Search all articles

+ Advanced search
Search articles within:
128120 articles
Proceedings Article

An Adaptive Bayesian Network Inference Algorithm for Network Situation Awareness

Jie Li, Lingwei Chu, Cheng Dong, Xiaoyuan Lu
The traditional Bayesian network is relatively fixed, the set of nodes, and intensity dependence relationships are rarely change, thus, it is unable to reflect changes in the actual network state. Such an inaccurate network model is also difficult to inference subsequent network. In order to solve the...
Proceedings Article

A robust region_based active contours model for image segmentation

Jiandong Bao, Fan Jiang
A novel region_based active contours model is proposed to deal with the images with intensity inhomogeneities and weak boundaries. For the proposed model, new global force and local force which compose hybrid energy functional are defined. Then, the energy functional is incorporated into a variational...
Proceedings Article

The Research on the Performance Evaluation of Civil Servant Based on Competency Model

Lei Zhao
This project roots in some common realistic problems in the performance evaluation of civil servant, such as paying attention to not quality but performance, which has led to serious division of talent development and evaluation in the public sector. So we devote to apply the competency model to job...
Proceedings Article

Application of Count Data Models in Inbound Tourism Source Markets based on Data mining technology

Changfeng Yin
This paper applies Application of Count Data Models based on Data Ming technology by the index of Familiarity Degree of Scenic Destination and the index of Competitive State to carry out quantitative analysis on the inbound tourism market of Jiangxi Province in 2001-2012. The results show that: Most...
Proceedings Article

Minimizing the Number of Tardy Jobs with Gammadistributed Processing Times

Haohao Li
This paper investigates two scheduling problems i.e., single machine scheduling problem with minimizing the number of tardy jobs and two machine flow shop scheduling problem with a common due date and minimizing the number of tardy jobs, in a stochastic setting in the class of non-preemptive static list...
Proceedings Article

Based on the improved AdaBoost OCSVM integrated application in image retrieval

Siqing Zhang, Run Zheng
In the traditional content-based image retrieval system, for a given query image, the number of relevant images in the database are not far outnumber correlation image. Therefore, a number of negative samples and the number of positive sample is unbalanced, the two class classifier traditional lose effectiveness....
Proceedings Article

Functionally Equivalent Clone Detection Using IOT-Behavior Algorithm

Xia Li, Tiantian Wang, Xiaohong Su, Peijun Ma
This paper presents an algorithm for the detection of functionally equivalent code clones in C code. The functionally equivalent code clones is the forth type of clones, which means that two or more code fragments that do the same calculation but with different syntax. Thus, we can detect the functionally...
Proceedings Article

Secure Mechanism for Remote Bitstream Updates of Reconfigurable Computing Platform

Runfeng Huang, Qinglei Zhou
Although FPGA-based reconfiguration computing platform has been shown as a promising technique in high productivity computing field, it may suffer security threats during its bitstream remote update process. A secure mechanism is proposed in this paper to prevent tamper and replay attacks during the...
Proceedings Article

Checking Strong Optimality of Interval Linear Programming

Jiajia Luo, Wei Li
In this paper, we will discusse the strong optimality of general interval linear program (IvLP), that is, the IvLP has an optimal solution for each realization, and some necessary and sufficient conditions are established, based on the duality theory.
Proceedings Article

The Effect of Tourism Competitiveness relating to Tourist Arrivals and Revenue in East Asia

Minglang Yeh, Laichu Lin, Yaju Hsieh, Chinhsin Chiu
Tourism industry has been growing in recent years, thus becoming a highly competitive market. Government improves its tourism competitiveness to attract a large amount of foreign tourists, increase tourist revenue, and create local employment opportunities. Studies of tourism competitiveness abroad began...
Proceedings Article

Ceramic Products Recommendation Based Improved Collaborative Filtering

Huiying Li, Yilai Zhang, Gongxun Cheng
In order to achieve personalized recommendation in the e-commerce platform for ceramic products, and improve the quality of recommendation, an improved collaborative filtering recommendation algorithm based on collaborative filtering algorithm was presented. By analyzing the insufficient of traditional...
Proceedings Article

Fusion Recognition Fingerprints and Handwritten Signature Recognition Fusion Based on the Bayesian Algorithm

Xiaojie Yang, Yunyun Zhou, Mandan Liu
This paper puts forward the fusion recognition using fingerprints and handwritten signature method, using Bayesian decision theory establishment decision-making optimization mathematical model to calculate the decision-making level fusion.
Proceedings Article

Effective and Efficient ways of Hybridizing GA with various methods while reviewing a wide variety of Hybrid Genetic Approaches.

Nafisa Maqbool, Chaoyong Zhang, Mudabbir Baddir
Hybrid genetic algorithms significant interest over the decade are increasingly used to resolve real-world problems. Genetic algorithm’s ability to incorporate various techniques within its framework to produce a hybrid that secures the best from the blend. In this paper, different forms of integrations...
Proceedings Article

Systematic Analysis on Pipeline Leak Detection and Location

Qibin Yang, Wei Sun
Because pipeline has large pipe diameter, large throughout and high pressure, once pipeline leakage accident happens, the damage is quite serious. In addition, pipeline leakage accident caused by man-made drilling oil stolen every year results in huge economic losses on oilfield. Therefore, a real-time...
Proceedings Article

A numerical method for nonlinear inverse heat conduction problem

Ailin Qian, Guangfu Wang
Inverse Heat Conduction Problems(IHCPs) have been extensively studied over the last 60 years. They have numerous applications in many branches of science and technology.The problem consists in determining the temperature and heat flux at inaccessible parts of the boundary of a 2- or 3-dimension al body...
Proceedings Article

Fuzzy Control of Obstacle Avoidance for Mobile Robot Based on Single Chip Microcomputer

Ling Wang
This paper aimed at the environment is unknown, the mobile robot can replace or partially substitute for personnel to enter the scene implementation of environmental detection and upload information. A path planning method is proposed for obstacle avoidance of robot based on fuzzy control algorithm is...
Proceedings Article

Study on dielectric property of BST of gradient thick films

Maoyan Fan, Lifang Zhang
The multilayer BST thick film with composition gradient is becoming the important alternative material for the infrared detector and microwave modulator due to its good comprehensive dielectric properties such as moderate dielectric constant and high dielectric-temperature coefficient, etc. The Mn-doped...
Proceedings Article

Cognitive Component Analysis of Basic Mathematics Achievement Assessment

Yenwen Yang
To provide some useful information into teaching practice adjustment, teachers usually need some professional supports. In this study, an analysis framework on item cognitive component is proposed and implemented. The sample for this study consisted of the Nursing and Management College student from...
Proceedings Article

Study on the Model of Quality Safety Information Diffusion

Wuyi Zhang, Yunfei Yang, Linjing Tao
Based on the SI communicable disease model, this paper established the model of quality safety information diffusion by comparing the system composition of SI model and the diffusing process with the model of quality safety information diffusion. Then, the paper overcomes the defect that and are fixed...
Proceedings Article

Discussion on SME Financial Management Problems and Countermeasures

Xuhui Yang, Ruoxi Zhang
The paper analyzes the status of the financial management of SME based on the depiction of what to define SME, it can As to this, it gives the field research towards some representative SME financial management status, in order to find out where problems exist and dissect what the enterprise take counter...
Proceedings Article

The Number of Economic Relations Analysis of Regional per Capita GDP and Quality Level in China

Wuyi Zhang, Yunfei Yang
This paper regarded the quality management level of regional pillar industries as the average level of regional quality, and selected the quality level of representative seven provinces of China as samples. By drawing scatter diagram and doing the fitting analysis, we ultimately find out the relation...
Proceedings Article

AMDS: Sentence Extraction Based Proficient Framework for Multi-Document Summarization

C. Balasubramanian, K.G. Srinivasagan, S. Geetha
Rapid improvement of electronic documents in World Wide Web has made overload to the users in accessing the information. Therefore, abstracting the primary content from numerous documents related to same topic is highly essential. Summarization of multiple documents helps in valuable decision-making...
Proceedings Article

Convergence and Parameters Analysis of Shuffled Frog Leaping Algorithm

Lianguo Wang, Yaxing Gong
Markov chain is an effective tool for convergence analysis of intelligence optimization algorithms. This paper briefly studies the state space of the basic Shuffled Frog Leaping Algorithm (SFLA) and theoretically analyzes the convergence behavior of SFLA by using Markov chain. It is proved that the SFLA...
Proceedings Article

Competitive Decision Algorithm for the Rooted Delay-constrained Minimum Spanning Tree

Xiaohua Xiong, Xuemin Chen, Aibing Ning
In this paper, we make research on rooted delay-constrained minimum spanning tree (RDCMST). RDCMST seeks to find a minimum spanning tree and no path from a specified root node to any other nodes may exceed a given delay bound. RDCMST is a NP-hard combinatorial optimization problem which arises both in...
Proceedings Article

Expert System of Fault Diagnosis of Dry-mixed Mortar Fieldbus Control System

Huan Zhang, Shuqi Shang, Dongwei Wang, Jiasheng Wang, Ranbing Yang
A design and implementation of expert system of fault diagnosis of dry-mixed mortar based on Profibus field-bus and large-scale PLC is proposed in this paper. Firstly, the control principle and algorithm, hardware choice and integration of the control system are introduced. Secondly, by analyzing the...
Proceedings Article

Interacting Multiple Gaussian Particle Filter

Yanwen Qu
Inspired by the framework of the Interacting Multiple Model (IMM), a method, called Interacting Multiple Gaussian Particle Filter (IMGPF), is proposed for solving the nonlinear Bayesian filtering problem with unknown continuous parameter. IMGPF regards the continuous parameter space as a union of disjoint...
Proceedings Article

Research and Development on Supply Chain Collaboration Management System

Yong Cen
The fierce competition pressures on supply chain management of tobacco industry enterprise increases emphasis on supply chain agility, integration, and visibility to respond rapidly and efficiently to changes in the marketplace. In this paper, we analysis the requirements and characteristics of the system,...
Proceedings Article

ICA and BP neural network based fingerprint recognition

Lu Zhao, Wenyong Wang
According to the recognition of fuzzy fingerprint and the ones with strong noise, proposed a new method which combining the ICA (Independent Component Algorithm) and BP (Back Propagation) neural network. First, using the FastICA method to extract fingerprint characteristics, then classify and recognize...
Proceedings Article

Study on the Method of CGF Intelligent Decision-making

Xiaoming Du, Shuchao Tian, Xuefeng Xu, Gu Ping
The intelligent decision-making method applied to the CGF behavior modeling is studied more and more. In this paper, we introduce the intelligent decision CGF definition, method, and the characteristics. It analyzes the general process of CGF intelligent decision, and constructs the CGF intelligent decision...
Proceedings Article

ERWD: A Measure for Nearest-Neighbor Search in Undirected Graph

Junyin Wei, Binghui Qi, Mingxi Zhang
Finding nearest neighbors in graph plays an increasingly important role in various applications, such as graph clustering, query expansion, recommendation system, etc. To tackle this problem, we need compute the most “similar” k vertices for the given vertex. One popular class of similarity measures...
Proceedings Article

Stereo Image Watermarking Method for Authentication with Self-Recovery Capability

Jing Wang, Gangyi Jiang, Chen Feng, Xingbin Zeng, Xiaodong Wang, Mei Yu, Yo-Sung Ho
To address issues of content authenticity verification and integrity protection, a stereo image watermarking method based disparity is proposed. Firstly, the stereo image blocks are classified into eight types according to the smoothness of it, and the alterable-length recovery bits are generated. The...
Proceedings Article

The design and implementation of satellite communication signal spectrum automatic monitoring System

Mingbo Liu, Zhong Wang, Jishi Chang
This article introduces the design idea and implement process of satellite communications signal Auto-Monitor System based on GPIB interface, and puts forward the system design frame centered with spectrum analyzer of “frequency spectrograph + GPIB/USB converter+ computer”, detailed introduces the implement...
Proceedings Article

Water demand forecasting based on adaptive extreme learning machine

Jinming Jia, Shengyue Hao
Predicting water consumption is of key importance for water supply management, which is also relevant in processes for reviewing prices.In this study, a hybrid method based on extreme learning machine model with the adaptive metrics of inputs is proposed for improving forecasting accuracy. The adaptive...
Proceedings Article

Based on RFID and NFC technology Retail Chain Supermarket Mobile Checkout Mode Research

Fugui Ruan, Daijiang Chen
Radio Frequency Identification (RFID) is a non-contact automatic identification technology. NFC technology is an extension of RFID technology. This paper analyzes the application status of RFID and NFC technology and introduces the working principle of RFID, NFC technology and EPC system. Based on RFID...
Proceedings Article

Research on KAAS-based Social Knowledge Collaboration Service Mechanism and Application

Yuan Rao, Shaochuan Chen
Knowledge as a Service (KAAS), which merges the whole architecture of knowledge into service process, is proposed and defined in the paper. Based on the BNF definition of KAAS, the new knowledge service mechanism is provided to aggregate the knowledge resources together for satisfying various users’...
Proceedings Article

A Data Fusion Algorithm Based on Improved LEACH Clustering Routing for Wireless Sensor Network

Zhang Shiyue, Jiande Wu, Xiaodong Wang
Energy limited of wireless sensor network limits the practical application. Therefore, in industrial applications we need to take into account introducing data fusion to reduce the data redundancy, improve performance, reduce energy consumption, and prolong the network life. This research idea: data...
Proceedings Article


Li Tian, Wei Li, Qin Wang
In this paper, we discuss the solution of interval linear equations from the point of view of the vector components. Tolerance solutions, control solutions, algebraic solutions and localized solutions are defined based on the relationship of two vectors as a whole, this paper detailed considerate the...
Proceedings Article

The Research of Image Feature Matching Method Based on CH-SURF

Zhaodi Wang, Jicai Deng
Since SURF (Speeded-Up Robust Features) algorithm is designed for gray images in feature extraction and recognition tasks, it can't recognize some objects of similar shape but different color. CH-SURF algorithm is proposed,which combines Color Histogram feature and SURF feature together. CH-SURF algorithm...
Proceedings Article

On-Line Modeling of AUV’s Maneuvering Motion Based on Sliding Window SVM

Yongjie Pang, Guocheng Zhang, Zhonghui Hu, Yushan Sun
In order to solve the problem of on-line modeling of AUV's Maneuvering Motion, considering that the sample space expends in the parametric identification, a learning algorithm for least squares support vector machines (LS-SVM) based on sliding window is deduced. The method improves the identification...
Proceedings Article

Stochastic Simulation of River Water Quality Risk assessment under Coupling Effect of Reclaimed Water Recharge and Inner Source Release

Han Yan, Zhihong Zou
A river water quality model under a coupling effect of reclaimed water recharge and inner source release is constructed based on a one-dimensional steady river water quality model. In order to solve problems that triangular fuzzy numbers are not suitable for data sets having flat representation and no...
Proceedings Article

Spontaneous Construction of higher order Voronoi Diagram

Hongmei Yang, Huaying Yin
The higher order Voronoi diagrams are difficult to construct because of their complicated structures. In traditional algorithm, production process was extremely complex. While spontaneous algorithm is only concerned with positions of generators, so it is effective for constructing Voronoi diagrams with...
Proceedings Article

Research on the Application of Information Technology in School Sports

Yunyun Du
The paper analyses the role of information technology in the P.E, training and management and analyzes the theoretical and practical basis for the application of information technology in the school sports.It also proposes measures to fully exert the function of information technology in the school sports.
Proceedings Article

The Research on NSC Key Service Mechanism in Mobile Network

Chenhe Zhu, Zhiyi Fang, Ying Wang, Qian Xu, Borui Jin
Mobile Network Security Center (NSC) and its key service mechanism is an important part of the mobile network security management. In this paper, based on the analysis of the security requirements of the mobile network, put forward a key service mechanism for mobile networks (NSC), including the management...
Proceedings Article

Study on Information Service Push Strategy based on Networked Manufacture

Xiu-zhen Feng, Chao Su
Based on exploring the characteristics of networked manufacture, we first analyzed the relationships on the networked manufacture. Then, we constructed architecture of information push service for networked manufacture, which is based on the detailed discussion with the related data structure. Furthermore,...
Proceedings Article

Does 4G Technology Trigger the S-commerce Era Coming Evidence from Taiwanese ICT Market

Ming-Yuan Hsieh, Chih-Cheng Huang, Kuang-Yu Huang, Hsiu-Wei Hsu
In reviewing of the generalization of wireless technology in the variously relative information and communication technology (ICT) industries, this research systematically explore the potential determinants of the fourth generation (4G) technology to cross-analyze the drivers of the smart-commerce (S-commerce)...
Proceedings Article

An Examination of the Concept of Smart School: An Innovation to Address Sustainability

Siavash Omidinia, Maslin Masrom, Harihodin Selamat
The smart school is a technology-based teaching-learning institution for preparing children for the Information Age. To achieve smarts schools educational objectives, these teaching and learning concepts should be covered: curricular, pedagogy, assessment and teaching-learning materials. Information...
Proceedings Article

Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability

Chunyang Yuan, Jiaxin Li, Ru Zhang, Jianyi Liu
Disaster recovery is the key approach to ensure the security of information system and business continuity. Nowadays, it's very urgent to explore a way to evaluate the disaster recovery ability objectively, comprehensively and scientifically before disaster occurs. Initially, our proposal constructs...
Proceedings Article

Rough Terrain Perception Through Geometric Entities for Robot Navigation

Roberto Valencia-Murillo, Nancy Arana-Daniel, Carlos López-Franco, Alma Y. Alanís
This paper presents the implementation of a non-linear geometric cost function to be used with a learning to search algorithm (LEARCH) to robot navigation in rough terrains. The non-linear function introduced is a neural network trained with geometric entities as inputs (points, lines, spheres, planes)....
Proceedings Article

Gossip-Pull System-based Dissemination Protocol Satisfying Message Causality Condition

Jinho Ahn, Cha-Young Kim
This paper introduces a group communication protocol ensuring message causality condition based on gossippull systems. The message causality condition can be satisfied by making all multicast messages transferred to group recipients through redundant message sending by sensor brokers, especially based...
Proceedings Article

Low Complexity Frequency Offset Estimation for FMCW Radar

Jinyong Lee, Jingu Lee, Youngseh Kim, Kanghoon Kim, Younglok Kim
The FMCW radar estimates the relative speed and the distance of moving targets from the frequency spectrum of received beat signal. The radar systems based on the Doppler processing measure the appropriate information from discrete frequency spectrum, and hence the accuracy depends on the sampling rate...