian He, Yongtai Zhang, Mingwo Zhou, Yi Han
With the rapid growth of vehicles scale in China, the development of public transportation has become an effective way of controlling urban traffic problems. However, the continuous occurrence of public traffic accidents has caused widespread concern in China. Hence, how to efficiently monitor the security...
Proceedings Article

Test Case Generation for Vulnerability Detection Using Genetic Algorithm

Bo Shuai, Haifeng Li, Jian Wang, Quan Zhang, ChaoJing Tang
In order to elevate efficiency of traditional Fuzzing technique, a novel method using genetic algorithm is proposed based on path coverage and test cost. There are evidences that GA has been already successful in generating test cases. Considering path coverage as the test adequacy criterion, we have...
Proceedings Article

Semi-supervised Gaussian Mixture Models Clustering Algorithm Based on Immune Clonal Selection

Wenlong Huang, Xiaodan Wang
Semi-supervised Clustering with constraints is an active area of machine learning and data mining research.. Shental used the Expectation Maximization (EM) procedure to handle semi-supervised Gaussian Mixture Models (GMM) estimation, in which positive and negative constraints are incorporated with to...
Proceedings Article

Discussion on the construction of disaster prevention green infrastructure network planning

Yao Feng, Lusi Zhang, Mingqi Shao, Qi Meng
This paper use the advanced experience of Japan in the area of disaster prevention green space planning and construction and, look at the status, gaps and challenges of China’s construction and planning of Green Infrastructure, present the new thinking direction about the construction of disaster prevention...
Proceedings Article

Research on strategies of safety evacuation simulation in the urban public space based on virtual simulation technology

Yao Feng, Jieying Yang, Guanghao Li, Bingmiao Zhu
In reference to domestic and international research on the theories and software of emergency evacuation, this paper aims at creating an emergency evacuation model of urban public space based on the Building Exodus, and the improved theory of Cellular Automaton (CA) was employed as the theoretical basis...
Proceedings Article

Tackling Multi-member Problem in IPTV Recommendation with Virtual Users

Peng Zhou
With the popularity of the Internet, Internet Protocol Television (IPTV) has been replacing traditional TV and recommendation systems can help IPTV users to choose programs that may interest them. Compared with other recommendations (e.g., movies), IPTV recommendation suffers from a multi-member problem...
Proceedings Article

Procedure-oriented University Digital Admissions System under Big Data Environment

Yun Liu
In order to solve the current college admission work problems like workload focus, department coordination problems, and low artificial statistical efficiency, on the basis of college admissions requirements analysis, this paper proposes the use of big data to collect admission work data in each link...
Proceedings Article

Web Service Composition Modeling Based on Pi Calculus

Yan Yang, Rong Li, Sai Wang
Web service composition has been an important research topic in the field of service computing. Through the web service process modeling and the formal verification of the composition, we make sure the composite services meet the designer’s anticipated targets. Pi calculus is process algebra which is...
Proceedings Article

Evaluation on Thermal Performance of Solar Water Heating System of High-Rise House in Jinan City

Jinglei Shi, Zhen Li, Di Li
The paper selects distributed solar water heating system of certain high-rise house in Jinan City as research object, its field performance test and energy efficiency assessment are made, obtains annual solar guarantee rate and conventional energy substitution quantity of solar water heating system of...
Proceedings Article

The Study on Development Strategy of Logistics Services Industry in China

Yu Liu
With the rapid growth of logistics, it is important to gain further insight into the strategic benefits of logistics services. The study examines the state of Chinese logistics service industry based on constructing a classification framework for logistics services studies. Finally, it explores key issues...
Proceedings Article

Recommendation Algorithm Optimization Based on Matrix Factorization

Zhenzhen Liu, Dongping Xu
In the paper, the influence of user trust relationship on recommendation is mainly analyzed, user rating and trust relationship are also clearly defined. Meanwhile, the traditional SVD matrix factorization algorithm is extended to introduce the explicit influence (user trust value) and the implicit influence...
Proceedings Article

Parameter Estimation of Double Exponential Pulse Based on Artificial Neural Network

Zhizhen Zhu, Yuewu Shi, Jing Yang, Xin Nie, Hui Zhou
In the study of high-power electromagnetic environments, double exponential function is widely used. The physical parameters of the pulse are the rise time tr and the pulse width tw, which have a strong relation with and , the key parameters of the double exponential function. In actual use, the transformation...
Proceedings Article

Virtual Machine Scheduling to Minimize Resource Wastage in Cloud Computing Environment

Yahui Zhu, Dan Chen
Virtual machine scheduling is the process of selecting the most suitable server in cloud data centers to deploy newly created VMs. The optimal placement is important for improving resource utilization and reducing resource wastage in a cloud computing environment. In this article, we propose an Self-Adaptive...
Proceedings Article

Clustering Algorithm Based on Time Series Similarity to Web Data Clustering

Yan Yang, Hua-Xiong Yao, Rong Li
In the view of the information inaccuracy and additional information in the web page recommendation algorithm of multi similar web pages, the data clustering effect is not satisfactory. In this paper, a new method for the image denoising method based on the rough set of Gauss block is proposed. Firstly,...
Proceedings Article

Research on the Application Scheme of Enterprise Data Mining Based on Extension Set

Chunxu Jiang, Bo Guan
The quality difference of data itself cause low credibility of data mining conclusions, which has become an important factor affecting the application of data mining. The cleansing algorithms and tolerate algorithms designed in view of incomplete data can not solve this problem fundamentally. By means...
Proceedings Article

Research on Video Object Segmentation Algorithm

Bo Guan
The video surveillance system is a more direct monitoring means, widely used in industrial production, transportation, electricity, office buildings and residential areas. Plenty of remote monitoring systems adopt the mode to collect and compress data through local end and remote monitoring center to...
Proceedings Article

Mining Biomedical Entity from Literature Based on CRF

Lejun Gong, Ronggen Yang, Jiacheng Feng, Geng Yang
With the rapid expansion of biomedical literatures, it provides an opportunity for mining biomedical knowledge from the huge amount of biomedical text. Entity recognition is a challenging task of biomedical text mining. In this work, we described a method to identify biomedical entity based on Conditional...
Proceedings Article

Research on Database Design of Military Equipment Data Engineering

Xinhui Zhang, Wei Chen, Yiping Bao
The database of military equipment data engineering is the important basis of making scientific decision for military equipment assessment, and it has the significance for developing the military equipment. The paper designed the database structure of military equipment data engineering, including the...
Proceedings Article

Simulation of Poisson process

Xinyue Hu, Tian Lei, Huaipeng Zhang, Shuxiang Chen, Yang Xie
The paper mainly introduces the definition and characteristic numbers of Poisson process and also gives two simulation methods and operation steps on Poisson process. In this paper, we mainly introduce the idea of generating the interval. We also give an example and use Matlab to simulate the process....
Proceedings Article

A Novel Approach to Recommender System Based on Aspect-level Sentiment Analysis

Yu Zhang, RuiFang Liu, AoDong Li
Traditional recommendation methods usually focus on utilizing user’s features obtained from structured behavior information, which only contains coarse grained user interests. This paper presents a novel approach to introduce aspect-based sentiment analysis (or opinion mining) into recommender systems....
Proceedings Article

An Electricity Pricing Oriented Memory Calculation Hybrid Application Mode

Haohan Hu, Chen Qi, Jinglin Guo
We discuss the key technology of smart power, analyze the technological features of big data technology and the column type database and present the basic computing architecture that fit for OLAP and OLTP hybrid mode. We provide an architecture solution based on the x86 server and open source components...
Proceedings Article

Electric Vehicles Operations Oriented Network and Data Analysis

Haohan Hu, Qiang Luo, Jinglin Guo
We analyze characteristics of electric vehicles interaction network and present a big data analysis method for electric vehicles operations, which is based on cloud computing model. For the electric vehicles large-scale operations, we propose a scalable architecture design as well as the method to improve...
Proceedings Article

A design method for digital phase-locked loop

Jiyuan Ru, Yujia Liu, Wei Xue
The design method of the digital phase-locked loop is presented according to the parameters of the center frequency, the loop filter bandwidth, etc. The modules phase detector(PD), loop filter(LF), voltage controlled oscillator(VCO) have the similar behavior with that of the analog phase-locked loop(APLL)...
Proceedings Article

An Improved KNN Algorithm for Product Quality and Safety Incident Information Tracking

Yingcheng Xu, Zhongbao Sun, Wei Jiang
In recent years, product quality and safety event shave happened frequently, which poses a threat to the health and property safety of consumers. With the development of the Internet, Web news has become one of the important channels for information release regarding product quality and safety issues....
Proceedings Article

Research on Case Library Construction of Energy Loss in Country Distribution Networks with Grey Relational Analysis

Ze Yuan, Xuefei Zhu, Jianhua Yang, Weizhou Wang
Some factors affect the energy loss in country distribution networks, including the load density, the load distribution, the grid structure and the operating condition of the distribution networks. As a result, the difference and the relation among these loss effect factors are considered, and the typical...
Proceedings Article

Energy efficient optimization method for green data center based on cloud computing

Runze Wu, Wenwei Chen, Li Li, Kuangyi Zhao
With the rapid development of cloud computing data centers, the problems of tremendous power consumption has become increasingly prominent, so it is of great practical significance to study the energy efficiency of cloud computing green data center. This paper proposes a mathematical model based on the...
Proceedings Article

A VoD System Model Based on BC Graphs

Xiaoqiang Chen, Jianxi Fan, Cheng-Kuan Lin, Baolei Cheng, Zhao Liu
BC graphs are important interconnection networks, which include hypercubes, crossed cubes and other hypercube's variants. In this paper, we propose a new model, named BC-VoD model, to approach VoD system, which utilizes BC graphs. At the same time, we use independent spanning trees for content distribution....
Proceedings Article

Anomaly Detection Approach based on Function Code Traffic by Using CUSUM Algorithm

Ming Wan, Wenli Shang, Peng Zeng
There is an increasing consensus that it is necessary to resolve the security issues in today’s industrial control system. From this point, this paper proposes an anomaly detection approach based on function code traffic to detect abnormal Modbus/TCP communication behaviors efficiently. Furthermore,...
Proceedings Article

DOA Estimation with Non-Circular Reduced Dimension PM Algorithm for linear array

Wang Zheng, Weihua Lv, Xiaofei Zhang
Propagator Method (PM) algorithm is a common method for the estimation of direction of arrival (DOA). In this paper, we propose a reduced dimension PM (RD-PM) algorithm for non-circular signal with linear array. We reduce the dimension of the pseudo spectrum function so that we need only one dimensional...
Proceedings Article

2D-DOA Estimation of Noncircular Signals for Uniform Rectangular Array via Noncircular-ESPRIT

Weihua Lv, Wang Zheng, Xiaofei Zhang, Licen Zhang
In this paper, we propose the noncircular estimation signal parameters via rotational invariance techniques (NC-ESPRIT) algorithm as a two-dimension direction of arrival (2D-DOA) estimation algorithm for uniform rectangular array. Compared to conventional circular ESPRIT algorithm, the proposed algorithm...
Proceedings Article

Design and Implementation of Key Management System in IC Card Application for Public Transportation

Xin Yang, Ye Du, DaWei Zhang
Key management system deals with the key question for the entire process of key from produce to final destruction ,including system initialization, key generation, storage, distribution, renovation, destruction and more. The paper conducts research for public transportation IC card certification and...
Proceedings Article

2D-DOA Estimation for Co-prime L-shaped Arrays with Propagator Method

Bin Hu, Weihua Lv, Xiaofei Zhang
In this paper we propose a DOA estimation method by combining propagator method (PM) algorithm for co-prime L-shaped arrays. The array contains two uniform L-shaped arrays with the minimum inter-element spacing larger than the half-wavelength, which will cause phase ambiguity. Utilizing the co-prime...
Proceedings Article

Remote-sensing Fusion by Multiscale Block-based Compressed Sensing

Senlin Yang, Xin Chong
A new compressive fusion algorithm based on non-uniform sampling is proposed. Although conventional block-based compressed sensing (BCS) represents a low computational cost, it suffers from low reconstruction quality since it is not well accounting for global image features. Employing the structured...
Proceedings Article

ANOVA for Spatial Data after Filtering out the Spatial Autocorrelation

Yumin Chen, Yan Lu, Jiang Zhou, Mo Cheng
Spatial data contains a lot of spatial information. Geographic Information System (GIS) provides methods to extract information and support decision. The difference of geographic data can be found out by analysis of variance (ANOVA) that is a method of spatial statistics, which is a part of GIS. In this...
Proceedings Article

Image Fusion Algorithm Based on Deng Correlation and Image Saliency in Curvelet Framework

YuanLi Liu, Yi Yang, Jian Sun
In this article, a multi-sensor image fusion algorithm is presented. The fusion framework is built on the second discrete curvelet transform to make full use of its multi-scale and multi-direction representability. The fusion rules are mainly based on Deng correlation for representing image similarity...
Proceedings Article

Threshold Selection Algorithm of Joint Metric for TOA Estimation in 60GHz Sensor Networks

Ning Du, Hao Zhang, Tingting Lv, Qingfang Zeng
Impulse radio (IR) 60GHz signal has been applied in ranging and localization systems because of higher multipath resolution. In order to improve the precision of the TOA estimation, a threshold selection algorithm based on a Joint Metric of the Skewness and Kurtosis after Energy Detection is proposed....
Proceedings Article

Model Checking of Software Development in Distributed Animation Rendering System

ZhiGuo Hong, Yongbin Wang, Minyong Shi
Distributed animation rendering systems are used to speed up of rendering i.e the computational-intensive phase of producing animation. How to develop softwares with high availability and efficiency is a hot topic in distributed animation rendering systems. In this paper, based on model checking method...
Proceedings Article

Landslide susceptibility evaluation based on GIS and information value model

Yumin Chen, Qianqian Ba, Qianjiao Wu, Xiangfei Li
The western region of Chongqing seriously suffers from landslides. This paper evaluate the landslide hazard using GIS (Geographic Information System) technology and information value model and selecting seven influential factors including slope, aspect, elevation, rain, river, road and geological structure....
Proceedings Article

Global existence and blow-up to a class of degenerate parabolic equation with time dependent coefficients

Anyin Xia, Xianxiang Pu, Shan Li
This paper deals with the global existence and blow-up to nonnegative solution of a degenerate parabolic equation with time dependent coefficients under homogeneous Dirichlet boundary conditions. We establish the results on global existence and blow up solution to the system.
Proceedings Article

Network Equipment Fault Prediction Based on CUSUM Algorithm

Peishun Liu, LiFang Lin, Changjian Zhao, Peiwei Jia
In this paper, the CUSUM algorithm is used to detect and predict the state of network equipment. By collecting information on network equipment operating characteristics, features of the device obtained sample set, the application design is complete training sample set and obtained parameters of algorithm,...
Proceedings Article

A special resource constrained project scheduling problem: model update and ant colony optimization solving

Mingwei Li, Kun Jiang, Sheng Han, Xingye Dong
A special resource constrained scheduling problem is proposed to satisfy the needs of an enterprise. The constraints of sites and the constraints among different resources are added. With a SSGS-based heuristic algorithm generating an initial solution for the proposed model, the max-min ant system is...
Proceedings Article

Distributed Cluster Multidimensional Transcoding for Stereoscopic Video Stream

Fengfeng Duan
In order to improve the quality and efficiency of the distributed cluster collaborative production for video stream, a multidimensional transcoding framework of stereoscopic video is proposed. In the framework, the transcoding technologies, including decoding and encoding, are applied based on multiple...
Proceedings Article

A Novel Routing Algorithm for Content-based Publish/Subscribe Systems

Shaohui Guo
Publish/Subscribe communication model has the characteristics of asynchronous , multipoint communication ,it can makes the participants of communication decoupled in space and time and control flow completely , and can meet the needs of loose communication that the large distributed system asks effectively....
Proceedings Article

Rao-Blackwellized Free Clustering Particle PHD Filter For Multi-Target Tracking

Ping YE, Hui Chen
This paper presents a novel approach to improve the accuracy of auxiliary particle probability hypothesis density filter without the need of clustering step. In most cases, the states of target can be seen as combinations of linear components and non linear ones. The new approach separates the two different...
Proceedings Article

A new algorithm of symbolic expression simplification based on right-threaded binary tree

Dechuan Yang, Zeliang Song, Ri Yu, Xihe Jiang, Hongwei Zhao
Considering that it’s difficult to dealing with symbolic expressions which are stored in the form of strings, we put forward an idea that the symbolic expression is stored in a right-thread binary tree, and we minimize the right-thread binary tree so that the symbolic expression could be simplified....
Proceedings Article

Image Retrieval Algorithm Based on Feature Fusion and Bidirectional Image Matching

Kaixuan Ji, Chuan Guo, Shengfu Zou, Yang Gao, Hongwei Zhao
According to the low accuracy of single feature-based image retrieval algorithm, the paper proposes a strategy which fuses the SIFT and the color feature, to obtain a kind of relatively simple and accurate retrieval approach. To accelerate the retrieval process and improve the efficiency, the paper adopts...
Proceedings Article

Design and Implementation of Android IT Job Alliance System

Hai Wang, Lan Huang, Wuchao Li, Wei Luo
In recent years, as the intelligent terminals developed rapidly, the combination of intelligent terminals and Internet has been an evident trend of information development and utility software. Based on the kernel of Linux V2.6, Android is the representative of mobile terminal, which is an open operating...
Proceedings Article

3D Modeling Algorithm Based on Vehicle-Borne Laser Point Clouds

Xu-Dong Xu, Rui-Jie Wen, Ze Li
Three-dimensional laser scanning can be used to collect the 3D coordinate information on the object surface to create 3D point clouds, which can reflect the characteristics of the target surface, facilitating the establishment of terrain model. Since point clouds lacunarity is usually caused by occlusion...
Proceedings Article

A Study of Cyber video Technology Application Based on Cloud Computing Platform

Yanfang Zhou
With the fast development of the computer technology and social developing needs, the network has experienced quite a lot of changes and the usage of it has also entered into more areas. As one mature technical service which is widely accepted by the public, cyber video has the inevitability and feasibility...
Proceedings Article

The Research on Sports Training Aids System Based on Data Warehouse Technology

Yan Liu, Xiaofang Liu
With the rapid development of computer technology and the business community have made new demands, data warehouse technology is introduced. Traditional database technology is a single source of data, that database will be mainly engaged in transaction processing, batch processing to decision analysis...
Proceedings Article

Features Tagging Technique in the Sports Video Analysis

Yongwang Wu
With the rapid development of computer networks and video capture technology, resulting in a large number of sports video data, how to effectively and quickly retrieve the part of coaches or athletes need from these data, as a problem to be solved. Video marked its description given according to the...
Proceedings Article

The Application Research of 3D Simulation Modeling Technology in the Sports Teaching

Jun-wa Yang
With the current development of information technology in sports training in computer-aided training has become increasingly common to achieve a sports training video feedback analysis system, through pattern recognition, image processing, video analysis and other modern computer technology information...
Proceedings Article

Design and Implementation of Credit Assessment Service Platform for International Trade

Ting Dai
International trade is a high-risk industry, in every aspect of business, there are risks. Credit risk has been highlighted, foreign trade enterprises to bring a lot of interference and confusion, and its further rapid development had hampered. Credit risk is the modern economies, including the main...