Advances in Computer Science Research

+ Advanced search
14148 articles
Proceedings Article

Teaching Reform of Power Electronic Technology Course of OBE Education Model

Dandan Ma, Jing Bai, Ping Xin
Due to the strong theoretical power electronics course, and in the process of teaching the lack of effective evaluation of students learning effect, It is difficult to achieve the expected teaching goal. This paper in detail discusses the meaning, theoretical basis and characteristic of OBE education...
Proceedings Article

Blind Identification of Space-time Block Coding (STBC) Using Single Receive Antenna over Frequency-selective Fading Channels

Hong-Wen Lin, Ke-Yuan Yu, Zhao-Gen Zhong, Shuai Liu
Blind recognition of STBC is an important issue in the non-cooperative context. However, the research on blind recognition over frequency-selective fading channels has been rarely reported. This paper introduces a novel and efficient algorithm for the frequency-selective fading channels to classify STBC...
Proceedings Article

Research on the design strategy of a fast packing box

Zhiliang Xia
This design scheme is a fast packing box? including external cylinder, laminate, spring, inner tube and lock ring. The inner tube is installed inside the outer cylinder and The hook is installed in the groove of the guide slot. It has the characteristics of convenient disassembly and easy to use and...
Proceedings Article

Parkinson’s Disease Diagnosis Based on XGBoost Algorithm

Shilong Yao
In light of China’s aging population and improved living standards, there is an increasing focus on health issues. Parkinson’s disease is a commonly-seen neurodegenerative disorder that greatly impacts patients’ quality of life, and its prevalence is on the rise. The traditional approach to Parkinson’s...
Proceedings Article

Adaptive Iteration Stopping Criterion for AMSS Equations

Changle Li, Gangfeng Liu, Jie Zhao
When AMSS (Affine Morphological Scale Space) operator is applied in image filtering, the scale parameter has great impact on the filtering results. In order to determine the parameters more precisely, this paper analyzed affine invariance properties and classical invariance properties of AMSS operator...
Proceedings Article

Icon design and application in HCI

Fu Jiuqiang
Icon design is an important part of interface design and it is also valuable manifestation of visualizing phase for interface. Based on the icon design and users perception, this article analyzes the general process of users recognizing icon, propose common icon design factors and find rules of users...
Proceedings Article

An improved Authentication Protocol for SIP-based VoIP

Husnain Naqvi, Shehzad Chaudhry,, Khalid Mahmood,
The SIP being an application layer protocol for signaling has been considered as the most ppropriate one for multimedia applications. In order to detect some collisions and replay attacks, the SIP offers built-in authentication mechanism as per its specification, designated as HTTP digest based authentication,...
Proceedings Article

A new algorithm for wireless network nodes effectiveness

XiangZhong Wang, Moyi Duan
According to the network congestion caused by node failure, presents a measuring node effectiveness evaluation index. The index for the long correlation properties of the actual flow, respectively using the autoregressive moving average (Auto-Regressive and Moving Average, ARAMA) model and linear fractional...
Proceedings Article

Research on Maximum Penetration of Microgrid Based on Artificial Bee Colony Algorithm

Xin-Hua Yang, Zhi-Wei Liu, Li-Zhen Wu
The paper builds a planning model with maximizing the penetration of microgrid as its aim to realize the maximum output of microgrid based on the planning problem of microgrid grid-connection in distribution network. Considering the impact of microgrid grid-connection on distribution network, power flow,...
Proceedings Article

The Simulation of Oligopoly Information Equilibria with Agents' Capacity Constraints

Mikhail Geras'kin
The game model of the oligopoly under the linear demand function and the non-linear functions of agents’ costs is considered, taking into account the capacity constraints of the agents. The simulation of optimal strategies for unlimited agents is carried out. The Pareto-efficient information equilibria...
Proceedings Article

Numerical Simulation of Failure Pattern of Overlying Soil during Vertical Jacking Construction

Zhengyuan Xiong, Chunshan Yang
In order to clarify the failure characteristics and influencing factors of overlying soil during vertical jacking, using secondary development of discrete element program to simulate the construction process of vertical jacking, which reveals the failure mechanism, scope and development path of the overlying...
Proceedings Article

Biodiversity of Invertebrates in Kemantren Coast, Lamongan

Dwi Rahayu, D A Rahayu, R Ambarwati, U Faizah
Kemantren beach is located in the Kemantren Village, Paciran District, Lamongan Regency. This beach is consists of sand and coral substrate. Kemantren beach is one of the small coastal islands of Java that has already reclaimed with spot of high ecotourism potency and habitat for numerous types of invertebrate....
Proceedings Article

A Study on Lung Cancer Detection in CT Images Using Medical Image processing with Deep Learning Techniques

D. E. Mariana Jaincy, Prasanthi
Several medical imaging applications have shown success with deep learning, ushering us further into AI technology. For a single activity, the availability of massive amounts of data with annotations, as well as developments in high-performance computing, are widely credited with AI's success. Medical...
Proceedings Article

Risk management as a determinant of the effectiveness of the quality management system in a building company

Harasymiuk Jolanta, Barski Janusz
The aim of this article is presentation of the results of an analysis of quality research on the conditions of an implementation of risk management in Polish building enterprises. The quality research was done on the basis of a participating observation and of an unstructured interview. The interviews...
Proceedings Article

A Summary of the Application and Research of the Command and Control Organization Theory in Emergency Communication Support

Yiwei Ji, Xuejun Ren
In recent years, the emergency communication support has been fully developed. With the progress of the times, the problems of the emergency communication support are constantly changing, and new methods are needed to solve the problems. This paper summarizes the current researches on the problems in...
Proceedings Article

Application Research of Organic Orientation Effect in Drug Synthesis

Hongxia Lv, Yuan Zhou
In the process of drug synthesis when choosing synthetic route, it is necessary to fully consider the positioning effect factors and pay special attention to effects caused by the compound of different orientating groups so as to give full play to the role of the synthetic drug and achieve the desired...
Proceedings Article

Application Research of Data Mining in Grades Analysis and Course Correlation Analysis

Shaorong Feng
Concerning the shortcomings of C4.5 algorithm, we put forward an improved one. This approach can improve the efficiency to generate the decision trees by reducing the computation complexity of information gain ratio. By applying the improved C4.5 decision tree algorithm to course grades analysis and...
Proceedings Article

Research on image mosaictechnique based on Contourlet transform

Li Li, Jun bo Chen, Jin Cheng
The image after image mosaic apply in not demanding occasions case, This paper presents the splicing method based on Contourlet transform.Through the feature extraction, feature matching, ranking is obtainedafter image stitching.The experimental results show that this method improves the quality of image...
Proceedings Article

Development of Data Integrity Testing Tool for Mission-Critical Systems

Bup-Ki Min, Yong Jun Park, Yongjin Seo, Hyeon Soo Kim
Mission-critical systems are hard real-time systems that collect large amounts of information from diverse sensors for mission performance. For perfect performance of missions of systems, data should not be omitted or spoiled. To this end, data integrity in the systems should be ensured. Therefore, along...
Proceedings Article

Existence of Solution to Generalized Multivalued Vector Variational-like Inequalities

Di Wu, Lu Shen, Yali Zhao
In this paper, we consider a generalized multivalued vector variational-like inequality and obtain some existence results. some special cases are also discussed.
Proceedings Article

Designing of a study game of the mathematics probability in middle school based on Unity3D

Li Wang
The emergence of educational games has greatly changed the students' learning style, so that students can combine learning and entertainment, so as to improve the learning interest and efficiency. The article uses 3ds Max as the model design tool to build three-dimensional game scene and props, takes...
Proceedings Article

Applied Undergraduate English Teaching based on the Analytic Hierarchy Process

Xin Yuan
This paper attempts to establish a teacher evaluation object, student evaluation of College English teaching quality evaluation system, details the steps analytic hierarchy process, gives the right of each index indicator system for scientific and objective evaluation of English classroom teaching quality...
Proceedings Article

Analysis of the algorithm of the dual spectrum feature extraction of communication radio station

Wenle Yuan, Xuanmin Lu, Wensheng Luo, Jinjie Cao
In order to study the characteristics of double spectrum radio signals, based on higher order statistics and the double spectrum definition and properties, using two kinds of direct and indirect bispectrum feature extraction algorithm, and two kinds of radio signal bispectrum estimation is simulated....
Proceedings Article

Flow Simulation Based Energy Efficient Clustering in Wireless Sensor Network

Yi Jiang
The paper introduces a flow simulation based clustering algorithm for wireless sensor network. The algorithm is fully decentralized. The proposed algorithm is inspired by simulating flow in the network. The algorithm clusters the nodes that are at distance of at most k hops from the cluster head while...
Proceedings Article

A Hybrid TD-AD Algorithm Based Electromagnetic Spectrum Assignment Method

L. Guo, T. Liang, A.W. Sun, Y.J. Zhang
The object of spectrum assignment is to build its own ordered spectrum environment and maintain uninterruptedly spectrum resource control. In this article, we build a mathematical model and put forward the hybrid TD (table dispatching method) and the AD (auxiliary decision method) algorithm. The results...
Proceedings Article

A Weighted APIT Localization Algorithm based on Vector Similarity

Li He, Zhiwei Kang
To reduce incorrect decisions of PIT test (Point-In-Triangulation Test) and localization error of APIT algorithm, a weighted APIT algorithm is proposed based on vector similarity. Firstly, for better distance precision, the estimated distances between nodes computed from RSSI attenuation model are corrected...
Proceedings Article

Analysis of Measured Data and Its Effect on Active Sonar Working Depth in the Yellow Sea

He Zhan, Rijie Yang
Based on the WOD13 data of the Yellow Sea, we analyze the sound speed profile and sound transmission loss of some position in it, and summarize its variation regulation. Utilizing the Bellhop model, we calculate the detect range of active sonar at different working depths, pick up the optimal working...
Proceedings Article

Signal Coding in Physical Layer Separation for RFID Tag Collision

Yi Li, Haifeng Wu, Yu Zeng
In an ultra-high-frequency (UHF) radio frequency identification (RFID) system, direct separation for tag collision on a physical layer can improve the efficiency of the tag identification. Many coding methods can be adopted in the RFID system. Different codes have different link frequencies and have...
Proceedings Article

Preference-based Evolutionary Many-objective Optimization for Regional Coverage Satellite Constellation Design

Minghui Xiong, Wei Xiong
For the satellite constellation design problem, the computational complexity of regional coverage performance evaluation has posed great difficulty to classical Pareto dominance-based algorithms discovering the entire Pareto front of the problem, while the decision makers are often interested in a limited...
Proceedings Article

Dynamic Routing Mechanism in Network Simulation Based on Topology Perception Time Series

Lei-gang SUN, Yu-feng MA, Li-ju CHEN, Bo WU
A fundamental requirement for any routing mechanism in network simulation is to truly reflect the forwarding process of packet from source to destination in the simulated topology. In current network simulators, all the nodes know the information instantaneously when the topology changed, which is obviously...
Proceedings Article

Big Data Analysis Method of Random Stress Spectrum for Crane Equipment

Li Chen, Keqin Ding
Fatigue damage is one of the most important failure modes of crane equipment. It is an important means to judge the fatigue damage of crane equipment structure by analyzing the random stress spectrum big data collected by the structural health monitoring system of crane equipment. Rain flow counting...
Proceedings Article

Research on the Construction of Agricultural Risk Compensation Fund in Dalian based on the Principle of Tax Benefit

Cui Dan
For a long time, agricultural risk has been the main contradiction and prominent problem that restricts the development of rural economy. This paper constructs the Agricultural Risk Compensation Fund in Dalian on the basis of the principle of tax benefit, the social public attribute of Agricultural Risk...
Proceedings Article

Chinese Dependency Parsing Based on An Improved Model of MST

Qi Sun, Yang Xiang, Xiao Tu
In this paper, a Chinese dependency parsing method was presented based on improved Maximum Spanning Tree algorithm. Within this method, Conditional Random Field (CRF) is adopted to establish sequence labeling model. Recognizing POS of head node is employed to modify the weights of directed edges in the...
Proceedings Article

Research on Control Model of Flexible Manipulator for Ships Based on Fuzzy Neural Network

Libo Yang
In this paper, it makes study on a kind of control model of flexible manipulator for ships based on neural network algorithm, this model can solve the operation control problem of flexible manipulator when ships are in the voyage through the combination of traditional fuzzy theory and neural network...
Proceedings Article

Analysis of Temperature Field in the Flow Field and the Stress Field of the Friction Plate of the Wet Clutch

Jingang Liu, Ming Mu, Jianwen Chen, Quan Li
Aiming at the friction temperature is too high, excessive thermal stress problems of wet clutch engagement process, establish the three-dimensional model of wet multi disc clutch, using ANSYS workbench finite element software, the calculation process considering various displacement constraints, the...
Proceedings Article

The Current Situation and Thought of Chinese Teaching of Painting

Liu Yuan
With the development of society and economy, the life quality and level have been improved. Therefore, many people now begin to focus more on the art and traditional culture. Chinese painting, as the quintessence of Chinese culture, becomes more and more important in the point of development of talents....
Proceedings Article

Analysis on the Heat Efficiency of Hot-Air Drying System

Sangan Ha, Dongkyun Kim, Jeipil Wang
Conveyor-belt hot-air drying equipment was developed and used in this study to investigate the feasibility of new heat-efficiency-improvement technology. This novel technology reduces the amount of heat generated by the heater in the new hot-air drying furnace. Sludge sample types A and B used in the...
Proceedings Article

The Decision Support System of Urban Distribution Network Planning Based on Electric Power Demand Forecasting

Suling Chen
The functional architecture and overall design of the decision support system of urban distribution network planning based on electric power demand forecasting are introduced, with the focus on the function implementation and key planning results of the electric power demand forecasting module for the...
Proceedings Article

The Estimation of Open Boundary Conditions in the Bohai Sea with POD 4D VAR Data Assimilation

Shouguo Qian, Xianqing Lv, Rencheng Sun, Fengjing Shao
Proper orthogonal decomposition four-dimensional Variational (POD 4D VAR) data assimilation method is used to estimate the open boundary conditions (OBCs) with a two-dimensional (2D) M2 tide in the Bohai Sea by assimilating the TOPEX/Poseidon (T/P) altimeter data. Qian et al. [14] assume that the OBCs...
Proceedings Article

Survey of Software Vulnerability Discovery Technology

Wang Wei
The 21st century is the information age. The rapid development of computer technology supports the rapid development of the information age. With the rapid spread of computers and networks, more and more software products play an important role in people's daily life. In computer security[1], a vulnerability[2]...
Proceedings Article

Design of Analytical Model for Predicting the Remaining Battery Discharge Time

Zhong-hua Ling, Lu-ling Duan, Lei Zhang
Based on the data of voltage, current intensity and remaining battery discharge time, a mathematical model of lead-acid battery discharge curve is established. The model was used to fit the sampling data of the curve about lead battery discharge with different current intensity. The nlinfit function...
Proceedings Article

Risk Evaluation of Gas Pipeline Based on Rough Set

Hongyan Gu
Gas is a flammable, explosive and high-pressure medium. Gas pipelines are passing through many different geographical conditions of changing natural environment with gas. Therefore, a lot of adverse consequences will be bought by the gas pipeline failure, however not all consequences have a great impact...
Proceedings Article

Improved Resource Search Strategy Using Random Walk Based on Node Reputation for Unstructured Mobile P2P Network

Junwei Ge, Hongxia Shi, Yiqiu Fang
With the development of wireless communication technologies and mobile devices, the P2P network technology has the conditions to be used in wireless environments. Resource search is to discover requested object in mobile P2P network (mobile peer-to-peer network), which is one of the core issues of mobile...
Proceedings Article

Research the output characteristic of the 2MV very fast transient overvoltage generator

Rui Li, Xiangyu Tan, Yibo Li, Yi Ma, Ke Wang, Guochao Qian, Peng Xu, Xianfu Chen, Shaoquan Zhang
Very fast transient overvoltage has become an important research topic in international high- voltage field due to its generation, features and the influence of GIS on insulation breakdown characteristics. In this paper, the distributed parameter simulation model is established in view of the VFTO generator,...
Proceedings Article

A New Invisible Cloak with Broad Stealth Angle Based on Isotropic Material

Jingbo Zhao, Hong Yao, Jun Du, Yijing Liu, Jiulong Jiang, Yake Dong
Study on invisible cloak has attracted considerable attention from all over the world thanks to its potential application value. However, it is still difficult to achieve fully movable invisible cloak due to material and other constrains currently. Here, the design and experimental demonstration of a...
Proceedings Article

The Appropriate Mode in the Application of the Philosophy of Sufficiency Economy in the Environmental Management of the Industrial Sector

Phoochinda Wisakha
This study aims to investigate success in the application of sufficiency economy philosophy of industries, to investigate factors affecting the application in environmental management and to suggest appropriate mode. Data are collected using in-depth interviews with nine businesses successfully applied...
Proceedings Article

Selection and evaluation of e-commerce enterprises logistics operation models based on F-AHP method

Zhouxiang Guo, Xifu Wang
This paper divides e-commerce enterprises logistics operation models into three forms: completely Self-built logistics, completely outsourcing and logistics alliance. Beginning from the logistics features of e-commerce enterprise, this paper established comprehensive evaluation index systems, and use...
Proceedings Article

A Migration Strategy based on Reliability Disk and Hotspot Data in Information Systems

Yin Yang, Wei Liang, Wenyi Li
This paper proposes a Migration strategy based on Reliability disk and Hotspot data called MRH. MRH uses reliability disk estimation to confirm disk reliability based on SMART technology. It computes the heat degree of data and the utilization of disk at the present time, so we can protect the whole...
Proceedings Article

Machine Tool Compensation Based on Computer Virtual Technology

Ming Song, Yongmin Jiang
This paper presents a comprehensive virtual simulation model for CNC systems. The Virtual CNC (VRCNC) has a modular architecture and the special function. It can show movement process and the result, it can also show the effect of different movement mode, the displacement, velocity and acceleration of...
Proceedings Article

A Certain Naval Gun on Empty Firing Command Decision Research

Changpeng Pan, Liang Ma
The operational effectiveness of naval gun's anti-air besides related to naval gun weapon system, also to a large extent under the influence of firing command decision making. How to reasonable use of naval gun weapon system's anti-air, we need to empty for naval gun firing command decision making problems...
Proceedings Article

Study on Construction of a Virtualization based Software Defined Network

Wen-Xin Qiao, Yu Lu, Chang-Sheng Wang
Information network technologies have been rapidly developing with the rapid growth of demand for information-based society. However, the traditional TCP/IP network architecture could not satisfy the demand of network development, so as to military network. A virtualization based SDN network for military...
Proceedings Article

Non-Gromov hyperbolicity of asymptotic Teichmuller spaces

Jinhua Fan
In this paper, we prove that the asymptotic Teichmuller space of Riemann surfaces of analytically infinite type with the asymptotic Teichmuller metricis not Gromov hyperbolic.
Proceedings Article

Investigating the Energy Efficiency of TD-LTE Private Network

Ying Sun, Yuqing Zhong, Xuanni Lin
TD-LTE private network is embracing unprecedented popularity due to its support of broadband services and ease deployment. However, due to the limited applications of power industry and the more urgent bandwidth requirements of telecommunication industries, the availabe bandwidth TD-LTE private network...
Proceedings Article

An analysis of the Effects of Value-added Tax Reform with Using the DID Method

Meiping Liu, Li Yang
This paper employs survey data from China National Taxation Bureau for 2006 2012 and applies the method ofDifference-in-Difference to study the effects of value-added tax reform, which was put into effect nationwide in 2009. The empirical findings show that when the VAT system changed from production-based...
Proceedings Article

Novel Approach to Estimate the SV Traffic Streaming Latency Based on IEC 61850-9-2LE

Mike Mekkanen, Erkki Antila, Reino Virrankoski, Mohammed Elmusrati
Substation Automation System (SAS) performance has been gained great improvements by implementing the high data rate process bus based on IEC 61850-9-2LE. These improvements can be summarized within the most important such as reduction in the SAS constriction cost by eliminating the high cost copper...
Proceedings Article

Development and Application of English Listening and Speaking Teaching Materials

Xiaoyan Feng
All along, there is a misunderstanding of English teaching in China, which ignores the basis that listing and speaking should be the foundation of English learning. How to improve English listening and speaking ability is an important topic in English education field, which has caught the attention of...
Proceedings Article

Inequalities On Generalized Trigonometric Functions

Baoju Sun
The Sharp Cusa-Huygens inequality involving the generalized trigonometric functions are established.
Proceedings Article

Approaches for the Synthesis of Decision-Makings Review

Denis Oleynikov, Lyudmila Butenko
This paper describes author's approaches, intended to obtain new decision-making methods. Approaches reflect morphological aspects of the consideration of decision-makings affect system-wide trends of the development of systems and contain elements of the heuristic nature of the synthesis process. Common...
Proceedings Article

Fluctuation sensitivity models of microwave radiometers

Tilekbek Abdirasul, Egor Alekseev, Dmitry Minenko, Anton Ubaichin, Gregory Zhuk
This paper offers a comparative analysis of the fluctuation sensitivity of radiometers of different types. We have considered mathematical models of fluctuation sensitivity , taking into account the destabilizing factors. Practical recommendations on the approaches to increasing the fluctuation sensitivity...
Proceedings Article

Pyrazolylporphyrin Derivatives as New Potential Ligand for Melanoma Cancer Radiopharmaceutical Kit: In Silico Study

Fransiska Kurniawan, Rahmana Emran Kartasasmita, Daryono H. Tjahjono
Melanoma is the most lethal skin cancer, and it is related to Fibroblast Growth Factor 2 (FGF2) which is important for survival and proliferation of melanocytes. Diagnosis and therapy of melanoma cancer can be performed applying radiopharmaceutical with appropriate ligand. The aim of this research was...
Proceedings Article

Automatic Lumbar tracking based on image processing and particle filter

Liu YuChen, Ma YingDong, Du ZhiHao
Lumbar motion is one of the most widely used information to diagnose low back disorder. By using the Digitalized Video Fluoroscopy (DVF) technique, a sequence of X-ray frames can be acquired, which shows the movement of patient vertebra. But the X-ray frame sequence is usually indistinct and having extra...
Proceedings Article

Security Detection and Research of Intelligent Hardware System

Guojian Ge, Qingshu Xue
With the rapid development of Internet of things technology, intelligent hardware equipment has become an important part of our lives. It widely exists in the smart router, network cameras, smart home and smart wearable devices. By analyzing the common features of intelligent hardware devices, our research...
Proceedings Article

Design and Implementation of Client Side at Application Layer of Internet of Things

Zong-Jing Zhao, Jing-Jing Yang, Su-Jing Ma, Xiao Zhang
This paper designs the client side of application layer of IoT-based smart home system. Firstly, it brings forward IoT overall structure; then it compares the three short distance transmission modes of ZigBee, WIFI and Bluetooth and chooses WIFI transmission; finally it analyzes the process of connecting...
Proceedings Article

Modeling of Complex Apron Conflict Control Based on Petri Net Model

Weijun Pan, Lei Yang, Xinping Zhu, Qinghai Zuo, Rundong Wang, Chuyang Yang, Jie Luo, Youjun Ye
This paper uses discrete events modeling to apron surface activity control problem. Through dispersing runway taxiway and apron, discrete element map to Petri net basic element, build surface activity model based on Petri net. The paper build model of apron activity by Petri net theory, use Cpntools...
Proceedings Article

Assessing the Uses of NLP-based Surrogate Models for Solving Expensive Multi-Objective Optimization Problems: Application to Potable Water Chains

Florin Capitanescu, Antonino Marvuglia, Enrico Benetto, Aras Ahmadi, Ligia Tiruta-Barna
In practice many multi-objective optimization problems relying on computationally expensive black-box model simulators of industrial processes have to be solved with limited computing time budget. In this context, this paper proposes and explores the uses of an iterative heuristic approach aiming at...
Proceedings Article

Discussion on the Situational Creation of University Database Teaching

Fang Xin
According to the constructivist learning theory, situational creation as the basis to create teaching, will combine teaching and context. It is helpful to achieve knowledge construction of university database course teaching in process of "Understanding - Demonstration - Memory - Imitation" .Curriculum...
Proceedings Article

Design and Current Tracking Control of Leg Press Training Device With Clutch

Hongbo Wang, Hao Yan, Baoshan Niu, Xincheng Wang, Hongfei Yu
Aimed at the characteristics of the existing stretch leg rehabilitation products with single function and complicated structure, a leg stretching training device with multiple training modes is proposed. At the same time, a controller strategy based on fuzzy slip film algorithm is proposed for the constant...
Proceedings Article

A Novel Sub-regional Key Management Scheme for Distributed Wireless Sensor Network

Yinghong Liu, Yuanming Wu
Encryption technique is one of the key technologies in wireless sensor networks. In this paper, a novel key management scheme of sub-regional based on bivariate symmetric polynomial key is proposed for distributed wireless sensor network (WSN). A certain amount of bivariate symmetric polynomials are...
Proceedings Article

Safety Verification of RGPS Service Layer Meta-model

Hao Yang
With the increasing complexity of network software, how to ensure safety of network software function and performance becomes more and more important. Based on the characteristics of network software and framework of RGPS requirement meta-model, this paper proposes safety verification of RGPS service...
Proceedings Article

Research on Access Control Model Based on User Trust Degree and Resource Life Cycle under Mobile Environment

Xiaoyan Zhang, Kai Kang
Traditional role-based access control models cannot meet the changing requirements of the roles and users under the mobile Internet environment due to their static attributes. To address such issue, this paper proposes an access control model, which is based on the user trust degree and the resource...
Proceedings Article

Research on Preparation Technology of Silicide Thermoelectric Material and Its Thermoelectric Transport Properties

Shiyun Zhou
Thermoelectric material is a kind of carrier material which will be able to use in the conversion of new functional electrical and thermal energy. It has the advantages of light weight, long life, small size, clean, environmental protection and many other advantages, which has been popularized in the...
Proceedings Article

On Ramsey (mK2, P4)-Minimal Graphs

Asep Iqbal Taufik, Denny Riama Silaban, Kristiana Wijaya
Let F, G, and H be simple graphs. The notation F → (G, H) means that any red-blue coloring of all edges of F will contain either a red copy of G or a blue copy of H. Graph F is a Ramsey (G, H)-minimal if F → (G, H) but for each 𝑒 ∈ E(F), (𝐹 − 𝑒) ↛ (G, H). The set ℛ(G, H) consists of all Ramsey (G,...
Proceedings Article

Prime Power Noncoprime Graph and Probability for Some Finite Groups

Nurfarah Zulkifli, Nor Muhainiah Mohd Ali
The study of coprime probabilities and graphs have its own uniqueness that produces a particular pattern according to its variabilities. Some obvious results can be seen from previous research where the domination number will always be equal to one and the types of graphs that can be formed are either...
Proceedings Article

Tourist Behavior-based Early Warning Scheme for Wisdom Tourisms

Jinghe Zhang, Qianwei Chen, Xiaowei Wu, Yue Hu, Weidong Fang
In this paper, we propose a warning scheme for behavior early warning in scenic spots. In the scheme, it determines whether to send an alarm reminder based on the current location of the visitor’s mobile terminal. The warning scheme includes obtaining the warning location information based on preset...
Proceedings Article

Successful Data Mining: With Dimension Reduction

Sariya Begum Syed Meraj, B. S. Shetty
The technique of collecting important knowledge characteristics from a dataset in order to further transform it into usable information is known as data mining. With the combined use of statistics and machine learning, data mining has grown in popularity for a variety of applications, including better...
Proceedings Article

Superluminal Transmission of the Information and Its Applications in Communications and Computer

Zi-hua Zhang, Hua-an Zhang
We have proved the superluminal transmission of information is certainly possible in the theory and computer simulation, Meanwhile this paper discussed the contradiction between Special Relativity and superluminal phenomena from three aspects: 1, epistemology; 2, the defects of SR and 3, the special...
Proceedings Article

A Data Analysis Approach for Diagnosing Malfunctioning in Domestic Space Heating

Seyed Amin Tabatabaei
Around one third of worldwide energy usage is for the residential section and 60% of the energy consumption in this domestic area is for space heating. Therefore, monitoring and controlling this part of energy usage can have a major effect on the overall energy consumption and also on the emission of...
Proceedings Article

Environmental Assessment of E-media Solutions: Challenges Experienced in Case Studies of Alma Media Newspapers

Yevgeniya Arushanyan, Åsa Moberg, Minna Nors, Catharina Hohenthal, Hanna Pihkola
The rapid and continuous development of information and communication technology (ICT) in society today is providing new means for various societal activities. To facilitate that new ICT solutions reduce environmental impacts and bring social improvements the potential impacts of those new solutions...
Proceedings Article

A comparative Study of the Liability of the Income Statement and the Liability of the Balance Sheet

Wang Jianbing, Wang Jun
On February 15, 2006, the ministry of finance issued new enterprise accounting standards system, including the accounting standards for enterprises - income tax ,which has clearly shown that we should apply the international balance sheet debt method to tax accounting. The view of assets and liability,...
Proceedings Article

The Use of Mapping Knowledge Domains in Analyzing Subject's Research Overview and Hot Spots*

Yan Liu, Yingjuan Tang
This paper uses scientometrics method of knowledge mapping domains, on the basis of CAJD database, summarizes and analyses the discipline structure of "Teaching Chinese as a Second Language (TCSL)". It introduces the method of knowledge mapping analysis to the research area of Teaching Chinese as a Second...
Proceedings Article

EEG Recognition of Motor Imagery Based on EWT in Driving Assistance

Wei Shan, Yuwen Wang, Qun He, Ping Xie
Electroencephalogram (EEG) feature extraction is one of the key techniques for Brain Computer Interface (BCI) in driving assistance. In this paper, empirical wavelet transform (EWT) is introduced for EEG feature extraction, and then a new EEG recognition method based on EWT is proposed. In the proposed...
Proceedings Article

Speed Identification Based on Surveillance Video in Traffic Accidents

Shuquan Xu, Shengwen Yang, Chaozhou Chen, Guofang Wu
Traditional analytical methods on the velocity in traffic accident are summarized, and the use of reference object in vehicle-mounted surveillance video data identifying the velocity in traffic accidents was introduced. A collision between a bus and an electric bicycle which caused injuries was taken...
Proceedings Article

The Bus Line Supporting System Based On Learning Neural Network Model Applied In GIS

Jun Song, Shengwei Quan
With the rapid increase of urban population and rapidly widening scope of the city, the newly built residential areas emerging or leading to the existing bus lines could not meet the needs of the people’s activities. The phenomenon of the traffic congestion is becoming more and more serious. [1] According...
Proceedings Article

High Accuracy Tracking with an Active Pan-Tilt-Zoom Camera

W. Fu, L. Gao
Traditional PTZ tracking system focus on tracking algorithm, but PTZ camera control is not taken seriously and the control method has the large deviations. The algorithm for PTZ camera control is defined according to the target position which is achieved by the tracking algorithm in the image, calculates...
Proceedings Article

Analysis and Compensation About Temperature Influence to Optical-Fiber Gyro Zero Bias

Zhou Haiyuan, Yang Heng, Wang Qianxue, Liu Xinming, Pan Liang
Compared to other gyro the dynamic performance of optical-fiber gyro was better and the price was cheap. Optical-fiber gyro was suitable to build SINS. By the way, zero bias of optical-fiber gyro was sensitive to temperature, and the compensation technique was a hot point in INS research. According to...
Proceedings Article

Application of Virtual Reality Technology in Complex Warfare Field

Kang Wang, Guiqing Gao, Yuanli Qin, Jingjing Zhang
In order to strengthen the study of complex war issues in the era of intelligence, the idea of using virtual reality technology as a bridge to connect artificial intelligence and complex warfare is proposed. By analyzing the characteristics, classification, and development of virtual reality technology,...
Proceedings Article

Design and Implementation of Single-Phase Inverter Based on Lightweight TCP/IP Protocol

Botao Zhang, Hongwei Xiao
As for resource-limited embedded devices, lightweight TCP/IP protocol (LwIP) is used for communication in order to meet real-time requirements of embedded devices. This paper offered and implemented a single-phase inverter solution based on lightweight TCP/IP protocol. The designed hardware circuit of...
Proceedings Article

A New RF Power Amplifier Linearization Method

Zhong-Yang Mao, Xiao-jun Wu, Fa-Ping Lu, Min Fan, Chuan-Hui Liu
For the weakness of the existing predistortion algorithm, when large amplitude component in the modulation signal which is more than the voltage in saturation will be limited, leading to predistortion algorithm become invalid, and a new joint RF power amplifier (PA) linearization method is proposed....
Proceedings Article

IBM ILOG OPL and Its Application in Teaching of Operations Research

Lixin Zhao, Lishuan Hu
In this paper, firstly, application areas of Operations Research are introduced. Some computer tool-kits used to solve OR problems are outlined, together with some programming languages, which can be used to model and solve the optimization problems. Secondly, an optimization programming language-IBM...
Proceedings Article

A SVT-ESPRIT Estimation Algorithm in Sparse Array

Wenhao Zeng, Junjie He, Hongtao Li, Xiaohua Zhu
With regard to two dimensional Direction-of-Arrival (2-D DOA) estimation in sparse array, this paper presents a singular value threshold based estimation of signal parameters via rotational invariance technique (SVT-ESPRIT) algorithm. Firstly, a signal model of DOA estimation based on matrix completion...
Proceedings Article

Automation Analytical Model of Familial Malware Based on Communication Features

Yiyang Wang, Shaoming Chen, Chongbin Wu
Up to date, the Internet industry has done a lot of research on malware analysis, which brings in effective malware detection. However, in terms of familial communication feature extraction and detection, a very mature product has yet to be seen. Given this situation, this paper tries to establish an...
Proceedings Article

The Aerodynamic Performance of an Inflatable Wing in Aircraft

Haoyu Wang, Yan Li
This paper explores the aerodynamic performance of an inflatable wing in aircraft using both theoretical and experimental methods. The theoretical analysis is based on inflatable structures and the existing simple pressure vessel equations for the necessary structural analysis. The present work also...
Proceedings Article

An Exploration Of Improved Design Of Biomass Pyrolysis Liquefaction Device

Yue Xia
With people's long-term exploitation, reserves of fossil fuels are continuously reducing, then in order to meet demand of social development for energies, developing renewable clean energies has attached with more and more importance. Biomass energy is renewable and environmentally friendly, so it has...
Proceedings Article

A Novel Multiple Watermark With ROI Recovery

Dan Wu, Ruxing Xu, Jiao Wu
A novel multiple watermarking scheme was proposed, which could embed the reversible watermark in ROI (region of interest) by improving the Ni's algorithm, and the robust watermark in non-ROI by quantizing the low frequency coefficients. The watermarks can simultaneously achieve copyright protection and...
Proceedings Article

The Research on Image Extraction and Segmentation Algorithm in License Plate Recognition

Weijian Fang, Xin Zhou
As a vital part of Intelligent Transportation System, License Plates Recognition System is meaningful in Vehicle Positioning and Traffic Monitoring. It consists of Vehicle License Plate Location, Character Segmentation and Character Recognition. In the paper we put forward a new method of segmentation...
Proceedings Article

A feasible, effective image transmitting framework in WMSNs

Feng Tian, Kun Song, Enyan Sun
In WMSNs, compared with the complicated media processing task the energy of node is very limited. In this paper, we use ROI coding of the image to decrease the requirement of the energy, and propose a feasible, effective framework to prolong the life time of the network.
Proceedings Article

Structural Optimization of Backhoe Hydraulic Excavator Working Attachment Based on Tested Dangerous Conditions

Yuan Wang, Xiaoping Pang, Jin Chen, Xingtong Gu
The structural parameter of excavator attachment plays an important role in the structural design, so it is very important to select the most dangerous working condition to improve the structural strength by optimizing the parameters. However, the previous traditional dangerous condition comes from specialized...
Proceedings Article

Study of Course Design for Electromechanical System in College Education

Jiangang Yi
Course design for electromechanical system is one of the most important and difficult points in college teaching process. In this paper, the large grinder recirculation cooling system as the sample, the hydraulic cooling system is built to solve the problems of low cooling efficiency, high failure rate...
Proceedings Article

An Optimal Algorithm based on the Solution to the Coarse-Grained Arc Consistency Algorithms of the Constraint Satisfaction Problems

Gang Yang, Huifeng Li, Can Cao, Siyuan Chen, Yubo Zhao
Constraint satisfaction problem are widely used in the artificial intelligence field. We study the coarse-grained arc consistency algorithms of the Constraint satisfaction Problems. We find that variables whose degrees or domains are 1 have invalid revises which can be removed in the process. We demonstrate...
Proceedings Article

Application of SVM Algorithm for Particle Swarm Optimization in Apple Image Segmentation

Qirui Huang
The apple image segmentation is the key technology of identification and location in the apple-picking machine vision system. On account of huge errors in the process of discriminating fruits by apple-picking robots at present and the long-time processing, the SVM theory in fingerprint image segmentation...