Proceedings of the 2012 National Conference on Information Technology and Computer Science

+ Advanced search
271 articles
Proceedings Article

Application of Ant Colony Algorithm in Fingerprint Identification System Based on Internet of Things

Zhigao Chen
The Internet of things is a network which connected to objects through the Internet, internet was treated as the foundation and the core ,by which the most date transmission is wireless information and intelligent processing information, in this situation for one thing ,the social efficiency can greatly...
Proceedings Article

Research on Lash-up Maintenance Technology of Engineering Equipment

Ming Zhang, Zhongfeng Shi, Chunyu Dou, Tao Fan
Abstract The theory frame of lash-up maintenance technology of engineering equipment is brought forward from the point of view of lash-up maintenance theory, which include fault diagnosis and survey technology, damnification evaluation theory, damnification repair technology, lash-up maintenance effect...
Proceedings Article

The Research of Future-Market-like Supervision of the Exchange of Cultural Products and Artworks

Chunxu Liu, Wenzheng Shang
As an innovation of the trade of Cultural products, the Exchange of Cultural Products and Artworks makes the market of cultural products more prosperous, but there are also some problems. Through analysing the characters of the Exchange of Cultural Products and Artworks and the trade model of the cultural...
Proceedings Article

Applicability Evaluation to Capital Asset Pricing Model

Xinzhu Li
The Capital Asset Pricing Model (CAPM), proposed by Professor William. F. Sharpe, a Nobel Prize winner in economics, is considered to be the backbone of pricing theory in modern financial market. The model is simple and practical, and mainly adopted in researches on the relationship between the expected...
Proceedings Article

The Innovative Study of Jilin Province's Urban Integration Development

Tieyu Liang, Chunjing Ma
As a big agricultural province, Jilin Province has a large agricultural population and agricultural land. In the process of urban integration, it is of great significance to solve the problems of migrant workers as well as land for promoting the healthy development of urban integration in Jilin Province...
Proceedings Article

The research of Online Transaction Risk in Service Provider to Consumer

Yao Yao, Liang Feng, Kailin Xu
Today, as the external environment of the internet tends to mature, the consuming service based on the family life will be the main part of the E-Commerce in China. It affects the development of the industry, and also changes and affects users spending habits. This article investigates the transaction...
Proceedings Article

Innovation of Emergency Management Estab-lishment of New Mode for Holographic Com-mand and Collaborative Work

Liangyan Jiang
Holographic command and collaborate work are the breakthrough to traditional emergency management mode. Holographic command, as a kind of all weather, three dimensional and information-shared network interactive command platform, consists of sound, image, data and is featured with comprehensive, information-shared,...
Proceedings Article

The Market Competition, Law Enforcement, and Banking System's Efficiency in China

Yu Xia, Xianliang Tian
In economic literature, the benefit of competition is well recognized, for example, it could reduce monopoly rents and cost inefficiencies, and finally improve the welfare of the economy. In the case of banking system, the market competition in banking sector could improve efficiency of the banking system...
Proceedings Article

Mutual Authentication Scheme for Muliti-server Environment Without Using Smart Cards

Jiayu Wang, Fangping Deng
To authenticate a remote user over an insecure channel, which widely deployed in e-commerce, e-government, information security, business management and many more, we propose a scheme without using smartcards. Due to the elliptic curve discrete logarithm problem, the proposed scheme is safe and efficient....
Proceedings Article

Research on Data Acquisition and Signal Processing of Fault Diagnosis System for Electromechanical Equipment

Yan Qin, Ming Gu
Data acquisition and signal processing is the basis of condition monitoring and fault diagnosis system for electromechanical equipment.The paper analysis the general technology of data acquisition and signal processing used in fault diagnosis system,A portable equipment of motor fault diagnosis is designed...
Proceedings Article

Spatial Structural Characteristics of Chinese Railway Passenger Network Based on Complex Network Theory

Xuejing Gu, Dewei Li, Lu Qin
The railway network provides transport services for clients, it is very important for railway managers to analyzing the spatial structure of the network. This article analyzes the spatial structure of Chinese railway network with indicators of degree distribution, the clustering coefficient, the average...
Proceedings Article

Comparative Study on Knowledge Transfer Among Different Networks: a Social Capital Perspective

Shouxian Liu
This paper examines how social capital dimensions of networks affect the transfer of knowledge between network members. There are different characteristics of social capital among three network types: MNCs, strategic alliances and industrial clusters. Based on comparing dimension of social capital among...
Proceedings Article

Banking Efficiency, Law Enforcement and Chinese Provincial Economic Growth

Yu Xia, Xianliang Tian
The body of literature about institutes efficiency is mainly fallen into the field of microeconomics, even though in theory, the efficiency could be related to economic growth. This paper tries to fill this gap by examining empirically the relationship between banking sectors efficiency and provincial...
Proceedings Article

Empirical Analysis of the Relationship between Or-ganizational Culture and Organizational Performance

Zhipeng Zhang, Xiancheng Zhu
This article uses empirical research to analyze four types of organizational culture on organizational performance, the results show that: adhocracy culture and market culture have a positive impact on financial performance and market performance, clan culture and hierarchy culture have a negative impact...
Proceedings Article

On the Impact Factors for Mining Enterprise Choos-ing Investment Position Abroad

Maoping Zhou, Mingzhen Xu
Mining enterprise investment is characteristic of long period, big size and fixed area. Resource, polity, law, economy environment and social culture of the host country should be taken into account when choosing place for offshore fund.
Proceedings Article

Analyze on GEO Satellites Output Power Variation

Jun Zheng, Hong Chen
Solar arrays are the main source of energy used at present onboard satellites. Their energy resources largely determines the time of active life of on-orbit satellites. This paper sets up the output power variation model of solar arrays from the telemetry of three-axis stabilized GEO satellites made...
Proceedings Article

Data Acquisition and Processing of Electronic Compass for Mobile Robot Autonomous Navigation

Jingwei Qin, Yimu Guo, Miaolei Zhou
Electronic compass is a kind of absolute sensor that can measure the azimuth by use of the earth's magnetic field. Electronic compass is widely applied in mobile robot autonomous navigation. An electronic compass applied to a certain kind of out-door mobile robot is introduced in this paper. Data format...
Proceedings Article

The Application of Grey Fuzzy Comprehensive Evaluation Method in Distribution Center Planning Scheme Optimization

Jingjing Jiang, Xiaoyu Wang, Tingbin Chen, Xiangwei Mu
At present, the planning of distribution center is a very important step before the construction. Therefore, how to choose the optimal plan in the process of the planning of distribution center has already become an important research topic in logistical system. In this paper, Grey Fuzzy Comprehensive...
Proceedings Article

WBS-based Risk Identification for the Whole Process of Real Estate Project and Countermeasures

Lei Su
The real estate industry is high-risk typically. Real estate project itself has the characteristics of large investment, long cycle, complicated construction technology and susceptible to environmental interference etc. Therefore it is a critical process to identify types and causes of risks, strengthen...
Proceedings Article

The Study of Development Pattern of Micro-Blog Combined with E-commerce

Lei Liu
In this paper, the author discussed the development pattern of Micro-blog combined with E-commerce. The feasibility of combination between both was analyzed. This paper pointed out e-commerce providing innovative profit model and development power to Micro-blog, and E-commerce enterprises can apply the...
Proceedings Article

Bayesian Methods with Application in Risk Analysis

Dongyang Ding, Xiyang Liu
In risk analysis, Bayesian methods are more adaptability and flexibility than traditional methods when be used to construct decision framework, estimate risk distribution and parameterize model, but has shortcomings at the same time. Robust methods make up some limitations of Bayesian methods, the analysis...
Proceedings Article

Credit Risk Transfer and Financial Stability: A Survey

Lili Zhou, Qing Chen
The relationship between credit risk transfer and financial stability were reviewed from two perspectives of the individual banks and financial system in this paper, in which focusing on the instruments of credit risk transfer and the incentive to monitor loan, as well as the differences of measurement...
Proceedings Article

Analysis for the Free E-Commerce Pattern

Anbao Wang, Haoran Xing
Nowadays, when free trial has become a powerful marketing measure, it is possible that we may experience a free lunch. This paper analyzes the free economic pattern, free economic pattern has made an attempt in early 20th century, and free has gradually impelled a consumption revolution. It is the direction...
Proceedings Article

Design and Integration in E-Commerce Website Based on Framework Technology

Anbao Wang, Jie Xu
With the rapid development of network technology, the Web applications are used more widely, and the higher requirements on the Web system has been pursued by many people. The web applications should become more simple and convenient; also it requires some new internal adjustments in the Enterprise....
Proceedings Article

Management System of Teaching Resource Based on SSH Framework

Liangtao Yang
According to the brief introduction of the three frameworks----Spring, Struts and Hibernate, the paper constructs a teaching resource management system by using SSH framework based on J2EE. Such a system architecture reduces the coupling system code and improves system maintainability and extensibility.
Proceedings Article

Research on Measurement of Mass, Centroid and Eccentricity of Large-scall Axisymmetric Body

Gang Lu, Aijun Zhang, Changming Wang
Pointed at low-precision of measurement of mass and centroid of large-scall axisymmetric body, measurement method is researched. After comparing, three-point method is adopted to design this system, and error is analyzed and compensated. According to experiments, measurement system has high-precision,...
Proceedings Article

Research on the Knowledge Management Based on GIS

Minghai Luo
Knowledge management is to collect, organize, process and transmit the information and provide effective means to make use of the information fully. The development and application of GIS and internet technology will import the bran-new concept for the knowledge management, promote the knowledge management...
Proceedings Article

The Main Method of Digital Mine Map

Lingling Han
mining map digitizing of various types of coal mining map digitizing processing new technology, is to establish a modern mine enterprise's essential condition and basic construction. Around the mine map digitization concept, put forward five kinds of digital mine map method and its application conditions,...
Proceedings Article

A Brief Analysis on Building and Enhancing the Property Management Enterprises Core Competitive Power

Yang Liu
Building and enhancing core competitive power is the necessary way for property management enterprise to achieve sustainable development. In this paper, author understand and grasp deeply about the concepts and features of property management enterprise's core competitiveness, think that the way building...
Proceedings Article

Pricing Benchmark of Empirical Research for Commercial Real Estate Development Project

Kun Yan
Rent of shops is inversely proportional to the distance from the central business district, and is proportional to the quality of the shop itself. This article take a shopping mall project case which is developed by the estate company in Xing Ping District, Xian Yang City as the example, described the...
Proceedings Article

Design and Implementation of Graphical User Interface of Digital STB

Rong Fang, Meng-shu Hou
regards the development of a digital Set-Top-Box(STB) as the background, through an understanding of developing environment of graphical user interface 'GUI', To have a general design of STB GUI system'and To realize the STB GUI, and give a realized example of building an GUI under this system.
Proceedings Article

Target Characteristic Fusion Recognition Based on D-Sevidence Theory

Xinjun Tai, Jianrong Lu, Dongsheng Zhang
D-S evidence theory is an important target fusion recognition in the characteristic fusion level. With a strong theoretical basis, this method can deal with not only the uncertainty caused by random but also the ambiguity caused by uncertainty. In this article, after the RCS (radar cross section) and...
Proceedings Article

An Extended Algorithm based on PlayFair Cipher

Yanhong Shang, Lilei Lu
This article proposed an improved solution to Playfair cipher algorithm. The algorithm extended former encrypting form from digram to integrated three letters. In this article the authors presented the improved encryption algorithm and finished its program in C programming language. At the end of the...
Proceedings Article

Analysis of Software Capability Maturity Model'CMM'

Luhua Zhao
CMM software process management and control systems approach, which provides software process improvement guidelines for software process assessment provides a basis. In this paper, the CMM concept and the overall framework in detail, the last of the CMM the problems outlined.
Proceedings Article

Consideration on Strengthening the Career Planning Education of College Students in China

Hongmin Liu
In the present situation of growing employment pressure for Chinese college students, to strengthen the career planning education has a great significance on enhancing the employment competition ability of college students. Based on analyzing the practical significance of career planning, this paper...
Proceedings Article

CRM Pricing Research of China's Inter-bank

Guiyun You, Siying Han, Zheng Liu
Credit risk mitigation (CRM) is an effective mean for bank's credit risk transformation. Buying CRM can reduce bank's capital requirement, and meet Basel regulatory agreement effectively. China's implementation of CRM will help improve the credit risk-sharing mechanisms, solve the "paradox of credibility"...
Proceedings Article

Using PCA to Evaluate Computer Network Security

Yunlong Zhang, Yong Hua
The principal components analysis (PCA) is a multivariate statistical tool which brings the multi-dimensional factor into the identical system to carry on the qualitative and quantitative research. The theory is relatively complete. This paper applies the PCA method into the synthesis evaluation of network...
Proceedings Article

Application of ID3 Algorithm in Information Asset Identification

Yong Hua, Yunlong Zhang
In the issue of information security risk evaluation, the asset, the threat and the vulnerability are the three most important elements. Information asset identification is a primary link of information security risk evaluation process. In this paper, the decision tree algorithm was applied into the...
Proceedings Article

Problems and Countermeasures of The Migrant Workers Becoming A Member of The City

Wenhua Kong
Migrant workers becoming a member of the city is a typical three rural issue, it is related to China's social transformation and changes in social structure as well as the construction of socialist modernization with Chinese characteristics
Proceedings Article

Curriculum Development and Practice Research of the Course The Project of Object Oriented Programming

Wenrong Jiang, Min Liu, Jihong Yan
Teaching is an essential part to determine personnel training, teaching quality and teaching level of the university. Curriculum development is an important part of teaching infrastructure. For features and status of The Project of Object Oriented Programming and experience of curriculum development,...
Proceedings Article

Analysis of coal production automation system

Lingling Han
The coal industrial transformation degree of relationship to the national level of development of productive forces, the automated construction of the coal industry is becoming a trend, the use of automated innovative technologies, energy-efficient equipment, computer-aided technology enables the construction...
Proceedings Article

Study on Evaluation of Logistics Enterprise Informationization Performance Based on the Theory of Fuzzy AHP

Li-bo Zhang, Xiao-bo Wang
This paper constructed an evaluation model for the logistics enterprise informationization of their own, based on the study of status and evaluation of logistics enterprise informationization performance. Comprehensively evaluated the model by AHP and Fuzzy and then proved the model's availability with...
Proceedings Article

Optimal Decision of M/M/C(m) Queuing System

Xiaomin Zhao, Junjun Gao, Yihua Wei
To study the M/M/C(n) queuing system in which a sever can service multiple customers at the same time, the stability equations is constructed, by which the stability probability is solved, and then some system operation indexes are obtained. Furthermore, based on those operation indexes, the number of...
Proceedings Article

The Framework of Remote Sensing Image Map Service on Hadoop

Junfeng Kang, Zhenhong Du, Xiaosheng Liu
Through completely discussing the data storage strategy on Hadoop, and analyzing the characteristics of remote sensing image map service , we designed a framework of remote sensing image map service on hadoop.
Proceedings Article

Design of Purchase-Sales-Inventory Business Software Based on Excel

Shunjin Wang
Purchase-sales-inventory software is a common tool of small business enterprise information and can be designed by using Excel. This paper focuses on the idea of fool business software design with Excel sequence, record pointer and ActiveX control, and introduces the skills in invoking development tool,...
Proceedings Article

Utilizing Service Science to Construct Green Printing Industry

Hejie Chen, Xiaozhang Huang
The Green printing has the followed three characteristics: the lower environment impact, the less pollution, saving resources and energy of the printing. Many printing produces are deserted in china every year. With the development of IT technology and communication technology, digital printing appeared....
Proceedings Article

Evaluation Research of Telecommunications Industry Knowledge Transfer Based on the Analytic Hierarchy Process

Gongyi Zhang, Zhuoyi Wang, Lihong Sun
To develop appropriate knowledge transfer strategy for China's telecommunications industry, the paper evaluates the status of the telecommunications industry knowledge transfer and establishes evaluation index system. Based on the AHP, the paper summarizes and analyzes the Telecommunications Industry...
Proceedings Article

A New Method of Self-Adapted Learning Mechanism Based on Neural Network

Hua Hu
This paper describes a new method to neural network model based self-adapted learning mechanism for deriving a complex system. This Learning scheme is organized based on a multi-agent-based self-adapted learning method as well as a multi-agent-based self-adapted method, while an Neural Network Decision...
Proceedings Article

Using Sensor Network to implement Mental Factor Analysis and Evaluation

Wen yan Wang
Effective and rapid mental disorder evaluation under emergency is the basis to carry out Mental Disorder Intervention (MDI). In this paper, based on existing research, a index system to evaluate the state of Mental disorder is established and the index system is simplified by the model integrated factor...
Proceedings Article

Using Network Concept Method and Data Mining Techniques to Implement Self-realization and Happiness Factor analysis

Wen yan Wang
This paper is achieved by means of the method of Information content Inclusion Relation-IIR and Data mining techniques. We present what an IIR is, and how IIR can be identified from both a concept and a database, and then reasoning about them. Data mining techniques and tools are developed for finding...
Proceedings Article

A Novel Algorithm for Predicting '-barrel outer Membrane Proteins using ACO-based Hyper-parameter Selection for LS-SVMs

Guangming Xian, Biqing-Zeng Xian
An ACO-based hyper-parameter selection for least squares support vector machines (LS-SVMs) was trained to predict the topology of transmembrane ' strands proteins. It should be stressed that it is very important to do a careful model selection of the tuning parameters for LS-SVM. In this paper, a novel...
Proceedings Article

An Effective SALS Image Denoising Method based on 2-D Discrete Wavelet Decomposition

Guang-ming Xian, Bi-qing Zeng
This paper describes an effective small angle light scattering (SALS) image denoising method based on 2-D discrete wavelet decomposition. The phenomenon of small angle light scattering has been applied to giving information about transparent structures on morphology. The potential of using SALS to probe...
Proceedings Article

A Research of USB Device Redirection Mechanism over IP network in Desktop Cloud System

Yi-min Zhou, Hui-hui Guo
As most existing device sharing technologies are only abstract operations sharable, such as read and write, virtual desktop users can't share the device-specific characteristics of USB devices attached to cloud terminal. In this paper, we propose USB device redirection as a peripheral bus extension over...
Proceedings Article

The Research of Web Information Retrieval based on Temporal Information

Zhe Wang, Chenggang Xu
Temporal information is an essential attribute of the web pages, such as the publish time and the content time in the web pages. However, the major search engine hasn't more view on the temporal information of web pages,and ignored the relationship between the keywords and time phrases.In this paper,...
Proceedings Article

The Role of Software Architecture and Trusted Computing in Software Design Guiding Principles and Quality Assessment Standard

Mingguang Dioa, Tao Xue, SenZhong Zou
In software engineering, software design guiding principles and quality evaluation standard is not only an important theoretical problem but also a very practical problem. Against to some inappropriate dissertation in the popular textbooks, we put forward that the rationality of software architecture...
Proceedings Article

Study on Internet of Things application for Highspeed Train Maintenance, Repair and Operation (MRO)

Weijiao Zhang
the design of EMU IoT-system, which is oriented to the MRO of high-speed trains, was studied with implementations of sensing technologies like RFID, sensors, etc; with regarding to the future requirements of safety, orderly, efficient and high-quality in EMU maintenance service of China. In operation:...
Proceedings Article

Existence, Uniqueness for Stochastic forest Evolution

Yinlu Gu, Qimin Zhang, Zhenzhen Song
This paper introduces random perturbations into the established system of stochastic forest evolution, and studies the system of stochastic forest evolution in Hilbert space, at the same time, using Kolmogorov's inequality and Burkholder-Davis- Gundy's inequality, analyzes the existence uniqueness of...
Proceedings Article

A Sequential Circuits Test Set Generation Method Based on Ant Colony Particle Swarmalgorithm

Xin Fu, Shuai Fu
There exists a lot of trigger unit in Timing circuit, and this leads to high computational complexity in its initialization and test set generation for deterministic method. This paper presents a timing circuit initialization and test set generation method. In the proposed method, a particle swarm algorithm...
Proceedings Article

Random Time Slot Assignment for enhancing wireless security in Multi-User SISO Systems

Guang Jin, Tiantong Zhang
Considering a multi-user SISO system, a random time slot assignment scheme is proposed for enhancing wireless security. For each time slot, single antenna transmitter selects a user randomly. Signals of the intended user are pre-processed before transmitting using known wireless channel state information,...
Proceedings Article

Research on the Construction of an Internet-based Database for Spoken English Testing and Teaching

Tiezhu Jin
The paper concerned starts with the literature review on spoken English teaching in the College English program, in particular weaknesses in college spoken English teaching, in the light of College English Teaching Requirements. It continues with discussions from scholars over spoken English teaching...
Proceedings Article

Integrated Marketing Strategy in New-media Era

Shao-Zhen Yang, Xiu-Yan Feng
With increasing popularity 3G and WIFI, smart phone users are more and more, Mobile Internet has achieved rapid development in China. The entire network media has entered a new-media age. This provides businesses with more opportunities to improve their marketing and profitability. The integrated marketing...
Proceedings Article

A SLNR-Based Precoding Scheme for Multi-Stream Multicasting Systems

Guang Jin, Bing Cao
The problem of wireless security for the downlink of multi-stream multicasting MIMO systems overheard by multiple multi-antenna eavesdroppers is investigated. We assume that the transmitter has perfect knowledge about the channel to desired users and the eavesdroppers. An efficient secure precoding scheme...
Proceedings Article

Construction of WSN Based on Polynomial Node Capture Attack and Defense Methods

Hong Gan, Dan Pan
Wireless sensor network ( WSN ) in the presence of node capture attack, put forward a kind of node capture attack detection method of defense, the method based on polynomial in two variables will be node key information and node deployment time and identification for binding, when negotiating session...
Proceedings Article

Construct a based on Mealy!The Meaning of the Machine Process Validation Method

Hong Gan, Dan Pan
semantic validation is bound semantics and semantic programming language software development problem. To solve this problem, in this paper introduces a kind of semantic Web services based on semantic programming language SPL and its knowledge base business domain ontology ( BDO ) foundation, proposed...
Proceedings Article

A New Kind of File Uploading of LIMS Based on VB.NET

ZhuoMa CaiRang, Chenghui Yang
At developing of website always come across some problem of file uploading .There are very complication to use some scripts dealing with this problem. In this paper we introduced a way of uploading file which edited with VB.NET. We emphasized to discuss the theory of uploading file which edited by VB....
Proceedings Article

A Research of the Development of VME Bus in VxWorks

Yi-min Zhou, Jun Wang
Based on the principle of the VME bus and combined with lithography machine control system, This paper briefly introduced the development of VME bus under VxWorks operating system, including the bus address space allocation and interrupt setting method. VG5, VME bus master board, is GE Fanuc's high-performance...
Proceedings Article

An Event-driven Cooperation model of Information Appliances in the Intelligent Home

Hua Peng
In the current system of the intelligent home, it control information appliances with the sole mode, can not realize the cooperation between of them, its intelligence can not get sufficient play. Based on the principle that the cooperation of information appliances are often event-driven, in this paper,...
Proceedings Article

Plant Simulation Research Based on GLSence

Yun-Kai Huang, Fang-Cheng Liu
Firstly, some present methods of plant simulation are briefly discussed. Then tree simulation program developing processes are put forward which take Delphi7 as the software developing tool and are combined with module database of GLSence. An example is given to explain the way that GLSence module database's...
Proceedings Article

Multi-rope Hoist Steel Rope Tension On-line Monitoring System

Jian Liu, Yuan-xiang Liu
A multi-rope hoist steel rope tension on-line monitoring system is introduced in this paper, which consists of hydraulic sensors, data acquisition and sending devices, wireless communication devices and IPC. This system monitors the tension of multi-rope hoist steel ropes, in order to get the actual...
Proceedings Article

The Application of Digital Technology in Ceramic Cultural Relics Restoration

Yanni Wang, He Zhang
Digital technology has a significant advantage in the application of cultural relics protection and restoration. Based on the theoretical foundation, the thesis analyzed the utilization of modern digital simulation technology, and explored the improvement of ancient ceramics cultural relics restoration....
Proceedings Article

Application of Optimized Combination Method to Financial Risk Forecasting for Listed Companies

Shuang Zhang, Qing-he Hu
In a market economy, the competition among enterprises is becoming fiercer. Examples of declaring bankruptcy have become common. Financial risk is predictable, so it is of great practical significance for listed enterprises and the stakeholders to establish an effective financial risk forecasting model....
Proceedings Article

Research on the Prediction Model of Total Agricultural Output Value based on Wavelet Neural Network

Jin-yue Liu, Bao-ling Zhu
This paper proposes a prediction model of total agricultural output value based on the wavelet neural network, and presents the model structure of network and learning algorithm to train network using the gradient-descent algorithm with the momentum, and then conducts a prediction for our country's total...
Proceedings Article

Boosting MBR based kNN Search over Multimedia Data by Approximate Pruning Metric

Shuguo Yang, Chunxia Li
MBR (Minimum Bounding Rectangle) has been widely used to represent multimedia data objects in R*-Tree family indexing techniques. In this paper, in order to improve the performance of kNN searching over multimedia data, we propose an approach to reduce the computation cost of MINMAXDIST by using its...
Proceedings Article

Acoustic Analysis of Standard Arabic Plosives

Yasheng Jin, Li Ma
This paper has used the research theory and method of experimental phonetics and Speechlab software (Peking university) and Matlab voice analysis platform to analyze and describe the standard Arabic plosives though the atlases such as wave pattern'broadband sonogram'amplitude curve and logarithm spectrum...
Proceedings Article

A Mobile Table for the Communication in IPv4/v6 Mixed Networks

Zheng Xiang, Zhengming Ma
IETF has specified Mobile IPv4 and Mobile IPv6 in RFC3344 and RFC3775 respectively, but not yet discussed Mobile IPv4/v6 in any published RFC. This paper proposes a scheme to solve one of Mobile IPv4/v6 problems which Home Agent (HA) is located in IPv4 network, Correspondent Node (CN) is located in IPv6...
Proceedings Article

Using Skin Color and HAD-AdaBoost Algorithm for Face Detection in Color Images

Li-Jie Xue, Zheng-Ming Li
Owing to the interference of the complex background in color image, high false positive rate is a problem in face detection based on AdaBoost algorithm. In addition, the training process of AdaBoost is very time consuming. To address these problems, this paper proposes a two-stage face detection method...
Proceedings Article

Attendance Technology on Campus Research and Application

Li Jiang, Yan Li
The phenomenon of cutting a class is increasingly more serious in university, leading to a lot of universities begin to strengthen the daily management for students. The students of class attendance is the most common method. This paper introduces some management can be used in the technology in classroom...
Proceedings Article

The Research On Building a Price Model for Urban Commercial Land Evaluation

Bing Bu, Thanakrit Gu
This essay concludes, on the basis of the theory of the increase in land value and the supply-demand curve of China's market, the incorporation of the new concept of benefit equilibrium baseline. Through comparison of earlier real estate market and land prices, analysis of urban commercial land prices...
Proceedings Article

A Study on Platform Construction of Automobile Industrial Innovation

Quan-ying Qiao
The fulfillments of automobile industrial innovation practices confirm that automobile industrial innovation platform plays more and more important roles. This paper studies connotation, structure and construction of automobile industrial innovation platform. An automobile industrial innovation platform...
Proceedings Article

A General System Design and Implementation of SQL Injection Precaution

Xin Fang, Wei Fang
SQL injection attack is very easy to implement intrusion detection, Attacker through the webpage address into the entrance, constructs a SQL statement, illegal access to the web resources. This paper introduces the SQL is injected into the formation reasons, SQL injection methods, to prevent SQL injection...
Proceedings Article

Theoretical Investigation on the Resonance Effect in the Acoustics

Chuan-mei Du, Ming-xu Zhang, Ying Xu, Xiu-quan Ni, Heng-linag Zhou
In this paper, the resonance interaction at the acoustic vibration caused by the inharmonic vibration is discussed. Based on the perturbation theory, the influences of the resonance interaction between the two and three vibrant levels on the level energy, wave-function, and the spectral line intensity...
Proceedings Article

A Data Mining Method on Software System Layer

Yonghui Liu, Yanhui Wang, Yinan Hu
This paper puts forward a data mining method on software system layer which is based on researches on clustering data mining. At first, this method gathers all kinds of software data. Then it extracts characters from them to mark softwares on Halstead software science. Thirdly, it classifies the softwares...
Proceedings Article

A Proposal for Automatic Diabetes Food Information Display with Mobile Phone

Jing-sheng Hu, Kun Peng, Mei-kui Zhang, Ya-bin Li, Chen Jiang
Dietary treatment is the basic therapy for diabetes, but how to do the right food intake is the biggest discouraging problem. We present a proposal for mobile phone diabetes food information display which can help determine the food composition and calories automatically from the clinical point of view...
Proceedings Article

A Distributed Network Fault Diagnosis Platform based on Web Services

Bo LI, Guo-min Zhang, Xiang-lin Wei, Ming Chen, Bing Li
Large-scale network services bring great challenges to fault diagnosis, which include the unpredictability of the fault, the difficulty of collecting the fault information, high cost and technical complexity of diagnosis system deployment. To address these challenges, a web services-based distributed...
Proceedings Article

A Study On Data Mining Algorithm Gragh-based

Qiuyu Tang, Yifan Tang
In computer science, graph is one of the most complex data structures. But graph can be used in research and in bussiness because of its intuitive expression. It is a focus in data mining how to derive the interesting subgraph patterns from a great number of graphs. This article introduces a data mining...
Proceedings Article

Research on Generalization of Patch in Water System of Land Use

Zhe Tang
In this paper we discussed the problems about water elements generalization in Cartographic Generalization, It includes some methods about the selection and simplification in the water elements generalization, extracting the axis-line of river, and the generalization of land use patch. At last, we design...
Proceedings Article

Design and Realization of Nature Language Processing in The Application of Computer-assisted Teaching

Xianming Meng, Feng Kong
with the development of computer technology, computer-assisted teaching has become an important aspect in modern education application. More and more educational software plays a major role on helping people learn the language. In this paper, we combine natural language process technology to multimedia...
Proceedings Article

Modeling for Nonlinear Series Prediction based on the Support Vector Machine Theory

Dao-wen Liu
In order to improve the prediction accuracy, applies the Support Vector Machine (SVM) theory to the prediction of the Nonlinear Series. Based on the analysis of the basic theory for the prediction, adopts the Cross Validation method to choose the best parameters and then establishes the prediction model....
Proceedings Article

Research on Pupil Center Location Based on Improved Hough Transform and Edge Gradient Algorithm

Dewu Chen, Junnan Bai, Zhiyi Qu
According to the poor efficiency of the traditional Hough transform algorithm to detect the pupil center, this paper proposed an edge gradient algorithm, which combines with improved Hough transform algorithm to detect the pupil center. At the beginning, a modified Hough transform algorithm was used...
Proceedings Article

Design and Implementation of the Defense Contract Management System based on B/S structure

Tianming Huang, Chao Xie
The defense contract management manual work involving multiple departments and multiple content, low efficiency and error-prone. Based on the characteristics of the defense contract management business, design and development of a defense contract management system. The system was developed based on...
Proceedings Article

Planning and Designing of Letters and Calls Management System Based on E-government

Zhenhua Xie, Chunlin Deng, Kai Zou, Bo Zhou
Based on analysis of Chang-Zhu-Tan area online letters and calls problems, by letters and calls management system as the research object, with electronic government network and service concept to provide support, to enhance the government and the public communication level, strengthen supervisory, and...
Proceedings Article

Research on Security Issues of RFID Technology in IOT

Hong-ying Jin, Min Tian
With the global development of IOT, people are more worried about their personal information security issues. Through the analysis of security problems, this paper introduces symmetric grouping algorithm DES to encrypt the data between tags and readers based on Hash-Lock protocol,. In order to reduce...
Proceedings Article

Method of Key Rating Ascertainment for Space Software based on Fuzzy Synthetic Evaluation and Quantitative Fault Tree Analysis

Yang Li, Kefei Song
Software key rating ascertainment is very important in development of space software. It can guide manager develop the congruent software using the optimal benefit-cost ratio in management. It can also provide the direction in software measurement, and help designer improve system reliability finally....
Proceedings Article

The Algorithm for Unstructured Road to Abstract Road Surface based on Color Feature

Xintian Cheng, Zhenmin Tang
Visual navigation of mobile robots is an important issue in the field of computer vision research. For the characteristics of unstructured roads, in this paper, we use color feature and space information to solve this problem. First, compress color space of color image containing unstructured road to...
Proceedings Article

Modified PFA with the Azimuth Resampling in Post Fourier Transformed Data Domain

Lu Liang, Pan Li
The polar format algorithm (PFA) is the most popular way for spotlight synthetic aperture radar (SAR) image formation and is still attractive nowadays. Conventionally, the algorithm is carried out sequentially as a range resampling, an azimuth resampling, a Fourier transform (FT) in azimuth, and an FT...
Proceedings Article

Characteristic Parameter Estimation of Internal Waves Based on Pitch Arc Fitting and HHT

Jie Chen, Jifeng Yang, Biao Chen, Suqin Xu
In this paper the wave direction and the wave length of the internal wave will be extracted with a novel method, which will combine the merit of artificial allocation and the Hilber Huang Transform. The Internal wave in SAR image is firstly drew with three points along the front of the internal wave,...
Proceedings Article

Characterizing Petri Nets with the Temporal Logic CTL

Zhifeng Liu, Zhihu Xing
Model checking is a powerful technique for verifying systems and detecting errors at early stages of the design process. When model checking is used to check properties of Petri net, the specification has to be expressed in temporal logics. In this paper we will focus on how to characterize some important...
Proceedings Article

Research on the Supporting Degree of Multilayer Correlative Rules and Its Minimal Thresholds

Xiaolan Cao, Jian Peng, Jiahong Peng
Supporting degree and its minimal threshold have important impacts on the designment of quick and effective algorithm of multilayer correlative rules. This paper introduces interzone supporting degree for computing supporting degree of item sets of intersectional layer rationally which avoids unmeaningful...
Proceedings Article

Study on Design of Fault Injection System Based on Testability Verification

Zhiyu Li, Kaoli Huang, Guangyao Lian
Based on testability verification, the paper studies on designing of fault injection system and it is used on designing stage of some auto-driving instrument. The previous design only adapted the designer's request, and ignored testability verification, and it was a large problem to equipment. This paper...
Proceedings Article

Ordovician Limestone Aquifer Seepage Field Simulation Based on Modflow

Jiuchuan Wei, Huiyong Yin, Shasha Wang, Daolei Xie
According to the data of draining test, we simulated the Ordovician limestone aquifer seepage field by MODFLOW module of GMS (Groundwater Modeling System). After numerical simulation model building, we successfully simulated the seepage field formed by draining test and dynamic changes in the water level...