Proceedings of the 2012 National Conference on Information Technology and Computer Science
271 articles
Proceedings Article
Least Squares Method Prediction-based Spray and Focus Routing Protocol in Opportunistic Networks
Zhuowei Shen, Ying Tu
Opportunistic Networks develops rapidly in recent years. With the popularity of GPS (Global Positioning System), velocity or position prediction plays an important role in opportunistic network routing. In this paper, a new opportunistic routing protocol named LSMPSF (Least Squares Method Prediction-based...
Proceedings Article
Water-Inrush Prediction of Coalbed Floor Based on the Limit Equilibrium Theory of Rockmass
Shasha Wang, Jiuchuan Wei, Weijie Zhang, Baolai Song
Based on the limit equilibrium theory of rock mass, we analyzed the mechanism of water-inrush of seam floor and deduced the theoretical formulas of ultimate hydraulic pressure of seam floor through obtaining the facing length, the thickness and lithological association of floor rockmass into consideration....
Proceedings Article
Design and Implementation of Value-added Services Platform Valet Operating Subsystem
Ke Zhang, Jiaqi Zhu, Jia Meng
Customer relationship management system is a system through systemic research towards the client. In order to improve the service level for client, establish a long-term, stable relationship between enterprises and clients, and elevates the rate of client?s loyalty, and so as to seek more profits for...
Proceedings Article
Research on the Key Influencing Factors of Use Intention on Coloring Ring Back Tone
Rong Liu, Keyan Gao
Through reviewing previous research papers based on Theory of Reasoned Action and Technology Acceptance Model, combined with the characteristics of mobile value-added Coloring Ring Back Tone business, this study discussed the factors influencing consuming intention of Coloring Ring Back Tone, developed...
Proceedings Article
Personalized Learning System Based on Data Mining for Experimental Platforms
Zufeng Zhong, Hongyan Yang
On the basis of adaptive learning and the results of data mining, a personalized learning system was designed and implemented. The system on this algorithm has implemented the educative conception of teaching students in accordance with their aptitudes. Experimental platform in the traditional learning...
Proceedings Article
A Novel Teaching Solution for Operating Systems
Tunhua Wu, Baogang Bai, Ping Wang
Traditional teaching process of Operating Systems course has many defects, such as divorce between theory and practice, outdated experimental platform, which result in low learning interest and effect on the course. A novel teaching solution for Operating Systems course was proposed in this paper. The...
Proceedings Article
Research on Retailer's Financial and Operation Decisions Based on Strategic Customer
Heng Liu
This paper studies retailer's decision and financial ins-titution's decision based on the strategic customer when retailer accepts financial service from financial institutions. Research shows that financing rate increases with the wholesale price and the average rate of return on investment increasing...
Proceedings Article
A Novel Photographic and Computer Graphic Composites Detection Method
Zhenwei Chen, Yongzhen Ke
With the development of the rendering techniques, the visual difference between photographic images (PG) and computer graphics (CG) is becoming smaller. And the digital image forgery is not limited to the composite between photographic, splicing of computer graphics and photographic is also a problem...
Proceedings Article
Development of Python-based ArcGIS Tools for Spatially Balanced Forest Sampling Design
Mingyang Li, Ting Xu, Qi Zhou
The current forest survey sampling methods are based on classical statistics, can not solve the problems of close spatial autocorrelation and poor adaptability. General randomized tessellation stratified (GRTS), a commonly used algorithm to implement spatial balanced sampling (SBS) has gained popularity...
Proceedings Article
Research on DSP-GPU Heterogeneous Computing System
Xiangzhen Li, Jingying Hu, Weiguo Lv, Guiqiang Wang, Xinrong Cai
In this paper, DSP-GPU heterogeneous computing system is studied and the system architecture is designed. The task scheduling model is analyzed and the discrete particle swarm optimization algorithm is used for the DSP-GPU heterogeneous computing. The communication framework between DSP and GPU is designed...
Proceedings Article
The Research of the Maximum Length n-grams Priority Chinese Word Segmentation Method Based on Corpus Type Frequency Information
Pengyu Lu, Lijun Jin, Bin Jiang
In order to solve the difficulties to extract words in particular domain, we formulate a method of automatic word segmentation in Chinese based on corpus type frequency information. This method can effectively extract n-gram words that are not predefined in a lexicon by setting the maximum length (n)...
Proceedings Article
Analysis and Application of Carrier Aggregation Technology in Wireless Communications
Binglin Li, Hao Zhang, Jiming Yao, Hongbin Yao
Carrier aggregation is a key technology in the LTE-A. Carrier aggregation can be achieved within the same frequency bands continuous carrier aggregate, non-continuous carrier aggregation and different frequency bands within the carrier aggregation. It analyses the two implementations of carrier aggregation:...
Proceedings Article
The Analysis and Solution of a PCP Instance
Jing Dong
In this paper, we present a heuristic rule for solving some specific PCP instances. We also analyze a PCP instance, and prove that this instance has no finite solution using our heuristic rule. Moreover, we find this instance has a unique infinite solution generated by a Fibonacci substitution.
Proceedings Article
Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System
Tian Wang, Hui Xu, Yi Zhu, Jieqing Ai, Wubing Zhou
Through analyzing the indicators of classified protection and risk assessments of information system, a security configuration check specification model of Guangdong Power Grid Corporation is built. Security configuration enumeration library is also designed by reference to SCAP protocol. The architecture,...
Proceedings Article
Attribute Reduction Algorithm Based on Incomplete Decision Table
Yue Du, Jian Wang, Xu Zhang
The paper describes the basic concepts of rough set theory and discernibility matrix and presents an attribute reduction algorithm based on reduced discernibility matrix, which aims at resolving the inadequate of the existing attribute reduction based on incomplete decision table. There only contain...
Proceedings Article
Muti-wheel Bogie Braking System Simulation of Civil Aircraft
Hua-wei Wu, Te-fang Chen, Lin-feng Wang, Wei-ming Huang
In order to meet the development needs of large civil aircraft, this paper takes four-wheel bogie landing gear as example and introduces the muti-wheel braking system control mode and control law. The kinematics of aircraft braking process and the mathematical models of wheels, tyres and runway, hydraulic...
Proceedings Article
Study on the Runoff Characteristics of Ordovician Limestone Groundwater in Jinmen Coalmine
Shasha Wang, Jiuchuan Wei, Zengxue Li, Baolai Song
Based on the data of water pumping test and releasing test, we systematically analyzed the hydrochemical characteristics of the Ordovician Limestone aquifer. We sorted the data, classified the water quality of each samples, drawed piper trilinear nomograph, and delineated hydro-chemical subsections of...
Proceedings Article
A study on applying KFCM algorithm to source code mining
Yonghui Liu, Jingjing Tian, Lei Zhang
This paper provides a algorithm, which is based on that kernelized fuzzy C-means uses on the study of source code mining, to solve the problem that the large number of quantities, multiple attributes and most of them discrete of software engineering. By using this algorithm, we can improve the efficiency...
Proceedings Article
A New Data Compressed Algorithm on Mobile Device under Cloud Service
Tong Zhu, Zhuo Gao
In this paper, we discuss how to use cloud services to provide seed data for data compression algorithm on mobile device. Seed data can remove redundant information from GPS data. Then, through the shift encoding algorithm, we provide a more simple and effective data compression method for real-time...
Proceedings Article
An Algorithm for Spread Arbitrage Process in the CSI-300 Futures Market
Jiayue Xu, Hong Fan
With the development of modern capital markets, the stock index futures have become one of the most active investment instruments in the world. The arbitrage of stock index futures actually plays a very important role in making the price of stock index futures be rational and activating the market. In...
Proceedings Article
Research of Fast Cloth Simulation Based on Mass- Spring Model
Zhenfang Cao, Bing He
In cloth simulation based on the spring-mass model, algorithm dealing with super-elasticity reduces the simulation efficiency to some extent. Based on the correction algorithm of modifying position and velocity, an improved algorithm is proposed which can improve the efficiency effectively. Meanwhile,...
Proceedings Article
Evaluating Mission-Oriented Network Reliability via Simulation Test
Mo Chen, Yuejin Tan, Hongzhong Deng
This paper proposed a simulated test method for evaluating mission-oriented network reliability. We first defined the mission-network model and entity-capability model. Then, to test the mission-oriented network reliability, we employed a three-layer network, including mission-layer, sampling-layer and...
Proceedings Article
Generalized Regression Neural Network Based Quantitative Structure-Property Relationship for the Prediction of Absorption Energy
Hui Li, Yinghua Lu, Ting Gao, Hongzhi Li, Lihong Hu
Generalized Regression Neural Network (GRNN) was used to develop a quantitative structure-property relationship (QSPR) model to improve the calculation accuracy of density functional theory (DFT). The model has been applied to evaluate optical absorption energies of 150 organic molecules based on the...
Proceedings Article
The Impact of Chinese Entrepreneur's Social Networks on the Development of Private Enterprises in China
Jing Bai, Jun-wei Liu
The Entrepreneur's social network in China is the reflection of the deep-seated cultural and social background, which exerts both positive and negative effect on the development of the Chinese private enterprises. However, when the Chinese enterprises are further involved in the economic trend of the...
Proceedings Article
Intelligent Buildings Equipment Management System Interface Information Integration
ZhiYi Xing, Jian Chen, JianXun Zhao
There are more and more intelligent buildings in our life. Building automation system (BAS) is the main content of intelligent building system equipment management. This paper discussed the integration of information and graphical interface of the lighting system, air conditioning system and security...
Proceedings Article
The Empirical Study on Impact of Consumer Experience to Consumer Loyalty of Coffee Chain in Guangzhou
Jing Bai, Jiang Lu
The purpose of this paper is to study on the impact of consumers experience to their loyalty in the city of Guangzhou. Based on the related literature study, it has been built the concept model of causal relationship among experiential medium, experiential value and consumer loyalty. We use the empirical...
Proceedings Article
Design and Implementation of A TV White Space Channel Allocation System
Qi Xu
This paper describes a white space channel allocation method which aims on calculating the quality of the available channels and the possible inference introduced by the new node. The implementation and analysis of the system are also discussed.
Proceedings Article
Research on Small Signal Amplification Circuit of Downhole Instrument
Xin Lai, Chunpu Wang, Liang Ge
In order to acquire the real-time work of underground drill, promote the security and the reliability, it is necessary to effectively measure the drilling engineering parameter of drilling pressure, torque and side pressure etc. It uses the resistance strain sensor as a converter. The microvolt signal...
Proceedings Article
Numerical Modeling Approach of an Air-launched AUV Initially Impacting on Water
Yonghu Wang
Water-entry impact of air-launched AUV (AL-AUV) is considered as a timedepended strongly nonlinear fluid-structure Interaction phenomenon. Numerical modeling technique of AL-AUV on its initial water-entry impact is given by using the Multi-Material ALE-Lagrange coupling algorithm. The key aim is focused...
Proceedings Article
Numerical Simulation Study of Aerodynamic Characteristic on Hypersonic Aircraft
Jiang Chen, Song-ping Wu
In this paper, a three dimension model that is similar to the hypersonic cruise aircraft X-51A has been generated by using a graphics processing technology and an anti-modeling method from the published pictures and related articles about the X-51A. This paper adopts the Harten-Yee's scheme to simulate...
Proceedings Article
Simulation and Analysis of OSPFv2 DR Election Based on GNS
Xiaohua Li, Jian Xu, Juan Nie, Chengkui Guo, Xiangang Zhao
Designated Router (DR) is the key for the quality of an Open Shortest Path First (OSPF) network and it enables a reduction in the number of adjacencies, which in turn reduces the amount of routing protocol traffic and the size of the Link State Database (LSDB). In this paper, we analyze the principle...
Proceedings Article
Dynamic Binary Instrumentation Technology Overview
Kunping Du, Fei Kang, Hui Shu, Li Dai
The Dynamic Binary Analysis technology is a newly emerged technology which can analysis program execution dynamicly. Using this technology, the process of program analysis became more simple and accurate. Foreign researchers had put forward several Dynamic Binary Analysis Platform in recent 10 years....
Proceedings Article
An Optimization Method for Missile Testing Vehicle Based on Genetic Algorithm
Ai-zhen Liu, Li-yun Chen, Xiu-feng Gao, Xi Li
Planning the optimum number of Missile Testing Vehicles is very important to decrease testing cost especially testing time of kinds of missiles. To determine the number of vehicles, the mathematics model was established and an optimization method based on Genetic Algorithm was proposed. And an encoding...
Proceedings Article
Exploring the Spatial Distribution of the Peasant Family Garden Based on the GIS in Xindu District, Chengdu City
Jinjun Zheng, Chao Hong
Due to the increasing of the population and development of industry economy, many Peasant Family Gardens have been flocking to the Sichuan Basin and shows messy distribution pattern on spatial scale. In the present paper, total of 187 Peasant Family Gardens in the Xindu District, Chengdu City, are selected...
Proceedings Article
Traffic Adaptive Geographic Routing for Vehicular Ad Hoc Networks
Xiang-yu Bai, Xin-ming Ye, Yan-jun Huang, Jun Li
Vehicular Ad Hoc Network (VANET) has recently attracted considerable attention. The design of routing protocol for VANET is a challenge given rapid topology changes and frequent network disconnection. Current routing protocols usually use geographic information to forward packets. In this paper, we propose...
Proceedings Article
Modeling Sediment Yields in A Small Gully of the Sichuan Hilly Basin Using Geowepp Model
Jinjun Zheng, Chao Hong
The spatial pattern of soil erosion and deposition on catchment scale are predicted by the GeoWEPP model in a small catchment of the Sichuan Hilly Basin. The estimated sediment delivery per unit area and sediment delivery ratio are 2760 t km2 yr-1 and 0.485, respectively. Compared with the results derived...
Proceedings Article
Digital Implementation Method of Base-band Signal of FSK Quadrature Modulation
Jinyu Bao, Kaiyu Qin, Bo Tang, Honglin Dou
FSK modulation is widely used in communication system. In this paper, based on the basic formula of the communication theory, we concluded a new digital implementation method of base-band signal of 2FSK quadrature modulation formula, and realized in base-band signal simulation software based on VC++,...
Proceedings Article
Research on RSA-based Broadcast Encryption Scheme in Web Multimedia
Xue Liang, Zhongjun Du
With the development of web multimedia technology, broadcast encryption schemes play an important role in multimedia services copyright protection. In this paper, we propose a new broadcast encryption scheme based on RSA, besides, we give out two algorithms?smallest power exponent algorithm and improved...
Proceedings Article
Design and Implementation of 802.1x Authentication Module in Security Switch for Industrial Control System Based on FPGA
Yanan Zou, Dongqin Feng
Aiming at the safety of the industrial control system, an authentication module based on 802.1x with dual authentication model in safety switch is proposed. The authentication mechanism of 802.1x is stated. The dual authentication model, namely the authentication between the safety switch and the server...
Proceedings Article
The Research on Strategies of China's Green Finance Development
Ying Shi, Xiaozhong Geng
Green finance (ecological finance) is an important tendency to develop modern financial industry. The development of green finance has significant role to protect the ecological environment, accelerate economy and develop the financial industry. Green Finance is also the necessary way to balance the...
Proceedings Article
A Novel Design of Wideband Frequency Antenna for WLAN
Rongrong Zhang, Yalin Guan
A novel and simple coplanar waveguide (CPW)-fed monopole antenna with wideband dual-frequency is proposed in this paper. The proposed antenna printed and integrated on a small region of a microwave substrate has a compact size of 22?35mm2. This antenna, fed by CPW and connecting a 50' SMA connector,...
Proceedings Article
Feature Extraction and Recognition of Analog Circuit Fault Signal Based on Wavelet Transform and Partial Singular Values Decomposition
Si-yang Liang, Jian-hong Lv
A new algorithm for the effective characteristics' extraction of analog circuit fault signal is proposed with consideration of its complexity. The proposed method is based on wavelet transform and partial singular values decomposition. Firstly, the analog circuit fault signal is decomposed into different...
Proceedings Article
Tourist Souvenirs of Eco-packaging Structure Optimization Design in Perspective of Lijiang River Culture
Zhihong Liu, Yu-ting Zhang
Article to the opportunity of development of Guilin tourist attractions souvenir packaging, with its profound cultural connotation and artistic taste as the basic point of Lijiang River, from unique structural optimization design of Visual angle to research, make souvenir package design visual branding...
Proceedings Article
Analysis of Information Construction for Business Files of University Teachers
Lianfeng Zhao
as the actual reflection of the teaching and research ability of university teachers, teachers' business file has an important preservation and application value. The paper puts forward corresponding specific measures to implement information management and initially explores the ways to achieve these...
Proceedings Article
Simulation of Optical Imaging Reconnaissance to Ground
Wen-wei Li, Hong Meng, Yong Sun, Guang-yun Li, Ji-rong Xue
Optical imaging reconnaissance plays an important role in the intelligence and reconnaissance process, especially widely used in UAV reconnaissance and direct fire weapons. Combined with related requirements, a simulation model of the optical imaging reconnaissance process is proposed, including the...
Proceedings Article
Effect of User Distribution on the Capacity of Cellular Networks
Xue Tang, Hongwen Yang
User distribution is a critical issue in cellular networks. In most previous works, a uniform user distribution is often assumed within a cell. In this paper, we purpose a non-uniform user distribution model. Both its effects on downlink and uplink capacities of a cellular network are evaluated under...
Retraction
RETRACTION: Introspective, Client-Server Technology
Yanchun Ma, Jixin Pan
In April 2020, Atlantis Press was alerted to fake proceedings articles hosted on our platform. These articles, mostly in computer science and engineering, were generated by the SCIgen computer program and were all published between 2006-2018. Immediately after receiving the alert, Atlantis Press initiated...
Proceedings Article
A Train Algorithm of Multi-Aggregation Process Neural Networks Based on Chaos Genetic Optimization
Yue-Wu Pang, Shao-Hua XU
Aiming at the learning problem of multi-aggregation process neural networks, an optimization train method based on chaos genetic algorithm (CGA) with lowest mean square algorithm (LMS) is proposed in the paper. The learning problem of the network weight functions is converted to the training of basis...
Proceedings Article
A Channel Allocation Algorithm Based on Demand in Cognitive Wireless Mesh Networks
Tingrui Pei, Jing Li, Zhetao Li
We proposed a channel allocation algorithm, which was a modification of graph theory and based on demand to optimize the performance of cognitive wireless Mesh network. The key idea of the algorithm was to design a proportion coefficient of actual flow to demand flow, and then cognitive users with the...
Proceedings Article
Object Tracking Based on Multi-feature Mean-shift Algorithm
Jiafu Jiang, Hui Xiong
Object tracking is one of the key technologies in intelligent video surveillance and how to describe the moving target is a key issue. Traditional color histogram Mean-shift (MS) algorithm only considered object's color statistical information, and didn't contain object's space information, so when the...
Proceedings Article
Location-based Security Authentication Mechanism for Ad hoc Network
Cui Li, Ze Wang
With the growing prevalence of wireless networks, location information plays a critical role in many applications. Especially, in unattended and hostile environment, whether the location of a node lies on a security area became very important. In this paper, we first analyze the security and vulnerability...
Proceedings Article
Scalable Distributed Standard Definition Video Conferencing System: Architecture and Forwarding Model
Suiming Guo, Congxiao Bao, Xing Li
Videoconferencing system is widely and successfully used on the Internet and standard/high definition videoconferencing is a new heated topic in research. However, researches in various videoconferencing systems (e.g. Access Grid, DVTS, VLC, and Ultra Grid) are faced with the problem of scalability....
Proceedings Article
Study on the Framework of the Management Platform for CPA Audit
Xu Liu, Shijian Lin
With the wide application of information technology in management, Audit Informationization has been the inevitable evolution trend of the CPA industry. Based on the features and needs of the CPA industry, we provide the Management Platform for CPA Audit, an ERP system. The Management Platform consists...
Proceedings Article
Analysis and Design of Clinical Information Management System Based on UML of AIDS Syndrome of Traditional Chinese Medical
Songhe Shi, Shengwu Xiong
[Purpose] In order to find out AIDS syndrome discipline of traditional Chinese medicine, and so as to conduct dialectical analysis scientifically to patients, and also lay the foundation for the Chinese medicine diagnosis and treatment of AIDS, and combined with the situation of Henna AIDS Chinese medicine...
Proceedings Article
Social Value Evaluation of Forest Resource Asset of Forest Industry Zone in Heilongjiang Province
Jiang Peng, Liandi Zhou, Hao Li
Along with the establishment of our country's market economy system, forest resources started to be regarded as a kind of asset, and it has been generally accepted after 20 years progress. Recent years, there have been some evaluation methods to evaluate the value of forest resource asset, but has not...
Proceedings Article
Arranging course automatically algorithm based on multi-factor priority
Wei Zhi, Huaping Feng
The problems of course timetabling mainly involve time, curriculum, the number of classrooms and so on. A new algorithm based on multi-factor priority is proposed in this paper. The algorithm use time division, the compute of the priority, the provisional matrix and quick sort to achieve the function...
Proceedings Article
Protect Cloud Computing's Data Using Fully Homomorphic Encryption
Xu-dong Wu, Xin Li
With the fast development and wide application of cloud computing,more and more security accident has been appeared.Though some traditional security measure has been applied, the security problem has become the main abstacle to apply cloud computing technology This paper based on the newly developed...
Proceedings Article
Load Balancing Technology Based On Consistent Hashing For Database Cluster Systems
Zhenguo Xuan
The database cluster is an effective mechanism to improve the throughput of database systems and reduce the response time of the database. Generally, it is used to solve the single-node bottleneck problem of data access in network services. Load balancing technology is the key factor to determine the...
Proceedings Article
Research on the Diffraction Problem of Finite-length Anisotropic Impedance Split
Dun Cao, Liling Zhen, Ming Fu
Optimizing the channel and the radiation direction of the antenna is an important factor to improve the performance and quality of wireless communication systems. When it's rapidly developed in the field of communications, electrically large anisotropic impedance materials are used for the optimization...
Proceedings Article
The Logical Structure of the E-Commerce Platform Design and External Interfaces to Achieve of O To O
Li-jun Wei, Hai-bo Wu, Liao-liang Xiao, Jiang-tao Gong, Xin-xi Chen, Dong-mei Tang
O2O namely Online To Offline, it is a line from online to down, and combine online resources with real economy ,therefore allowing the network to become the real economy to an e-commerce model extends to the virtual world of the "front", different from the B2B - (Business To Business) and B2C (Business...
Proceedings Article
Research and Evaluation on Procurement Techno- Economic Benefits of NC Grinder Technology Projects Based on the AHP
Ping Zhao, Jinwu Fang
With regard to the NC grinder technology procurement project of a machinery ' according to a large number of data this paper makes use of The AHP to establish a mechanical plant AHP model. The third layer (Tender licensors) is taken as the evaluation indicators. Based on the relationship between production...
Proceedings Article
An Algorithm for Detection of Malicious Messages on CAN Buses
Congli Ling, Dongqin Feng
Control systems are encountering increasing security threats; as one of the common systems, CAN control system is very facile to be attacked. Aiming at the improvement of CAN control system security, an algorithm for detection of malicious CAN messages is given, and it has been implemented in the CANoe...
Proceedings Article
Research on the Measurement of Displacement based on Grating Reticle Image
Hai-hua LI, Juan Fan
A new method is present to get movement displacement directly when applying grating reticle to AC servo driving control system to carry on high precise orientation for the micro-objects. Adjusting the optical path until grating reticle image can be gathered clearly by vidicon. After analyzing and processing...
Proceedings Article
A Hybrid Evolution Algorithm with Application Based on Chaos Genetic Algorithm and Particle Swarm Optimization
Yu Fu, Bing Wang, Shao-Hua Xu
Aiming at the complex function extreme value and non-linear system model parameters adjust, a hybrid optimization algorithm based on chaos GA combined with PSO is proposed in the paper. With application of applying experience of PSO, sharing information of GA, and traversing pathway of chaos, the adaptive...
Proceedings Article
Smoke Detection Algorithm Based On Wavelet Transformation and Energy Analysis
Yijun Xu, Ning Han
A novel algorithm to detect the forest fire smoke based on the wavelet transformation and high-frequency energy analysis is proposed. The conventional color-based RGB algorithm has the difficulty to distinguish the smoke from other objects with the same color, such as clouds and fogs, so it leads to...
Proceedings Article
Stream Cipher Method Based on Neural Network
Haiyan Long
A new stream cipher algorithm based on one-way function of neural network is proposed. The nonlinear system comprised of such neural network is used to transform a group of LFSRs for key stream generation. As a result, the complexity of sequences is increased with period expanding. The produced cipher...
Proceedings Article
Research on Intelligent General Acquisition Controller of Rice Seedling-nursery House in Cold Region Based on MSP430F5438
Fangming Tian, Shujuan Yi, Feng Tan, Xiaoliang Wang, Li Yan, Yingnan Liu, Donglai Han
In view of the existence of insufficiency of environmental parameter acquisition control system for the current cold rice seedling house, through researching, develop a sampling control system with low power consumption, high precision, strong versatility, to which MSP430F5438 chip processor with low...
Proceedings Article
A Java Source-code SQL Injection Attack Detection Algorithm Based on Static Analysis
Tian Wang, Lihao Wei, Hong Zou
This paper researches the method of SQL injection attack detection and the principle of static analysis scanning, and presents a Java source-code SQL injection attack detection algorithm. The detection algorithm includes these steps: lexical analysis of source code, parsing of source code, constructing...
Proceedings Article
Impact of Antenna Beampatterns on the Capacity of Multiantenna Channels
Chao Shao, Li-Shuang Fan, Qian Xiao, Zeng-Tao Mo
This paper provides an overview of the capacity of multi-antenna channel in Shannon theoretic sense, and gives analysis results and the upper bound expressions of Shannon MIMO channel capacity when transmit and receive antennas have the same beam pattern and are aligned, or one has wider beam than (or...
Proceedings Article
Hierarchical Structure Resource Scheduling Model Based on Grid
Na Wang, Bo Wei, Heng-wei Zhang, Jin-dong Wang
Resource matching is the core function of the grid. This paper analyzed the characteristics of the grid, designed a Hierarchical Resource Scheduling Model for data resources in grid and a new resource scheduling algorithm. This model can combine each function units of resource scheduling organically...
Proceedings Article
Research on the Association Rules of Marketing Resources Demand and Supply in Grid Environment
Jianyou Zhang
This paper introduces processes and methods access to the demand for marketing resources, describes the steps for marketing resources planning and the marketing resources demand-supply model in grid environment,finally lists several association rules of marketing resources demand and supply. It provides...
Proceedings Article
A method to implement data extraction using AND optical gate based on SOA-XGM
Ya-lin Guan, Rui-dong Wang, Lei Zhang
A method was proposed to implement data extraction using AND optical gate based on cross gain modulation (XGM) of semiconductor optical amplifier (SOA). The optical data extraction in DPSK/ASK orthogonal modulation system was achieved with the proposed AND gates, in order to prove its feasibility. Through...
Proceedings Article
A Wireless Mouse Design and Implementation Based on J2ME
Yuhe Song, Changying Liu, Tianhao Wang, Xin Zhang, Lingling Zheng
J2ME is a Java technology specification which was advanced by The United States of America SUN company.It was used to develop Java applications which run on small equipments, consumer electronic equipment, Internet mobile equipment, embedded equipment. Hereby, this paper will introduce a J2ME-Based program...
Proceedings Article
Stdudy on Cultivation Strategy of Customer Loyalty Based on Internet Marketing
Cuimin Zhen, Shehui Bian
In internet marketing environment, many businesses have gradually realized that gaining and maintaining customer loyalty is important source of long-term profits. This article firstly elaborates the connotation and importance of customer loyalty in internet marketing environment, then analysis the main...
Proceedings Article
Based on Prospective Dynamic Frequency Scale Power Optimize Method for Multi-Cores Processor's I/O System
Yufeng Guo
Power problem has been one of the most restricting development barriers of processor. I/O system power is an import part of the processor's power. The paper aims at I/O dynamic power of multi-cores processor, and put forwards a prospective dynamic frequency scale with clock gating power optimize method....
Proceedings Article
RAID Storage Systems with Early-warning and Data Migration
Yin Yang, Zhihu Tan, Wei Liang, ChangSheng Xie
This paper proposes a new RAID-based system, we defined as REM: RAID system with Early-warning and data Migration. REM can predict RAID potential fault according to disk health degree and array health. Once the fault has been predicted, it takes data migration to protect the data, which allocates reserved...
Proceedings Article
Weak Electricity Pipeline Management System Development Based on Seam Framework
Kai Yang, Yiming Li
As information technology and accelerating the process of the network, many companies, schools or government agencies are densely covered with a variety of weak lines, of which both China Unicom's mobile telecommunications network cable has a telephone line and broadcast television Some TV lines. Although...
Proceedings Article
Institutional Environment, Ownership Structure and Accounting Earning Quality
Jinri He, Xinran Liu
This paper empirically examines the relationships between the institutional environment, ownership structure and accounting earning qulity based on the data Chinese listed companies in 2007-2009. It finds that the better the insitutional environment in the rigion, the higher the quality of accounting...
Proceedings Article
Morphological Characteristics of Drug-loaded Nanoparticles based on Microscope Images Analysis System
Bohua Feng, Siyuan Mo, Liufen Peng, Huoyan Xu
Microscope images analysis of drug carriers was a widely used method for those nanomaterials. Usually manual measuring and analysis of microscope images were subject to errors, and bad stability of results. Nanoparticles microscope images analysis method was combined with computer image processing technique...
Proceedings Article
A research on error handling model of service fault-tolerant strategy
Yongqing Wang, Yan Chen, Ming Yang
With the rapid development of web services, web services fault-tolerant mechanism has become a new research focus. This paper presents an innovative error handling model of service fault-tolerant strategy. For the goal of enhancing the fault-tolerant performance of web services, we analyze the key technologies...
Proceedings Article
Risk Quantified Evaluation Method and Platform Design for Grade Protection
Tian Wang, Lihao Wei, Hong Zou
Regarding all the issues that Corporation faced during the grade evaluation, e.g.lack of accuracy on risk analysis, over dependence on the capability of the evaluater, etc. We bring out a new evaluation method on grade protection and the distributed platform RQEP. With them we can quantify the risk objectively,...
Proceedings Article
Solving linear PDEs with the aid of two-dimensional Legendre wavelets
Fukang Yin, Junqiang Song
In this paper, we develop a method, which using twodimensional Legendre wavelets, to solve linear PDEs. Based on the properties of shifted Legendre polynomials, we give a brief proof about the general procedure of two-dimensional operational matrices of integration, and then employ aforementioned matrices...
Proceedings Article
Typical cloud computing system design
HaiYan Liu, Zhiyuan An
Cloud computing more widely applied to study the structure of the cloud computing system, and in-depth understanding of cloud computing technology is necessary.Is very meaningful for the development of cloud computing systems.Designed in a typical cloud computing system framework, including the central...
Proceedings Article
Design and Implementation of hidden key loggers under .NET platform
Zhiyuan An, HaiYan Liu
keyboard recording technology has been widely applied to the system monitoring program.This paper describes the design and implementation keyboard loggers based on the the HOOK, under .NET platform. At the same time, in order to reach the hidden effect, record keyboard function module is inserted into...
Proceedings Article
Design and Implementation of Remote Buffer Overflow and implanted Backdoor
Xin Zhang, HaiYan Liu
Network security research focused content is a buffer overflow. It is a technology used by hackers mostly. This paper, based buffer overflow, given the use of the remote overflow implanted backdoor design, and implementation methods. In this paper, introduce the detailed steps to structure Shellcode,...
Proceedings Article
Research of Attack Model Based on Finite Automaton
Zhi-wei Zhang, Yun-Tian YUE
According to the unknown of attack behavior in cyberspace, this paper presents an attack modeling method based on system states aggregation. In the model, the basic principle of the finite automaton is researched and attack entities of cyberspace are classified by attack process, it combines finite automaton...
Proceedings Article
Syntactic Dependency for relation extraction from Biomedical literature
Xiaomei Wei, Jianyong Wang, Yang Li
Relation extraction is important to improve complex natural language processing (NLP) applications. The Bio-Event extraction in GE shared task is important to understand biological processes. Although some progress has made in GE research, there is still much work to do to improve the performance of...
Proceedings Article
Research on Basic Information Collection of Electronic Health Records
Guang Dong, Chunmei Liu
With the use of SOA, ESB and XML technology, this paper designed message-oriented middleware and data exchange adapter based on HL7 v3, XML standard. Through data migration middleware based on XML, it realized storage and derivation of user-defined XML document and completed automatic collection of basic...
Proceedings Article
An Exponential Distribution-based Model for Equipment Remaining Life Prediction
Xiao-Hong Meng, Wei Wang, Yong-Tao Zhou
The article proposed and established an exponential distribution-based model for equipment remaining life prediction. The model is a general decision model for detectable continuous degradation process. The modeling method and application example is introduced. Compared with other models, the model has...
Proceedings Article
Application study on multiple network communication of power engineering
LiMing Zhang, Rui Guo
The application of network communication in the field of engineering monitoring software has been very common, but most of them used a network communication mode. This paper introduces the multiple network communication modes (asynchronous network socket communication, wave communication, named pipe...
Proceedings Article
A study of test oracle for application interface testing of distributed system
Jingyan Cui, Gang Ye, Xianjun Li, Shilong Ma
The application interface testing is an important part of automated software testing of distributed system. It is based on network data which is produced when the distributed system is running. It is used to verify whether the network data is correctly exchanged. In this paper firstly we design test...
Proceedings Article
The actual diagnosis and rational appeal of college network courses
Jixin Pan, Lulu Cheng, Fuping Guo, Liping Liu
Nowadays, people have wrong conclusions and unreasonable concepts about the essential attribute in college network courses. These can be illustrated by the following aspects: such as in the value, the fixed position is not conformity with expectation; in teaching, the current teaching situation is deviated...
Proceedings Article
Method of Software Development Based on Component Technology
Yan Li, Li Jiang
Component-based software development methodology is a software development reuse software solutions in order to avoid duplication of effort, the current software component technology is regarded as one of the key factors of successful reuse. The article describes the main content of the basic concepts...
Proceedings Article
Research on IT Service Management of Local Colleges Based on ITIL
Zhengang LI, Zhigang Zhang
At present, the key of IT work faces to convert construction to service, however, the local colleges have not established complete management in order to fit for these changes. This paper discusses on IT service management mechanism and implement scheme for local colleges after analyzed the problem of...
Proceedings Article
The application of data source authentication protocol to video multicast
Shijie Zhao, Zhirun Liu, Liehuang Zhu, Rufeng An
An efficient packet-injection resistant data source authentication protocol for group communication(EPJRSA) was proposed to authenticate data source. It can recognize which packets are injected by attacker and delete them. But it cannot recover the lost packets. So an advanced protocol based on EPJRSA...
Proceedings Article
The research of multimedia data transmission Basis on the inventory and queuing theory
Jia-jie Shen
Aim to problem how the packet size effect to the multimedia data transmission and how to design the packet size to reach the best efficient of transmission. The research is mainly to use the inventory and queuing theory find the best way to design the send packet size. Though the model is established...
Proceedings Article
Constellation Design of the Beidou satellite navigation system and performance simulation
Xiaomeng Wang, Ruihua Liu
To improve the positioning accuracy and reliability of Beidou ,an analysis of the Beidou satellite navigation system has been performed; combination of technical experience of the foreign global satellite navigation system and the current release of technical information, we have designed Beidou satellite...
Proceedings Article
A Design of Digital Handheld Terminal in Wireless Data Acquisition System
Xingguo Sun, Lei Xu, Shouxian Wen, Xiaohui Li
In order to make data collection more convenient, quick and accurate in working site in the existing wireless data acquisition system, one kind of multi-function handheld terminal is designed which combines the wireless and wired data acquisition. The paper adopts Atmega128 of ATMEL as microcontroller,...
Proceedings Article
Angle-of-Arrival based Constrained Total Least-Squares Location Algorithm
Gangcan Sun, Xuefei Xu, Kai Yang
A source location algorithm based on the angle-ofarrival (AOA) measurements of a signal received at spatially separated sensors is proposed. The algorithm is based on the constrained total least-squares (CTLS) technique and gives an explicit solution. Simulation results demonstrate that the proposed...
Proceedings Article
Assessment of Meteorological Disaster Emergency Management Capability Used Information Entropy Theory
Weiying Li, Shuxia Jiang
In recent years, Meteorological disasters are frequently occurred, which bring tremendous suffering to people's lives and property. Meteorological emergence management capability appraisal is a system engineering which involved many factors, This paper design a multi-index appraisal system, built an...