Search all articles

+ Advanced search
Search articles within:
120197 articles

Discussion on planning ideas of steel lo-gistics park in the low carbon perspective

Xingang WENG, Xiaokun WANG
Under the background of fact that the low-carbon revolution of the whole world rises, this text carries on research to in-tension and characteristic of the low car-bon type steel logistics park, analyze the current situation of the development of the low carbon logistics. Construct the planning framework...

The Use of Indexes of The Permanent Evaluation Committee in the Management and Systemic Planning of Institutions of Higher Education for the Improvement of Quality

Valdecir Bertoncello, Osmar Possamai, Edson Pacheco Paladini, Flávio Bortolozzi
The new tools for the evaluation of Higher Education still lack the practical experience that warrants their feasibility and effective application. Current research focuses on the foregrounding, development and the establishment of a system based on a technical and dynamic development, rooted on indexes...

Brief Analysis on Characteristics of Army NCO Education and Teacher Teams Construction under New Situation

Qiangye Gao
The vocational education of army non-commissioned officer (NCO) has been the inevitable trend of the development of military vocational education recently. In this paper, the basic characteristics of the vocational education of Army NCO are summarized firstly. Then the basic qualities that the teachers...

Managerial Forecasting System Based on RBF Neural Network for Financial Data

Dusan Marcek
Forecasting systems are applied which are based on the latest statistical theory and artificial neural networks. The impact of these methods to risk reduction is judged in managerial decision-making. The fundamental question arises whether non-linear methods like neural networks can help modeling any...

Chinese Internet Companies and Their Quest for Globalization

Harlan D. Whatley
Chinese internet companies have seen an unprecedented growth over the past decade. However, very few are recognized brands outside of China while some seek to develop their brands in foreign markets. This paper analyzes the marketing strategies of two internet companies: Baidu and Tencent and their quest...

A Hybrid Assessment Method for Evaluating the Performance of Starting Pitchers in a Professional Baseball Team

ChihCheng Chen, YungTan Lee, ChungMing Tsai
The performance assessment of professional baseball starting pitchers is considered a multi-attribute decision-making (MADM) problem. This study develops an evaluation model based on the analytic hierarchy process (AHP) and grey relational analysis (GRA) to evaluate starting pitcher performance for teams...

Geochemistry and origin of tektites from Dalat area, Vietnam

Lung Lin, YenTsui Hu
We measured the major and trace element contents and Rb-Sr isotopic compositions of 9 tektites from the Dalat area, Vietnam. All the samples studied are splash-form tektites which show pitted or grooved surfaces with schlieren structures on some surfaces. The trace element ratios Ba/Rb (avg. 4.00), Th/Sm...

Applications of GRNN Based on Particle swarm algorithm Forecasting Stock Prices

Jinna Lu, Yanping Bai
Generalized regression neural network (GRNN) has very good effect on making nonlinear forecasting model with large number of stock data. Particle swarm optimization (PSO) has simple operation analysis and is easy to implement. We use PSO algorithm to optimize the GRNN in order for optimal smoothing factor...

Performance evaluation study of strate-gic nuclear deterrent

Tiejian YANG, Minle WANG, Song TIAN, Baoshun ZHOU, Lan LI
To build a nuclear deterrent effectiveness evaluation model. Essentially based on nuclear deterrence, nuclear deterrence factors are analyzed and strategic nuclear deterrent performance system model is built. Based on Agent, nuclear deterrence performance assessment analysis model is constructed, the...

Multi-touch GIS Based on Optical and Computer Vision

Bo Wan, Dongxue Zhao, Xiu Wen, Gengdai Liu
This paper describes a multi-touch GIS(Geography Information System) based on optical and computer vision. In the system, user can operates map direct-ly through gesture. A series of image pro-cessing and computation of video frames is used to get data and trajectory of touch point according to the character-istics...

Research and Implementation of ROHC for PoC Service Based on TD-SCDMA Network

Haiwen Li, Wei Huang, Lifu Li, Gang Yu
PoC is a half-duplex PTT service using VoIP technology based on cellular net-work packet domain carrying. ROHC is used to implement the header compres-sion in PS domain, which can improve the transmission efficiency of the air in-terface. This paper describes the working principle and the modes of operation...

Design and Implementation of anti-cheating programming Examination system

Yiju Wei, Hong Han, Jianyua Jiang, Yong Liao
Programming oriented on-machine examination (POME) faces some new cheating challenges. They exploit the fea-tures of third-party programming tools used in POME. Traditional methods, such as screen taking over, packet filtering, used in traditional on-machine examina-tion system could not prevent cheating...

Constructing Time-Varying Gene Regulatory Networks

Xiaohong Ni, Yingfei Sun
Discovered gene regulation networks are very helpful to understand biological mechanisms and predict unknown gene functions. Little literature has been done toward estimating time-varying networks from time series data. In this paper, we develop a new method to discover the dynamic, and delay interactions...

An Error Resilient Video Coding Algo-rithm Combining FEC and WZ Technol-ogy over Error-prone Channel

Tianqing Wang, Zhengguang Xie, Hongkui Li
Reliable video delivery has become one of the crucial issues in wireless video communications. Based on different error resilient property of forward error correction (FEC and Wyner-Ziv (WZ), we propose a scheme which combines these two technologies. Experimental results demonstrate the scheme can possess...

Mining Users for Organizations on Mi-cro-blogs

Zhenhua Zhang, Ruifang Liu, WeiRan Xu
This paper focuses on detecting relevant real-world users of organizations in mi-cro-blogs. Many organizations and indi-viduals choose to publish posts on micro-blogs. As the virtual social network may possibly be influenced by accounts’ real world social ties, it’s feasible to detect the user groups...

The Perception Layer Information Secu-rity Scheme for Internet of Things based on Lightweight Cryptography

XiangYi Hu, LiPing Du, Ying Li
This paper uses the lightweight (simple cryptography, high security and fast speed single-key cryptographic algo-rithms such as: RC4, RC5, SMS4 etc.) cryptography, and a security single-key management technology to solve the key update management problems of light-weight cryptography. In smart chip of...

Research on the design of a scalable hardware platform for data management

Fei ZHANG, GuangMing LIU
Data management system includes hard-ware platform and management software. Under the circumstance of explosive growth of data, scalability and processing speed are two important indicators of measurement of hardware platform. Design a highly scalable data management hardware platform, and solve the...

Local distributed mutual exclusion al-gorithm

Zhong-hao ZHANG
A distributed mutual exclusion algorithm has been proposed for large-scale distrib-uted systems in the Internet environment. The algorithm combines the advantages of centralized algorithm and distributed algorithm, and taking into account the system fault tolerance, while message complexity is decreased...

An Algorithm to Find Cycles of Biochemical Systems

Desheng Zheng, Guowu Yang, Xiaoyu Li, Zhicai Wang
Genetic regulatory systems, self-organized systems and other living systems can be modeled as synchronous Boolean networks with stable states which are also called cycles. This paper devises two algorithms based on BDD to compute all the cycles in synchronous Boolean networks and enumerate all states...

Risk assessment method for marine net-work security base on fuzzy-gray system theory

Guoliang Zou, Jie Wu, Yueying Jing
This paper constructs a marine network risk assessment model based on fuzzy-gray system theory, combining fuzzy mathematics with gray system theory. According to some special characters of the Marine Network, we screened the score results and normalized on the index weight with expert scoring. Whereafter,...

OpenCV Detection of Athletes in Long Jumping Videos

Ailing Song, Kai Chen
The precise analysis of long jumper’s technical videos can provide the im-portant information for the coaches to formulate the training program. To real-ize the analysis of technical videos, we must firstly detect and track the long jumpers in the video. OpenCV technique (open source computer vision...

The optimization design of Hall compo-nent array based on genetic algorithm

Weiwei Zhai, Wenzhu Gao, Yu Zhang, Ke Bi, Tianyue Xu, Tieqiang Zhang
It can greatly shorten the design period and make optimization more reasonable that use genetic algorithm for the Hall component array optimization design. The method is to set up the optimized platform based on ANSYS and MATLAB software. MATLAB software is used to realize the program design of genetic...

The Research and Application of Network Security Technology in the University Network

Ling Jia
The rapid development of computer network technology and information technology, brings greatly facilitate and enrich people's lives for information transfer and fast access, improves work efficiency. At the same time, the network information security is followed. How to ensure the network information...

The Design and Implementation of Florist’s Shop Online System Based on J2EE

Hui Shi, Hui Zhai, Rui Zhai
With the rapid development of Internet, e-commerce had been widely using by more and more people, so had shopping online . The J2EE architecture was adopted in this paper. An florist’s shop online system was designed and implemented based on the analysis of the actual needs of users. Through running...

Security EarlyWarning Assessment Progrm of Hazardous Sources Based on EarlyWarning Information Processing Mode

Ling Jia
The early warning can constantly improve the monitoring and management of the hazardous sources to realize advance prevention and control. Many early warning methods do not predict and imitate the hazard sequel and the early warning information in incomplete. This essay analyzes and studies the early...

The Comparative Analysis of SVC and STATCOM on Subsynchronous Oscillation Mitigation

Jian Zhang, Xiangning Xiao, Benfeng Gao, Chao Luo
The methods for subsynchronous oscillation mitigation based on SVC and STATCOM are analyzed in this paper. According to the IEEE first benchmark model, the electrical damping coefficients respectively provided by SVC and STATCOM connected at the generator terminal, as well as positive damping condition,...

Research on the Thermal Effect of Long Pulse Laser Irradiation BK7 Glass

Yuanyuan Sun, Zheng Li, Limin Song, Qiurui Jia, Shibo Liu
The temperature and thermal stress distribution on BK7 glass was numerical simulated by MATLAB according to heat conduction theory. Research has shown that the laser pulse number, spot radius and pulse width can change the extent of the damage threshold for BK7 glass. The results shown the damage threshold...

One OCDMA PON System with 2D Multi-Length Two-Weight CHPCs

Di Zhang, Yuhua Liu, Cui Xu, Yongqiang Qi
One OCDMA PON system is discussed in this paper. Multi-length Two-Weight Carrier Hopping Prime Codes is selected as encoder scheme, encoded information is transmitted through Optical fiber. Hard Limiter is utilized in receiver terminal to ensure lower bit error rate. Simulation shows that it can be used...

Research on the Security Technologies of Power Grid EMS Based On SOA

Zhiyong Lu, Yijun Zhang, Luan Yang, Shiping Xu, Yuanyou Chen
This article analyzes the accidents of power grid in some domestic region to discuss the security problems existing in the power grid Energy Management Systems (EMS). Combined with the security requirements of EMS, the method of improving EMS security based on SOA is proposed and the involving key technologies...

A novel method of Visual Attention for Targets Detection

Zhuo Zhang, Xinnan Fan, Xuewu Zhang, Haiyan Xu, Min Li
Inspired by the research of human visual system in neuroanatomy and psychology, the paper proposes a two-way collaborative visual attention model for target detection.In this new method , bottom-up attention information cooperates with top-down attention information to detect a target rapidly and accuractly....

The Petri Net model of the requirements and service composition

Zhijuan Chen, Ronghua Ye
In the service-oriented environment, the composition of multiple web services is always used to satisfy the given request. To meet the request, the compositions of the services are various. Aim at such difficulty, described with the environment ontology, the relative theory of Petri net is proposed to...

Active Learning Based on diversity maximization

Yongcheng Wu
In many practical data mining applications, unlabeled training examples are readily available but labeled ones are fairly expensive to obtain. Therefore, as one type of the paradigms for addressing the problem of combining labeled and unlabeled data to boost the performance, active learning has attracted...

The Design and Implementation of Database on Library Management Information System

Hui Zhai, Hui Shi, Rui Zhai
The stand or fall of database design was related to an information management system was really practical. Analysis of user demand from the library management information system, the design and implementation of the database part in the system development process was discussed as a key point, and the...

AlNGaN HEMT T- gate Optimal Design

Xiaowei Zhang, Kejin Jia, Yuangang Wang, Zhihong Feng, Zhengping Zhao
The GaN HEMT is widely used in high-frequency aspects, use the T-gate to reduce gate resistance is one of the most effective methods to improve the the device maximum oscillation frequency (fmax). But fmax is very sensitive to T-gate size, improper selection may reduce fmax, Therefore, in order to reduce...

Design and implementation of a large points FFT acceleration unit in multi-processor system based on FPGA

Duo-li Zhang, Xue-peng Yang, Yu-kun Song
This paper introduces the design and implementation of a large points FFT acceleration unit of multi-processor system based on FPGA. It introduces radix-2 DIT-FFT algorithm and the features of hardware platform. It analyzes the FFT acceleration unit overall and divides it into several modules. Then hardware...

Design and Implementation of Network Devices Monitoring System Based on SNMP

Liang Liu, Weifeng Wang, Zhilei Wang
People requirement network reliability and security more and higher as the information age of the Internet to promote the rapid development of business and Internet using unceasingly thorough, network equipment, network structure is complicated. This paper design and implementation of a monitoring system...

An Analysis on the Application of P2P in Network

Yongmei Zhang
Currently, P2P is a very popular network model. Compared with the traditional model, it bears the advantages of high transmission speed and no centralization etc, and it performs much better in the cyber source utilization and server bottlenecks elimination. This article, starting from the basic principle...

Development of Embedded Practice Platform for Control System Based on ARM

Qing Liu, Jiang-Tao Wei
This paper uses an industrial control product as a teaching platform, the necessary foundation of theoretical teaching and practical exercises which is combined, so that students quickly grasp the embedded industrial control system software and hardware, the basics of the system hardware and software...

The Design and Implementaion of PTZ Control in Intelligent Video Surveillance

Saidong Lv, Guohua Tang, Yaowen Xia, Jili Xie
In the security monitoring system, in order to realize the multi-angle and different positions of the camera monitoring the camera monitoring, a pan tilt zoom (PTZ) module is used. This paper describes the PELCO-D protocol of PTZ and serial communication firstly. Then it achieves control the of PTZ and...

3D Tree Modeling and Visualization Simulation Based on Fractal

Xudong Xu, Jingqing Ye, Guanfeng Lv
In this paper, we propose a 3D tree simulation method which is based on fractal theory and combined with the morphological characteristics of trees. By modifying a few simple parameters we can achieve the realization of different types of 3D tree automated generation. According to the tree structure...

Active Defense Security Model in the Application of Network Deception System Design

Jiawei Du, Xing Zhang, Ying Zhou, Yongqiang Bai
As the traditional network defense is built on intrusion detection and passive protection, which is weak at dynamic response. The network deception technology in active protection is analyzed, and a network deception system based on active security model is proposed in this paper. This system implements...

Signal recognition basing on optical fiber vibration sensor

Haiyan Xu, Zhuo Zhang, Xuewu Zhang
Distributed optical fiber sensor can acquire the information of physical field along time and spatial continuous distribution. It plays an important role in long-distance oil and electricity transmission and security. In this paper, the author introduced the universal steps in triggering pattern recognition,...

Impact of Indirect Network Effect between Two Sides on the Diffusion and Pricing of Platform

Chuan Zhang, Weida He
Platform’s diffusion is sophisticated because of indirect network effect between two sides; there will be a peak or several peaks of diffusion rate. Platform’s diffusion can be divided to two stages: the stage before its take-off of potential market size and the stage after its take-off of potential...

The existences of frame wavelet set

Wan-She Li, Hong-Xia Zhao
In this paper, Let be a real expansive matrix, it mainly discusses the existences of frame wavelet set, we discuss the characterization of frame wavelet sets in , and several examples are presented, in order to deepen the understanding of frame wavelet set, which gives the two related theorems; we try...

Website information extraction based on DOM-model

YaFang Lou, YiChong Zhang, ZhiJun Yuan
With the rapid development of network technology and the promotion of application, web has become the main platform of the issuing and accessing information. It is current research focus, how to obtain the information required by the user from the vast information source. This paper presents an extraction...

Research on the Lifetime Estimation of Secondary Connections Using the PRP M/G/1 Queuing Network Model

Ekendeke Ndiomo Maurice Junior, Bin Guo
Allocated Spectrum band has always been a limited resource; being later a more challenging issue due to the growth of user demands. The past decade is marked by important changes in spectrum access through especially cognitive radio technology. Here, spectrum access issue can be studied in all the different...

Subnet Broadcast Polling Algorithm of Network Management Based on SNMP

Meigen Huang, Zhilei Wang
The current data collection of a network device in the network management system exists low real-time and long polling cycle, this paper proposes a subnet broadcast algorithm based on SNMP. The algorithm introduces the idea of Subnet division and broadcasting, when polling, the algorithm polled network...

Design and Implementation of LAN-sensitive Information Interception and Analysis System

Shaofeng Lin, Weifeng Sun, Linna Fan, Hua Wang
The LAN usually hides internal network structure by NAT to share a public IP address in the internal network, and thus it is hard to locate the source host precisely distributing sensitive information for a large-scale information monitoring system by analyzing the intercepted packets. So it is hard...

A General Architecture for Monitoring Data Storage with OpenStack Cloud Storage and RDBMS

Bin Hu
The process monitoring and fault diagnosis is one of the important problems in the process industry. Archived monitoring data is valuable for long-term analysis and decision making. In this paper, we propose a general architecture to manage and storage archived monitoring data. It has been implemented...

Design and Application of a Network Security Model

Shiping Xu, Yuhan Zhang, Ying Zhou, Yongqiang Bai, Haipeng Fu
This paper analyzes the deficiency of P2DR security model, and proposes a kind of new active dynamic security model AD-RPPDRRM, in which risk analysis, management and recovery are imported. On the basis of this model, basic technologies used to implement the defense in depth system are discussed. At...