Proceedings of the 2016 2nd International Conference on Artificial Intelligence and Industrial Engineering (AIIE 2016)

+ Advanced search
126 articles
Proceedings Article

Key Research of Pre-processing on Mongolian-Chinese Neural Machine Translation

Jian Du, Hongxu Hou, Jing Wu, Zhipeng Shen, Jinting Li, Hongbin Wang
Neural machine translation has recently achieved promising results with the big scale corpus. But there is little research on the small scale corpus, such as Mongolian. Mongolian belongs to the agglutinative language while Chinese is a pictograph. It is necessary to do some pre-processing for both Mongolian...
Proceedings Article

The Research of Grade Prediction Model Based on Improved K-means Algorithm

Yongguang Zhang, Hua Wang, Hongyang Li
Grades reflect how well you learnt in courses. This paper introduce a model to predict student grade-data with a refined K-means clustering algorithm. K-means clustering algorithm based on the normal distribution is proposed to overcome the flaws that caused by using Euclidean distance algorithm to measure...
Proceedings Article

The Modified Model of Q-learning Search Strategy Based on LDA-DBN

Shihao Zhu, Guangfeng Zhang, Dongfan Zhao
The network in web has the characteristic of information roughness. Focused crawling is able to grab the information selectively when topic relate to web page. In this paper, utilizing the characteristics of Gibbs using in DBN and LDA, in the sliding window containing the URL link to semantic recognition,...
Proceedings Article

A General Conceptual Model of Recommendation Based on Multi-Agent Approach

Xunhui Zhang, Tao Wang, Gang Yin, Xinjun Mao, Huaimin Wang
In recent years, recommendation is becoming more and more popular in many fields. However, there are still some problems, such as single point failure, lack of ability to support different devices and etc. To solve these problems, researches have been carried out using multi-agent approach but some new...
Proceedings Article

Robust Model for Multimodal Location of the Hazmat under Uncertainty

Liping Liu, Zipeng Yi
In reality, the demand of O-D pair can be affected by various factors and then lead to uncertain demand. Finally, it will impactthe location of transfer yards. A bi-objective nonlinear robust model is established for locating multimodal transfer yards with hazardous materials in this paper. To solve...
Proceedings Article

The Correlation Analysis of Clean Energy Output Based on Nonparametric Kernel Density Estimation Probability Models

Xiaolin Qin, Yonggang Li, Chao Shen, Zengqiang Zhang, Xuyao Zeng
There often exists correlation among adjacent photovoltaic power stations and wind farms. This paper provides a method based on the nonparametric kernel density estimation theory and Spearman rank correlation to analysis the correlation of clean energy outputs. Firstly, a variable bandwidth kernel density...
Proceedings Article

Penalty-PSO Algorithm for Sequencing Mixed Model Assembly Line

Chenglong Lu, Bo Zhu, Beibei Liu, Yuwei Wan
A mathematical model of sequencing problem which takes the minimum overload time as the optimization objective is estab-lished to solve mixed model assembly line sequencing problem in semi-closed station. A new penalty strategy that can eliminate the influence of the viscous effect which caused by the...
Proceedings Article

A Comparative Analysis toward Two Famous Smart-Tourism by Integrated Dynamic-Programming & Project Appraisal Model

Tianhang Huang, Nan Zhang
The purpose of this study is aimed to construct a comprehensive theoretical framework for explaining the characteristics of different Smart Tourism Projects' Designing and Developing, and finding the best practice model in this booming area. Based on the three stages of R&D project pipeline of dynamic-programming...
Proceedings Article

A Probability PPV Model for Social Network Influence Maximization Problem

Yunjia Ge, Dong Wang
For Influence Maximization(IM) problem based on social network, effective and personalized probability learning method was still not theoretical guaranteed. In this paper, we proposed a PPV probability model based on IM problem, which effectively learnt influence probabilities and personal-ized influence...
Proceedings Article

Technology of Exploratory OLAP Based on the Integral Analytical Model

Anna Korobko
The paper presents the original approach to the exploratory OLAP of the heterogeneous resources based on the integral analytical model. Applying the multidimensional data model as a technological fundament allows to analyze the structure of the joining sources according to unified notation, allows to...
Proceedings Article

Development of a Unified Model of Data Representation for Cross-System Interaction

Tatiana Penkova, Anna Korobko, Artem Belorusov
The paper presents an unconventional approach to formation of unified models for representation of cross-system interaction. The authors highlight the necessity of system integration method development that would bring in a standardised way to data exchange between heterogeneous resources with an opportunity...
Proceedings Article

Adaptive Model of Data Exchange for Cross-System Interaction

Tatiana Penkova, Anna Korobko, Artem Belorusov
The article approaches the problem of adaptive data exchange model making for cross-system data interaction. The authors demonstrated the need in development of system integration methods that would facilitate the standardised data exchange across heterogeneous sources with an opportunity to adapt flexibly...
Proceedings Article

Study on the Distribution Model of Supermarket Chain Based on AHP

Caixia Chen, Chun Shi
In the past few years, With the constant expansion of supermarket chains, logistic distribution has been a Bottleneck of the development of supermarket chains. It is an important reason that distribution model is not well chose. This article based on the analysis of the limitation of traditional selective...
Proceedings Article

Validation of Dynamic Simulation Models on Uncertainty

Xiaojun Guo, Shaojing Su
Autonomous underwater vehicles (AUV) play an important role in human activities. They are different from of the vehicles other areas (such as air, ground). Movement, communication, target detection all involve complex hydrology and climatic condition. For special application fields it's even more complex....
Proceedings Article

The Classification Model of Customer Groups Based on Grader

Tao Xi, Lijing Wang
The customer demands were divided into dominant and implicit requirements. Classified by professional ability and social background of customer groups, classified indexes of customer groups were established to accurately obtain implicit requirements. In general, natural language expression of customers...
Proceedings Article

Simulation-based Prediction Model of the Auto-body Multi-Stage Forming Process

Dong-Guk Han, Dong-Won Jung
Usually auto body need several forming stages in the real manufacturing. Every forming parameter within the process has a significant influece on the forming quality. A reasonable desgin of the stamping process is needed. According to statistics, stamping process cover auto parts account for a large...
Proceedings Article

An Improved K-means Clustering Algorithm Based on Meliorated Initial Centre

Xiang Li, Zhenwei Wei, Lingling Li
The initial clustering center of traditional K-means clustering algorithm is selected at random that different initial clustering center will get different clustering results, which have great randomicity and poor stability. To improve the K-means clustering algorithm optimized by adopting local outlier...
Proceedings Article

Design of Sliding Rope Protection Algorithm for Mine Hoist in Iron Mine

Jinyang Xia, Yanping Wang, Linlin Shao
Rope protection is the protection function of large mineral lifting equipment. At present, most of the iron ore hoist sliding rope protection is the speed difference detection algorithm, and it is able to determine whether or not the hoisting machine system has a sliding rope fault, which can give the...
Proceedings Article

An Improved Possibilistic Fuzzy Entropy Clustering Based on Artificial Bee Colony Algorithm

Baofeng Guo, Mingyan Jiang
In this paper, a possibilistic fuzzy entropy clustering algorithm (PFECM) based on unsupervised possibilistic clustering (UPC) algorithm and partition entropy (PE) has been proposed. Meanwhile, an efficient global optimization method-artificial bee colony (ABC) algorithm is introduced to optimize the...
Proceedings Article

A Transmission Probability Control Algorithm Based on Competing Node Estimation in MANET

Shentao Wang, Xiaoli Liu, Jingwen Sui, Shengze Qiang, Rui Li, Junqiang He
Most of Transmission Probability Control Algorithms in Mobile Ad hoc Network (MANET) research are based on the assumption that the number of competing nodes is known by every node. With an increasing number of wireless devices or appliances, the number of competing node in network is changed dynamically,...
Proceedings Article

A Dynamic Slot Allocation Algorithm in High-Band Radio Networks

Shentao Wang, Xiaoli Liu, Bin Liu, Shibiao He, Shengze Qiang, Rui Li, Junqiang He
The High Band Radio network has extensive value in the military application. A Dynamic Slot Allocation Algorithm (DSA) based on the High Band Radio network TDMA protocol is proposed in this paper, DSA algorithm allocates slots dynamically according to the difference of network traffics. The simulation...
Proceedings Article

Parallel Algorithm for Identifying Overlapping Communities from Local Extension

Hua Long, Baoan Li
The overlapping communities identification in complex networks was studied with the parallel algorithm from local extension. The algorithm thought originated from clustering of modularity. Firstly, based on the Map/Reduce framework, the core node was selected according to the distribution and aggregation...
Proceedings Article

The Method of Structural Damage Identification by ACO Algorithm and Wavelet Theory

Deqing Guan, Jun Tang, Tao He
In order to effectively identify the location and extent of structural damage, a two-stage damage identification method, ACO algorithm and wavelet theory were presented. First, the curvature mode of structure with damage was obtained with finite element analysis. The curvature modes were analyzed using...
Proceedings Article

Damage Identification of Frame Structure by Wavelet-Genetic Algorithm

Deqing Guan, Tao He, Jun Tang
This article takes the frame structure as the research object, and combines wavelet analysis with genetic algorithm for structural damage identification. Firstly, wavelet analysis is used to identify the structural damage location and the number of damaged units, then the genetic algorithm is used to...
Proceedings Article

Detection of Application-Layer DDoS by Clustering Algorithm

Chuyu She, Wushao Wen, Zaihua Lin, Kesong Zheng
Affinity Propagation (AP) algorithm is a relatively new clustering algorithm that can handle large datasets to obtain more satisfactory results. This paper introduces a detection mechanism for application-layer DDoS attack by using AP algorithm. In this detection strategy, we first extract some features...
Proceedings Article

A Fast Depth Intra Mode Selection Algorithm

Jieling Fan, Qiang Li, Jianlin Song
For the purpose of reducing the complexity of depth intra coding, a fast intra prediction mode decision algorithm is proposed. First, the fast decision of depth modeling modes (DMMs) is obtained by using Laplace Operator detection method. Second by using the correlation between the wedgelet pattern and...
Proceedings Article

A Definition of Structure Hole and Algorithms

Tianji Zhao
In this paper we only use graph's structural information to generate other information in order to get the structural hole. Our work firstly delivers a formula well defines the structural hole, gives an iterative algorithm and a descending algorithm to find solution. The definition combines the advantages...
Proceedings Article

Optimized TF-IDF Algorithm with the Adaptive Weight of Position of Word

Jie Chen, Cai Chen, Yi Liang
The classical TF-IDF algorithm only considers the weight of the term frequency and the inverse document frequency, without considering the weights of other feature of word. After the author analyzing summary of Chinese expression habits, an adaptive weight of position of word algorithm based on TF-IDF...
Proceedings Article

Research of Reactive Power Planning Optimization Based on Improved Adaptive Genetic Algorithm for Wind Power Plant

Shijie Liu
Contrapose the randomness of wind speed and the wind power, use the method of multi-scenario based on probability analysis to study reactive power planning of wind power system and make the multi-scenario expectation model. On this basis, use improved adaptive genetic algorithm with subsection self-adaption...
Proceedings Article

Research on Optimization of Generator Grid-Related Parameters Based on Double-Stranded Quantum Genetic Algorithm

Yan Xu, Lixin Fan, Yunqian Li, Zhong Chen
With the expansion of grid scale and the development of UHV technology, grid partitioning mode is more and more widely applied. While the grid is closely connected with the large power grid, there is still the risk of separation and isolation mode operation. Under this background, this paper carries...
Proceedings Article

An Efficient Character Segmentation Algorithm for Offline Handwritten Uighur Scripts Based on Grapheme Analysis

Yamei Xu, Panpan Du
Cursive offline handwritten Uighur scripts contain a lot of small and random writing strokes, which makes the character segmentation is more complicated. In view of this, a new efficient character segmentation algorithm based on grapheme (part of a character) analysis is proposed in this paper. Firstly,...
Proceedings Article

Research on Vehicle Detection and Tracking Algorithm Based on the Methods of Frame Difference and Adaptive Background Subtraction Difference

Yiqin Cao, Xiao Yun, Tao Zhong, Xiaosheng Huang
This paper proposed methods of vehicle detection and tracking algorithm in real-time traffic. In the detection of real-time moving vehicle, vehicle areas would be determined through road line detection. Then, the main color information of moving and non-moving area would be obtained through frame difference....
Proceedings Article

Balanced COD-CLARANS: A Constrained Clustering Algorithm to Optimize Logistics Distribution Network

Tong Zhang, Dong Wang, Haonan Chen
In this paper, we focus on the problem of the siting of distribution stations, which is of key importance during designing a logistics distribution network. This problem includes dealing with physical obstacles in real world, making the orders as close as possible to their respective stations and making...
Proceedings Article

Remember-All Based Frontier Allocation for Multi-Robot Coverage in Unknown Environments

Sushil Parti, Dan Wu
Robots are being increasingly used for coverage tasks which were earlier considered too dangerous or monotonous to be performed by humans such as interplanetary exploration, search & rescue missions, etc. Out of all the multi-robot coverage approaches, the frontier based approach is one of the most widely...
Proceedings Article

Using the IEEE 802.11 Family of Standards for Communication between Robotic Systems

Andrei Vladyko, Alexander Paramonov, Ruslan Kirichek, Andrey Koucheryavy
The paper analyzes the possibility of using the IEEE 802.11 standards for communication between the elements of robotic systems in terms of radio frequency (RF) channels congestion exterior traffic.
Proceedings Article

Artificial Intelligence Applications in Power System

Xiaoyue Zhao, Xinyan Zhang
The purpose of this paper is to research on artificial intelligence in power system operation and on transient protection, through the use of discrete control and the continuous control to increase the stability of the power system; transient protection is through the use of relay protection based on...
Proceedings Article

A Synchronous and Closed-Loop Architecture of BCI-Based Rehabilitation System for Stroke with Robot and Virtual Reality

Chuanqi Tan, Fuchun Sun, Wenchang Zhang, Shaobo Liu
In this paper, we proposed a novel architecture of a scalp electroencephalography (EEG) based rehabilitatoin system via brain computer interface with robotic and virtual reality devices. More and more attentions had been taken to the brain computer interface, because it is the only way for some special...
Proceedings Article

Design of a Smart Home Remote Monitoring System Based on C++ and ZigBee

Xuewen Shi, Qinglan Wang, Guangdeng Zong, Tongdui Zhang
In this paper, a smart home remote monitoring system was designed based on C++ and ZigBee. The system is composed of slave subsystem and host subsystem. The slave subsystem is a wireless sensor network designed by using ZigBee, it performs the real-time detection of temperature and humidity, smog, gas...
Proceedings Article

Temperature Control System Based on SCM

Yuxin Lei
In order to control the indoor temperature in a given range automatically, use SCM(single chip microcomputer) 89C52 as the main part is a simple way. The design of the hardware part is shown as FIGURE I and the software part is compiled by 'Keil'. After simulating the system in 'Protues' then begin the...
Proceedings Article

Developing A Fire Monitoring and Control System Based on IoT

Yi Li, Jianjun Yi, Xiaoming Zhu, Zhuoran Wang, Fangwen Xu
An novel fire extinguishing monitoring and control system is proposed in this paper. The system combines online monitoring of fire extinguishing information based on Internet of things (IoT), early fire warning and alarm system with building safety evaluation, which are designed to acquiring the real-time...
Proceedings Article

An Electric Power System Protocol Conversion Method Based on Embedded Platform

Jiang Zhu, Chong Xie, Tao Yan
In the electric power systems, there are many different types of equipment with a variety of different functions. They need to communicate with each other through all kinds of hardware interfaces and software protocols. With the construction of electric power data network and the improvement of automation,...
Proceedings Article

Energy Aware Scheduling Algorithm for Vehicle Networking Applications in Cloud Computing Platform

Zheng Xiao, Bo Wang
This paper expounds the strategic significance of China car networking industry development, the development of a comprehensive analysis of the current situation of domestic and foreign car networking industry, the bottleneck problem of all aspects from the development process of different dimensions...
Proceedings Article

A Preliminary Study for Exploring High-speed Train Driver Fatigue Using Eye-gaze Cue

Ronghui Yan, Cheng Wu, Yiming Wang
High-speed railway is seeking for a higher safety level than other public transports because of more passengers and higher speed. However, sleepiness and fatigue occur more frequently for train drivers due to longer operation time and irregular shift schedule. In the paper, we focus on study the particularity...
Proceedings Article

Path-Planning of a Certain UAV Using Neural-Network Method

Jie Li, Li Li
Unmanned Aerial Vehicles(UAVs) are widely used for civilian and military purposes, such as surveillance, reconnaissance, search and rescue, border patrol etc. In this paper a single UAV is equipped with a gimballed camera to conduct surveillance operations, the route planning method that uses neural...
Proceedings Article

Optimization Method of Wavelet Neural Network for Suspension Bridge Damage Identification

Deqing Guan, Jie Li, Jun Chen
In this paper, an optimization method of wavelet neural network for structure damage identification is established. The suspension bridge is used as the research object. Firstly, wavelet coefficients modulus maxima are obtained by wavelet transform to determine the location of structural damage. Then,...
Proceedings Article

RoI Pooling Based Fast Multi-Domain Convolutional Neural Networks for Visual Tracking

Yuanyuan Qin, Shiying He, Yong Zhao, Yuanzhi Gong
This paper proposes a fast multi-domain convolutional neural networks method (Fast MDNet) for visual tracking. Fast MDNet builds on fast region-based convolutional neural networks (Fast R-CNN) and MDNet to efficiently track arbitrary objects using deep convolutional networks. We introduce a RoI pooling...
Proceedings Article

Combining FFT and Spectral-Pooling for Efficient Convolution Neural Network Model

Zelong Wang, Qiang Lan, Dafei Huang, Mei Wen
Convolution operation is the most important and time consuming step in a convolution neural network model. In this work, we analyze the computing complexity of direct convolution and fast-Fourier-transform-based (FFT-based) convolution. We creatively propose CS-unit, which is equivalent to a combination...
Proceedings Article

The Study of RSSI in Wireless Sensor Networks

Jungang Zheng, Yue Liu, Xufeng Fan, Feng Li
Localization estimation of sensor node is a key component in many sensor networks' applications. Correct localization is required for WSN applications, but it is often expensive to include GPS adapters in each sensor node. The RSSI ranged-based localization algorithm is a simple and cost effective localization...
Proceedings Article

A General Gender Inference Method Based on Web

Hong Yang, Yali Yuan
Gender information, as a crucial part of human demographics, is valuable for its abundant connotations and potential applications. Though much effort has been made on the problem of gender inference, most existing methods are highly dependent on data from specific sources, like Twitter, and are difficult...
Proceedings Article

Research of Prediction Scheme Based on Adaptive Particle Swarm Wavelet Neural Network Model

Fuxing Yang, Qi Zhang, Ning Li, Zhongliang Deng
Traffic flow prediction have the characteristics of complexity, non-linearity and randomness. Researchers are resorting to hybrid neural networks fusing more effective algorithms into forecast process. This paper advances a fresh algorithm with both the thought of variation and adaptive to conquer the...
Proceedings Article

The Beginning and Evolution of Consciousness

H. J. Cai, Tianqi Cai, Wenwei Zhang, Kai Wang
It is an open question if the explosive computing capability of artificial intelligence could transcend human intelligence. It is proposed that the universe is bisected and encapsulated into Self and Outside World by an individual based on one's sensitive tactility acquired in the biological evolution...
Proceedings Article

Cascaded Hallucination-Classification Deep Network for Low-Resolution Face Recognition in the Wild

Zheyu Zhang, Peter Cheung
Low-resolution face recognition (LR FR) has become an active research subarea due to its significances for real applications. Conventional low-resolution face recognition approaches meet challenges like noise affection and lack of effective features with LR faces. In this paper, we propose a deep learning...
Proceedings Article

Cylindrical Medicine Bottle's Character Recognition of Automotive Dispensing Machine

Mingde Gong, Xianming Zhang, Tao Ni
a new scheme was designed to recognize the medicine which was packed in small cylindrical bottle with a label on the surface. To recognize the label of medicine a new algorithm was needed, which was used to rectify the cylindrical character to plane one. According to the equations of the rectification...
Proceedings Article

A Review of Visual Tracking with Deep Learning

Xiaoyu Feng, Wei Mei, Dashuai Hu
Visual tracking is an important research direction in the field of computer vision and has been widely used in military, medical and other fields. In recent years, the upsurge of deep learning in computer vision provides a new way for the realization of visual tracking with higher performance. This paper...
Proceedings Article

IKNN-SVM: A Hybrid Incremental Algorithm for Image Classification

Huimin Che, Bo Ding, Huaimin Wang, Ben Hu, Huifang Che
Incremental learning is a machine learning paradigm that the training dataset grows dynamically at runtime and the prediction accuracy can be improved incrementally. Since real-life datasets are usually open-ended and dynamic, incremental learning is important to many image classification applications....
Proceedings Article

Digital Watermarking Technology of Holographic Image Based on S-FFT Method

Li Wang, Fuping Liu, Zirui Fu, Yukun Wang, Zhipeng Lu
In this paper, we use one fast Fourier algorithm of the Fresnel integral transform (S-FFT) to realize the digital watermarking information of hologram. The most important point is that by the four-step phase shifting method to obtain four holographic images. We can randomly choose a holographic image...
Proceedings Article

A Human Identity Recognition System Based on Kinect Skeletal Tracking and ANN Classifier

Xianhui Zeng, Jinwen Deng, Mujun Liu, Yue Wang, Xuejun Zhang
We proposed a novel method of people recognition based on the structure of bones, which is detected by Kinect sensor for skeletal tracking. By using 3D depth image achieved by Kinect, body's skeleton information is extracted as 20 joints with joint coordinates, from which body's skeletal features are...
Proceedings Article

Application of Design Patterns in Development of Reusable GIS Symbol Library

Xiaojian Li, Jianxun Chen
The design and development of complex 2D symbol library system based on GIS system is completed by combining design pattern technology. Firstly, it states that the design of the symbol library system has its unique difficulties. The diversity and complexity of symbol library lead to difficulties in the...
Proceedings Article

An Efficient Method for Air Quality Evaluation via ANN-based Image Recognition

Xiaoguang Chen, Yaru Li, Dongyue Li
In recent years, air pollution problem has been the focus of public attention. In this paper, we proposed an efficient algorithm to evaluate the Air Quality Index (AQI) based on image recognition technology. In offline stage, some distinctive features extracted from the photos which are captured by common...
Proceedings Article

An Approach for Detecting Human Posture by Using Depth Image

Xianshan Li, Maoyuan Sun, Xiuxiu Fang
This paper introduces a method that can detect human posture by using depth image. The method uses head model to locate the human position which includes edge extraction, template matching and human detection. Then we extract the HOG feature from the depth images to get the characteristic vector of the...
Proceedings Article

Change Detection of Remote Sensing Image Based on Deep Neural Networks

Yan Chu, Guo Cao, Hassan Hayat
How to improve the quality of difference image (DI) for change detection task is an important issue in remote sensing images. This paper propose a new DI creation method based on deep neural networks. Deep belief network (DBN) which is an important model in deep learning is applied, and back propagation...
Proceedings Article

Research on Image Acquisition and Recognition for Stored Grain Pests

Defa Wang, Huiling Zhou, Haiying Yang, Yufeng Shen, Yang Cao, Huiyi Zhao
Manual ways of recognizing stored grain pests which are trapped is very time-consuming. In this study, an image dataset of 9 species of pests was built up by finding the MSERs (Maximally Stable Extremal Regions), through a trap of stored grain pests combined with a real-time imaging device. On this basis,...
Proceedings Article

A Simple and Fast Algorithm for Image Coding Based on SPIHT

Yiqun Zhang, Peijie Lin, Lijun Wu, Shuying Cheng
The complicate calculation and frequent comparison based on spatial orientation tree (SOT) structure in SPIHT severely reduce the coding speed. To overcome these shortcomings, a modified image compression algorithm is proposed without SOT. The algorithm sorts the wavelet coefficients in descending order...
Proceedings Article

Image Retrieval Algorithm Based on Convolutional Neural Network

Hailong Liu, Baoan Li, Xueqiang Lv, Yue Huang
With the rapid development of computer technology and the increasing of multimedia data on the Internet, how to quickly find the desired information in the massive data becomes a hot issue. Image retrieval can be used to retrieve similar images, and the effect of image retrieval depends on the selection...
Proceedings Article

An Improved K - Mode Algorithm for Facial Expression Image Clustering

Xibin Jia, Jianming Yuan, Yujie Xiao
When recognizing facial expression sequences by discrete Hidden Markov Model, it is necessary to cluster the image frames into several observation states. Considering the complexity of face images in emotion expressing, we partition the whole face into several sub-regions to do clustering separately....
Proceedings Article

Implementation of Virtual Visualization in Mountain Scenic Spots Based on Spatial Integration Technology

Sisi Lv, Weiquan Zhao, Wei Li, Weici Su
With the development of the tourism, tourism virtual visualization became the essential method to show the charm of scenic spots. Study on the integration technology of panoramic images, 3D GIS and cloud GIS to visualize the mountain scenic spots in order to meet the needs of travelers, the integration...
Proceedings Article

Using the Pattern Function of Angular Momentum Improve the Directivity of Binary Antenna Array

Jiangmei Tang, Bin Yao, Qinhong Zheng
Building solar power stations in space are concerned by international .In the process of electricity transmission to need to make the solar cell array always orient for the sun. The microwave beam of transmitting antenna must point to ground receiving antenna, which requirement the antenna has the very...
Proceedings Article

An Adaptive Ant Colony Algorithm for Classification Rule Mining

Xiaomeng Zhang, Wensheng Sun
Ant-Miner algorithm is a typical classification rule mining algorithm which can improve the classification accuracy and generate simple rules. However, it also has a few disadvantages, such as complicated computing method for heuristic factor, long calculation time, slow evolution and so on. Based on...
Proceedings Article

Research Semi-Supervised Learning via Kernel Function Method

Jianfeng Liu, Jia Lv
Recently, researchers focus on Graph-based semi-supervised learning, how to construct a graph and introduce kernel function into semi-supervised learning affect the effect of the algorithm, and mostly. This paper proposed a improved graph-based method and introduce kernel function into semi-supervised...
Proceedings Article

Text Similarity Based on Semantic Analysis

Junli Wang, Qing Zhou, Guobao Sun
One of the most important challenges in measuring text similarity is language variability: texts with the same meaning can be realized in several ways. A way to address the language variability is the notion of semantic similarity. This paper extracts the relevance of texts and terms through Singular...
Proceedings Article

Research on Patent Document Classification Based on Deep Learning

Bing Xia, Baoan LI, Xueqiang Lv
Science and technology can be called the first productive force of development, and the patent as an important source of science and technology innovation is getting more and more attention. With the increase in the number of patent applications, followed is patent document classification problem. At...
Proceedings Article

hi-RF: Incremental Learning Random Forest for Large-Scale Multi-class Data Classification

Tingting Xie, Changjian Wang, Yuxing Peng
In recent years, dynamically growing data and large-scale data classification research. Most traditional methods struggle to balance the precision and computational burden when data and its number of classes increased. However, some methods are with weak precision, and the others are time-consuming....
Proceedings Article

OLP Scheme on Backup Log and Hbase

Chao Feng, Baoan Li
As a non-relational database, HBase (Hadoop Data Base) is an open source data storage system based on column cluster and is applied wisely. The HBase will write the log file before the memory caches data, so the cache size and the writing speed of the log file have become two important factors affecting...
Proceedings Article

High-speed Data Long-line Transmission Modeling and Evaluation

Xiao Li, Bowei Zhang, Shaowei Li, Chaojie Wang, Fanling Kong, Zhichao Xue
In the field of aerospace, the amount of test data need to be transmitted is large, and the transmission is far. Especially when down sending the stored data, the code rate is as high as 200Mbps, and the data transmission distance is far, even up to several tens of meters. This paper presents a high-speed...
Proceedings Article

Segmentation Study of Aged Gait Based on FFT

Li Zhu, Yuchuan Wu, Shuangbao Ma, Shengfeng Qi
To study the rules and characteristics of the daily actions of the aged, a set of multi-sensor wearable device has been developed. As for the segmenting method of action data collected from the aged wearing this device, the human action sequence segmentation method has been proposed based on the motion...
Proceedings Article

Investigating Semantic Relationship between the Scene and the Sound within the Scene by Dynamic Causal Modeling

Xiaojing Wang, Junhai Xu
The purpose of the paper was to explore the dynamic information flow among brain regions, which took part in the perception of the semantic relationship between the scene and the sound of the object within the scene. 15 healthy volunteers were recruited to observe the 4 categories (32 subclasses) of...
Proceedings Article

An Empirical Study on Energy Disaggregation via Deep Learning

Wan He, Ying Chai
Energy disaggregation is the task of estimating power consumption of each individual appliance from the whole-house electric signals. In this paper, we study this task based on deep learning methods which have achieved a lot of success in various domains recently. We introduce the feature extraction...
Proceedings Article

The Application of kNN and SVM in the Decoding of fMRI Data

Fangyuan Ma, Junhai Xu
For the decoding analysis of functional magnetic resonance imaging (fMRI) data, the appropriate method for feature selection and classification algorithm was a core issue. Given the high dimensionality of fMRI data in whole brain, the localization of regions of interest (ROI) usually was used to select...
Proceedings Article

Research on Gombrich's Academic Affinitive Community Based on Data Mining

Jing Ye
From the knowledge exchange and influence angle, taking bibliometrics as the research methods, the author selected the journal papers which cited Gombrich academic literatures as the research object. Based on the literature data mining, this article described the academic affinitive relationships and...
Proceedings Article

Rethinking the Traditional "Faithfulness" after Deconstructing Centeredness

Chunhua Shen
Among many translation criteria, "faithfulness" principle is the most popular and widely accepted by Chinese and Westerners. Traditional translation criteria emphasize "faithfulness" which is regarded as the most essential principle in translation process and is also accepted by most translators. This...
Proceedings Article

Recognition of Stratum Lithology of Seismic Facies Based on Deep Belief Network

Guohe Li, Yang Zheng, Ying Li, Weijiang Wu, Yunfeng Hong, Xiaoming Zhou
The Deep Belief Network (DBN) is one of the major algorithms of deep learning. It simulates human brain to extract the features efficiently, so that the model has much strong learning ability. Because it is difficult to extract features from a variety of seismic data effectively, multiple sampling points...
Proceedings Article

Detecting System of Collecting and Exhaustion of Chemical Gas in Tank Car

Qing Li, Ligang Luo, Yeqing Sun, Xinhua Xia, Ge Shi, Muda Jin, Renyuan Tong, Zhipeng Zhao
In order to improve the progress of the tank car test , ensure inspector's personnel safety and save resources as well as reduce atmospheric pollution; This paper using a kind of explosion-proof valve which can be controlled by single-chip microcomputer to exhaust and collect the chemical gas in tank...
Proceedings Article

Agent-based Eight Wheel-legged Hybrid Wheelchair Control System

Dongxing Cao, Shanshan Liu, Chao Wang, Minfei Li
Eight wheel-legged hybrid wheelvhair robot motion is the process of multi-agent system collaborating work, in which each module can be viewed as an agent, such as frontal leg mechanism, latter leg mechanism, and seat position and orientation mechanism. Agent has the ability of sensing the environment,...
Proceedings Article

The Design and Realization of University E-voting System

Haibo Zhang, Shuyuan Shang, Wenfeng Zhai, Chunyan Zhang, Ying Zhang
There are many different ways to vote in university daily management process such as title appraisal, research assessment, post evaluation and so on. Due to the variety of voting methods, inconvenience of traditional paper ballots by statistic method and targeting of electronic voting system result in...
Proceedings Article

Design and Implementation of an Intelligent Enter-prise Email Filter Based on Service Plugins

Jing Zhang, Jianmin Yao, Ling Zhang, Qihua Zhang
An enterprise email filtering system is introduced integrating present business systems with service plugins, which connects the email and related business parts as office automation, cloud storage etc.. The user can fulfill his business-related process in the business system with personalized rules....
Proceedings Article

Water Saving Irrigation Monitoring Network Localization Algorithm Based on RSSI Ranging

Bo Chang, Xinrong Zhang, Baoguo Xv
In order to know the soil moisture status of farmland irrigation area, improve the quality of production, for the actual demand of water-saving irrigation monitoring node localization, a weighted centroid localization algorithm of water-saving irrigation monitoring network is proposed based on RSSI ranging....
Proceedings Article

Research on Meat Product Traceability System Based on Two Dimensional Code

Yanbai Wang, Lu Tan
Meat products safety related to the national economy and the people's livelihood, the relationship between the national health. Meat products in the breeding, slaughter, storage and sales process of real-time monitoring and the establishment of meat products safety traceability system is the main means...
Proceedings Article

Research and System Design of Traceability System for Food Safety

Yanbai Wang, Lu Tan
Now the food industry has become more and more customers as the center, so the need for faster response time to deal with food safety incidents. The current food labeling system does not guarantee that the food is authentic, high quality and safety. Good traceability system helps to reduce the production...
Proceedings Article

Online Monitoring of Three Dimensional Ledge Profile of Aluminum Electrolytic Cell

Zhengguang Xu, Liling Song, Mingsheng Ju, Yu Xue
A ledge of certain thickness will be formed on the side wall of the cell during aluminum electrolysis process, its formation has a very important role for the normal production of aluminum electrolysis. First a three-dimensional unsteady heat transfer model with phase transformation is established by...
Proceedings Article

Research of Ontology based Battlefield Scenario Generation Systems

Dongsu Jeong, Dohyun Kim, Yoonho Seo
In battlefield, it is very difficult to consider all conditions such as various battlefield environments & factors. Thus, Friendly forces should satisfy battle tactics, weapon systems and other multiple conditions by responding immediately to battlefield situations. Therefore, in order to suggest the...
Proceedings Article

An Automatic Anti-Attack Scheme for MySQL Database

Qiao Sun, Lanmei Fu, Weihao Qiu, Jiasong Sun
Because of the high-speed, multi-user and multi-thread characteristics of MySQL database, it becomes one of the most popular open-source database. With the rapid development of network technology, SQL attacks against MySQL is also growing, and its security had been paid more and more attention. Due to...
Proceedings Article

Creation of Uyghur Off-Line Handwritten Signature Database

Ahat Yimin, Zulpiya Gheni, Mahpirat, Yunus Aysa, Kurban Ubul
Until now, there has not been any major international effort that aims at comparing different signature verification methods systematically. However, most of the disclosed handwritten signature database is based on Latin, Chinese, Arabic and other languages. So creation of Uyghur off-line signature database...
Proceedings Article

Improving Fault Localization through Fault Propagation Analysis

Zhimin Fang, Danni Li, Shifei Chen, Rong Chen
Lots of studies have been done to pinpoint program faults almost to the exact line where different types of abnormal behaviors occur. Among them there is the promising testing-based fault localization (TBFL) technique, the aim of which is to locate the faults in the program automatically when the program...
Proceedings Article

The Technique to Design Sharing Maintenance Resources among Maintenance Modules

Bo Zhang, Ying Xu, Fusheng Liu, Shouhua Chen, Ying Shen
To promote modularized maintenance force building, the reasons to share resources among maintenance modules and the standards to design share resources are analyzed, based on the kinds of classification result of maintenance modules. The technique and process to design sharing resources are researched,...
Proceedings Article

Research on the Continuous Use Intention of Government Portals Based on Grounded Theory

Zhiwei Tang, Jing Tan, Zepeng Gong, Xiao Han, Seth kwame sakyi Arthur
Since the first investigation of government websites in our country in 2015, problems such as low utilization rate and poor content construction have appeared. To solve the realistic problems and make up on the previous studies, this paper, based on grounded theory, discusses the factors influencing...
Proceedings Article

Trusted Software Behavior Monitoring Model Based on Agent

Caimao Li, Shaofan Chen, Hanwei Wu, Jing Chen
This paper studies trusted model for software behavior monitoring Based on agent. First, it put forward a trust monitoring software behavior framework, then analyzed the dynamic proxy monitoring mechanism, built a dynamic proxy monitoring model based on AOP. Finally, this paper analyzed the monitoring...
Proceedings Article

An Improved Scheme of Privacy Preserving Based on Lagrange Interpolation in Cloud Storage

Yu Jin, Yadan Wang
The increasing maturity of cloud computing has led many companies to store critical information in the cloud. The privacy preserving in the cloud storage still remains major concern because the management of the data might not be fully trustworthy. Privacy preserving brings in concern for data confidentiality....
Proceedings Article

Improved Collision Cryptanalysis of Authenticated Cipher MORUS

Tairong Shi, Jie Guan, Junzhi Li, Pei Zhang
MORUS is an authenticated stream cipher designed by Wu et al. and submitted for the third-round of the CAESAR competition. The collision properties of MORUS-640-128 are studied. We propose the necessary conditions for an internal state collision after two-step update, i.e., the Hamming weight of the...
Proceedings Article

Secure QR Code Scheme Based on Visual Cryptography

Xiaohe Cao, Liuping Feng, Peng Cao, Jianhua Hu
With the wide application of QR code, the security problem of QR code is serious, such as information leakage and data tampering. In order to solve the QR information security problem, this paper proposed a secure QR code schema based on visual cryptography. The QR code is divided into two share images...
Proceedings Article

Standard Grey Potential and Its Application in Grey Target Decision

Aiqing Ruan, Xiaoyong Yin, Qiu Chen, Yinao Wang
Grey target decision-making is one of important problems of decision-making theory. It is critical to express uncertain information effectively and depose them in reasonable and simple way. Firstly this paper makes a brief overview of the existing method for Grey target decision. Then the conception...