Advances in Computer Science Research

+ Advanced search
15625 articles
Proceedings Article

Construction and Application of the Operational Plan Ontology Model

Fei Long, Xiaozhe Zhao, Xinglin Liu
Aiming at the bottleneck of assistant decision-making system caused by traditional expression method of the operational plan, this paper introduced the ontology technology in the information system field, and analyzed the advantages of the operational plan ontology model. On the basis of the determination...
Proceedings Article

An Algorithm to Extract and Judge the Main Text Based on the Law of Total Probability

Qingsong Lv, Shulin Cao, Yifan Wang, Qian Yin, Xin Zheng
Since Internet web pages have diverse contents and complex structure, it is of great significance to use a uniform algorithm to tackle them. In this paper, we proposed an algorithm called P value algorithm to extract the main text of one webpage. By calculating the P value of each tag in an HTML page,...
Proceedings Article

Construction of Chinese Deceptive Speech Detection Corpus

Cheng Fan, Heming Zhao, Xueqin Chen, Xiaohe Fan, Shuxi Chen
Nowadays, deceptive speech detection has raised more and more interests. The corpus is the foundation of researches in deceptive speech detection. While there are several corpora about English deception detection, few efforts have been put on Chinese which is quite different due to the culture divergence....
Proceedings Article

Decision-Making by Agents with Endogenous Aims Using Genetic Algorithm

Gennadiy Vinogradov, Nataliya Vinogradova
The problem of constructing a choice model of an agent endogenously shaping purposes of his evolution is under debate. It is demonstrated that its solution requires the development of well-known methods of decision-making while taking into account the relation of action mode motivation to an agent's...
Proceedings Article

Entropy-Monotone Scheme for Nonlinear Scalar Conservation Laws

Li Xiao, Rongsan Chen, Miao Wang, Xia Zhang
The Entropy-TVD scheme was developed for the non-linear scalar conservation laws in [1].The scheme with step reconstruction simultaneously compute the two numerical entities, the numerical solution and the numerical entropy, and numerical examples show that the scheme provides a super-convergence rate....
Proceedings Article

Analysis on Kinematics and Dynamics for A Planar Flexible Driving Target Motion Simulation System

Ma Jianyu, Yang Fang, Xue Yujun
The flexible drive have made tremendous inroads into many industrial fields. This paper focuses on the kinematics and dynamics analysis of a planar flexible drive target motion simulation system. The kinematics and dynamics mathematical models of the planar flexible driving target motion simulation system...
Proceedings Article

Graphic data as object of system analysis

Aleksandr Kuchuganov
The relevance of the system approach to the problems of graphic data analysis proceeds from the degree of its substantial volume and validity in the information about an object. System analysis methods being abstracting and specialization, structuring and restructuring, recursive specification and iteration...
Proceedings Article

Improvements on Proxying and Cache Scheme of CoAP Protocol for IPv6-Based Wireless Sensor Networks

Ping Wang, Xin Li, Heng Wang, Na Bao
For the IPv6-based Wireless Sensor Networks (WSN), there exists a difficulty in applying Internet protocol into Internet of Things (IoT) due to the constrained resources. Constrained Application Protocol (CoAP) is a lightweight protocol which is proposed and standardized by Internet Engineering Task...
Proceedings Article

Application of Photoshop on the Post-Processing of Building Works

Keqin Huang
Nowadays, graphic image editing and processing has been very common in people's life and work, such as building plans produced and people's digital photo processing. The most popular image processing software Photoshop, its function is very powerful, graphic design, color printing, graphic creation,...
Proceedings Article

Research on Method of Rapid Software Development Based on Component Design

Hu Jingyi, Lei Juchao, Wang Yaming, Zhao Yalin
This article presents a quick way to develop your system with custom components in Delphi. using the above method can minimize code duplication, improve work efficiency. In this paper, we apply this method to the development of information management system in a university based on the Data Snap three-tier...
Proceedings Article

On the Form of "Sex" Cultural Elements in the Clothing Advertising Communication

Duanwu  Shang
In the modern civilized society, "sex" has the endless charm to the person, using "sex" as a sale communication tool has become a familiar phenomenon. Particularly prevalent in the clothing advertising communication, using "sex" as an appeal is a customary manoeuvre innumerous clothing brand. The form...
Proceedings Article

Numerical Simulation Study of Non-standard Prestressed Concrete Continuous Box Girder Bridge

Xu Luo, Lixiong Gu, Xinsha Fu
This paper summarizes the stress characteristics of non-standard box girders and the grillage method, and according to the engineering practice experience, summarizes the characteristics of the grillage method in the stress analysis of non-standard box girders, and draws the corresponding conclusions....
Proceedings Article

Research on the High Performance System Development and Cloud Platform Building Mode under Parallel Framework

Xinxin Xie, Wenzhun Huang
In this paper, we conduct research on the high performance system development and basic cloud platform building model under parallel framework. Cloud computing is a kind of the public service, its security problem is complex and requires skill, standard, regulation, law and so on various aspects, multi-pronged...
Proceedings Article

Planning and Research of Integrated Test System for Rail Transit

Yiping Lian
In recent years, with the rapid development of social economy and the deepening of economic restructuring, a more convenient, safer and less consumption mode of transportation has become an inevitable trend of social transportation development. Because of its all-weather, pollution-free and small area,...
Proceedings Article

Critical Events Detection Based on Alert Logs in Smart Grid

Wenmin Li, Ning Dong, Haoliang Zhao, Jianlin Jiao, Hao Xv, Bo Li, Minghui Gao
Alert logs in the smart grid come from a variety of security devices and hosts. There are a large number of false alerts and low-threat alerts in the massive logs, which not only make the real threat difficult to be discovered, but also increase the difficulty of analysis. Therefore, based on the fact...
Proceedings Article

Paradigm Migration and Interdisciplinary Convergence Study of Electronic Nose Odor Recognition Algorithms

Ciermuzhen Aoma
Electronic nose technology has shown great potential in medical diagnosis and industrial monitoring by simulating the biological olfactory mechanism, but its industrialization has been constrained by the fragmentation of algorithms and mechanisms for a long time. This paper systematically analyzes the...
Proceedings Article

New Hybrid Conjugate Gradient Method Under Exact Line Search

Ain Aqiela Azamuddin, Nurul ‘Aini, Mohd Rivaie, Zuraida Alwadood
Conjugate gradient (CG) method is one of the popular method in solving unconstrained optimization problem. This method is notable for being an intermediate between the steepest descent method and the Newton’s method. In this study, a new hybrid CG method is proposed with the main focus on improving Aini-Rivaie-Mustafa...
Proceedings Article

The Transmission Mechanism of Sentiment from Securities Futures Market to Spot Market

Bo Zhang, Xuehua Wei
This study aims to explore the mutual influence between securities futures market investor sentiment and spot market investor sentiment, along with its underlying mechanisms. First, by establishing a VAR model, we find that investor sentiment in securities futures markets exerts a negative effect on...
Proceedings Article

The Impact of Smart Manufacturing on Total Factor Productivity: Empirical Evidence from Chinese Listed Manufacturing Firms

Yuxiang Xie, Haohan Gao, Feng Xu, An Jin, Feng Tian
The optimal allocation of production factors requires both macro-level regulation and efficient resource management at the micro level within firms. We explore the impact of smart manufacturing on the total factor productivity (TFP) of listed manufacturing firms in China through empirical analysis. Using...
Proceedings Article

Research on Course Sharing Technology Based on IPFS and Blockchain

Wenzhi Wu, Ruizhe Ye, Feng Sha, Chao Lin
This paper studies the course sharing project by using IPFS and Ethereum technology. Designed a course sharing project based on IPFS and Ethereum. This project solves the problem of huge course data and single point of failure. First of all, using IPFS as the access medium can effectively reduce storage...
Proceedings Article

User Analysis Based on Short Video and Live Streaming

Xiya Wang, Ben Wang, Yinggui Wang, Liangqi Chen
With the development of the mobile internet, short videos, and live streaming have brought new development models for social interaction and consumption of users. From the perspectives of user group classification and behavior analysis, the article takes short video and live streaming as an instance,...
Proceedings Article

Prediction and Feature Extraction Techniques used for Classification of Alzheimer’s Disease in its Early Stage using MRI: A Review

G. Merlin, V. Pattabiraman
Most people worldwide are affected by an acute neurological disorder called Alzheimer’s disease. Despite the reality that there is no treatment, it can be tapered off if it is detected early enough. 6 million individuals in the United States have Alzheimer's disease, and more than 120,000 people...
Proceedings Article

The Research on Distribution of Benefits in the Cooperation of Enterprises, Colleges and Institutes Based on Shapley Model

Mengshi Zhan, Qiming Cai, Shuangteng Liu
The Intelligent Control Management System of fish tank uses STC12C5A60S2 microcontroller as the control and can automatically light on, automatically change water, automatically feed, and automatically water cycle. The collected data and all of the operations can be accessed through the display which...
Proceedings Article

Teaching Design Practice of Microlecture Based on Knowledge Point

Xinhe Gong, Weiwen Zhu
This paper has promoted the teaching design mode of microlecture based on the knowledge point by learner-centered. By using smart technology and various format of resources including mobile learning, it has formed the knowledge network at multi-level and overall coverage that adapted to diverse learning...
Proceedings Article

Experimental Study on Flexural Behavior of Modified Recycled Concrete Beams

Zhang Shimin, Peng Xiaohui, Liu Kangning
With silicon powder content and the hybrid fiber content as parameters, will be 1 as ordinary concrete beams and the control group, three different content of silicon powder and 2 root hybrid fiber volume content of beam as the experimental group, the modification of the flexural performance of recycled...
Proceedings Article

Automatic Leveling System of Precision and Heavy Load Platform

Zhenting Liu, Dazhai Li
This paper mainly introduces a set of automatic leveling system for high precision and heavy load platform and describes the principle of system operating, the component of hardware and software. The angle sensor is the basis of leveling, and the electric push rod is the guarantee of leveling. Motion...
Proceedings Article

The performance of Agricultural science and technology transformation Fund of different Technical Fields

Qiang Shen, Li-Li Xu, Jun-Qiang Wang, Wei-Min Yang
Based on perfecting the performance evaluation index system of Agricultural scientific and technological achievements transformation Fund. In this paper, we evaluated the performance of Agricultural scientific and technological achievements transformation Fund in different technical fields during the...
Proceedings Article

Software Application Teaching Combined With Computational Thinking

Li Jiang, Guohua Zhan, Zhihua Li
The cultivation and training of computational thinking become more and more significant in basic computer education in university. In this paper, firstly the necessity of the computational thinking is analyzed in contribution to the learning of the usage of application software.And then a new teaching...
Proceedings Article

Design and Development of College Students' Employment Platform

Yufei Wang, Furong Li, Kun Zhang
In the era of the Internet, demand-oriented Internet business model and value creation is emerging, the current phenomenon of college students work-study is widespread, students often seek part-time channels are scattered, roadside advertising now lacks a focus on students Group of healthy part-time...
Proceedings Article

A First-Order Differential Power Analysis Attack on HMAC-SM3

Limin Guo, Lihui Wang, Qing Li, Zhimin Zhang, Dan Liu, Weijun Shan
HMAC algorithm is one of the most famous keyed hash functions, and widely utilized. And SM3 is the only standard hash algorithm of China. However, most cryptographic algorithms implementations are vulnerable against side channel attacks. But specific side channel attacks on HMAC-SM3 have not been given...
Proceedings Article

Decision Model of Quality Supervision Six Sigma Project Based on ANFIS and Evidence Theory

Jianjun Yang, Jie Yao
In order to effectively improve the implementation effect of quality supervision six sigma project, it is crucial to select an appropriate project. Through combination of six sigma project implementation experience with expert evaluation, an approach is proposed to solve the problem of experts’ insufficient...
Proceedings Article

IoT Based Health Care System for Elderly and Disabled People

Khalid Aloufi
Different organizations and governments are working toward publishing their data on the web to achieve a variety of goals. Published data facilitate transparency and cooperation. Currently, most of the data available on the web are not easily accessible, which limits their aplication. The Semantic Web...
Proceedings Article

Research on the Relationship among Technology Sources, Learning Modes and Innovation Performance of Technical SMEs of Tianjin

Geng Zhao, Zibiao Li, Jie Ma
Due to the characteristics of high technology and knowledge intensity in Technical small and medium-sized enterprises (SME), the research on technical resources, technology development and learning mode of Technical SME and the exploration of acting mechanism and innovation performance, are theoretically...
Proceedings Article

Evaluation Method for Stability of Manufacturing Process Based on Fuzzy Norm Method

Xin Tao Xia, Wen Huan Zhu, Bin Liu
For the manufacturing system adjusted, there still is the uncertainty in the manufacturing process which is part of poor information problem with probability distribution unknown. The statistical evaluation methods depend on information with known probability distribution, which can not used to realize...
Proceedings Article

A New Method of Power Quality Detection on Limited Capacity System

Chuang Lv, Pu Xie
For the operating characteristics of limited capacity micro-grid, power quality disturbance impacting on the micro-grid is to be significantly larger than the civilian power grid, especially the transient power quality disturbances can not be ignored. By combining the advantage of wavelet transform and...
Proceedings Article

Remote Mobile Environmental Monitoring System based on Socket

Lianzhen Huang, Lin Zhao, Qinggang Tu, Jianbo Wu, Heming Zhao, Jinzhi Ren
This article designed and implemented a remote mobile environmental monitoring system based on Socket communication technology. The system consists of clients, a server, and remote terminals. The interaction between the client and the remote terminal of the system is based on the server acting as an...
Proceedings Article

A Character Recognition Method for License Plate Based on Combination Feature and Partial Character Input

Qiang Li, Juan Zhang
In order to improve the recognition rate of license plate characters, a new method based on combination feature and partial character input is proposed. First, according to the texture characteristics of the license plate character, the basic LBP operator is improved, and then the characteristics of...
Proceedings Article

Analysis on the Problems and Countermeasures of E-commerce Credit System and Credit Management

Yongliang Li, Yaqin Liu
To solve the credit problem of e-commerce, we should start with the construction of e-commerce credit system. The construction of credit system is a huge and complex system project, which must be cooperated by government, industry, enterprises, consumers and media. This paper analyzes the credit problems...
Proceedings Article

Development of A Security System in The Location Identification Application for The Blind Disabled Based on Nfc Rfid

I Made Widhi Wirawan, I Dewa Made Bayu Atmaja Darmawan, I Gede Widnyana, Ni Nyoman Sukma Prasetyadewi Gita
Cognitive needs are basic human needs that are closely related to the need for information, knowledge and understanding of their environment. For people with visual disabilities, identifying a location is an important thing among their limitations (Widhi, 2013). People with visual disabilities are trained...
Proceedings Article

Exploration and Evaluation of Virtual Simulation Experimental Teaching for New-Type Power Systems Based on OBE Theory

Hanyu Zhao, Wei Li, Xiaoning Xu, Siyi Huang, Yuerui Shi, Jiangzhen Yao, Mengyan Jin, Yongyi Wang, Xuesong Zhou
To address the urgent demand for interdisciplinary talents in electrical engineering amid the transformation of the new power system, and to overcome the limitations of traditional experimental teaching in terms of safety, cost, and cutting-edge relevance, this paper explores the construction of a virtual...
Proceedings Article

Design of Sports Training System Based on Wireless Sensor Network

Le Huang, Lili Lv
In order to realize the training needs of athletes, it is necessary to apply the wireless sensor network to the sports training system. Through the system hardware and software design, the connection of base station and sensor nodes, and the management of node control. Create a sports database management...
Proceedings Article

Interactive Gamification Education Method

Naiying Yu
Interactive gamification in education incorporates game design principles to enhance student engagement and improve learning outcomes. This paper examines the theoretical foundations, design frameworks, and practical applications of gamification within educational contexts. It emphasizes the PBL triangle...
Proceedings Article

Research on Tourism Image Perception of Xiangshan Park Based on Web Text Analysis

Xiaoling Li, Yonghui Sun
A good tourism image is not only the basis for customers to choose tourism destinations, but also an important basis for tourism destinations to maintain the source of tourists. This paper uses the Octopus collector to collect tourist travel notes on Meituan Travel Network as a data sample, and uses...
Proceedings Article

Design and Application of Pseudorandom Coded Sweep for Mini-SOSIE

Zubin Chen, Na Li, Yun Long, Xiaozhe Wen, Feng Sun
The miniaturized, high-energy-output mini-SOSIE has become an important source in seismic exploration. It has seriously impeded resolution because of the coherent vibration frequency and periodical problem of the signal. In order to solve these problems, this paper designed a vibrator signal generator....
Proceedings Article

Chinese-English-Yi Public Opinion Information Database Construction and Implementation

Y.Y. Yang, B.Z. Li, J.M. Wang, C.S. Yuan, R Lin, G.M. Lu, J.L. Wang
Language is an intangible cultural heritage of the human, it is more precious and longer than the tangible herit-age history. Language resources preservation, research, development and utilization has become an important part of national resources. Through the research study of existing technologies...
Proceedings Article

A Systems Thinking View on Cloud Computing and Energy Consumption

Michal Sedlacko, Andre Martinuzzi, Karin Dobernig
Cloud Computing is often regarded as form of "green computing". However, the growth of cloud computing also goes hand in hand with an increasing demand for energy, caused by a continuously growing demand for content, data-intensive applications and bandwidth. The debates on the energy implications of...
Proceedings Article

The Microblog Public Opinion Analysis Based on the SVM and the LDA Model Combining

Weilin Xu, Zong Zhu, Li Gao, Jinling Liu
In view of the LDA model, the superiority of long text clustering to Microblog about the use of the user and time to build a long text. According to implied rich semantic information in text and traditional text clustering makes because of the high dimension calculation results inaccurate faults, the...
Proceedings Article

Effective Message Authentication Method for Performing a Swarm Flight of Drones

Yun-seok Lee, Eun Kim, Young-sub Kim, Dong-chul Seol
Recently, various types of aircraft are flying in the sky. Especially, Unmanned Aircraft Vehicle(UAV) called drones can operate with from aerial photography to unmanned delivery thus, utilization is very high. Drones are classified as Quad, Hexa and Octa copter depending on the number of rotor. However...
Proceedings Article

Anti-freeze and Anti- corrosion Performance of Road Fiber Reinforced Concrete

Yancong Zhang, Lingling Gao
To research the anti-freeze performance of road fiber concrete in erosion solution, trabecular specimens that contained three kinds of water-cement ratio (0.44, 0.42 and 0.40) was formed. Half of it were treated with protective agent and then placed in distilled water and 10% Na2SO4 solution. The mass,...
Proceedings Article

Effects of Writing RoadmapTM 2.0 on Teachers in English Writing Teaching

D.F. Ge
This paper attempts to investigate the impact of integrating the online assessment tool of Writing RoadmapTM 2.0 into English writing teaching, aiming at revealing its specific effects on teachers. Results show that the integration of WRM into teaching can help teachers monitor students’ writing process...
Proceedings Article

The Research on Exploitation of Spot Statistic Data Visualization Software in Volleyball Match by Utilizing Microsoft Visual C++ 6.0

Xin Tan
The characteristics of computer software are objective, detailed, accurate and synchronization. Microsoft Visual VC + + 6.0 is a strong compatibility, visualization and object-oriented process oriented development tools which could be utilized in exploitation on-the-spot Statistic data visualization...
Proceedings Article

Molecular Docking Studies of Flavonoids of Noni Fruit (Morinda citrifolia L.) to Peroxisome Proliferator-Activated Receptor-Gamma (PPAR )

Fikry Awaluddin, Andrianopsyah Mas Jaya Putra, Supandi Supandi
Diabetes is a chronic disease that occurs either when the pancreas does not produce enough insulin or when the body cannot effectively use the produced insulin. Morinda citrifolia has been widely used as herbal medicine to prevent and to treat diabetes as well as health supplements. It contains flavonoids...
Proceedings Article

The Design of Real-time Monitoring System for Operation State of High Voltage Circuit Breaker

Zhenhao Wang, Ming Liu, Dan Pang
This paper discusses the principle design of real-time monitoring system for high voltage circuit breaker operation, monitoring and analysis for the monitoring principle and mechanical characteristics of the opening or closing coils.The devices are used in substation, and the actual monitoring data can...
Proceedings Article

The Research on Security Reinforcement of Android Applications

Xiaorong Feng, Jun Lin, Shizhun Jia
Along with the rapid progress and widely used of mobile application, security protection to software application has become an important issue. The lack of binary protections makes it important to implement packing services. By analyzing traditional features of software reinforcement technology, the...
Proceedings Article

An Algorithm of Mining Closed Frequent Itemsets

Haifeng Li
Closed frequent itemset is a perfect representation of frequent itemset. This paper tries to find an efficient solution to mine the closed frequent itemsets over databases by sampling technique. We employ the SCFI tree to record the data synopsis of the frequent itemsets, and propose an efficient algorithm...
Proceedings Article

Numerical solving for optimal control of stochastic nonlinear system based on PF-PSO

Xiong Yong, Xiaohao Qu
Getting general solution for optimal control of stochastic nonlinear system is a hard task, the main difficulty is state variable and the control variable influencing each other,so system does not satisfy the separation theorem. To solve this problem, this paper use horizon optimal control strategy,...
Proceedings Article

Topology Optimization Design and Thermodynamic Analysis of the Missile Engine Support Structure Based on Numerical Simulation and 3D Printing

Miao-Wen Jiang, Jian-Zhuo Yan
This paper aims to offer a lightweight design method of the missile engine support structure based on the topology optimization by taking advantage of the computer numerical simulation and 3D printing technology. Taking use of 3D printing in the shape of heterogeneous structures and personalized manufacturing...
Proceedings Article

A Secure Simultaneous Wireless Information and Power Transmission System Based on CDMA Architecture

F. Zhao, Y.T Wu, Y.Z Sun
In view of the security issue of the simultaneous wireless information and power transmission (SWIPT), this paper presents a secrecy SWIPT communication system based on code division multiple access (CDMA) architecture. The transmitter uses different spread spectrum polynomials to spread spectrum information...
Proceedings Article

Reducing Insertion Time in LRC-based Cloud Storage Systems

Zhenyuan Liu, Zhen Huang, Dongsheng Li
In traditional erasure codes, all the redundant data are created and uploaded to the different storage nodes by a unique source node. However, such a source node may have limited communication and computation capabilities, which constrain the storage process throughput. In-network redundancy generation...
Proceedings Article

Detecting SQL Injection Attacks based on Text Analysis

Lu Yu, Senlin Luo, Limin Pan
SQL injection attacks have been a major security threat to web applications for many years. Detection of SQL injection attacks has been a great challenge to researchers due to its diversity and complexity. In this paper, we present a novel approach to detect SQL injection attacks based on text analysis....
Proceedings Article

A Time-Slot Routing Protocol for Smart Home

Xiao Tian, Nan Chen, Xian-Deng He
By adopting ad hoc technique, the routing protocol of data network can be realized in smart home system. Due to the features of low moving speed, less number of nodes and high data rate, few present ad-hoc protocols are suitable for smart home data network. In order to make up the deficiencies of present...
Proceedings Article

Anti-tumor Effects Elicited by Heat Shock Protein 72 Functional Peptide and Alpha-fetoprotein Epitope Peptide Vaccine

Xiaoping Wang, Qiaoxia Wang, Bing Xu, Na Chang
Objective: Alpha-fetoprotein (AFP) is an oncofetal antigen during hepatocellular carcinoma (HCC) development which could lead to weak reproducible antitumor immunity, and may act as a target for cancer therapy. Therefore, it is imperative to enhance its immunogenicity and develop therapeutic vaccines...
Proceedings Article

The Use of Machine Learning in Digital Forensics: Review Paper

Yusra Al Balushi, Hothefa Shaker, Basant Kumar
With the increase of cybercrimes in the current years, digital forensics has become an important matter to study in order achieve quality evidence. Forensic investigators face difficulties with data collection and analysis to reconstruct events. Due to humans’ immense interaction on a daily basis, machine...
Proceedings Article

Collaborative Control Digital Twin Technology for Mines

Yue Cao, Yuhan Zhong
Digital twin technology can provide strong technical support for data integration, collaborative management, and intelligent linkage of the global mining business system. By constructing a business dynamic collaborative control architecture based on digital twins, covering the physical object perception...
Proceedings Article

Discussion on applications of computer network technology in electronics and information engineering

Ruxin Tan
With the rapid development of the era, Internet information technology has found extensive applications, thus playing an important role in improving people's living standards. This paper conducts a basic analysis of applications of computer network technology in electronics and information engineering.
Proceedings Article

Study on the Innovation Competency Model of Students with Mechanical Major

Fan Jiang, Chunliang Zhang, Tsingfeng Wu, Zhongmin Xiao
To improve students' innovation ability need to consider their innovation competency, on the basis of existing research results, and the students' innovation competency is defined, through the investigation on the students of mechanical major, the students' innovative competence dimensions determined,...
Proceedings Article

Design And Implementation Of Information Representation System For Intelligence Acquisition

Ru Liu, Menghui Li, Huina Zhang, Yurong Huang, Jingyan Zhou
Information Representation System (IRS) is to transform data information and knowledge into a type of visual information for intelligence officers reading, where the natural ability of mankind to identify visual mode quickly will be made most of. Information representation combines human brains with...
Proceedings Article

Industry Competitiveness Evaluation Index System of Regional E-commerce Based on AHP

Xinchun Wang, Yubo Jiang
This article analyzes the factors of industry competitiveness of regional e-commerce from the perspective of business ecosystem, builds the evaluation index system, and determines the weight coefficients of each index by using the method of analytic hierarchy process (AHP). The thesis could provide decision-making...
Proceedings Article

The research of new start frame beginning spinning position signal acquisition system based on reed sensor

Qingbin Zhao, Guangdong Jiang
In this paper, a new frame beginning spinning position signal acquisition system is designed with reed sensors. Compared with the beginning spinning position signal acquisition device, the experiment proves that, the structure of the signal acquisition device is easy to adjust, stable and long usage...
Proceedings Article

Research and Application of the Electricity Information Collection SystemBased on Cloud Computing

Qi Qian, Guang Chen, Yu Han, Tao Liu
With the increasing huge amounts of data, there is a high requirement on the electricity information acquisition system. In this paper, a platform for the electricity information collection system is proposed to solve the problems in the current electricity network by employing the cloud computing technology....
Proceedings Article

A Design of Wireless Sensor Network Node Location Algorithm

Yun-He Li, Shao-Hua Wu, Hai-Tao Wu
Wireless sensor network belongs to an emerging concept and a technology for creating new application field. Range-free location algorithm can obtain distance information without any specific hardware, and thereby range-free location algorithm is more economic and effective, which is suitable for large-scale...
Proceedings Article

Research on Data Transmission Method Based 4G in Platform

Ningxia Yang, Yongfeng Chen, Min Qin
Aiming at studying the performance of the real-time video data transmission based on opportunistic network coding in the wireless network. First of all, making an in-depth analysis of the working principle of network coding and the improvement of the performance of the wireless network; secondly, on...
Proceedings Article

Ultrasonic Enhanced treatment wastewater dairy farming organics of single-factor test

Yong-guang Bi, Kuan-xin Zhang
In dairy farming simulated wastewater resorcinol as the research object, examines the ultrasound enhanced treatment of resorcinol single factor test, the results showed that: resorcinol degradation rate increased with the ultrasonic power is reduced, when sonication is 200W, its degradation rate of 45%;...
Proceedings Article

The Research of Positioning Measurement Based on Sensor Signal Strength

Mack Jianhua Du, Roger Liu
Sensor positioning plays animportant role in wireless sensor network (WSN). Thesensor location information is indispensable to a lot of applications. This paper analyzes the wireless sensor node measuring algorithm and the principle of classification, focuses on analyzing the signal strength based ranging...
Proceedings Article

Simulation and Optimization of Pressure-Swing Distillation System for High Purity Acetonitrile

Feini Huang, Shu Zheng, Yuxuan Chen, Mengxiang Zhou, Xiaofang Sun
According to the feature that composition of the azeotrope could be changed with the change of pressure, the method of pressure-swing distillation was applied to separate the azeotrope of acetonitrile-water and obtain high purity acetonitrile. A simulation model of pressure-swing distillation system...
Proceedings Article

Toxicological Effects of Cd Pollution on Soil Urease Activity

Yang Baoshan, He Fei, Chen Qinglin, Wang Hui
To characterize the effect of heavy metal Cd on soil microbial activity, urease activity was analyzed based on the enzymatic products of ammonia. . The results showed Cd concentrations had little effect on the urease activity and the incubation time had strong effect on the activity of urease activity...
Proceedings Article

Design and Implementation of Information Management and Decision System by Mobile Intelligent Terminal in Bridge Inspection

Xiaochuan He, Jinghua Fu, Tian Xia, Xiao Zhou, Li Ding
The information management and decision system of artificial bridge inspection is based on android mobile intelligent terminal which can make artificial and regular inspection electronic, information and networking, and improve the working efficiency and the level of bridge management and maintenance.
Proceedings Article

Design of Elevator Monitoring and Alarm System Based on WiMAX

Hong Jiang, Yongfang Shi, Lei Qi
With rapid speed, wide bandwidth and large covered range, WiMAX is used for building an system of elevator monitoring and alarming in this paper. The system integrates fault detection, trapped people communication and information management to inform maintenance staff. The design mentality and the structure...
Proceedings Article

An Augmented Reality Art Work for Museum

Fei Jiang
This paper surveys the field of augmented reality (AR), in which 3D virtual objects are integrated into a 3D real environment for Museum. It describes the interaction, visualization and entertainment applications that have been explored. This paper describes the characteristics of augmented reality art...
Proceedings Article

Application research of improved K-means algorithm in intrusion detection

Xiaoguo Liu, Jing Tian
An improved K-means clustering algorithm is put forward on basis of the split-merge method for the purpose of remedying defects both in determination of value in K and in selection of initial cluster centre of traditional K-means clustering. At first , the concept of independence degree of date was incorporated...
Proceedings Article

Data Analysis Model of Machining Accuracy Measurement Technology for Machine Parts

Xiaoming Chen
The quality of mechanical products depends on the quality of mechanical parts and the assembly quality of products, and the quality of parts is the basis of assembly quality. The quality of mechanical parts is related not only to the performance of materials, but also to the accuracy of machining and...
Proceedings Article

Intuitionistic Anti-fuzzy Subincline of Incline

Fengxiao Wang
Fuzzy subalgebras is an important research field of fuzzy algebras. In order to understand the characteristics of incline algebras, the intuitionistic anti-fuzzy subalgebra of incline algebra is introduced. The related properties of intuitionistic anti-fuzzy subalgebra are discussed. Furthermore, it...
Proceedings Article

A Novel Weak Deduction Password Strength Meter of Chinese Websites

Yu Wu
With the increasing situation of passwords datasets disclosure, the security of user's account faces rising risks under various kinds of password attack. To protect the security of user authentication system, password strength meter (PSM), which is used to measure user's password strength is widely accepted...
Proceedings Article

J Algorithm for Scientific Knowledge Discovery: Taking Economic Growth Theory as an Example

Qianhui Zhao, Qi Qian, Zhaohua Jiang
Text mining, intelligent algorithms and knowledge maps are the research frontiers and hotspots of current scientific knowledge discovery. However, there is currently no theoretical basis for such research—for example, the theoretical framework for the structure of scientific knowledge systems and the...
Proceedings Article

Students' Ability to Arrange Learning Devices Using Discovery Learning Model in Innovative Learning II Course

Pradnyo Wijayanti, P Wijayanti, Ismail Ismail, I Kurniasari
Based on curriculum development in primary and secondary schools, Unesa Mathematics Department through the KKNI curriculum has tried to adjust 2013 curriculum, which is to teach students about learning with scientific and constructivist approach. This is done in the subject of Innovative Learning II...
Proceedings Article

Multimedia-based Learning for Early Childhood Education

Stephanus Turibius Rahmat, Suyitno Muslim, Moch Sukardjo
This study aims to describe the usefulness of multimedia for early childhood education. Multimedia as a medium that facilitates and motivates learners in learning to be more interactive, effective, efficient, and interesting. With that, learners are encouraged to have a positive motivation in learning...
Proceedings Article

Innovative exploration on the electricity safety management system for high-rise buildings based on the trinity of government, power utility and users

Penghe Zhang, Jiajun Zhao, Runan Song, Hailin Gu, Shiyu Feng, Yanlei Li, Ganchao Chen, Yiwei Qin
As the economy grows, there are more high-rise buildings which leads to the issues with electricity safety. This paper focuses on the energy consumption characteristics of high-rise buildings and common electrical hazards, devoting to the current standardization of high-rise building electricity at home...
Proceedings Article

Implementation of Support Vector Regression (SVR) Analysis in Predicting Gold Prices in Indonesia

Suwardi Annas, Zulkifli Rais, Aswi Aswi, Indrayasaro, Nurfajriani
Gold is jewelry made from precious metals which are soft and easy to shape. The value of gold tends to fluctuate every year. Gold investments, like other investments, are not risk-free. So, investors can experience profits or even losses. Gold price predictions are needed to determine investors’ opportunities...
Proceedings Article

A CNN-RF-SVM Hybrid Method for Traffic Congestion Monitoring

Jiaxu Zhu
With the development of the automotive industry and increasing demand for personal mobility, the growing number of vehicles on roads has led to traffic congestion and environmental pollution. Accurate traffic congestion monitoring has become a prominent research focus. The integration of surveillance...
Proceedings Article

A Study of Behavior Intention of Runners' Virtual Community - The Case of Marathon's World Website

Hsin-Ke Lu, Peng-Chun Lin, Chi-An Li
According to the World Health Organization (2015) statistics, the population of today's global obesity has already doubled since 1980, the number nearly doubled. World Health Organization also estimates that depression, along with cancer and AIDS, will be the three major diseases in the world. It can...
Proceedings Article

The Development Stage of Micro Media Apps in China

Tiansheng Xu, Zhuowen Deng, Hanglong Song
Social networking has demonstrated a clear shift towards mobile platforms like smartphone and tablet apps as well as mobile web. Due to the significant development of social networking technology, the number of mobile social media users has been boosted over past 10 years. One of the defining phenomena...
Proceedings Article

Iris eyelid detection based on adaptive sectional line fitting

Ji Xiaocun, Chen Houjin, Li Jupeng
It is the premise condition of iris recognition that we segment iris image effectively. Most of the iris images are interfered by eyelid, so it is important for iris image segmentation that detecting eyelid accurately. An iris eyelid detection method based on adaptive sectional line fitting was presented...
Proceedings Article

Oscillation of Solutions to Fractional Partial Differential Equations with Several Delays

Yongfu Xiong, Li Xiao, Anping Liu
In this paper, we study a class of nonlinear fractional partial differential equations with several delays to the second boundary condition. Based on properties of the Riemann-Liouville fractional derivative, we establish a sufficient oscillatory condition of all solutions. The result is illustrated...
Proceedings Article

Phenol Adsorption onto Modified Industrial Solid Waste Adsorbents in the Presence of Cationic and Anionic Surfactant

Gang Tan, Yongjie Xue, Li Wan
The objective of this study is to remove phenol from aqueous solution by using modified industrial solid waste (ISW) in the presence of cationic and anionic surfactant with batch adsorption. Tests were carried out as functions of contact time, initial phenol concentration, pH and temperature. The experiments...
Proceedings Article

Design of Digital Switching Power Supply Based on FPGA

Xiaohua Wang
With the development of power electronic technology, the control technology of power electronic device is becoming more and more complicated. The switching power supply is a indispensable component in modern power electronic equipment. Its quality and size have a direct impact on the whole performance...
Proceedings Article

Open Data Model for (Precision) Agriculture Applications and Agricultural Pollution Monitoring

Tomáš Rezník, Karel Charvát, Vojtech Lukas, Karel Charvát Jr., Šárka Horáková, Michal Kepka
Both agricultural and environmental domains have to manage many different and heterogeneous sources of information that need to be combined in order to make environmentally and economically sound decisions. Such examples may be found at the definition of subsidies, national strategies for rural development,...
Proceedings Article

A Method of Network Behavior Recognition and Attack Scenario Reconstruction for Attack Kill Chain

Jiawei Du, Xing Zhang, Guowei Suo, Ronghua Guo, Gang Lu
Currently, most successful network attacks are aimed at a particular target, composed of several attacks at different stages, and the attack is always carried out in a certain sequence, which coincides with the attack kill chain proposed by the US Army. Aiming at the typical multi-step attack type of...
Proceedings Article

Design of University Resource Website and Security Measures in IPV6

Li Chunmei, Cui Peng, Zhou Xinke, Xiao Ze
In this paper authors introduced the overall design of learning resource sharing platform in the pure IPv6 environment, including the client and the web server and the back-end database, and the user management, the detailed design of the three aspects of resource management platform and administrator...
Proceedings Article

Analysis on the Comparative Advantages of Developing Green Industry in Heilongjiang Province under the Labor Division Theory

Wenjun Zhao
China has made major decisions on rejuvenating northeast old industrial bases. The choice of leading industries is of crucial importance to the future economic development of Heilongjiang Province. Based on the theory of labor division with Smith, Petty and Marx, the dissertation holds that the division...
Proceedings Article

Generalization of Chaos Game on Polygon

Kosala D. Purnomo
The original chaos game has been applied to the triangular attractor points. With the rules for selecting attractor points randomly, the points generated in large iterations will form like a Sierpinski triangle. Several studies have developed it on the attractor points of quadrilaterals, pentagons, and...