Proceedings of the 3rd International Conference on Computer Science and Service System

+ Advanced search
173 articles
Proceedings Article

Image Preprocessing Methods Used In Meteorological Measurement of the Temperature Testing System

Jiajia Zhang, Ruyi Liang, Yu Liu, Tao Jiang, Xianluo Meng, Chunai Wu
The Meteorological measurement automatic temperature testing system having a defect image. For example: noise problem, contrast is insufficient problem, put forward research programme for image pretreatment, try the median filter, histogram equalization, image binarization methods to remove noise, enhanced...
Proceedings Article

Cascade Control for Hydraulic Automatic Gauge Control of Hot Rolling Mills Based on Data-driven Theory

Zhang Xiaodong, Liu Xinping, Gao Weixi
In the paper, a cascade predictive control strategy is proposed for the hydraulic AG C (Automatic Gauge Control) system of hot rolling mills based on the data driven control theory to solve the problem of inaccurate indirect measurement and long time-delay direct measurement. Because of the influence...
Proceedings Article

Scrambling Code and Channelisation Code Parallel Generation for WCDMA on Vector Core

Yu Yongguang, You Hongyan
In a Wideband Code Division Multiple Access (WCDMA) environment, each user is assigned a unique complex-valued spreading codes to encode its information-bearing signal. The spreading sequence composed of scrambling codes and channelisation codes spread transmitted symbols and despread received chips....
Proceedings Article

Towards Cloud Computing Security Considerations in Smart Grid

Ma Shouming, Yu Chunlei, Gu Wei
Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or consumer IT services over the Internet. The cloud computing technology is especially suitable for handling series of problems in smart grid. However, the development of cloud computing technology is currently...
Proceedings Article

An Improved Ant Colony Algorithm for Probabilistic QoS Routing

Ding Genhong, Guo Dongwei, Ding Yuchen
The actual dynamic network environment urgently requires us to give full consideration to the non-precision of the network state when we design the QoS routing algorithm. Mainly by substituting the piecewise function for the probability constant which is chosen by ants when a route is selected, changing...
Proceedings Article

Design of IP Traceback System based on Generalized Bloom Filter

Chen Zhouguo, Liu Bo, Pu Shi, Huang Chen
With the rapid development of Internet, network security technology has recently attracted a lot of interest, both from academia and industry. By tracing and locating the source of network intrusion, IP traceback technology help defenders to take targeted defensive measures, counter attackers and collect...
Proceedings Article

Sinusoidal Steady-state Response Research Based on the Time Domain, S Domain and MATLAB Software

Yuying Liu, Zhijian Yin
Circuital sinusoidal steady-state analysis is the important content in such curriculums as Circuital Analysis and Signals and Systems.It is the essential knowledge for college students majoring in electric, signals and procession of signals, communication, etc.Studying the usage of time-domain method...
Proceedings Article

The Study on the Development of Decision Support Systems in Response to Catastrophic Social Risks

Zhenhua Xie, Zhen He
After the catastrophe, the key to whether the government can effectively deal with and control social risks caused by the disaster lies in whether to make the right decisions under the unified leadership and the unity of command. Therefore, the establishment of Decision Support System DSS in response...
Proceedings Article

An Effective Strategy of Area Reduction for Custom Instruction Based on Basic Cell

Liu Haiming, Ma Yuchun, Wu Qiang
Area reduction is very important for CI (Custom Instruction) on reconfigurable processor. However, for FPGA (Field Programmable Gate Array) structure, resource sharing method is inefficient for area reduction of data-path. In the paper, we propose an effective strategy of area reduction for custom instruction....
Proceedings Article

Research on Quickly Search in Massive Remote Sensing Images Based on Hbase

Chen Wu, Jicheng Quan, Yuwei Yuan, Yu Liu, Hongwei Wang, Xiuying Zhao, Mingquan Yang
On the basis of analyzing massive remote sensing images storage and HBase, Hilbert Curve was applied in image pyramid model. A solution about quickly search in massive remote sensing images was put forward in this paper. The experiment showed that the solution not only could solve the storage problem...
Proceedings Article

The Analysis of the Location Algorithm for Mobile Targets Based on Mono-Station Passive Infrared Method

Zhang Shi-quan, Yin Shi-min, Zeng Jun
The passive infrared mono-station location algorithm for mobile targets due to stationary platform are investigated. The passive location physical model and related algorithm of mobile target are established. The algorithm in this paper can be effectively applied to the location for both uniformly accelerated...
Proceedings Article

The Building of Naval Gun Dynamics Simulation Model Based on Adams

Yang Ming-hua, Wang Guo-gang
Because of conditions limit and expensive, the method of gun firing research naval gun system shooting dynamics equation generally less used. The paper carry simulates calculation based on Adams, analysis the character of naval gun system dynamics. And draw support from parts of test data checkout the...
Proceedings Article

Topological Optimization of Hubs in P2P Network

Yanmei Liu, Huanhuan Cui, Yuda Chen
This paper further studied the hubs in P2P network, and presented a strategy based on hierarchical P2P network by controlling the logical topology structure and through enhanced mechanism to avoid the formation of hubs. It firstly introduced the idea of control model, and the specific implementation...
Proceedings Article

Design and Realization of the Vibration Cylinder Barograph Data Acquisition System

Sha Feng, Wang Chang-hao, Li Hai-ming
Data acquisition system is the core module of the automated calibration software. In this paper, a vibration cylinder barograph data acquisition system has been developed, applying LabVIEW. The development environment of hardware has been described. In process of the automated calibration, the system...
Proceedings Article

Web Service Recommendation using Optimized Iterative Collaborative Filtering

Wang Binbin, Guo Jie, Zhou Zuojian, Pan Jingui
With the explosive growth of web services on the World Wide Web, service recommendation is becoming extremely important to both the service providers and the active users. In this paper, we propose a web service recommendation model which utilizes the prediction of Quality-of-Services (QoS) based on...
Proceedings Article

Control Strategy on a Class of Control System

Wu Wei, Du Wencai
It is acknowledged to build nonlinear system modelis the crucial point for control problems, the utilization of conventional control strategies can improve the system perfor-mance, i.e., system accuracy, stability and fast convergence.From fundamentally view, a model does not touch changes of its structure...
Proceedings Article

Research of Converged Cable Access Platform in Tri-networks Integration

Ni Yepeng, Yang Cheng, Liu Jianbo
In an age of tri-networks integration, CATV operators are facing huge competitive pressure from telecommunication operators. The "transformation" is the only way of CATV operators to cope with the competition. Such CATV operators should transform a single TV service provider to a multiple service operator...
Proceedings Article

A MAC Protocol Optimization Algorithm in Wireless Sensor Network Based on Real Platform

Zhang Leilei, Luo Jian
For multi-hop wireless sensor networks traffic aggregation mode transmission characteristics, proposed optimization algorithm based on CSMA protocol. Adjust the channel access strategy based on the location of of the nodes in the network, The optimization algorithm improves the equalization channel access...
Proceedings Article

Security in Next-Generation Wireless Sensor Networks

Gao Lijie, Chen Zhigang
Wireless Sensor Networks (WSNs) have been widely used in various applications. Recent advances in micro-electro-mechanical systems (MEMS) technology have enabled the development of WSN. Hardware constraints and application scenarios lead to safety problems become important problem that restrict the development...
Proceedings Article

Independent Component Analysis in development of Chinese Agriculture insurance

Xiaoxia Chen
Independent Component Analysis is a useful method to find some internal keyelement which play an important role in the development. This paper uses ICA to analyze agriculture insurance to try to find the major factorwhich has great impact. We take FastICA as analysis tool and designed parameters. According...
Proceedings Article

Provably Secure ID-Based Signature without Trusted PKG for Smart Grid

Peng Wei, Bai Xia
By using Gap Diffie-Hellman groups, we construct an efficient ID-based signature scheme without trusted PKG for smart grid, which security relies on the hardness of the Computational Diffie-Hellman Problem (CDHP). In this scheme, PKG is prevented from forging a legal user’s signature because it only...
Proceedings Article

The Technology Diffusion Effect of International Intellectual Returnees

Shuyun Li, Shaozhi Chen
By introducing returnees into the international R&D spillovers econometric model and using Chinese provincial panel data, we test the technological progress effects of returnees in various regions of China. The results show that returnees have played important roles in technological progress in various...
Proceedings Article

A Two-Dimensional Cellular Automata Based Method for Multiple Image

Ping Ping, Wang Zhi-jian, Xu Feng
This paper presents a novel CA-based multiple image encryption by using a kind of two-dimensional (2-D) reversible CA, and by using a circular chaining mode of operation. The proposed method allows images to be processed in a 2-D way and makes the statistical information of each plain image in the group...
Proceedings Article

Research on stabilization control method for humanoid robot

Lou Jianming, Zhong Qiubo, Zhang Xiaohui
For the characteristics of humanoid robot in stability control, a method called second-order cone planning is proposed for controlling the stability of robot walking. The stability control of humanoid robot is configured to convert the second order cone to be suitable for solving the problem by derivating...
Proceedings Article

Extracting Historical Information and Fault Localization Information that may Contribute to the Effectiveness of Test Case Prioritization

Lin Chu-Ti, Guo Sin-Ting, Wang Jiun-Shiang, Tsai Chang-Shi
The goal of test case prioritization is to schedule the test cases in an order so that the faults in the software will be detected early during the regression testing. So far, a lot of test case prioritization techniques have been proposed and received considerable attention. However, there is currently...
Proceedings Article

Development and Application of Integrated Services in Metropolitan Area Transmission Network

Shuyan Wang, Xiaohui Li
With the high-speed development of contemporary communication industry, Metropolitan networks is required to be a multi-Service platform for transmission. This article introduces the application of two key technologies, PTN and MSTP from the point of application, and the development process and construction...
Proceedings Article

Automatic MR Brain Tumor Image Segmentation

Lu Yisu, Chen Wufan
Traditional Dirichlet process mixture (MDP) models has the characteristic that the image segmentation can be done without initialization of clustering numbers. For the computing speed of the classical MDP segmentation is jogging, a new kind of nonparametric segmentation (DMMDP algorithm) combined with...
Proceedings Article

Line Correction for Robot Go-Forward using Image Detection Approach

Hsia Shih-Chang, Fu Wei-Siang
In this paper, we present a line correction method for robot moving control based on image detection approach. By statistics of horizontal vector, the line deviation can be estimated, and then to control the speed of motor to trim the moving direction. For real-time control requirement, we presented...
Proceedings Article

Discovering the Potentials and Directions of Mobile Payment Applications Development an Exploratory Study in Taiwan

Liu Hsuan-Hung, Tsai Dwen-Ren
Globally, rapid growth of mobile payment, many consumer brands will be integrated into the trend of mobile payment applications, thereby displaying mobile payments continues to grow and change the Electronic Commerce and Mobile commerce of consumer habits. However, current literature pays attention to...
Proceedings Article

The Application of Genetic Algorithm in the Optimal Offer of Stochastic Number of Bidders

Chen Guodong
Competitive bidding is widely used in international equipment procurements and construction projects for the moment. With the development of market economy in our country, competitive bidding is introduced in various industries, especially popular in the large-scale construction projects and government...
Proceedings Article

Weight Calculation And Purity Identification Of Symplectic Self-orthogonal Codes

Kai Cao, Luobin Guo, Chaoyang Li, Yuxiang Zheng, Leinan He, Zhenpeng Zhao
The purity identification of quantum error-correcting codes and symplectic self-orthogonal is a pivotal problem in quantum code theory. This work is dedicated to some issues of symplectic codes. First, by the MacWillams identity, a fast algorithm to determine the weight polynomial of high-dimension symplectic...
Proceedings Article

User-credibility Based Service Reputation Management for Service Selection

Jiuxin Cao, Yi Dong, Yi Qin, Bo Liu, Fang Dong, Tao Zhou
In composite services, the atomic service reputation is becoming important when many similar functional services could be provided for selecting under the heterogeneous and loose- coupled circumstance . However, existing reputation measurement methods pay little attention on user credibility which has...
Proceedings Article

Realization of High-Performance Confidential Data Transmission Based on FPGA

Fan Yu, Peipei Yang
This paper uses advanced encryption standard, AES, to implement encryption algorithm and FPGA devices to achieve hardware encryption. AES commonly used to provide several security services such as data confidentiality. However, it is a challenge to design efficient hardware architectures with small hardware...
Proceedings Article

Simulation Researches on Feed Method of GSM Microstrip Antenna for Impedance Match

Jian-wei Ye, Jian-fang Ye, Jia-le Tu
In present work, the feed method of GSM microstrip antenna for impedance match was studied. Firstly, Transmission Line Model (TLM) and impedance theory were introduced. Using three-dimensional electromagnetic simulation software ANSYS Ansoft HFSS, the effects of different feed points on the E-plane and...
Proceedings Article

A Framework for Providing Dynamic Context-Aware User Interface of the Secondary Devices using the SmartTV in Home Network Environment

Moon Jaewon, Lim Tae-Beom, Park Sungju, Kum Seungwoo, Kim Kyungwon, Park Jongbin, Yoon Myunghyun, Shin Dong-Hee
The growing number of smart devices having different capabilities, service providers want to provide a nicer user interface and experience to individual users with considering device status and other environments. And a second device also allows user to interact with the contents he/she is consuming....
Proceedings Article

The Information System Security Situational Awareness Based On Cloud Computing

Zhicheng Ma, Lin Jin, Peng Yang
With the increasing amount of data in the information network, various network threats are growing. Designing efficient and reliable security situational awareness methods becomes one of the main tasks of information security. By using the Apriori algorithm based on MapReduce in the cloud computing environment...
Proceedings Article

A Fast Mode Decision Algorithm for Intra Prediction in HEVC

Wei Li, Rangding Wang, Jiaji Wang, Dawen Xu, Jian Xu
To reduce the intra encoding complexity of HEVC, a fast intra prediction mode decision algorithm is proposed in this paper. According to different size of prediction unit, based on statistical data, the algorithm uses threshold method to exclude the intra prediction modes of small possibility, then reduce...
Proceedings Article

Effectiveness of Mental Model-Based Training for Complex System Operators: A Quasi-Experimental Study

Lin Xiaomin, Bai Xinwen, Hao Jianming
Previous research has indicated that operators of complex systems will achieve higher system operation efficiency and better job performance when they hold high quality mental models. Authors of recent studies have called for greater attention toward how to improve the development of mental models especially...
Proceedings Article

Improved Grouping Genetic Algorithm for the Pickup and Delivery Problem with Time Windows

Ding Genhong, Mao Juncheng, Ding Yuchen
The Pickup and Delivery Problem with Time Windows (PDPTW) is an NP-hard problem. This paper studies the Grouping Genetic Algorithm for solving the PDPTW. The insertion heuristic algorithm which can generate feasible solutions was improved by adding a certain taboo mechanism, and then five adjustment...
Proceedings Article

Secure Communication Scheme for Color Image Based on Index Technology

Peng Jingyu, Ren Yong
A secure communication scheme for true color image was proposed. It is aimed at the hiding problem of a huge amount of true-color image data in the covert communication and maintaining the good visual quality of carrier image. Secure communication is achieved by combining encryption and hiding. Encryption...
Proceedings Article

Spectral Clustering Based on Multi-scale Stochastic Tree Image Segmentation Algorithm

Chen Yuantao, Zuo Jingwen
For spectral clustering is applied to image segmentation is difficult to calculate the spectral weight matrix of the actual problem, we have defined the pixel distance between the point and the class is given a sampling theorem, the design of a hierarchical image segmentation algorithm in the use of...
Proceedings Article

An Improved Monte Carlo Ray Tracing for Large-Scale Rendering in Hadoop

Li Rui, Zheng Yue
To improve the performance of large-scale rendering, it requires not only a good view of data structure, but also less disk and network access, especially for achieving the realistic visual effects. This paper presents an optimization method of global illumination rendering for large datasets. We improved...
Proceedings Article

An Estimation Algorithm of Carrier Frequency Offset Based on Signal Reconstruction in Cooperative OFDM System

Bao Jingjing, Liu Yuan
In cooperative OFDM system, because of the OFDM technology, cooperative communication system is very sensitive to carrier frequency offset, a tiny carrier frequency offset will cause the inter-carrier interference. An estimation algorithm of carrier frequency offset based on signal reconstruction is...
Proceedings Article

A New Selection Model for the Adaptability Scheme of Graduate Employment Information System

Dong Li-Li
In order to improve graduate employment information system (GEIS) adaptability, the Improvement Scheme of GEIS adaptability is studied. Firstly, an index system for GEIS adaptability is established. Secondly, the selection model for the adaptability scheme is built based on QFD method, and the selection...
Proceedings Article

Application of Association Rules Data Mining in the Determination the Operation Target Values in the Thermal Power Plant

Xiang Wan, Niansu Hu, Min Huo
As the parameters from the thermal power plant DCS (Distributed Control System) data have closely relationships, the association rules data mining is tried to be applied in the determination the optimization values in the thermal power plant. A model is built by the mining tools Clementine 12.0 based...
Proceedings Article

Airy pulses interactions with solitons

Wu Hao, Fu Xiquan
We investigate and analyze finite energy Airy pulses interactions with temporal solitons in nonlinear fiber at the same center wavelength, via split step Fourier numerical simulation. The results show that the Airy main lobe is partly trapped by temporal solitons, and the trapped pulse that can present...
Proceedings Article

A Computer Aided Case Tool for Temporal Knowledge Visualization

Wang Yue, Ma Jixin
The Internet has become a very important information source. Take Twitter for example: the tweets people post various kinds of data on the internet, usually with rich temporal and spatial aspects such as valid time, transaction time, location, and so on. In this paper we introduce a computer aided case...
Proceedings Article

Optimization Service Migration Scheme for Load Balance in Cloud Computing

Yingchi Mao, Jiulong Wang, Lili Zhu, Qing Jie
Large-scale development of Web services and cloud computing bring enterprises and users new experience. In the traditional service system architecture, large-scale number of service access and execution make some of the nodes overload and seriously affect the quality of services. Therefore, it becomes...
Proceedings Article

Application Research on The Equipment Measuring Sludge Thickness in Coalmine Channel

Qiu Xingguo, Fang Yisong
For solving the problem of measuring sludge thickness in coalmine channel,the paper discusses a new measuring method based on the difference of penetration when light spread in different medium.The method combines computer science,sensor technology,data communication technology,which measures sludge...
Proceedings Article

A Novel Lightweight Authentication Protocol for YML Framework

Lv Xin, Chen Hao, Xu Feng, Mao Yingchi
YML framework is a well-adapted advanced tool to support designing and executing portable parallel applications over large scale peer to peer and grid middleware. It is necessary to introduce some security mechanisms for the improvement and extension of the framework. To secure the authentication process,...
Proceedings Article

PSDRA: Priority selection delivery routing algorithm in opportunity network

Wu Jia, Chen Zhi-gang
The randomness of the opportunistic network and the disconnection of transmission area results in many difficulties in information transmission. In this paper, a new routing algorithm is called priority selection delivery routing algorithm (PSDRA). It has been designed through selecting the optimal node...
Proceedings Article

Identification of Different Patterns of MP3 and Duration Calculation

Li Yaqi, Cao Yizhen
With the development of technology and internet, mp3 has become a recognized music data format due to the advantages of its convenience. At present, the developers use some methods to analyze header and calculate the duration of mp3 with different header format. However some of the calculated durations...
Proceedings Article

Limiting Privacy Breaches in Differential Privacy

Ouyang Jia, Yin Jian, Liu Shaopeng
In recently years, privacy-preserving data mining has become more import and attractedmore attention from data mining community. Among the existing privacy preserving models, -differential privacy provides the strongest privacy guarantees and has no assumption about the adversary’s background information...
Proceedings Article

Improved PSO Algorithm and its Application in Function Optimization

Dun-Li Zhang, Guo-dong Zhou
To solve the problem in function optimization using Particle Swarm Optimization algorithm (PSO), this paper propose an improved PSO algorithm adopting gradient information. There are some merits such as simplicity, high effectiveness and so on about function optimization using PSO algorithm. But some...
Proceedings Article

Mobile Data Exchange Model for Large-scale Campus Network based on EXI

Chunyan Yu, Huibin Wang, Shenghui Zhao
In large-scale campus network, large amounts of mobile data exchange frequently. Transmission time and energy are consumed too much when smart mobile devices accessing the XML-based Web services. In this paper, a data exchange model is proposed which is based on EXI (Efficient XML Interchange) standard....
Proceedings Article

A New Method to Detect Primary User Emulation Attacks in Cognitive Radio Networks

Peng Kai, Zeng Fanzi, Zeng Qingguang
Cognitive radio (CR) can improve the utilization of the spectrum by making use of licensed spectrum in an opportunistic manner. However, the security aspects of cognitive radio networks have garnered little attention. In this paper, we identify a threat to cognitive radio networks, which we call the...
Proceedings Article

Sequence Join

Xiaomei Song, Xiaojun Ye, Xiaoqing Zeng, Dong Xie
This article put forward a new join technology for tables of relational database, named sequence join.Sequence join make a tuplematch other one tuple according to the disk address. The technology of the specific method can help solve these problems: the number of columns in arelational table is too large...
Proceedings Article

The Impact of Topological Characteristics on Ad Hoc Networks based on Complex Network

Wang Dong, Li Xianyu
Topological characteristics is the foundation for optimizing topology structure and designing protocols. In this work, we study broadly the topological characteristics of Ad hoc networks through the perspective of complex network and identify the small-world effect, scale-free property, clustering property...
Proceedings Article

Spectrum allocation algorithm under the novel channel handover constraint in cognitive radio network

Chen Kuangyu, Zeng Fanzi, Zeng Qingguang
Dynamic spectrum (channel) allocation in cognitive radio network is the effective measure to solve the low utility of spectrum resource. Spectrum (channel) handover will degrade network performance and cause large amounts of energy consumption. This paper proposes a novel spectrum allocation algorithm...
Proceedings Article

A Robust Image Retireval Algorithm Based on Interest points

Gao Wenwen, Sun Yanhong
The global features can not capture all parts of the image having different characteristics and can not contain the spatial features. so in this work we present a novel approach which extracts the local color and texture features based on interest points and utilizes the local information of the interest...
Proceedings Article

The Adaptability Evaluation of Graduate Employment Information System

Dong Lili
In this paper, a set of evaluation system is proposed by GQM (Goal-Question-Metrics) for graduate employment information system (GEIS). Then based on Similarity to Ideal Solution, the evaluation model is proposed to evaluate GEIS adaptability. Finally, the application of the evaluation system and model...
Proceedings Article

EPKM:An Efficient and Practical Key Management Scheme for Hierarchical Wireless Sensor Networks

Wei Yang, Yue Qi, Xinqiang Luo, Qin Wang
Wirless sensor networks are becoming increasingly attactiv for military,wildlife monitoring and other applications. Usually the sensor nodes are deployed in a dangerous and untrusted area.Therefore,network security becomes very important.Key management is the core areas of the security. In this paper,we...
Proceedings Article

Improved Technique of PAPR Reduction Combined Pre-distortion in OFDM Systems

Luo Zhinian, Shi Jian
Orthogonal Frequency Division Multiplexing (OFDM) is an effective parallel multi-carrier transmission scheme. However, this technique has one weakness of a higher transmission signal Peak to Average Power Ratio (PAPR) when the signal is transmitted. To reduce the impact of High Power Amplifier (HPA)...
Proceedings Article

A Novel Protein Complex Identification Algorithm Based on the Integration of Local Network Topology and Gene Ontology

Luo Jiawei, Wang Xiaoping
The identification of protein complexes is an essential step to understand the principles of cellular organization and biochemical phenomena. A large dataset of experimentally detected protein-protein interactions (PPI) has been determined using high-throughput experimental techniques. However, these...
Proceedings Article

A Research on the Performance Communication Questions in Enterprise Performance Management

Li Zhiwei
The effective performance management is an important part to promote the personnel quality and realize the organization goal. Moreover, the performance communication is the key of performance management, playing a vital role in every link in performance management. But due to the problems such as “the...
Proceedings Article

Vehicle service middleware based on OSGi

Luo Juan, Wu Feng, Alkubati Fahmi Ameen Abdo
Embedded system for the automotive electronics becomes increasingly powerful, whereas the system structure becomes more complex. There is a high coupling between hardware and software which makes it hard to develop applications. To solve this problem, we proposed a middleware based on OSGi, namely OSGiIV....
Proceedings Article

Research of Permanent Magnetic Brushless DC Motor Fuzzy Self-adaptive PID Controller Based on Matlab / Simulink

Xuejie Wang, Peng Wang, Ying Lou
The permanent magnet brushless DC (BLDC) motor is a typical Multiple variables, nonlinear system. In this paper, the fuzzy control technique was applied to the BLDC control system, realization of traditional PID controller parameters on line adjustment, the BLDC double closed loop speed regulation system...
Proceedings Article

An Alternative Algorithm For Forward Resource Scheduling in CDMA2000-1X EVDO Network

Zou Tiegang, Du Wenpeng
G-fair algorithm is popularly used for forward resource scheduling in CDMA2000-1X EVDO network. It is generally acknowledged that G-fair algorithm takes into account both maximum system throughput and fairness. However, according to the result of simulation and test in actual network, when G-fair algorithm...
Proceedings Article

Combination of Color and Significant Edge Features in Image Retrieval

Chen Liu, Zhou Wei
Content Based Image Retrieval (CBIR) has been stirred in last decades since the dramatic rise in the sizes of images databases. In this paper, a CBIR system is proposed combining features of color and significant edge. To promote the whole performance, compact quantizing method in HSV color space and...
Proceedings Article

A Grid-based Unequal Clustering Algorithm for the Multi-hop Routing in WSN

Xu Ying, Zheng Xiongfei, Li Renfa
Wireless sensor network consists of energy-constrained sensor nodes that are densely distributed in a monitoring area. Therefore, how to effectively use the energy of nodes to prolong the network lifetime becomes a key research topic. A grid-based unequal clustering algorithm for the multi-hop routing...
Proceedings Article

Salient Region Detection based on Frequency-tuning and Region Contrast

Li-hua Fu, Liang Guo, Wei-dong Wu
Frequency-tuned saliency detection analyzes image saliency from the perspective of frequency domain and fully combines image segmentation method, which outputs well-defined boundaries of salient objects. However, the method ignores spatial relationships across image parts. This paper proposes an improved...
Proceedings Article

A scheme supporting efficient attribute revocation for cloud storage based on CPABE

Cai Bodong, Xiong LiaoTe, Ye Junyan, Ma Meng, Tang Zhuo
For low efficient of key management, most cloud centers lack fine-grained attribute revocation, which only support revocation of the keys. This paper proposes a novel access policy which supporting fine-grained attributes revocation based on CP-ABE. In this paper, we firstly re-design the key manage...
Proceedings Article

Disambiguating named entities by semantic web

Azari Ideh, Koohpeyma Fateme
There are many words in natural language sentences which describe an object or event in real world. An important step to understand a sentence is finding the exact meaning of all words. In this paper we propose an approach to identify meaning of each named entity of a text by using web of data (LOD)...