Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)

+ Advanced search
794 articles
Proceedings Article

An on-Chip Clock Controller for Testing Fault in System on Chip

Wei Lin, Wen-Long Shi
In this paper, an on-chip clock (OCC) controller with bypass function based on an internal phase-locked loop (PLL) is designed to test the faults in system on chip (SOC), such as the transition-delay faults and the stuck-at faults. A clock chain logic which can eliminate the metastable state is realized...
Proceedings Article

A Study on Turbo Code Performance Based on AWGN Channel

Peng Zhu, Jun Zhu, Xiang Liu
Turbo codes have a wide range of applications in 3G mobile communications, deep-sea communications, satellite communications and other power constrained fields. In the paper, the Turbo Code Decoding Principle and several major decoding methods are introduced. Simulations of Turbo code performance under...
Proceedings Article

The Application of Authorware to the English Teaching in the Multimedia Environment

Xu Tian, Yanling Lv
The development of multimedia technology in computer science enriches the traditional English teaching methods. As soon as the new technology applies to the English teaching, it arouses the attention and is welcomed by the English teaching professors both abroad and at home. At present, the multimedia...
Proceedings Article

Resource-sharing Construction of Area E-government Information Based on Cloud-computing

Linna Huang, Baoguo Gu
Cloud computing, with superior computing power, low-cost and high-security, will be applied to the resource-sharing area of E-government information with great significance and value. From the point of theory, technology and practice, it is scientifically feasible to build a cloud-based E-government...
Proceedings Article

Weight Set Of State Estimation Based on Partition

Jiayi Zang
In power system state estimation, bad data of local area can make state estimation difficult, and accuracy of measurement can also have great influence on the result of state estimation. Based on grid partition, this paper forms a lot of independent sub area, then measurement weights are adjusted using...
Proceedings Article

Research of Shielding Effectiveness of Metallic Experiment Box Based on Modal Method of Moments

Guishu Xia, Chao Zhou
In this paper, electric field shielding effectiveness (SE) of metallic experiment box with apertures illuminated by vertical polarization plane wave has been studied by using modal method of moment technique. Electric field SE has been calculated at three different points on the same plane inside enclosure....
Proceedings Article

A Pneumatic Miniature Robotic Control System Based on Improved Single Neural Network PID Control

Wen Li, Hong-Min Li
At present pneumatic miniature robotic control system usually adopts PID control strategy. The basic PID control strategy has its limitations. To cope with this problem, a lot of methods to optimize this strategy have been researched. In the paper an improved single neural network PID control strategy...
Proceedings Article

A digital watermark algorithm based on DCT and improved Watson perceptual model

Shaoyu Chen, Xinwei Wang
An adaptive image watermarking algorithm is proposed based on block Discrete Cosine Transformation(DCT) and the improved perceptual model of Human Visual system(HVS).At first, the digital watermark is transformed by Arnold, then it is effective to make full use of the improved perceptual model in DCT...
Proceedings Article

A Programmable Approach to Evaluate Ramanujan Sums

Lina Zhou, Zulin Wang, Jiadong Shang, Lei Zhao, Song Pan
Ramanujan sums, which have been widely researched in mathematics, recently began to attract more attentions in signal processing and communications. The traditional methods to get the values of Ramanujan sums follow the definition and formulas in number theory, both of which need factorization information....
Proceedings Article

Improvements of RSA algorithm for hardware encryption implementation based on FPGA

Youguo Li
In the field of information security, encryption and decryption operations in RSA cryptographic algorithm are both modular exponentiation. The direct computing method to implement this algorithm through software programming is to multiply M e times with iteration statements and later make modulo operations....
Proceedings Article

Status and Design of Digital Oilfield

Xiaohong Xu, Hu Tian, Jilin Fu, Zhihua Sun, Xin Xu
At present, the global petroleum exploration and production enterprises are all faced with dual huge pressures which are to lower operating costs and improve labor productivity, but the appearance of digital oilfield let these companies find a silver lining. This paper expounds the difficulties that...
Proceedings Article

The Application of GIS in The Digital Oilfield Construction

Xiaohong Xu, Yanlin Shao, Jilin Fu, Zhihua Sun, Xin Xu
In the 21 century, the construction of oil and gas resources information system has stepped into the mature and development stage, However,it also faces two technical difficulties: multi-data integration and the integration of attribute information and location information.This paper analyzes the technical...
Proceedings Article

Simulation Algorithm of Naval Vessel Radiation Noise

Jun XIE, Liang-long DA
Propeller cavitation noise continuous spectrum results from noise radiated from random collapses of a large number of cavitation bubbles. In consideration of randomicity of initial collapse of cavitation bubbles and similarity of frequency spectrums of various cavitation bubble radiated noises, theoretical...
Proceedings Article

A Hardware Design of EDT Algorithm Applied to Binary Images

Hanxi Feng, Liping Tang, Peifeng Zeng
In this paper, a hardware Euclidean distance transform (EDT) algorithm is proposed. The binary image data of each row are independent. For a binary image, the row distances and column distances are separately calculated. By taking the advantage of these two characteristics, a parallel EDT circuit based...
Proceedings Article

Sensitivity analysis of parameter variation in T network impedance-matching

Jianwen Tan, Sijian Deng, Fangwei Ye, Chunliang Zhao, Deping Zeng
In the practical application of passive network impedance matching, variations in component tolerance, process, and load impedance may make the performance of impedance-matching network deviate from the designed or simulated result. The current work investigates the effect of these parameter variations...
Proceedings Article

Design and Implementation of Teaching and Training System Based on Radar Hardware-in-loop Simulation

Jun LUO, Ji-shan ZHANG, Wen-jun LU, Shuang-xi SUN, Dong-hui PENG
On the basis of a certain type of radar is proposed to establish based on C / S architecture, teaching and training loop simulation of radar system design. System prototype developed by the host analog receiver with the received signal, and display the data passed to the client, and then displayed by...
Proceedings Article

A Method for Parallel Arc Fault Detection and Identification

Yuan Wu, Zhengxiang Song, Jianhua Wang
Every year, fires bring great loss and damage, and arc faults is one of main causes. But it is identified that the conventional circuit breakers fail to interrupt the circuit when an arc fault occurs. It is necessary to find new protecting techniques to improve the safety of circuits and reduce the probability...
Proceedings Article

Study on Method of Underwater Electromagnetic Target Dimension Recognition

Zhiliang Ren, Siwei Tan, Changcun Sun, Jiong Sun
The detection range and the equipment-target encounter speed are key factors to the capability of target dimension recognition in an underwater electromagnetic detection system. In view of that, a novel dimension recognition method based on the detection range and the encounter speed extracting was proposed...
Proceedings Article

Silicon detector for the Saline Soil Degree in ETM Image

Tao CHI, Song ZHANG, Guofu FENG
A silicon photoconductor apparatus having improved efficiency in infrared radiation detection by sandblasting the reflective surface of the apparatus and thereby creating a near-infinite number of reflecting angles and a corresponding multiplication of quantum energy yield. This article describes its...
Proceedings Article

Based on the Quickbird remote-sensing image of Aoshan vegetation extraction

Xue-xian Li, Guang-wei Wang, Hong-jun Pan, Chang-song Qi
On the analysis of terrain spectral features of Aoshan remote-sensing image, we identify spectral differences between the vegetation and other surface features, it combines mathematical morphology with vegetation distribution planning to complete the vegetation area extraction. Thus it can effectively...
Proceedings Article

Application of AHP to security protection ability comprehensive evaluation during classified evaluation

Jing Yuan, Weihong Ren
On the basis of analyzing the situation of classified evaluation, this paper brings forward a security protection ability evaluating indicators system based on AHP. According to the algorithm of AHP, the hierarchical architecture, the computing method of indicator weights and synthetic weight are established....
Proceedings Article

Visualization of Vector Data on Global Scale Terrain

Baosong Deng, Dong Xu, Jinxia Zhang, Chiyang Song
Vector represents a major category of data managed by GIS, which is traditionally used for representing geographic entities such as political borders, roads, rivers and cadastral information. In this paper we present a key data structure and associated render-time algorithm for the combined display of...
Proceedings Article

Fire Fighting Equipment Management Based on Grid Technology

Xianghui He, Qingying Zhang
This paper put forward the new idea of combining the fire equipment with grid technology in order to improve the efficiency of the fire fighting equipment management, as well as to ensure effective supervision of fire fighting equipment.
Proceedings Article

Distributed Collaborative DDoS detection method based on traffic classification features

Zeyu Xiong, Yongjun Wang, XiaoFeng Wang
This paper classifies the DDoS attack prevention technology from the view of defense stage and defensive position. DDoS attacks have relatively low proportion of normal flow in the boundary network at the attack traffic, and the characteristics of the network are not very obviously. For these characteristics,...
Proceedings Article

The Research and Application of Improved Decision Tree Algorithm in University Performance Analysis

Wushi Gao, Yunfeng Dong, Kan Li
with the promoting of education informationization process, more and more complex data is accumulated, the data mining techniques used in education. The work, that finding in hidden and useful information to guide education from large number of educational data, will be helpful to the education reform...
Proceedings Article

A 3D Simulation approach of Pool Fire

Jianfeng Zhou
Pool fire is a major accident type of flammable liquid. In this paper, a particle system based 3D simulation model of pool fire flame is established. On this basis, a multi-point source model of pool fire thermal radiation is proposed. Each living particle in the particle system is considered as a radiation...
Proceedings Article

CFD numerical simulation analysis of small and medium caliber 90 ° circular bend

Kai Wan, Ping Wang
Using standard k- model with FLUENT software on large diameter CFD numerical simulation of air flow in a 90 ° bent tube, are three dimensional stress field and velocity field in the pipe. To explore non-change law of fully developed pipe flow through CFD numerical simulation on large-diameter flue gas,...
Proceedings Article

An Improved Data Mining Algorithm Based on Concept Lattice

Xiao-feng Li, Jian-guo Luo, An Shi
In order to solve the multidimensional data model and relational data model, query between the two-way data system query, data cleansing, data conversion, centralized, distributed data accuracy and consistency control problem, this paper described the concept of grid-related, the global data mining combined...
Proceedings Article

A virtualization-based method for analysis of Cisco IOS

Cheng Zeng, Shengli Liu, Ligen Cehn, Da Xiao
Traditional debugging and disassembly tools are much demanding to analyze as well as debug Cisco IOS. At the same time, analysis with these tools isn’t performed in single-step. In addition, some other defects also contribute to its inaccuracy. This paper presents a dynamic debugging platform based on...
Proceedings Article

A model for airline seat control considering risk and discount

Wei Fan, Jianwei Wang
Most seat control models rely on the concept of marginal seat revenue and the assumption of risk neutrality to develop an policy to solve this kind of problem. For the multi-leg dynamic seat control problem ,this study proposed a modified multi-leg policy to take risk into consideration by discounting...
Proceedings Article

An Active Energy balancing System for Lithium-Ion Battery Pack

Yu Zeng, Zhiwei He, Mingyu Gao, Hongtian Pan
In this paper, a cell balancing circuit for the Lithium-ion battery pack based on the Flyback topology is proposed. Balancing the lithium-ion battery pack is often employed to improve the energy utilization and lifetime of the battery. The proposed circuit uses the minimized power path to simplify the...
Proceedings Article

Failure Categorization for Problem Diagnosis on Exception-Based Software Systems

Shuhai Li
Traditionally, distributed system software developers print log messages when creating a program to track the runtime status of a system to help identify where problems may have occurred while the program is running. People often use system logs produced by distributed systems for troubleshooting and...
Proceedings Article

Information system of warehousing logistics enterprise

Yumin Tao, Qingying Zhang, Jing Liu, Zhengguo Wang
The logistics processes of the storage logistics enterprises is analyzed, the warehousing information models, system structures, management modules and their operational processes are studied, to provide enterprises with an automatic business information platform which not only meets internal management...
Proceedings Article

Design and Implementation of Wireless Data Link Calibration Equipment of UAV

Jun Luo, Wen-jun Lu, Fei Ye, Shuang-xi Sun, Dong-hui Peng
UAV system with a wireless data link for the calibration and test objects, designed and implemented a wireless data link system calibration equipment, medium-range UAV system to solve the simple means of technical support, equipment calibration testing process takes a long time, personnel, results poor...
Proceedings Article

Orientation estimation for corner detection

Ling-wei Ye, Zhe Wang, Wei Feng
Although many work have been done on corner detection, no generally accepted mathematical definition exists. This paper gives an explicit definition of corner which is based on the multi-orientation nature of corner and presents an algorithm for corner detection based on orientation estimation. Experimental...
Proceedings Article

Application of One-Cycle Control Based on Active Power Filter

Lan Li, Zeng-shang Kang
For the great deal of harmonics and reactive power produced by these non-linear devices, active power filter can effectively compensate.To all alone realize the harmonic component and reactive power compensation,or to compensate both at the same time,the ip-iq detection method is applied in active power...
Proceedings Article

Information systems for the manufacturing supply chain management

Qian Shi, Qingying Zhang, Zhengguo Wang
Information is one of the crucial factors of supply chain management, as well as manufacturing industry. The requirements of manufacturing supply chain management, the exchange of information between enterprises are stated, system architecture and function are built, so as to find a way to optimize the...
Proceedings Article

An Improved Algorithm Research of Transit Signal Priority Based on Bi-objective Optimization Model

Tianhong Gu, Huijian Cao
Optimization of adaptive traffic signal timing is one of the most complex problems in traffic control systems. In order to obtain control parameters of bus signal priority of the urban roads, a bi-objective optimization model for signal timing is established based on real-time data of GPS. As the goal...
Proceedings Article

Design and realization of CNG intelligent monitoring system

Zhen-hua Wang, Ge-fei Yu, Chun-ming Chen, Yin-ting Wang
One CNG remote intelligent monitoring system is designed and realized in this article. The monitoring system can receive real time monitoring information and monitor environment of CNG filling station by using GSM short message platform , terminal PC and cell phone based on ARM microprocessor, PTM100GSM...
Proceedings Article

Trust in Cyberspace: New Information Security Paradigm

R. Uzal, D. Riesco, G. Montejano, N. Debnath
This paper is about the differences between traditional and new Information Security paradigms, the conceptual difference between “known computer viruses” and sophisticated Cyber Weapons, the existence of a Cyber Weapons “black market”, the differences between Cyber War, Cyber Terrorism and Cyber Crime,...
Proceedings Article

A Methodology Based on Business Intelligence for the Development of Predictive Applications in Self-Adapting Environments

Marcelo Fabio Roldan, Joyati Debnath
Based on different methodologies, we have developed a new methodology that synthesizes, accelerates and optimizes the application of Adaptive Business Intelligence (ABI) in medicine, genomics, pharmaceuticals and other related sciences. This methodology -in its final phase- culminates in a stage called...
Proceedings Article

A Machine Learning Algorithm of Human-Computer-Interface Application-An AdaRank Model Approach to Facial Expression Recognition

Chang-Yi Kao, Chin-Shyurng Fahn
A completely automatic facial expression recognition system is presented in this paper, which consists of three main procedures. The first is based on skin color blocks and geometrical properties applied to eliminate the skin color regions that do not belong to the face in the HSV color space. Than we...
Proceedings Article

Analysis of the Type of Information Society Website

Zhenghong Wang, Xiaoping Li
Rely on the development of information technology, information industry has become an important symbol of the information society. The information industry is the electronic information industry to provide information products and information services. This article through the analysis of the current...
Proceedings Article

A dynamic statistical method based on peer grouping for spatial data access laws in a distributed system

Shaoming Pan, Zhengquan XU, Xiaojun Liu
The spatial data access laws reflects the general characteristics of user preferences in tile access. According to the access laws, the strategy of storage and organization can be adjusted and utilized to store the spatial data in right place. However, the tile access has dynamic features(server peer...
Proceedings Article

An Access Control System Based on Multistage Firewalls

Xingcheng Zhang, Zhongpan Qiu, Zhijun Song
In accordance with the company’s request, we have designed an Access Control System based on multistage firewalls, whose work flow consists of the centralized management, application, check and automatically alteration of firewalls, to effectively control the access to the server from the clients. In...
Proceedings Article

Applying Particle Swarm Optimization and Differential Evolution Combined with Finite Element Method to Optimize Cable

Zhipeng Jiang, Xishan Wen, Xiaoqing Yuan
Particle swarm optimization (PSO) and differential evolution (DE) algorithm are biologically inspired computing, which simulate the behavior of survival of the fittest from the systems of nature biology, ecology and so on. As heuristic random algorithms, they have characteristics of self-adaptation,...
Proceedings Article

The Improvement Algorithm of Wavelet in Spectral Analysis

Wei Ping Cui, Zhi Wen Cao, Yong Liu
This article is mainly about the application of wavelet in spectrum analysis. In signal processing, we usually need to know different frequency components in the signal. We use the frequency bands dividing characteristic of wavelet and FFT to process signals and pick up different frequency components....
Proceedings Article

Researches on the Coordinated Rescue of Multi-helicopters Based on Feasibility Matrix and Track Planning

Zheng-hong Xia, Wei-jun Pan
the multi-objective distribution of multi-helicopter based on the feasibility matrix was proposed in this paper, which enhanced the effectiveness of aviation emergency rescue. The horizontal track planning of helicopters was put forward based on the morphology graphic process technology and heuristic...
Proceedings Article

Bearing Fault Diagnosis of Sorting Machine Induction Based on Improved Neural Network and Evidence Theory

Wei Chen, Qing-xuan Jia, Han-xu Sun, Si-cheng Nian
Roller bearing is an important mechanical element of sorting machine induction. It usually has defects in outer race, inner race or balls due to continuous metal-metal contacts in high-speed operating conditions. This paper presents a novel diagnosis algorithm based on improved neural network and D-S...
Proceedings Article

A New Synchronization Method Based on SDI with Variable-Length Frame

Yun Zhang, GuangMing Liang, RenRen Liu, Dong Hua Liu
The Serial Digital Interface is widely used in high speed uncompressed video data transmission. It's unsuitable to use the clock recovered from original data as the reference clock,because the recovered clock has large clock jitter. It must have low enough jitter. Traditionally, offset compensation and...
Proceedings Article

The Medical Image Watermarking Using Arnold Scrambling and DFT

Jingbing Li, Sui Miao
During network transmission, when an exception occurs(such as forgery, tampering, information confusion), digital medical image, as a diagnostic basis, can not serve as the evidence of medical accident case. And the ROI of medical image is unable to tolerate significant changes. In order to dealing these...
Proceedings Article

The development of Electro-hydraulic servo control system for milling based on ARM

Liping Xu, Ke Liang, Dezhi Ren
To overcome the long servo cycle, poor stability, weak parameter adaptability and other poor performances of domestic developed electro-hydraulic servo system of milling, it adopts the embedded design to set up electro-hydraulic servo control system based on STM32 MCU to realize precise control of copper...
Proceedings Article

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Qicai Yang, Futong Qin, Jianquan Bi, Qiubo Xu
Delay Tolerant Networks are characterized by intermittent connectivity, long delays and often constrained bandwidth. Delay Tolerant Networks often use multi-copy routing schemes for message transmission. Multi-copy routing schemes, such as Epidemic Routing, usually lead to congestion problems. In this...
Proceedings Article

A New Method of Designing Double-tuned Filter

Yi-hong HE, Heng SU
Aiming at the question of parameter of double-tuned filter, A new method of designing double-tuned filter is proposed based on resonance frequency, by using the relationship that the impedance of double-tund filter and two parallel single tuned filters is equal and the resonance frequency of single tuned...
Proceedings Article

Text Emotion Classification Research Based on Improved Latent Semantic Analysis Algorithm

Xuren Wang, Qiuhui Zheng
The emotion classification of text is an important research direction of text mining. Application on emotion text classification, latent semantic analysis algorithm has advantage of small occupied space, applicable to a large scale of text classifications. Compared with the traditional vector space model,...
Proceedings Article

A Static Malicious Javascript Detection Using SVM

Wei-Hong WANG, Yin-Jun LV, Hui-Bing CHEN, Zhao-Lin FANG
Malicious script,such as JavaScript, is one of the primary threats of the network security. JavaScript is not only a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications, but also used to carry out attacks taht used to steal users' credentials...
Proceedings Article

A Novel Multichannel Access Scheme with Directional Antennas in WLANs

Yuan Cheng, Suming Jiang, Lele Song
Directional antennas in wireless local area networks (WLANs) offer more benefits than traditional omni-directional antennas. Use of directional antenna can increase the spatial reuse and largely reduce the radio interference. In this paper, we attempt to propose a new medium access control (MAC) protocol...
Proceedings Article

Non-rigid registration between brain CT images and MRI brain atlas by combining grayscale information, point correspondence on the midsaggital plane and brain surface matching

Aili Gao, Mingyang Chen, Qingmao Hu
This paper presents an image registration method to warp brain atlas of magnetic resonance image (MRI) onto computed tomography (CT) brain images. A new deformable model is proposed to add constraints on corresponding midsagittal planes (MSP). The point correspondences in the MSPs are built up from registered...
Proceedings Article

An Improved Dijkstra Shortest Path Algorithm

Yizhen Huang, Qingming Yi, Min Shi
An improved Dijkstra shortest path algorithm is presented in this paper. The improved algorithm introduces a constraint function with weighted value to solve the defects of the data structure storage, such as lots of redundancy of space and time. The number of search nodes is reduced by ignoring reversed...
Proceedings Article

BER-based Optimal Power Allocation for Cognitive Relay Networks

Jun Cui, Weijia Lei, Xianzhong Xie
In this paper, we consider an optimal power allocation scheme for Rayleigh fading channels in cognitive relay networks considering both total transmit power and average interference power constraints. We derive the optimal power allocation scheme between the cognitive source and relay aiming at minimizing...
Proceedings Article

Thinking of the advance of software development method in the future

Yu Gao, Zhen-Bo Bi
Continuity of software development activities determines that software development method is bound to progress. For the future advance of development of software development methodology, six important factors are put forward. The six factors are: software development techniques and tools of, software...
Proceedings Article

Non-ideal SSS Coherent Detection in 3GPP LTE System

You Zhou, Hanying Hu, Ping Wang
In the LTE system, SSS coherent detection is one of the commonly used methods. However, Theoretical analysis of the performance of non-ideal coherent detection is rarely seen. Properly modeling the Doppler Effect and channel estimation error, the paper focuses on the mathematic deduction of non-ideal...
Proceedings Article

Application and Research on Data Mining Technology in the Hospital Information System

Hui Yang, Mei Wang, Xiangfeng Xue, Peibin Chen, Yan Dong
Most of the current medical database in hospital information system is poorly applied, the low level data integration and superficial analysis can not satisfy the automatic access to medical knowledge, not to mention the requirement of hospital management. This paper introduces the key technologies in...
Proceedings Article

A Method of Traction Partial Jamming on GPS/INS Integrated Navigation

Jun Chen, Yi Liu, Yun-hong Li, Da-ming Wang, Xin-yuan An
To solve the GPS/INS integrated navigation countermeasure problem, a method of traction partial jamming on GPS/INS integrated navigation is proposed. Deception jamming signal produced by jamming equipment can force GPS receiver to output navigation and position data that have gradual departure from the...
Proceedings Article

The Whole Trajectory Simulation of Cruise Missile Based on Inertial Navigation Error Model

Yi Liu, Hai-bo Chen, Xu Sun, Yun-hong Li
For the problem of cruise missile's performance test in complex electromagnetic environment, the whole trajectory simulation of cruise missile is researched in this paper. First, we analyze the role played by inertial navigation system(INS) in the process of cruise missile attack. Then, we build error...
Proceedings Article

A Design Method of Linux Bootloader Based on S3C2440

Xianfan XU, Kun ZHANG, Lei XU, Qiang LI
Bootloader is an important part in the developing stage of embedded system. Most embedded Linux Bootloaders are developed based on development and application, which have the disadvantages of large code capacity and low booting speed. In this paper, by only operating necessary equipments closely related...
Proceedings Article

A Trappy Alpha-Beta Search Algorithm in Chinese Chess Computer Game

Jian Fang, Jian Chi, Hong-Yi Jian
In this paper, we propose an improved alpha-beta search algorithm, named trappy alpha-beta (simply TrapA B), for game-tree in order to identify and set the potential traps in the game playing. TrapA B can be regarded as an extension of the traditional alpha-beta search algorithm which ties to predict...
Proceedings Article

Usage control: a solution to access control in a distributed- network-connected environment

Patricia Ghann, Changda Wang, Conghua Zhou
Computer and information technology has evaded our every aspect of life. Information technology is seen in all aspect of the individual from banking and investing to shopping and communicating through the use of the internet services such as emails and chat rooms. Organizations and industries also utilize...
Proceedings Article

Several Arithmetic Operations on Spiking Neural P Systems

Xianwu Peng, Jianxun Liu, Wei Liang
In this paper,we consider some simple SN P systems that perform the following arithmetic operations:two’s complement,addition/subtraction on negative integers and multiplication on two arbitrary positive integers.This paper provides an answer to an open problem about multiplication operation formulated...
Proceedings Article

High-precision absolute laser interferometer distance measurement system

Chen-yang Zhang, Shao-lan Zhu, Hao-dong He, Bing Li
With the improvement of precision in various fields, we increase high requirements for measurement accuracy. In this paper, we obtain the interference fringes change information (the distance information) with the help of laser scanning with different frequency. This interference method is an absolute...
Proceedings Article

The Secure Communication Technique Based on Lorenz Chaos System

Fei YE, Jie ZHOU, Jun LUO, Xingrong GAO
Chaos system has important application to secure communication for its indeterminism. Based on studying the theory of chaotic encryption system, the Lorenz chaos system is applied to construct serial code and encrypt information, and then an experiment of encrypting speech validates that Lorenz chaos...
Proceedings Article

Research and Analysis the Performance of NAMD- Molecular Dynamics Simulation Based Multi-core +GPU

Yang Zhang, Wen Bo Chen, Qi Feng Bai, Lian Li
Nowadays, the GPU can provide about one order of magnitude accelerated over CPU code and even more, so it can be used in large scale science computing applications. The paper based on NVIDIA Tesla C2050 and dual-core CPU server through use NAMD 2.9 simulates three differences molecule number proteins:...
Proceedings Article

Research on Basic Strategies of Constituting Software Development Method

Yu Gao, Zhen-Bo Bi
In the software methodology, the structure of the software development method is a worthy issue. After studying the structure of software development method, a rule is found. The rule is that every software development method is formed from the basic strategies of development software. Discussed the...
Proceedings Article


Kai Zong, Yurong Chen, Feng Wang
With the development of modern electronic technology, the intelligent robots are researched and developed in many areas. In this paper, the hardware circuit and system software are designed reasonably to achieve the robot carry water from origin to destination. The intelligent robot can carry water along...
Proceedings Article

The Research and Implementation of Nonferrous Metallurgy Informatization Service Platform

Nianqin Guo, Haiyan Zhu
The construction of nonferrous metallurgy informatization service platform is proposed, facing the problem of the low concentration, poor benefit and dispersive resource of nonferrous metallurgy industry in our country. The integration of nonferrous metallurgy industry information is realized, the electronic...
Proceedings Article

A characteristic set method for reflexive differential-difference polynomial systems

Zhiwang Gan, Meng Zhou
In this paper, a zero decomposition algorithm based on characteristic set methods are developed in reflexive difference and differential polynomial systems. The “generalized term order” is used to deal with negative exponents of difference operators in DD-polynomials and the reduction of two DD-polynomials...
Proceedings Article

Study on Simulation Performance of OFDM-IDMA System

Zhen-hua WANG, Ge-fei Yu, Xi Cheng, Jie Yang, Yin-ting Wang
OFDM-IDMA system with perfect performance is the key technology of 4th mobile communication. in this paper, we simulated the performance of OFDM-IDMA in AWGN and quasi-static Rayleigh channel respectively, the simulation results indicate that the performance of multi-user is close to the single use as...
Proceedings Article

Design of Monitoring Control System Based on MODBUS for Transformer Measurement Equipment

ShiBen Zhu, Xiaoping Zhang
To meet the demands of the transformer measurement equipment, it is necessary to need monitoring control system to control, display the characteristics of the testing transformer. The function of monitoring control system is to control the transformer measurement equipment which is mainly consisted of...
Proceedings Article

Design and Implementation of Improved Algorithm for Association Rules Mining

Lin Zhang, Jian-li Zhhang
For traditional algorithm of association rules mining based on frequent item sets and ignored the exception rules, as well as the traditional issues such as frequent item sets algorithm can be costly, a new association rules mining algorithm which isn’t based on frequent item sets is given in this paper....
Proceedings Article

An Improved Control Strategy of Four-wire Shunt Active Filter

Yi-hong He, Li-jun Shi
When the wind energy is separated from the power grid, explore to find a way by using four-leg active power filter to guarantee power quality to solve the problem caused by four-wire nonlinear load. Considering the disadvantage of phase locked loop, a real-time algorithm of detecting harmonic current...
Proceedings Article

Entropy-based Adaptive Image Denoising

Long Ye, Haijun Gao, Qin Zhang
Image entropy, which not only describes the average amount of information about the image source, but also reflects the statistical characteristics of image data, can be described as the properties of image features and image processing basis. This paper is aimed to put forward an adaptive image denoising...
Proceedings Article

QoS Deployment in PTN based Power Communication Networks

Yipeng Li, Zheng Wan, Lingling Zhang, Yu Zhu
Abundance of applications requires Power Communication Networks (PCN) to provide large bandwidth and QoS guarantee. PTN, the technique trend of future IP transport network, can meet the requirements. In this paper, we present details of QoS deployment in PTN based PCN of Jiangxi province of China. Firstly,...
Proceedings Article

An Enhanced Bidimensional Empirical Mode Decomposition Algorithm Based on Wavelet Transform for SAR Internal Solitary Images

Guang-Mei Wei, Bing Lie, Xing-Xing Nie
Synthetic aperture radar (SAR) produces ocean SAR solitary images which include the information of internal solitary waves (ISWs), surface wave, terraininfo and noise. Based on wavelet transform (WT) and bidimensional empirical mode decomposition (BEMD), we give a new algorithm, named wBEMD, to obtain...
Proceedings Article

The Optimal Design of Hydraulic Fracture Parameters in Fractured Gas Reservoirs with Low Porosity

Xiuling Han, Fujian Zhou, Chunming Xiong, Xiongfei Liu, Xianyou Yang
A new composite reservoir simulation model was developed to optimize the hydraulic fracture length and conductivity for guiding fracturing designs. The model is made of inner part and outer part. The inner part is dual-porosity and dual-permeability system, and the other is single porosity system. Based...
Proceedings Article

An Improved ICA Method on Resting State fMRI Data Analysis

Shengnan Yao, Weiming Zeng, Nizhuan Wang
For the resting state functional magnetic resonance imaging (fMRI) data, it has an important significance in clinical medicine to extract the functional connectivity regions (Default Mode Network, DMN). Independent component analysis (ICA) is an excellent method to detect the DMN. It has been popularly...
Proceedings Article

The Medical Image Watermarking Algorithm Based on DWT-DFT and Logistic Map

Jingbing Li, Yaoli Liu
Medical image data require strict security, confidentiality and integrity when transmitted and stored in hospitals. However, the transmission of wireless and wired networks has made the medical information vulnerable to attacks like tampering, hacking etc. And the Region of Interest(ROI) of medical image...
Proceedings Article

The service design of GetSeverDirectory based on IEC 61850

Xianfan XU, Qiang LI, Lei XU, Kun ZHANG
MMS EASE Lite development package is always used to realize IEC 61850 protocol, but this conventional developing method has several drawbacks, such as high cost, huge data redundancy and no correspondence to IEC 61850 service. Therefore, a set of communication system which can meet IEC 61850 international...
Proceedings Article

Research and Design of Data Transmission System Based on HDMI

Jiang Xiong, Qingming Yi, Min Shi, Tingting Li
An improved data transmission system based on HDMI is proposed and implemented in this paper. First, the structure and algorithm of HDMI are discussed and analyzed. Second, according to the audio/video format requirements, a data transmission system based on an improved TMDS codec algorithm of HDMI transmitter...
Proceedings Article

The investigation of situation of Taiwan adult civilians’ retrieving science or technology related information on the Internet

Yuan-Chueh Tseng, Jeng-Fung Hung
This study investigated the public information sources in science or technology in Taiwan. A survey was conducted extensively in Taiwan to study civic network scientific literacy. Participants of this study included 2,024 individuals who were selected by using probability proportional to size sampling...
Proceedings Article

A Method of Gesture Segmentation Based on Skin Color and Background Difference Method

Hong Duan, Yang Luo
This paper proposes a method of segmentation of hand gesture, based on the static skin color model and background subtraction under complex background. This paper discussed the reasonable threshold selection of Cb, Cr in the skin color model and the segmentation selection of skin area combining the background...
Proceedings Article

A Fingertip and Webbed Point Detection Method Based on K-vector and K-medoids Clustering Algorithm

Hong Duan, Kunyu Cai
The paper presents a calculation method to get the probable fingertips and webbed points in outline. First, use K-vectoe to calculate the K-slope of all points in outline and get a series of peak point sets. Then, cluster the peak point sets which have been obstained by K-medoids algorithm and get the...
Proceedings Article

A Hand Direction Vector Extraction Method Based on K Vector and K-medoids Clustering Algorithm

Hong Duan, Kunyu Cai
This paper proposed a method of computing the hand direction vector. At first, using K-vector method, compute the K-slope of all the points on the contour to get a series of peak point sets; Then, cluster the sets which have been obtained through K-medoids algorithm; At last, detect the pointing direction...
Proceedings Article

A Gestures Trajectory Recognition Method Based on DTW

Hong Duan, Yang Luo
This paper puts forward a gestures trajectory recognition method based on DTW. Through the direction characteristic to calculate trajectory characteristics, and through the coding to quantize direction characteristic, and at the same time, considering the direction of the cyclical, proposed a new distance...
Proceedings Article

Comparative Analysis of Continuous Entropy Estimation with Different Unsupervised Discretization Methods

Jian Fang, Li-Na Sui, Hong-Yi Jian
In this paper, we compare and analyze the performances of nine unsupervised discretization methods, i.e., equal width discretization (EWD), equal frequency discretization (EFD), k-means clustering discretization (KMCD), ordinal discretization (OD), fixed frequency discretization (FFD), nondisjoint discretization...
Proceedings Article

The Design of Motor Control System in Portable Ventilators

Bin Chen, Hong Li
This paper introduces a design of brushless motor control system in portable ventilators, which is based on ML4425 and C8051F330 microcontroller. For the simplify-cation in circuit design and programming, this is very suitable for portable ventilators. In the design, the ML4425 motor controller provides...
Proceedings Article

Remote maintenance system for inspection robot based on CDMA network

Dezheng Zhao, En Li, Guodong Yang, Zize Liang
In order to remotely maintain the robots for high voltage power transmission lines in field application, a remote robot maintenance system is built up based on CDMA network. Network connection between the robot and remote maintenance center is established through intranet within CDMA network. During...
Proceedings Article

The Feature Description and Identification Method of Radar Signal Based on Kernel Density Estimation

Fei YE, Xin Wang, Xingrong Gao, Jun Luo
Along with the development of modern radar technology, the radar signal system is more and more complicated. This makes the description way of the existing radar signal feature cannot effectively express and analysis it's characteristic. Therefore, in this kind of situation, a description method of radar...
Proceedings Article

Compensation for the demodulated phase errors caused by sampling frequency offset in OFDM systems

Yujie Xiong, Xiaofei Zhang, Yi Zhang
OFDM has been successfully adopted in Digital video broadcasting-terrestrial (DVB-T) due to its excellent spectral efficiency and inherent resistance to multipath effect. However, OFDM is a multi-carrier transmission technique and sampling frequency offset (SFO) always exists in OFDM systems. It must...
Proceedings Article

A Linear Time Algorithm for Cubic Subgraph of Halin Graphs

Dingjun Lou, Junfu Liu
In this paper, we design a linear time algorithm to determine whether a Halin graph H has a cubic subgraph H*. If H has, then the algorithm finds a cubic subgraph H* in H; otherwise the algorithm answers “No”
Proceedings Article

A reflective TWTA predistortion linearizer for Ka-band application

Yongfei Wang, Dongfang Zhou, Qing Hu, Ying Zhao
A predistortion linearizer used for Ka-band travelling wave tube amplifiers (TWTAs) was proposed. Based on analysis of nonlinear transfer characteristics of TWTA using a power series, the inverse nonlinear distortion characteristics of predistorter which was also the model of predistortion linearizer...