Proceedings of the 3rd International Conference on Computer Science and Service System

+ Advanced search
173 articles

An Improved LQI- based Link Quality Estimation Mechanism for Wireless Sensor Networks

Chen Wei, Luo Jian
An accurate and efficient link quality estimation method is crucial for the performance of the upper layer routing protocol, flow distribution and topology control algorithms in WSNs (Wireless Sensor Networks). Based on the analysis of the cause for packet loss and bit error, an improved LQI (Link Quality...

Design and Implementation of Cluster Evolution based Mobility Model

Wang Dong, Wang Zhouli, Li Xiaohong, Xiao Zhu
The movement of nodes has a great influence on the performance of protocols in mobile ad hoc networks. Mobility model is used to describe the movement of nodes, react the mobile characteristics really. In real circumstances, mobile devices are usually attached to humans ,so the movement of such devices...

A similarity algorithm of trees with complicated labels

Jihua Wang, Yiliang Liu
A tree with complicated labels can widely represent objects in the real world. In this paper, the sum of matched pair similarity is used only to measure the similarity of such trees, while omitting inserted nodes and deleted nodes in the maximum mapping conditions of edit operations. The principle of...

A Large-capacity Information Hiding Method for HEVC Video

Jiaji Wang, Rangding Wang, Wei Li, Dawen Xu, Meiling Huang
A large-capacity information hiding algorithm for HEVC is proposed. We modify the intra prediction modes in 4x4 luminance blocks to embed secret information. According to the probability distribution of the statistical optimal prediction mode and suboptimal prediction mode, we are establishing a mapping...

Oil production predicting with modified BP neural network method

Liu Haohan, Li Wei, Zhang Songlin
Feasibility of oil production predicting results influence the annual planning and long-term field development plan of oil field, so the selection of predicting models plays a core role. In this paper, a common and useful model is introduced, it is,the neural network model. By using this model to predict...

Research on the knowledge-based comprehensive decision support system for human resource management in SaaS mode

Dai Liangtie, Zhou Qiongyu
This research puts forward the structure model of knowledge-based decision support system (DSS), which includes knowledge base, reasoning machine, model base, method base and database. With the six-layer structure of data management process, the knowledge-based DSS adopts distributed resource organization...

Data Mining as a Tool for Information Retrieval in Digital Institutional Repositories

Tonon Leticia, Fusco Elvis
Currently there is a large volume of data stored in informational bases of digital repositories and the problem of finding useful data in information retrieval systems has intensified, making the processes of recovery increasingly sophisticated. This study aims to make use of data mining techniques to...

An approach to ensure the trustworthiness of cloud platform using the trusted chain

Wang Guan, Gao Lubaihui
IaaS (Infrastructure as a Service) provides users with "pay" calculation mode in cloud platform. Users can obtain computing or storage resources he needed from suppliers to load related applications and just rent that part of the resources to pay for at the same time. However, users start to lose their...

A Time Reservation Dynamic Algorithm Based on the Variable Frequency Interval DVFS Technology

Jun Xiao, Cheng Xu, Lining Zeng
embedded systems have been used in various areas of people's lives. However, the contradictions between performance and power consumption of embedded products have become increasingly prominent. DVFS technologies provide the possibility for solving the contradiction between performance and power consumption...

Impact of Emotional Intelligence on Emotional Labor Strategy: the Mediating Effects of General Self-Efficacy and Organizational Identification

Zeng Yan, Chen Xi, Chen Yiwen
The present study conducted questionnaire method by taking 240 samples from service industry employees to probe into the relations between EI, GSE, OI and ELS. The result shows that: 1) a significant positive correlation between EI and all dimensions of ELS; 2) significant mediating effect by GSE between...

Sequence Dataset Similarity Measure by Aggregated Shared Emerging Sequences

Chen Xiangtao, Wang Jing, Ding Pingjian
Emerging sequences (ESs) represent some strong distinguishing knowledge and are very useful for building powerful classifiers. The shared emerging sequences (SESs) are some emerging sequences shared by two or more datasets, which show great values in dataset similarity measure. As for the application...

The analysis on the duration and pitch of Lhasa Tibetan prosodic unit

Ai Jinyong, Chen Xiaoying, Guo Xiaodan
Based on the small speech database of Tibetan single sentences, we get three layers of prosodic structure units by prosodic marking, syllables, prosodic words and prosodic phrases, to study the internal and boundary syllable duration and fundamental frequency data in different prosodic units. The statistical...

A Brief Analysis of Shape Recognition

Zhaoyang Qiao
The shape recognition is an important research problem in the field of computer vision. It has been widely applied in the field of scientific research and engineering technology, such as object recognition, image retrieval based on content, character recognition, and medical diagnosis, etc. This paper...

Study on prediction of cement-soil gravity retaining wall security risk based on BP

Cai-hui Li
In order to forecast the security risk of cement-soil gravity wall, an index system whose function is to forecast the security of cement-soil gravity wall is established from four aspects of soil properties, mechanical properties of mixer, materials, error of a pile position and verticality deviation....

Feature matching algorithm based on KAZE and fast approximate nearest neighbor search

Cai Ze-Ping, Xiao De-Gui
This paper proposed a feature matching algorithm based on KAZE and fast approximate nearest neighbor search for that SIFT and SURF feature detection algorithm,extracting features by Gaussian pyramid in the linear scale space has the problems of fuzzy boundaries, detail missing, and low feature points...

Cryptanalysis of a Shoulder-Surfng Resistant Password Authentication Scheme

Tsaur Maw-Jinn, Lue Chung-Chia
Researchers have been trying to improve authentication for a long time. User still uses textual passwords to authenticate the systems. However, since weak textual passwords are susceptible to the dictionary attack and strong textual passwords are hard to remember. Graphical passwords have been proposed...

Frame-based skip mode decision for distributed video coding

Gang Wang, Gaobo Yang, Leida Li, Yun Song
Distributed video coding (DVC) is a coding paradigm that can shift the computational expensive task from the encoder to the decoder. Though in theory the reverse of encoder and decoder complexity does not cause coding performance degradation compared with traditional hybrid video codecs, the gap between...

3D Skeleton Extraction Method using Potential Field on OpenCL

Lu Lu, Wang Xuewen
For 3D skeleton extraction, the algorithm based on generalized potential fields, known as the outstandingly flexible and robust method, is suffering from seriously heavy computational burden. In this paper, we put forward a parallel algorithm based on OpenCL heterogeneous parallel framework, which can...

The Design of PROFIBUS-DP HUB based on FPGA

Ping Jiao, Tong Zhou
This paper analyzes the PROFIBUS-DP and physical layer signals states, DP time series and other characteristics. In the past, PROFIBUS-DP HUB common problems of poor universal apply, shape communication is more time-consuming, required message analysis, Drop frame etc, this paper propose a new design...

Lead Time Quotation under Time-Varying Demand and Capacity

Nguyen Thanh-Ha, Wright Mike
In this paper, we consider a telecommunication service company with time-varying demand and capacity. The firm applies a uniform lead-time policy, i.e. a lead time which corresponds to the maximum time span a customer has to wait before receiving the required service is uniformly quoted to all customers....

The acoustic analysis of voice parameters about thevowels and consonants of Lhasa Tibetan

Liu Zeguo, Chen Xiaoying, Ai Jinyong
this paper’s study focuses on the vowels and consonants of Lhasa Tibetan, with the basic voice parameters, it is found that there is high relevance among the fundamental frequency(F0),open quotient (OQ) and speed quotient (SQ)of the 8 monophthongs which are in the V,CV and VC 3 types. Among the 3 types,...

Optimization and Realization of G.729 Protocol Based on ARM 9 Platform

Wu Chunming, Zhang Bowen, Li Yanxia
In order to simplify the complexity of the algorithm structure of G.729 protocol and make the speech transmitted real-time on the ARM 9 platform, the present paper analyzes the G.729 protocol and designs the hard and software of the ARM 9 platform. Optimization and upgrading of Language C and algorithm...

Progress in Machine Learning-based Predicting Subcellular Localizations of Proteins with Multiple Sites

Qiao Shanping
Prediction of protein subcellular localizations is a key step to determinate the functions of proteins. The experimental methods are both expensive and time-consuming. Therefore, many machine learning based computational approaches were proposed in the last two decades. Recently, it is proved that the...

An Improved Ant Colony Algorithm for Probabilistic QoS Routing

Ding Genhong, Guo Dongwei, Ding Yuchen
The actual dynamic network environment urgently requires us to give full consideration to the non-precision of the network state when we design the QoS routing algorithm. Mainly by substituting the piecewise function for the probability constant which is chosen by ants when a route is selected, changing...

The Study on the Development of Decision Support Systems in Response to Catastrophic Social Risks

Zhenhua Xie, Zhen He
After the catastrophe, the key to whether the government can effectively deal with and control social risks caused by the disaster lies in whether to make the right decisions under the unified leadership and the unity of command. Therefore, the establishment of Decision Support System DSS in response...

Sequence Join

Xiaomei Song, Xiaojun Ye, Xiaoqing Zeng, Dong Xie
This article put forward a new join technology for tables of relational database, named sequence join.Sequence join make a tuplematch other one tuple according to the disk address. The technology of the specific method can help solve these problems: the number of columns in arelational table is too large...

The Adaptability Evaluation of Graduate Employment Information System

Dong Lili
In this paper, a set of evaluation system is proposed by GQM (Goal-Question-Metrics) for graduate employment information system (GEIS). Then based on Similarity to Ideal Solution, the evaluation model is proposed to evaluate GEIS adaptability. Finally, the application of the evaluation system and model...

Improved Technique of PAPR Reduction Combined Pre-distortion in OFDM Systems

Luo Zhinian, Shi Jian
Orthogonal Frequency Division Multiplexing (OFDM) is an effective parallel multi-carrier transmission scheme. However, this technique has one weakness of a higher transmission signal Peak to Average Power Ratio (PAPR) when the signal is transmitted. To reduce the impact of High Power Amplifier (HPA)...

Vehicle service middleware based on OSGi

Luo Juan, Wu Feng, Alkubati Fahmi Ameen Abdo
Embedded system for the automotive electronics becomes increasingly powerful, whereas the system structure becomes more complex. There is a high coupling between hardware and software which makes it hard to develop applications. To solve this problem, we proposed a middleware based on OSGi, namely OSGiIV....

An Improved Monte Carlo Ray Tracing for Large-Scale Rendering in Hadoop

Li Rui, Zheng Yue
To improve the performance of large-scale rendering, it requires not only a good view of data structure, but also less disk and network access, especially for achieving the realistic visual effects. This paper presents an optimization method of global illumination rendering for large datasets. We improved...

A Computer Aided Case Tool for Temporal Knowledge Visualization

Wang Yue, Ma Jixin
The Internet has become a very important information source. Take Twitter for example: the tweets people post various kinds of data on the internet, usually with rich temporal and spatial aspects such as valid time, transaction time, location, and so on. In this paper we introduce a computer aided case...

A Novel Lightweight Authentication Protocol for YML Framework

Lv Xin, Chen Hao, Xu Feng, Mao Yingchi
YML framework is a well-adapted advanced tool to support designing and executing portable parallel applications over large scale peer to peer and grid middleware. It is necessary to introduce some security mechanisms for the improvement and extension of the framework. To secure the authentication process,...

Web Service Recommendation using Optimized Iterative Collaborative Filtering

Wang Binbin, Guo Jie, Zhou Zuojian, Pan Jingui
With the explosive growth of web services on the World Wide Web, service recommendation is becoming extremely important to both the service providers and the active users. In this paper, we propose a web service recommendation model which utilizes the prediction of Quality-of-Services (QoS) based on...

Development and Application of Integrated Services in Metropolitan Area Transmission Network

Shuyan Wang, Xiaohui Li
With the high-speed development of contemporary communication industry, Metropolitan networks is required to be a multi-Service platform for transmission. This article introduces the application of two key technologies, PTN and MSTP from the point of application, and the development process and construction...

Line Correction for Robot Go-Forward using Image Detection Approach

Hsia Shih-Chang, Fu Wei-Siang
In this paper, we present a line correction method for robot moving control based on image detection approach. By statistics of horizontal vector, the line deviation can be estimated, and then to control the speed of motor to trim the moving direction. For real-time control requirement, we presented...

An Improved Patch based Multi-View Stereo (PMVS) Algorithm

Lichun Wang, Ran Chen, Dehui Kong
Multi-view based reconstruction is always focused in computer graphics and many excellent algorithms have been reported these years. According to Middlebury benchmark, PMVS(Patch based Multi-View Stereo) outperforms all the other submitted algorithms [1]. In this paper, we propose an improved PMVS algorithm...

The Research and Analysis of Association Rules on the Internet of Things

Yanxin Xie, Yongjiang Wang
Temperature, humidity, and light intensity are the important influence indicators of crop production. In order to achieve good economic and social benefits, we could use of modern network technology (3G network, wireless sensor network, mobile network, and local area network), sensing technology, RFID...

Research of Global Localization for Humanoid Robot Based on Vision

Qiubo Zhong, Chunya Tong, Yu Wang
Vision perception plays a key role in the research on humanoid robot. A new version of particle filters called coevolution based adaptive particle filters (CEAPF) is proposed for robot localization. Using vision and odometer, a robust perception model extracting from environmental features, which are...

An Allocation Method for Resource of IaaS Platform with Energy-saving Consideration in the Data Center

Xia Qingxin, Lan Yuqing, Wang Long, Xiao Limin, Wang Xiang
Reducing energy consumption and maximizing resource efficiency have become two important issues without violating service level agreements(SLAs) on Infrastructure as a Service(IaaS) clouds. For the important issues, using the method of resource classification, this study proposes a resource provisioning...

The Influence of Railway Bridge Vehicle Vibration on Sand Liquefaction in a Dam Foundation

Ma Donghe, Guo Xuezhong, Li Yanping, Xu Xiaowu, Huang Ruhui, Zhang Fengde
Saturated sandy soil liquefaction of a dam foundation caused by vehicle vibration was studied by using the QUAKE/W finite element software combined with a concrete project example. Two high-speed trains were used to simulate vibration under driving conditions. The results showed that foundation soil...

Web Service Matching for RESTful Web Services Based on Parameter Semantic Network

Zhongbo Wu, Zhumei Dou, Chaonan Song
With the increasing demands of matching REST-ful web services in data sharing systems, a novel service match-ing method based on the parameter semantic network model is proposed. Compared with traditional matching methods of web services, the proposed method aims at classifying various web services into...

An Inter-vehicle Communication Based Cooperative Speed Suggestion Algorithm for Smoothing Fluctuations in Stop-and-go Traffic

Wang Dong, Sun Jiancong, Li Xiaohong, Xiao Zhu
Stop-and-go traffic can cause a significant amount of pollutant emissions due to frequent accelerations and decelerations. Various efforts have been made to smooth traffic flow and reduce air emissions and fuel consumption in stop-and-go conditions. In this paper, we propose a cooperative algorithm based...

Research of Trusted Authentication in Wireless Mesh Networks

Peng Zhai, Liping Zhang, Manman Cao, Ke Han
WMNs (Wireless Mesh Networks) are a new wireless broadband network structure based completely on IP technologies and have rapidly become a broadband access measure to offer high capacity, high speed and wide coverage. WMN is such a network that doesn’t need to rely on fixed infrastructure and is operated...

CCA secure type-based proxy re-encryption in the adaptive corruption model without random oracle

Yanni Chang, Mingxing He
Type-based proxy re-encryption can solve the fine-grained delegation perfectly, and being more and more important in applications. However, as we know, there is still a problem come up with type-based proxy re-encryption in adaptive corruption model. In this paper, we propose a typed-based proxy re-encryption...

A Biterm-based Dirichlet Process Topic Model for Short Texts

Pan Yali, Yin Jian, Liu Shaopeng, Li Jing
Topic models are prevalent in many fields (e.g. context analysis), which are applied to discovering the latent topics. In document modeling, conventional topic models (e.g. latent Dirichlet allocation and its variants) do well for normal documents. However, the severe data sparsity problem makes the...

Zero-IF and Modularization RF Design of Wireless Identification Reader for UHF Passive Tags

Li Linsen, Chen Gongliang, Wu Yue, Li Jianhua
In this paper, a zero-IF and modularization RF design scheme of wireless identification reader for UHF passive tags is presented. The reader works at 860-960MHz, and corresponds to the standard of EPC C1 G2 and ISO/IEC 18000-6C. The realization of some key modules is elaborated. The tests have shown...

Design and Implementation of the Networked measurement and Control System based on the Internet

Ma Shengqian, Liu Weibing, Li Xiaoyong
Distributed and networked measurement and control system has become a trend. In this paper, we designed and implemented an Internet-based networked measurement and control system. High-speed Ethernet plays the role of the field measurement and control subsystem. In this subsystem, we use the gateway...

An improved ADRC and its Application

Guo-dong Zhou, Dun-Li Zhang
Electro-hydraulic servo control system has a typical large delay, nonlinear and time-varying characteristics, which is Controlled effectively by using ADRC. To optimize the parameters of ADRC quickly, the paper presents a new ADRC structure of configurable zero point, and analysis the effect of strong...

Delayed projection neural network for solving degenerate quadratic program

Yong Yang, Jing-wen Zhang
A delayed projection neural network model is presented for solving degenerate quadratic programming problem with general linear constraints. By constructing suitable Lyapunov functions, the proposed neural network is proved to be global convergent to the equilibrium points set. Compared with the existing...

A New Hybrid Model for Video Shot Saliency Extraction

Tao Fang
Video screen shots of images are special, and they are motive compare to other images. To extract saliency maps from video images quickly and accurately is a hard task. This paper is inspired by some excellent works, employing the combination of several ideas to propose a hybrid model for extracting...