Proceedings of the 2016 2nd Workshop on Advanced Research and Technology in Industry Applications

Session: Information Technology and Applications

120 articles
Proceedings Article

Research On Prosody Conversion of Affective Speech Based on LIBSVM and PAD Three Dimensional Emotion Model

Xiaoyong Lu, Tao Pan
This paper proposes a framework for prosody conversion of emotional speech based on LIBSVM support vector regression model and PAD three dimensional emotion model. We design an emotional speech corpus including 11 kinds of emotional utterances. Each utterance is labeled the emotional information with...
Proceedings Article

Research on the open teaching of College English based on network technology

PinJing Tian
With the continuous development of information technology and network technology, using modern information technology to assist in the traditional form of teaching is becoming more and more important. In this paper, the in view of the problems existing in the current college English teaching, which makes...
Proceedings Article

A study on the integration of computer network technology and College English Curriculum

Weiwei Zheng
Informatization is the trend of world economic and social development, with the network technology and multimedia technology as the core of information technology has become the creative tool of expanding human ability. "Computer" and "curriculum integration" teaching model has become our country oriented...
Proceedings Article

Design of Printing System of Forest Right Certifications

Weili Kou, Zhe Luo, Hua Yuan, TangSong Zhang
The forest right certification is an important result of forest right system reform in China. The forest right certification printing is a very important work of collective forest right system reform. However, the traditional printing method of forest right certifications is tedious, detailed, and time-consuming....
Proceedings Article

Saddle Point Non-Singular Value Solution Based on Generalized Inverse Hermitian Triangulation and Split Iteration

Juan Li
In order to achieve the nonsingular solution of saddle point linear system, this paper proposes an improved nonlinear Uzawa splitting iteration method, and combined with the generalized anti Hermitian triangle method, the algorithm is further modified, to improves the convergence of the algorithm. Finally,...
Proceedings Article

The Modeling of Dual Drive Software Based on Requirement and Runtime Variability

Zhigang Liu, Lei Shi, Zhen Ge, Xiaozhi Wang
In order to solve the operating environment of the dynamic evolution, this paper builds the internal reflection of the SaaS evolution model describing according to the needs and variability of the software dynamic evolution, the model is the formal definition by using communication process algebra (ACP)...
Proceedings Article

Research on Jiangxi City Tourism Competitiveness based on Comprehensive Fuzzy Evaluation Method

Rulian Wu, Shanmei Xiong, Yebiao Liu
Accelerating the Jiangxi Province tourism construction has great significance on social and economic development of Jiangxi. As insufficient in current evaluation system of tourism competitiveness system and lack of tourism province evaluation index system and method of academic research, this study...
Proceedings Article

Analysis of Construction Project Safety Management Influence Factors Based on Clustering Algorithm

Xiangyi Bu
In order to explore the main influencing factor of safety management of construction project proposed a based on clustering algorithm of safety management factors analysis method, and the main factors of influencing the construction safety management through the practical investigation. By a factor of...
Proceedings Article

The Application of Big Data Technology in Basic Computer Teaching of Ethnic Preparatory

Yuhan Jie
The computer foundation is a major course of ethnic preparatory education. In this paper, the research situation of traditional preparatory basic computer teaching has been analyzed, in view of the crisis of the teaching, the application background, characteristics and essence of big data technology...
Proceedings Article

On Application of Virtual Reality Technology in Mechanical Course Teaching

Junjian Dang
Mechanical course contains a complex internal structure. If daily teaching adopts traditional process, it is difficult to stimulate the interest of students and students may feel dull. At the same time, the mechanical device has a complex and compact body structure, and it is difficult to grasp the fundamental...
Proceedings Article

On College Computer Experiment Teaching Based on Cloud Platform

Limin Guo
Application of cloud platform technology in college computer experiment teaching to integrate the teaching resources, can help achieve unified storage and management of data relating to computer experiment teaching in colleges, so as to provide a good platform for teachers and students in the teaching...
Proceedings Article

Explorations of Applying Cloud Computing Technology to the Digital Library

GuangCheng Zheng
In the 21st century of science and technology, the cloud computing technology has already been full applied in all industries, which has quite obvious effects. Nowadays, all libraries have realized the digitalization. To become popular and obtain development, the digital library needs to introduce the...
Proceedings Article

Protection Strategy Exploration for the Computer Network Information Security in the Big Data Age

Liang Xue, Juan Yang, Weiguo Fan
With the popularization and application of internet, human society enters the information-based society in an all-round way, computer has gradually become an indispensable part in people's daily life, work and study, it brings great convenience for people as well as some corresponding potential safety...
Proceedings Article

Analysis of BP Neural Network Applied in Enterprise Financial Warning

Hang Zeng
In the 21st century, high-tech society, the information age, more and more on the "Network" emerging term, as we respect these new terms confusing and difficult to understand, but also had to lament these new terms of social development made contribution. And on the "Network" word, also has its own value...
Proceedings Article

Enterprise Network Security Management System Construction Research Based on Cloud Computing Technology

Enfeng Zhou
With the constant development of economy in our country in recent years, the role of network technology in contemporary society has become more and more prominent. Network has become an indispensable important information tool for modern people's daily life and work, while cloud computing technology...
Proceedings Article

Study on Computer Information Management Method in File Management

Yonghong Li
The computer information management is a product of the era of knowledge economy and the information age, is also extremely important resource. Since the current extensive use of computer information technology, information management methods for the archives management in the integration and created...
Proceedings Article

Establishment of Supply And Demand Match Indicators for Taxi Resource

Yilin Song
With the coming of “Internet +” era, drops a taxi, Uber and other companies rely on mobile Internet software to establish a taxi service platform, and achieve information exchange between the passengers and the drivers. Aiming at this phenomenon, based on in the history data in a certain period at designated...
Proceedings Article

Analysis on Security Management Strategy of Computer and Internet Information System

Yuan Chen
With the rapid development of network, network information security more and more people's attention. Through the network information security threat factor analysis, and then we present five common computer network information security policy, information security and network development were discussed)...
Proceedings Article

The campus network security hidden danger analysis and countermeasure research

Juan Wei
With the continuous development of computer network information technology and popularization, many colleges and universities have established the campus network. The current campus network has become important in infrastructure projects in university, and the campus network information security problems...
Proceedings Article

Research and application of digital campus SMS platform based on web services

Hanguo Mao
WEB embed online platform, the main function of the information services, student management and access control of three modules. Since the open education students not at school, so that the information service is particularly important, information services are primarily teaching information services...
Proceedings Article

Research and Development of Open Operating Management System for Sports Laboratory Instruments

Rui Jiang
In order to promote the open operation of sports laboratory instruments and improve the utilization ratio of sports instruments, we do the research and development of open operating management system for sports laboratory instruments. It has many functions, such as the working status monitoring of sports...
Proceedings Article

Preliminary Study of Our Country’s Network and Information Security Strategy under the New Situation

Yuanyuan Zhang
The internet innovation and development has already deeply penetrated into all aspects of economic world. The attaching problem-the network and information security problem becomes increasingly prominent, and the complexity and harmfulness of network security situation manifest themselves become more...
Proceedings Article

Multibeam Bathymetric Data Processing and Applications Based on Cygwin and MB-System

Chunqiao Xiao, Wang Zhang, Zhiwei Lv
Cygwin is a Unix-simulated environment running on the Windows platform.Mb-System is a Unix-based multi-beam bathymetric data process open source software that can be installed and run on Cygwin. This paper introduces the installation of MB-System on Cygwin and its main functions, and then the detailed...
Proceedings Article

Review on Urban Travel Time Estimation Method

Liuren Wang
Travel time is an important measure of traffic travel service level, and is also an important travel index which can be directly perceived by the travelers. Good calculation application of travel time is an important support for road traffic management, traffic information service and route guidance,...
Proceedings Article

The GARCH Analysis of YU’EBAO Annual Yields

Weiwei Guo
As the important tool of network finance, YU’EBAO has highly financial product yield, liquidity and other advantages compared with bank. But accompanied by such financial products innovation, their earnings also gradually fell back. By Eviews 6.0 ,the paper studies YU’EBAO annual yields from May 30,...
Proceedings Article

A Novel Image Super-resolution Method Combined with Edge Focusing

Lei Shu, Zhijun Fang
There are some problems existing in traditional image interpolation algorithms such as blockiness, blurring, etc. To overcome these problems, a novel image super-resolution algorithm based on edge detection and different filters was proposed. The algorithm firstly calculates an initial super-resolution...
Proceedings Article

Research of Image Segmentation Algorithm Based on Clustering

Pu Wan, Lisha Wang
Through the study of existing image segmentation algorithms, this paper improves the standard FCM-based image segmentation algorithm. And according to the principles of effective treatment on neighborhood image noise by mean filtering and median filtering, proposes a new similarity distance calculation...
Proceedings Article

Research and Realization of Network Virtual Optical Laboratory

Hua Chen
Nowadays, with the rapid development of network technology and computer technology, the research of network virtual optical laboratory has become a key development project in the field of relevant teaching and research. Through the network virtual optical laboratory, the real laboratory’s effect can...
Proceedings Article

Research and Implementation of Service Management in Cloud Database

Yu Tao
Cloud database follow the calculation model of cloud computing that everything is a service, therefore, the service is one of the key concepts in cloud database. Because of the simplicity of the database service package, it is easy to expand for the cloud database. Cloud database provide database service...
Proceedings Article

Design and Implementation of Engineering Investigation Information System based on GIS

Yin Qiong
The rapid development of urbanization, urban engineering survey has a huge impact, traditional urban reconnaissance production management tools has exposed its limitations, geographic information systems involved, unprecedented space for development of urban engineering survey. How to effectively and...
Proceedings Article

Research of LAN Security Attack and Defense Technology

Ying Peng, Rongfu Wang
With the continuous development of information technology era has arrived, LAN has been gaining in popularity in the use of people's daily work, at the same time, LAN security issues prominent. In this paper, LAN security for analysis, testing their safety and make relevant recommendations to its reasonable...
Proceedings Article

Research on Design and Implementation of Personal Website

Rongfu Wang, Ying Peng
In recent years, with the rapid development of network technology, computer network has gradually penetrated into every corner of life, personal journal published by web browsing and content of interest to a growing concern in today's society has gradually become self-display and a new way to discover...
Proceedings Article

Potential Problems and Effective Measures of Network Accounting Information System

Xiao Cheng
With the accelerated process of modernization, advanced science and technology has been widely applied. In this context, the Internet-related information systems will get rapid development, such as: accounting information system, the degree of the network has been significantly improved and network accounting...
Proceedings Article

Study on Clothing Structural Design and Modeling

Min Yue
Rapid socio-economic development, people's living standards rising spirit, the pursuit of more and more obvious to clothing, this situation led directly to clothing design industry and the rapid development of derivatives. People for the pursuit of fashion design is mainly reflected in the colors, materials...
Proceedings Article

Study on the Application of 3D Printing Technology on the Construction of Clothing Space Styling

Jia Hu
Costume design needs to use a number of technical components and each have their own unique effect. Costume design is a market with a wide range of industries, our lives plays an important influence. Costume design is the soul of clothing, the clothing style in the use of technology to nature is also...
Proceedings Article

Research on Computer Security and Firewall Technology

Ping Chen
In this paper, computer security and firewall technology for a simple analysis, and then study the type of firewall technology, principles and the latest firewall technology, and to make some research on the firewall technology in computer security, such as the configuration of security services, configuration...
Proceedings Article

Research on Virtual Three-Dimensional Clothing Styles and Fold Effect Show

JingJing Li
Since the birth of garment computer aided design, production efficiency and product quality garment processing has been greatly improved and faster. Its principle is the human body consists of a simulation model, the use of a switching supply tool costume design environment. Such fashion design is no...
Proceedings Article

Numerical Simulation for the Wall Channeling of Packed Bed in the Chemical Industry

He Lou
Wall channeling has a significant impact on the profiles of flow velocity in packed bed. Using fore treatment software GAMBIT, the three-dimensional packed bed model was established. Grids of three-dimensional model were divided by the means of coin division. Based on FLUENT porous media model, the anisotropy...
Proceedings Article

Research on Inventory Management Based on Gray Forecasting

Zonghan Li
Gray prediction is mainlydeveloped to study uncertainties of “small samples” and “poor information”. Gray forecastmodel is one of the most important part grey system theory. This paper applies for the gray model prediction to forecastA product demand in every month of 2016. On the basis of the prediction,...
Proceedings Article

An Improved Algorithm of Image Retrieval Based on Combined BTC Color Moments and DT-CWT

Huajie Cai, Yaxin Zhao, Guangyi Xie
Feature extraction is the key technology in the process of image retrieval based on content. This paper puts forward an improved algorithm of image retrieval based on combined BTC color moments and DT-CWT. We firstly select the YIQ color space as the feature extracted space due to the strong correlation...
Proceedings Article

Study on Construction of Digital Cloud Services Platform of College Library

Weiwei Wang
The Digital Library cloud services platform based on cloud computing technology has become a new direction of development of digital libraries. Cloud service platform can achieve intensive management for digital library resource, and bring more convenient and efficient information service for readers....
Proceedings Article

Study of Neural Networks and Its Application based on Fuzzy Adjustment

Cong Xie
With the development of fuzzy and neural network theory, the role both play in engineering applications is also growing, but both their disadvantages are also gradually revealed. The neural network has a strong ability to learn, but it is a typical "black box" model, the knowledge acquired in connection...
Proceedings Article

The Road Traffic Meteorological Monitoring and Forecasting System Based on GIS

Yanlong Chu
Traffic safety is the top priority of road traffic, weather and road traffic safety threat is huge. Rain, snow and other weather conditions affect people's lives become, the impact of national economic construction and development obstacles. Therefore, establishing a road traffic meteorological GIS system...
Proceedings Article

Analysis and Discussion about Wireless LAN Technology

Zhongtang Li, Yin Lei
Effect of wireless LAN technology to China mobile and portable communication is enormous, mainly using wireless LAN network unlimited channel signal transmission. WLAN has information transmission convenient network of flexible benefits. This paper discusses the recent rapid development of wireless LAN...
Proceedings Article

The Realization of Industrial Design Product with Computer Software

Jiangning Li, JingSong Huang
With the computer software and hardware technology development and CAD technology is widely used in industrial design, industrial design ways and means to achieve constantly updated development, industrial design field is undergoing a new revolution. Introduction: With the rapid development of the computer,...
Proceedings Article

The Application of Emotional Design in the Web Interface

Qian Cheng, Dehong Tang
In today's rapid economic development, people's lives have been limited to the pursuit of material conditions, but the pursuit of the spirit of the pursuit of a higher level, emotional design came into being, its design has been filed in many areas. Study on interface design with high development in...
Proceedings Article

Study on the Listing System of Financial Derivatives

Jianan Wei
Derivatives listing is becoming one of the main trends in the global market competition and evolution. China's financial derivatives market is increasingly becoming the focus of global concern, since the Shanghai and Shenzhen 300 stock index futures market, there are many overseas exchanges proposed...
Proceedings Article

Research of Tourism Information based on Cloud Computing Platform

Yuting Zhang, Lu Cao, Rui Wang, Yang Zhang, Ying Zhang, Junli Wang, Chen Hao, Jie Cao, Jiangmin Tian
With the advent of continuous development of society and the era of mass tourism, tourism is increasingly becoming a major lifestyle of modern people and economic activity in the community, a large tourist information and improving the quality of people's travel, not the traditional travel agency can...
Proceedings Article

Data Analysis Based on E-Commerce Platform

Junli Wang, Yuting Zhang, Lu Cao
Data in everyday life everywhere, and people's lives. With the development of information society, the needs of various industries for analysis of data are also growing. However, the current domestic data analysis industry started late, small-scale, without a complete system and improve service delivery...
Proceedings Article

Decision Mechanism of Password Recovery Based on Bloom Filter in Heterogeneous Platform

Quanquan Xie, Qinglei Zhou, Xueming Si, Bin Li
According to the password recovery task’s computation and local communication intensive features, we design a decision mechanism of password recovery based on bloom filter in the CPU+FPGA system architecture. Utilizing the advantages of the bloom filter in the searching of massive data, bloom filter...
Proceedings Article

Research on training mode of computer network based on competency

Xiaozhong Chen, Zhijian Mao
Job competency model, as an organization can enhance the core competitiveness of the talent management model, has been widely recognized by many enterprises and institutions. This article will post competency theory into the computer network of professional personnel training and curriculum reform, refining...
Proceedings Article

An allocation model of educational finance based on Big Data

ChaoQun Sheng
This paper attempts to provide a thorough allocation model of educational finance for Goodgrant Foundation, with different kinds of factors taken into consider. In order to fulfill the optimum allocation of funds and pin down a favorable investment strategy, we build two models to research into school...
Proceedings Article

Dynamic weight analysis of risk index during earth-rock dam construction

Zongkun Li, Qi Li
There are two shortages of traditional AHP method: (a) expert scoring to be absolute and (b) less considering the credibility of expert scoring and the dynamic difference between experts. In order to solve the above-mentioned drawbacks, an uncertain type of AHP method based on expert’s credibility is...
Proceedings Article

Research on Classification of Memory Attack

Gang Shi, Jiangtao Ru
Exploits on memory vulnerability has existed for two or three decades, it’s always an important problem how to prevent memory attack. Vulnerability patch can’t resolve the problem fundamentally, we should think about how to improve the memory security mechanism of OS, such as DEP, ALSR, etc. This paper...
Proceedings Article

Improved TLD Target Algorithm Based On Feature Fusion

Wenjun Dai, Tianqing Chang, Kuifeng Su, QuanDong Wang
A modified TLD tracking algorithm based on fusion of color model and ORB feature is proposed for the poor tracking performance of TLD algorithm for rotating target. The algorithm uses a feature fusion tracking algorithm instead of the optical flow method in the TLD tracking module, updating target tracking...
Proceedings Article

Challenges of Big Data based Cyber-Physical System

Wei Zhong, LiChen Zhang
With the development of science and technology, What we need in Cyber-Physical System CPS have became more and more complicated Because the system seem more vast more sensors,and need to be more intelligent , the data and information be collectted, stored, processed also need even more. So big data were...
Proceedings Article

Research on NTFS File Anti-Delete Forensic Technology

Weimin Wu, Gang Zhao, Wenxin Lai, Jiongjiang Lan
The deleting mechanism of file is summarized by means of research on NTFS structure and management mechanism. After analysis on the deleted leftover, valuable information included in it was acquired. A method is proposed for anti-delete forensic based on traversing free file record. Software named AntiD...
Proceedings Article

The best taxicab strategy for a town

GuoJing Dong
Taxi is an important means of transport in our life. With the development of the society, a taxi is convenient or not and its price may have a direct impact on the passenger's ride experience and the quality of life. There is no denying that it is necessary to discuss how to set prices, etc. In Model...
Proceedings Article

The Way of Searching Lost Aircraft

Jian Chen
Recall the lost Malaysian flight MH370. To build a generic mathematical model that could assist "searchers" in planning a useful search for a lost plane feared to have crashed in open water. Our model has two parts, of which the first part is to find the location where the aircraft is more likely to...
Proceedings Article

The Adaptive Load Balancing Algorithm in Cloud Computing

WuCai Lin, LiChen Zhang
Cloud computing is a calculation based on the Internet, through this way, the hardware and software resources and information sharing may be provided to a computer or other devices on demand. Load balancing algorithm plays a very important role in cloud computing environments. Through efficient load...
Proceedings Article

The Load Balancing Research of SDN based on Ant Colony Algorithm with Job Classification

WuCai Lin, LiChen Zhang
In this paper, we propose a dynamic load balancing algorithm conbined with job classification and ant colony algorithm in SDN network cloud computing environments. After scene analysis was done, we classify the server nodes that have the same processing capability of the CPU into a small cluster sub-network...
Proceedings Article

City Emergency Command System Based on GIS

Yong Wang, Jun Wang
For traditional urban scheduling system independent of all kinds of information, lack of information exchange and sharing between systems, scientific task evaluation and other issues, city emergency command system based on GIS was proposed. The whole system was developed under Windows platform ,based...
Proceedings Article

Research of SLAM for Indoor Environment based on Kinect

Di Liu, Ri Pan, Yajun Zhang
The research of mobile robot’s intelligence currently is a hot topic, and the basic and key technology to achieve the intelligence is Simultaneous Localization and Mapping(SLAM). In order to solve the problem of localization for mobile robots based on vision, A method of SLAM based on Kinect is proposed....
Proceedings Article

Slope anchor cable life evolution model and prediction

Jing Wang, Jiwei Liu, Bing Liu
After a comprehensive analysis of the characteristics of slope anchor structure, a mature reliability theory model in durable life prediction field is applied to predict the life of this structure, and support vector machine method is used to solve the probability density estimation for predicting factors...
Proceedings Article

Research to Promote Deep Learning in Learning Commons

Chun Li, Yingbin Wei
This article clarifies the possibilities and advantages of deep learning which LC support to be realized, from the concept and connotation of the information commons, deep study, and propose the design principles and design models of LC promoting deep learning, specifically describes the point which...
Proceedings Article

MTF Estimation Based on an Improved Step edge Method

Mengya Qu, Yongsheng Zhang, Weican Meng
A higher precision reconstruction method for MTF, not constrained by the slant edge angle, is proposed. The improved method adopts new techniques of gradient operator and moving window in ESP sample refinement to gain more accurate and robust MTF estimated results. Experiments show that the new method...
Proceedings Article

Research on the development of country based on Runge-Kutta method

Qinfei Long
We set up the predicted model of country’s development based on Runge-Kutta method to predict the development’s trend of a country. When a country is in the absence of policy interference, we regard economy, society and environment as competitors in a biologic chain and obtain the Lotka-Volterra equations....
Proceedings Article

Affinity Propagation Clustering With Pairwise Constraints

Lijia Zhang, Lianglun Cheng
With the explosive growing of data, there are challenges to deal with the large scale complex data. Many clustering algorithms have been proposed. Such as Affinity Propagation (AP) clustering Algorithm, AP takes similarity between pairs of data point as input measures. AP is a fast and efficient clustering...
Proceedings Article

Affinity Propagation Clustering Algorithm based on Spark Platform

Lijia Zhang, Lianglun Cheng
With the explosive growing of data, there are challenges to deal with the large scale complex data. Many clustering algorithms have been proposed. Such as Affinity Propagation (AP) clustering Algorithm, AP takes similarity between pairs of data point as input measures. AP is a fast and efficient clustering...
Proceedings Article

Railway Big Data Real-time Processing Based on Storm

Shihang Guo, LiChen Zhang
Train Operation Control System is a typical Cyber-physical System which is combined with sensors, decision-making control unit and actuators. There are more and more sensors are used in railway, as a result these sensors produces Big Data stream data. In view of this situation, we propose the architecture...
Proceedings Article

Aspect-oriented Formal Specification Modeling of Air Traffic Control System

Shihang Guo, LiChen Zhang
Because of lack of aspect-oriented programing technology during the early stage of soft programing, this paper developed a method which combines the aspect-oriented programing technology with formal specification language. Aspect-oriented programing technology separates the different concerns of system.Formal...
Proceedings Article

Reasarch of Architecture based BP Neural Network in Modeling of Sheave Buffer

Ke Bi, Xiang Li, Zhiying Tang, Yemeng Wei, Gang Wu
In order to solve the problem of non-linear modeling of hydraulic system, a modeling method based on BP neural network is put forward. The complex hydraulic system, according to the structure and relationship of hydraulic system, is divided into simpler subsystems, a complete network is established and...
Proceedings Article

Applied Single Correlation Analysis and Multiple Regression Analysis for Rapid Prediction of Reservoir Sensitivity

Lei Qu
Sensitivity study, the premise of the analysis of reservoir damage mechanism, is significant to optimize all the links of drilling and development process, as well as to develop the systematic oil and gas reservoir protection technology scheme. To study a variety of methods developed in recent years...
Proceedings Article

Analysis of the Logistics Service Level of Express based on Pareto analysis

Shengbin Pang
In the existing logistics enterprises in our country, the logistics service level is not very well. Most enterprises are still limited to traditional pattern of service consciousness. It hindered the development of the enterprise seriously. Under the impetus of the e-commerce, China ushered a new era...
Proceedings Article

Genetic Algorithm, figuring out the optimal solution problem of active removal of space debris

Nan Wang
Space junk, one of the man-made pollution, is destroying the satellite's safety, ultimately making low earth orbit (LEO) unusable. Many countries, such as Japan and U.S., have been proposed many different methods for remediation of the orbital debris environment over the years, including the use of lasers,...
Proceedings Article

Cobb-Douglas Function, evaluating the best five active removal methods of space junk

Haowen Zhong
It’s acknowledged that the problem of the scarcity of space resource is getting more and more serious since there is too much space junk floating in the orbits. If orbital debris couldn’t be removed in time, there would be a collision between operational spacecraft and orbital debris every 5 to 9 years...
Proceedings Article

The Best Coach Evaluation Based on CW-TOPSIS

XuDong Yang
We analyze the Analytic Hierarchy Process (AHP) and the Technique for Order Preference by Similarity to Ideal Solutions (TOPSIS). We build an old model based on the combination of them, which is named AHP-TOPSIS. The old model is built as: First, use the AHP to determine the weight of each factor on...
Proceedings Article

A Mathematical Method to Keep The Temperature In The Bathtub

Huinian Li, Shuting Li, Jiong Zhang
In this paper, we do the best to extend the time of bathing without wasting too much water. In the Lumped Parameter model[1], we predict the change of temperature by the use of Runge-Kutta method. We also consider the heat dissipation between the water and the bathtub wall as well as the air. And we...
Proceedings Article

Medicine Distribution By Using The Method Of The Center Of Gravity

Weiqing Wang
Under the condition of using the least time, we hope to minimize the cost. As is known to all, the shorter distance is, the less money we spend. Thus, the problem of cost is transformed into the problem of distance. We choose four addresses as supply points and view the amount of medicine which they...
Proceedings Article

The Least Amount Of Water Used By Nonlinear Programming Model

Weiqing Wang
Firstly, In order to make the temperature of water in tub fixed, thus, the quantity of heat of water from faucet is equal to the heat loss of water in tub . Secondly, according to thermodynamic energy formula, we get that the quantity of heat of water from faucet has relation with its temperature and...
Proceedings Article

Water Evaluation and Prediction by Using SD model

Xian Ma
In this paper, the evaluation and prediction model is presented to measure the ability of a region to provide clean water to meet the needs of its population. Considering that the dynamic nature of the factors affects both supply and demand, this model is improved by using the SD theory. And what the...
Proceedings Article

Water strategy based on multi-objective planning and Combination incentive game theory

Wan-Sheng Liu
In this paper, two models are built to solve the water scarcity problem, from which 1.6 billion people are suffering. In order to improve the water scarcity situation, an interbasin water transfer model and an agricultural water-saving model are built
Proceedings Article

The Model of a Person Takes a Bath with Hot Water

DanYang Li
In order to create a comfortable and cost-effective hot bath condition for everyone, we invent a bathroom environment to simulate the process of people taking a bath. Then, What are a hot bath made of There must be a bath crock, a tired man who is eager to clean himself. In this way, we got the two key...
Proceedings Article

The development of designated driving application based on Android platform and Ali cloud sever

Xinge Li
This paper discussed the development process of designated driving application on Android platform, using Android SDK, Eclipse IDE to build and Ali cloud sever for back-stage management, and explained the key technologies of the building of android platform and Ali cloud sever in a further step. By the...
Proceedings Article

The Analysis of Water Supply Capacity Based on Analytic Hierarchy Process and Fuzzy Comprehensive Evaluation

Xinge Li
Proposing solution to clean water shortage is of great importance to all citizens of the world. In this paper, we analyze and evaluate water supply capacity in a region based on building mathematical model by analytical hierarchy process (AHP) and fuzzy comprehensive evaluation. First of all, hierarchical...
Proceedings Article

Multimodal Retinal Image Registration method Based on Speed-up Robust Feature

Zhitao Xiao, Wan Zhu, Fang Zhang, Jun Wu, Lei Geng, Wen Wang
Retinal fundus image plays an important role in the diagnosis of eye diseases. In order to have a comprehensive understanding of retinal image, doctors need to take pictures from different angles of the patient's eyes. Because of the movement of the eye and head of the patient, there are some differences...
Proceedings Article

The Risk Hedging Method of Power Market Chaos System Based on The Mode of Futures Trend

Rui Ma, Fei Jin, Ningning Liu, Qian Hou
Along with the power market reform in depth, the financial capital market as a breakthrough in the power industry reform and development, accelerate the process of electricity market. This paper introduces a method of power market risk hedge futures trend under the system.To ensure that the market depth...
Proceedings Article

Evaluation of Regional Water Resources

Wenmin Wang
To evaluate the regional water resources carrying capacity according to the importance of each related factor,we establish a model and sort out indicators that can characterize the ability of a region to provide clean water for its population. The water deficient ratio and utilization ratio of water...
Proceedings Article

Searching for the Accident Plane

Zhu Wang
It is difficult but important for the searchers to predict the accident plane. In order to imitate the crashed range of the aircraft, we devise the model of the process of the fragments’ falling. Because of the influence of the current, we are supposed to consider the fragments flow in the ocean current....
Proceedings Article

A New Kind of Water Resources Evaluation Standard

Chaowei Wang
First,I begin by establishing the L-WSCI model that takes the factors that affect both supply and demand. These are population growth rate, water availability, domestic, industrial and ecological water usage. This model is developed from the traditional WSCI model. The model’s testing results, whose...
Proceedings Article

The Intervention Plan of Water Resource

Wei Li
First, I establish the L-WSCI model to compare water resource. There are 5 differentfeasible and efficient intervention plans: Water Project——south-to-north water diversion, desalination of sea water, recycled water treatment technologies,technology of drop Irrigation and urban greenbelt. We take all...
Proceedings Article

Physical Scarcity of Water in a Region

Yu Zhang
This report builds a s-type curve model which defines the change of per capita water consumption following the change of GDP, and it defines the rate of per capita satisfaction of using water which is considered as the index to judge the ability of the region to provide clean water to meet the needs...
Proceedings Article

Mathematical models for researching the human factors on the heat transfer in a pool

JiDong Li
In order to obtain the temperature field of water in a pool with a person inside, this paper established mathematical models by taking the human factors, including static and dynamic factors, into consideration. Firstly, based on the three-dimensional N-S equations and the concept of the equivalent size,...
Proceedings Article

The sun shadow calculation and analysis

Jianeng Chai
How to determine the location of the video is the important aspect of video data analysis and date taken, the sun's shadow positioning technology is based on analysising the sun's shadow change to determine the video shooting place and the date of video shooting.
Proceedings Article

Water intervention plan

Jianeng Chai
According to the United Nations, 1.6 billion people (one quarter of the world's population) experience water scarcity. Water use has been growing at twice the rate of population over the last century. What should we do to mitigate water scarcity we use Multiobjective Dynamic Programming(MDP) Model to...
Proceedings Article

Refugees: Searching for Security, Searching for Hope

Qingqing Ren
In order to propose the optimal route for each refugee[1], we have finished the following work. Firstly, Grey Relational Analysis model is established to analyze the correlation coefficient of a plurality of metrics. The indicators with larger correlation coefficient are chosen as the metrics. In our...
Proceedings Article

A Macro Intervention Plan to Improve the Water Situation

Lang Liu
Firstly, we define Z as the index measuring the ability of one region to meet its water demand. Next we design an intervention plan based on most influential factors in Xinjiang. The intervention plan has four aspects: Dispatch water resource, employ advanced irrigation technology, proper pricing mechanism...
Proceedings Article

A differential equation model, finding the drowning point when search for crashed planes

Nan Wang
To solve searching problem, we will establish a model to describe the trajectory of the falling and determine the drowning point. With the application of kinematics knowledge, we obtain relationship between time and displacement in the both horizontal and vertical directions. We use linear fitting to...
Proceedings Article

Runge-Kutta method, finding the drowning point when search for crashed planes on the seabed

Haowen Zhong
In order to search for crashed planes, we discuss that the resistance changes with velocity of the airplane. Then we draw the settlement trajectory without effects of ocean currents by using Runge-Kutta method. We also do gray-scale processing to seabed topography map around the drowning point to get...
Proceedings Article

Four Economic Indicators of Space Debris Removal schemes

Jiali Chen
In this paper, four significant factors including the costs, the risks, the benefits, and the interference to other satellites, are taken into account by transferring them to the specific commercial indexes. The transferring calculation is on the basis of a series of integral-differential equations which...
Proceedings Article

A dynamic model of the refugee crisis

Yuan Xu
Markov Chain is used for creating a dynamic model of the refugee crisis. we assume that refugees move dynamically between destinations with the transition probabilities which rely on the environmental factors. The model is applied to the current EU refugee crisis, and we obtain the dynamic process of...
Proceedings Article

All people hail a cab

Ruixiang Zhang
Our basic model has two parts: to find the relationship between the waiting time and the rate of the vacant taxis arrive, and to find the relationship between the passenger flow volume and the rate of the taxi arriving in the area. In an extended model, we take the Scheduling efficiency into consideration....
Proceedings Article

Prediction of water scarcity situation of a region

Meiqi Song
Currently, one quarter of the world's population is experiencing water scarcity. In order to alleviate this situation, a prediction model which based on quadratic curve fit and the method of Grey Verhulst has been built. We used quadratic curve fit to forecast the comprehensive indicator and the per...
Proceedings Article

The Extension of Refugees Migration Model

YiHui Zhang
In order to make the optimization of model, firstly, supporting policies are pro-posed to ensure the optimal migration pattern; the NGO can increase the total amount of goods and improve the environmental carrying capacity. Secondly, the exogenous events will decrease the quota of refugees and increase...
Proceedings Article

The Optimal Migrating Route for Refugees

YiHui Zhang
This paper aims to determine the optimal migrating route for refugees. Firstly, we develop a Secondary Fuzzy Evaluation Model SFEM to evaluate the metrics of refugee crises and allocate the refugees of six routes. Eleven factors are chosen as the primary factors of SFEM such as the number of refugees,...
Proceedings Article

Assessment and prediction of water resources based on Grey Theory

HongWang Yang
The ability of a region to provide clean water relates to many aspects of the physical and economic elements. We use natural and social indicators to evaluate this feature. To measure the ability of a region to provide clean water to meet the needs of its population, water demand and supply index (WDSI)...
Proceedings Article

Research on data acquisition time optimization of bus travel time prediction method

Huiran Zhao, Lei Shi, Guangyao Li, Shidong Geng
The travel time prediction of the public transport system is of great significance to improve the traffic management and control. In this paper, the travel time prediction method of public transit system is studied by using the method of time interval optimization of traffic data acquisition and the...
Proceedings Article

Flight reliability of multi rotor UAV Based on genetic algorithm

Chenggong Li, Shuai Wang, Xiaoming Wu
In the disturbed case, since the parameter tuning method is imperfect, there have been issues of excessive overshoot and adjusting time in MFAC. To optimize MFAC controller, a MFAC-ABC is proposed, with ITAE criterion as the fitness function, and key parameters of _kand are optimized and tuned using...
Proceedings Article

Application of related data automatic semantic annotation technology in Internet of things

Lianwang Zhao, Hai Huang
specific to semi-supervised learning method based on graph ignoring the problem of video correlation in research and application of multimedia, a kind of video annotation algorithm based on related kernel mapping linear neighborhood propagation is put forward. Firstly, the propagation coefficient of...
Proceedings Article

MEMS Gyro Random Error On-line Modeling Based on Recursive Least-Squares Method of System Identification

Jiawei Wang, Keyu Qi, Kai Shi, Ke Liang, Jie Yan
To develop the guided projectile with higher hit precision, promotes gyro’s performance has immensely affection on trajectory measurement. According to the difficulty in method of MEMS angular rate gyro random error on-line modeling, this paper proposes a new algorithm of recursive least-squares method...
Proceedings Article

An improved license plate characters binarization algorithm based on sub-pixel

Zhiyong Ju, Chaonan Wang, Xiaolei He
For the problem of traditional binarization algorithm can’t segmentation license plate adhesion or intermittent character effectively. This paper proposes a new binarization algorithm which use a curved surface fitting algorithm to get a new gray level image based on sub-pixel. Experiments show that...
Proceedings Article

Research on association rules based on Complex Networks

Zhenwei Yi, Lingyun Wei, Lizhu Wang
In most cases, the association rules mining (ARM) will generate a large number of rules, most of which are of no interest. In order to find the interesting rules from the large-scale association rules more effectively, this manuscript presents a new method to research the association rules based on Complex...
Proceedings Article

Economic Data Mining Research based on Complex Networks and factor analysis

Yajie Li, Tao Huang, Liwen Ma
Economical data mining is practical and meaningful. Economic development levels of different regions in China are varied. We use complex network analyzing method to make network graphs and did nodal analysis and community structure detection of these regions to indicate the difference of the economic...
Proceedings Article

The Application Research of FCM Clustering Based on Genetic Algorithm in the Telephone User’s Behavior

Hailiang Tang, Lei Shi, Bin Liu
Telecom user behavior analysis, is that in the case of gaining the basic consumption data of the users to disposal, count, and analyze the relevant data, and discover the law of the users consumption from it, and combine these laws with the telecom marketing strategies to find the problems in the current...
Proceedings Article

Design and Implementation of GeoScience Case Database on JSF Frame for Teaching

Zhenhe Zhao, Shilai Wang, Ping Zhang
Case base construction is of great significance for the promotion of case teaching. But at present there is no successful geosciences case library can be used as reference. So the construction and development of geosciences case library has significance to fill the gap. This article is about design and...
Proceedings Article

An improved QS algorithm for pattern matching of bit stream

Zhao Tao, Jianbo Yang, Peng Liu
On the condition of bit stream, for the reason of simple character sets of target strings and Pattern strings, the probability of appearance of absolutely bad character is very low. The bad character shift is not suited for pattern matching, because of it’s low efficiency. This paper gives the definition...
Proceedings Article

A Framework for Security Policy Derivation

Fei Peng, Tao Zhang, Weiguang Xu, Min Zhao
It is difficult for end users to configure security models in operation system without technical knowledge, since security models are defined by experts who have security experience. Indeed, there is no complete method to translate user security requirements into implementable security policies. In order...
Proceedings Article

An improved key frame selection algorithm on sub shots

Jianfeng Zhang, Shuming Jiang, Zhiqiang Wei, Shuai Wang, Huisong Wan, Jian Li
The algorithm based on multi-frame average is the classical algorithm in all kinds of key frame extraction algorithms. This method has better sense on averaging the extracted key frames. But it can only extract one frame at once, which limits the reflections about changes in the content of the lens....
Proceedings Article

Enterprise Knowledge Access Control Based on Colored Petri Net

Xiaozhong Li, Xiaoqin Liu, Ying Liu, Peng Zhao
In the era of knowledge economy, knowledge management has been recognized as an important means to enhance the competitiveness of enterprises, and the access control of enterprise knowledge is a main mechanism of information system security. In this article, through analyzing the type of enterprise knowledge,...
Proceedings Article

The Study of Improved Fault Petri Nets Diagnosis and Its Application

Xiaozhong Li, Peng Zhao, Ying Liu, Xiaoqin Liu
The purpose of this study is to improve the efficiency of fault diagnosis and quickly aim fault propagation path. This paper introduces the modeling and reasoning methods of Improved Fault Petri Nets (IFPN) based on existing concept and method of modeling for fault Petri nets. IFPN shows network fault...