Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013)
794 articles
Proceedings Article
Fuzzy Cluster Method based on RV measure for functional MRI data analysis
Han Wang, Weiming Zeng
Functional magnetic resonance imaging (fMRI) has become one of the important tools of functional connectivity studies of the human brain. Fuzzy clustering method (FCM) is a common method for analysis of fMRI data. Traditional FCA methods measure the similarity between the BOLD time course of a centroid...
Proceedings Article
Multi-agent Simulation for the Adaptive IT Capability based on Swarm
Bing Bai, Xiuquan Deng, Zhiqiong Guo
In this paper we try to focus on the adaptive IT system’s capability of an enterprise, which describes the organization’s IT ability to support changes in firms’ products, services, business processes, organizational structures and competences when necessary. Based on the multi-agent simulation methodology,...
Proceedings Article
Design of a 2.5GHz Beam Scanning Antenna Array Controlled by Voltage Based on CRLH TL
Rui-kun Wu, GuoTai Chen
An antenna array composed with power divider and small antenna at the operating frequency of 2.5GHz is designed and investigated, and the main radiation beam of the antenna array can be controlled by bias voltage. The measured results show that the main radiation beam of the antenna array has good directivity...
Proceedings Article
Iris Recognition Using Spatial Pyramid
Kuan Xu, Lu Chen
Importance of biometric user identification is increasing everyday. In recent years, the iris recognition technology is considered to be one of the most promising biometric recognition technology. The selection of iris features has become an important issue in the field of iris recognition. In this paper,...
Proceedings Article
User Involvement in System Development Process
Zhiwei Sun
User involvement is playing a more and more important role in the system developing cycle.Meaningful user involvement in systems development and an overall user orientation is critical to the success of any development project. This paper will concern with the definition of user involvement, why it is...
Proceedings Article
A geometric modeling method based on OpenGL in virtual gallbladder surgery
Lingtao Yu, Tao Wang, Wenjie Wang, Zhengyu Wang, Baoyu Zhang
With the virtual surgery simulation system playing an increasing role in the medical filed, this paper puts forward a method of reconstructing a virtual gallbladder geometric model based on the OpenGL graphics library. Firstly, we can use 3ds Max software to build a gallbladder model and write program...
Proceedings Article
Research and Improvement on Error Back Propagation Neural Network and Learning Algorithm
Yudong Huang, Gaoqiang Yang, Rui Hao, Jianhe Guan
As the important subfield and the quintessence of Artificial Neural Network, BP Neural Network accelerated the development in this field. BP algorithm uses the steepest descent algorithm, thus there are two main shortcomings of slow convergence rate and easy to fall into local minimum. According to this,...
Proceedings Article
Virtual Prototype modeling studying of breech mechanism based on the software Pro/Engineer and ADMAS
Xin-jie Shao, Su-min Yang, Jing Chen, Hong-feng Lu
By the CAD software Pro/Engineer and dynamics simulation software ADMAS, the XX breech mechanism virtual prototype is established. At first, the 3D modeling of the XX Breech Mechanism is generated with the parametric design and virtual assembling, then the restriction and dynamic power is added on the...
Proceedings Article
The Research of The Disturbance of Lightning Strike on Rogowski Coil Current Transformer According to Wavelet Analysis
Guan-qi Liu, Long Shao, Ting Hu
Although there are many Rogowski coil current transformers being widely used, its stability and accuracy of measurement is not very good due to the effects of various factors. In practice, there are still some new interfering factors. In this paper, the principle of a new interference factors is analyzed,...
Proceedings Article
Research on Reactive Power Compensation Strategy Based on Time Series Method in Wind Farms
Guan-qi Liu, Ting Hu, Long Shao, Shu-ping Jiao
This paper presents a strategy to make reactive compensation scheme in wind farms, combing wind power prediction with voltage and reactive power integrated control. Firstly, the wind power can be predicted by using ARIMA model. Secondly, the latter two can be calculated since there is a relationship...
Proceedings Article
Short-term wind power prediction based on time series analysis model
Xiaodan Wu, Wenying Liu, Ningbo Wang, Yanhong Ma
In this paper, three kinds of prediction models based on time series analysis method are studied. Largely the process of building the wind farm short-term power forecasting model is discussed, mainly including sequence preprocessing, model identification, model order judging, parameter estimation, model...
Proceedings Article
Research on Battery’s charging system based on the Fuzzy control
Fu-shun Wang, Xue-song Suo
Based on J. A. Mas 's law and the characteristics of lead-acid battery charging, provided a intelligent and dynamic Charging ideal with a fuzzy control ideal. Experiments show: The systems based on fuzzy control enable the charging current to achieve real-time changes according to the acceptable current...
Proceedings Article
Research of Improved Active Frequency Drift with Positive Feedback Islanding Detection Method
Guan-qi Liu, Long Shao, Ting Hu
Nowadays, the active frequency drift with positive feedback (AFDPF) islanding detection method which can solve the islanding of photovoltaic (PV) systems is widely used. However, the traditional AFDPF method may cause some problems such as the missing detection of islanding and the extension of detection...
Proceedings Article
Research on Micro-Certificate based Authentication Protocol
LiPing Du, JianWei Guo, Ying Li
This paper presents a micro-certificate based authentication protocol, which is lightweight and can be used in the internet and in the internet of things. The micro-certificate is a small, and is a dynamic certificate that changed each time and can improve the security of authentication protocol. The...
Proceedings Article
Data mining Approaches in Manpower Evaluation
Jun Meng, Xiao Chen, Tianyu Zhu, Yangyang Pan
Manpower allocation determines the competence of the companies. Scientific manpower allocation calls for accurate evaluation on the abilities that the employees have for the posts. In this paper, we first present a general fuzzy clustering model for manpower evaluation for companies. To verify the approach,...
Proceedings Article
The Nonlinear Dynamics Characteristics of Stock Market and Its Variation
Jun Meng, Tianyu Zhu, Xiao Chen, Xiang Yin
The stock market is a kind of complex system with all kinds of interactions. It also shows a nonlinear characteristic. In this paper, we analysed the time series from Dow Jones indexes itself and the time series from its fluctuation difference and extracted its correlation dimension and Lyapunov exponent,...
Proceedings Article
Cubature Kalman Particle Filters
Ganlin Shan, Hai Chen, Bing Ji, Kai Zhang
To resolve the tracking problem of nonlinear/non-Gaussian systems effectively, this paper proposes a novel combination of the cubature kalman filter(CKF) with the particle filters(PF), which is called cubature kalman particle filters(CPF). In this algorithm, CKF is used to generate the importance density...
Proceedings Article
A Algorithm for Static Gesture recognition Using combination of object features
Hong Duan, Yang Luo
Proposed a static gesture recognition method for identifying characteristics of the object in combination. With the feature vector composed of five features, such as the number of fingers, gesture outline convex defect characteristics, the length and area of contour and Hu matrix, we adopted the template-matching...
Proceedings Article
Optimal Designs for the Multiresponse Polynomial Regression Models in Symmetric Domains
Xuanhao Zhang
The multiresponse polynomial regression models are deal with by a linear combination to the responses for getting a manageable single-response model. Based on this method, prove that the symmetric design is optimal in the case of multiresponse polynomial regression models in symmetric domains.
Proceedings Article
Research and Optimization of HDMI Transmitter with Pre-emphasis Strategy
Guoguan Wen, Qingming Yi, Min Shi
Pre-emphasis of LVDS driver for HDMI transmitter (HDMI-TX) is designed and implemented in this paper. HDMI supports high bandwidth and long distance transmission. However, HDMI cable high cost and instability limit its application. Therefore pre-emphasis of LVDS driver is proposed. Compared with traditional...
Proceedings Article
A Novel Architecture Based on Cloud Computing for Wireless Sensor Network
Peng Zhang, Hanlin Sun, Zheng Yan
Wireless sensor network (WSN) is widely applied in many fields since its emergence. However, the limited resources of a sensor, especially limited battery life, limited bandwidth and limited processing power, are the main challenges for deploying and operating WSNs. This paper proposes a novel architecture...
Proceedings Article
A Improved Network Risk Assessment Model Based on HMM
Yong Yan Chen, Wei Dai
In HMM risk assessment of network, relationship between the nodes is the key part to compute the state transition matrix. The change of IDS alarm level has property of randomness. To calculate the value of the IDS alarm as the input of HMM is based on the Bayesian algorithm model. Using HMM model, probability...
Proceedings Article
Link 11 Network Simulation Based on OMNeT++
Biao Fang, Gaoming Huang, Yongbin Wang, Jun Gao, Chengxu Feng, Zhen Li
In the life cycle of Tactical Data Link (TDL) system, the simulation is an indispensable key. This paper places emphasis upon a new object-oriented modular simulation framework—OMNeT++, and polling protocol of MAC layer is explored under its environment. Besides, TDL simulation model and Link11 network...
Proceedings Article
A Novel Signal Detection Algorithm for a Wide Band Detection-Finding System in the HF Band
Qin Shi, Jin-yu Xiong, Hua-feng Peng, Lai-yuan Luo
This article describes a novel multi-dimension combination signal detection algorithm based on the space-frequency-energy domain for the raw data derived from high frequency (HF) wide band direction-finding (DF) systems. According to the HF wide band DF data, the time-frequency-power spectrum and its...
Proceedings Article
Construction of distributed computer test system of the ammunition warehouse based on the grid technology
Yukui Ding, Wensu Ji, Haidan Wang, Huaizhi Zhang, Huiming Li, Quanmin Xie
Taking into account the requirements of the data processing and transmission of a large number of real-time monitoring information for the server hardware resources while establishing national ammunition warehouses, a national ammunition warehouse distributed test system is established based on the grid...
Proceedings Article
A chaotic prediction algorithm using a new cost function
Yun Bu, Wan Xin Kang
The traditional cost function, minimization mean square prediction error is not a proper cost function in chaotic series prediction, for many chaotic signals are non-Gaussian distributions. Then we present using minimization error negentropy as new cost function, and derive the nonlinear approximation...
Proceedings Article
A Novel Algorithm for Filling Incomplete Data Based on Attribute Reduction
Yang Yang, Feng Liu, Shan Xiong Chen, Xiao Wen
Traditional data filling algorithms take the unified method to fill the incomplete data, leading to the low efficiency for filling a large number of incomplete data. This paper proposes a novel algorithm for filling incomplete data based on attribute reduction. The presented algorithm first uses the...
Proceedings Article
Multi-channel Coordinated Spectrum Sensing in Cognitive Radio
Youxuan Zhao, Bisheng Pan, Hanying Hu
A multi-channel coordinated spectrum sensing method based on improved Genetic Algorithm is proposed to tackle low throughput issue due to inefficient signal channel serial detection in conventional cognitive radio. The proposed method detects different spatial frequency channels with multi-antenna of...
Proceedings Article
Parallel Programming Based on Microsoft.NET TPL
Zuomin Luo, Quanfa Zheng, Xinhong Hei, Nasser Giacaman
In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores modern task-based parallel programming using the Microsoft.NET Task Parallel Library (TPL). Firstly, this paper utilizes the two main parallel programming models: Data Parallelism and Task Parallelism,...
Proceedings Article
Predistortion Linearization of a Ku-Band TWTA for Communication Applications
Xinpeng Chen, Dongfang Zhou, Jingyuan Xu, Linchuan Yang
This paper presents a Ku-band predistortion linearization for traveling wave tube amplifiers(TWTAs), it is composed of GaAs Schottky diode and resistor-terminated transmission line. By controlling the DC bias, the linearizer is capable of providing different combinations of the amplitude and phase characteristics....
Proceedings Article
Improvement of Speed Measuring Precision for Traffic Radar
Xinjie Wu
Aiming at improving the speed precision especially when there are more than one targets run through radar speed instrument at one time, we discuss the relation between the key performance parameters and speed precision as well as speed resolution. Then the main defects of the current traffic speed radars...
Proceedings Article
Analysis and Corresponding Measures to Factors about Effecting the High Availability of Digital Campus
Xinhua Li
The digital campus is a main platform for carrying out education information of colleges, its security and stability can directly affect the education, scientific research and management of colleges whether can normal proceed. This paper analyzes the four main factors about effecting the high availability...
Proceedings Article
An efficient and provably secure certificateless short signature scheme
Shu-Rong Feng, Jiao Mo, Hua Zhang, Zheng-Ping Jin
Certificateless short signature can not only have the advantage of certificateless signature, but also provide a short signature size in communication. However , all existing certificateless short signature scheme only proven secure against a normal adversary which can only obtain the valid signatures...
Proceedings Article
Nonlinearity test and compensation of the passive AFOCT's scale factor
Yue-yu Xiao, Jin-kui Yan, Lei Peng
In order to compensate the nonlinear error of passive all-fiber optic current transformers (AFOCT) in the case of large current input, a new method based on the inverse function correction is presented. Taking the feature of the AFOCT’s nonlinear response into account, a high-order signal is produced...
Proceedings Article
A new algorithm for choosing initial cluster centers for k-means
Jiangang Qiao, Yonggang Lu
The k-means algorithm is widely used in many applications due to its simplicity and fast speed. However, its result is very sensitive to the initialization step: choosing initial cluster centers. Different initialization algorithms may lead to different clustering results and may also affect the convergence...
Proceedings Article
Study on Combination Model of Wind Power Generation Prediction
Guan-qi LIU, Ting HU, Long Shao
With the installed wind capacity increasing rapidly, the security, stability and economic operation of the power grid have been influenced because of the randomness and volatility of the wind power. Wind power prediction is an effective approach for the above problems. This article is about the theory...
Proceedings Article
An IBE Implementation of REESSE1+
Jiankang Chen, Shenghui Su
IBE (Identity-based Encryption) technology, no digital certificates, is user-friendly and convenient for back-office management. It simplifies the key management process of a public key cryptosystem and diminishes the cost of application. This paper presents the thought of IBE systems, and analyzes the...
Proceedings Article
The Image Steganography Method Based on the Nonlinear Optimization
Yu Chen, Ren-er Yang, Min Yuan, Jun Mo, Cheng-hong Ma
On digital image steganography, the traditional LSB method usually makes the histogram’s change relatively large after the image steganography; therefore the hidden information can be detected easily. This paper puts forward a new method which based on the nonlinear optimization to determine the best...
Proceedings Article
Mobile Application Development Based on Building Information Modeling for Chinese Users
Zhuohua Huang, Encheng Ma
In China, the mobile devices, especially smart phones and tablet PCs have been growing up with an astonishing speed. Meanwhile Building Information Modeling (BIM) has been one of the most promising developments in the architecture, engineering, and construction (AEC) industries. Since there are very...
Proceedings Article
A Novel Grey Game-Theoretic Model for Intrusion Detection in Vehicular Ad Hoc Network
Cheng Tan, Hao Sun, Ning Cao, Lihui Sun, Cheng Li
Ensuring security plays a significant role in main-taining the stable operation of vehicular ad hoc network (VANET). Actually, it’s impracticable to evaluate the precise value of packets’ transmission success rate within a short time due to the uncertainty of environmental information collected. To reduce...
Proceedings Article
The Relationship between Chaotic Characteristics of Physiological Signals and Emotion Based on Approximate Entropy
Chun-yan Nie, Hai-xin Sun, Ju Wang
Emotion recognition is an important part in affective computing. It is the basis of building a harmonious man-machine environment. Respiratory (RSP) signal and electrocardiogram (ECG) signal are one of the main study objects in the emotion recognition based on physiological signal. The variations of...
Proceedings Article
Analysis of Performance about Secure Communication Based on Fourth-Order Hyperchaotic System
Chun-yan Nie, Hai-xin Sun, Xin Wang
In this paper, we propose a new secure communication synchronization system which exploits the combination of the fourth-order hyperchaotic system and the synchronization theory. We study the fast encryption and decryption methods of the images and the performance analysis of the secure communication...
Proceedings Article
A SPLICING IMAGE DETECTING METHEOD BASED ON ORIGINAL IMAGE ESTIMATION
Yunyi Liang, Ying Wang
The image splicing method is commonly used for forged digital images. This paper proposes a detection method for the splicing image. By the color filter array interpolation, the original image is estimated and the consistency of the adjacent pixels is reconstructed. Use the adjacent pixels consistency...
Proceedings Article
Two New Calculating Methods for the Irregular Hermite Interpolation Polynomial
Miao Luo, Liangliang Ma
Based on the theory of the regular Hermite interpolation polynomial, two new calculating methods including undetermined coefficient and Lagrange interpolation have been proposed to solve the complex irregular Hermite interpolation polynomial.
Proceedings Article
Study on the Multi-domain Modeling and Optimization Designing Method for the Band Sawing Equipment
Guojin Chen, Jing Ni, Tingting Liu, Huipeng Chen, Ming Xu
This paper is oriented to the design and analysis process of the high-level band sawing equipment, and studied the modeling and the simulated optimization design method for the high-level band sawing equipment based on the unified modeling language. The unified constraint model is used to describe the...
Proceedings Article
Data Processing and Analysis Method of NLOS Ranging Radar System
Huixian Jiang, Guoxin Zheng, Zhongpin Luo, Xiao Chen
We address the problem of precise ranging between trains in non-line-of-sight (NLOS) environment using a NLOS (Non Line of Sight) ranging radar. By calculating the phase delay of the received and transmitted OFDM (Orthogonal Frequency Division Multiplexing) waveform, we achieve the target of ranging...
Proceedings Article
Traffic-Based Credit Network Management System
Yizhe Zhang, Jilong Wang, Haizhuo Lin
With the rapid development of Internet, some bad behaviors such as network attack and bandwidth abuse become more and more serious, result in wasting the limited resources of network. Cernet2, the experimental IPV6 network, is suffering from the shortage of monitoring resources, so how to maximize the...
Proceedings Article
A Reliable and Energy-efficient Traffic Attack Detection Protocol for WSN
Jiana Bi, Xu E
How to accurately and rapidly detect traffic attack is an important security problem in wireless sensor networks. An energy-efficient ARMA-based traffic attack detection protocol is proposed in this paper. The detection protocol uses linear prediction to establish easy ARMA(2,1) model for sensor nodes....
Proceedings Article
Criteria for nonsingular H-matrices
Qi Chen, Min Li
Nonsingular H- matrices play a very important role in matrix analysis and numerical algebra. Based on the concept and properties of the generalized strictly diagonal dominance matrices, we partition the row and column index set of square matrix, construct a positive diagonal matrix according to the elements...
Proceedings Article
The Design of a Hospital Environment Data Acquisition System Based on ARM11 and Embedded Linux
Hong Shao, Chen Yang, Na Zong, Ke-feng Jin
This paper introduces the current world popular embedded Linux operating system, the latest ARM series chip and several digital sensors , such as temperature, humidity, light and so on, which are applied in the data acquisition terminal of the hospital environment intelligent monitoring system and used...
Proceedings Article
Detection of Information Hiding by Modulating Intra Prediction Modes in H.264/AVC
Songbin Li, Xiuhua Ma, Peng Liu, Qiongxing Dai, Haojiang Deng
In the intra-frame coding of H.264/AVC, information hiding can be implemented by modulating the prediction modes of 4×4 luminance blocks. Since this kind of method has characteristics of high speed, good concealment and so on, it has become a great security threat. Therefore, it is necessary to study...
Proceedings Article
A Study of Intelligent Hospital Environment Monitoring Method Based on the Android Platform
Wen-Cheng Cui, Hong Ren, Yang-Yang Han, Hong Shao
With the development of the medical treatment and public health field, the higher quality of hospital environment is required. This paper presents an intelligent hospital environment monitoring system based on the Android platform to overcome the present monitoring problems, such as incomprehensive monitoring...
Proceedings Article
Research on Fault Feature Extraction for Radar Transmitter Based on HHT
Liujun Wang, Changjin Liu
In order to overcome the difficult in extracting the fault feature of nonlinear and non-stationary signal in radar transmitter, the concepts of Instantaneous Frequency (IF) and Intrinsic Mode Function (IMF), and the specific process of Empirical Mode Decomposition (EMD) and Ensemble Empirical Mode Decomposition...
Proceedings Article
An Efficient and Secure Mutual Authentication with Key Agreement Protocol for Automobile Roaming System
Xin Xu, Ping Zhu, Zheng-Ping Jin, Hua Zhang
With the fast advance of communication technologies, there is an increasing demand of efficient operations in low-power roaming environment. Several protocols came into being successively, yet for special requirements in automobile roaming system such as low consumption, high performance and convenience,...
Proceedings Article
Toward Teaching-Learning-Based Optimization Algorithm for Dealing with Real-Parameter Optimization Problems
Kai-Lin Wang, Hui-Bin Wang, Li-Xia Yu, Xue-Yu Ma, Yun-Sheng Xue
A latest optimization algorithm, named Teaching- Learning-Based Optimization (simply TLBO) was proposed by R. V. Rao et al, at 2011. Afterwards, some improvements and practical applications have been conducted toward TLBO algorithm. However, as far as our knowledge, there are no such works which categorize...
Proceedings Article
An Improved Dynamic ID-based Remote User Authentication with Key Agreement Scheme for Multi-server Environment
Zhen-Zhen Wang, Jin-Kou Ding, Zheng-Ping Jin, Hua Zhang
In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. They claimed that their protocol is efficient and can resist several kinds of known attacks. However, we observe that Lee et al.'s...
Proceedings Article
Application of Fuzzy Variable Structure Control in DC Source of Plasma Arc Welding
Xin-wei LI, Xiang-min Chen
A new control system of DC source of plasma arc welding was designed according to the shortcomings of time-varying and nonlinearity in the design process of DC source of plasma arc welding and traditional control algorithms could not be overcome these disadvantage. Main circuit and control circuit were...
Proceedings Article
D-Optimal Design Applied to Calibration of Strapdown Three-axis Magnetometer
Zhitian Wu, Xiaoping Hu, Meiping Wu, Peng Liu
Strapdown three-axis magnetometer needs calibration before it can be properly employed for navigation purposes. Many scalar calibration methods have been proposed to determine the calibration parameters. However, most calibration approaches seldom describe the influence of sampling distributions on the...
Proceedings Article
An Agent-Centered Multi-Formalism Modeling Framework for SoS Behavior
Xiaobo Li, Weiping Wang, Yonglin Lei, Qun Li
The system of systems (SoS) possesses essential characteristics of autonomy, evolvement and emergency, which can only be studied from the aspect of SoS behavior. Modeling and Simulation (M&S) can cope with SoS complexity and study its behavior more efficiently at lower costs. Considering the multi-subsystem...
Proceedings Article
Research on the DFT for Mixed-Signal Circuits
Guo-gang Lioa, Jun Li, Chun-yan Chen
Nowadays with the increases of the density of large scale integrated circuits, researches of Design for Test (DFT) become more and more important. JTAG (JTAG: Joint Test Action Group, also called Boundary Scan) has been widely used in test area, which improves the testability and reliability of mixed-signal...
Proceedings Article
Design of tunable broadband equalizer
Dalong Lv, Dongfang Zhou, Cuilian Song, Dewei Zhang
Broadband equalizers are widely used in radar systems to compensate for inconsistencies in broadband TWTA’s gain response. But few of them are tunable. This paper provides a kind of 6-18GHz coaxial broadband equalizer. The result shows this equalizer is not only small in size, but also convenient to...
Proceedings Article
A Review on Estimation for Medical Image Registration
Feizhou Peng, Yanyi Chen, Xing Chen, Jiajun Xin
Medical image registration is very important in many areas and some methods for image registration have been proposed in these decades. However, it is still a serious challenging to estimate the results of medical image registration, because there have been not a golden estimation criterion presented...
Proceedings Article
A Client-side Intelligent Paging Algorithm Based on JavaScript
Yinhuang Le, Jiahui Qi, Min Wu
In this paper, a client-side intelligent paging (CIP) algorithm based on JavaScript technique is proposed. CIP algorithm can intelligently turn a large-scale HTML document with an intricate DOM tree into more manageable pages with relatively simple structure of DOM tree. There are two main co-dependent...
Proceedings Article
A Hardware/Software Testbed for the Design of OFDM Systems
Xuming Lu, Weijie Wen, Hongzhou Tan
A field programmable gate array (FPGA)-based hardware/software co-verification scheme is proposed for the design of orthogonal frequency-division multiplexing (OFDM) baseband systems. It provides a platform to simulate the software implementation and verify the hardware implementation of a baseband OFDM...
Proceedings Article
The Method of Positioning Error Measuring Compensation of the Multiple-Target Motion Simulation System Based on Neural Network
Ju Huo, Wenbo Dong, Yunhe Liu
In order to solve the problem of large range of target motion and targets mutual interference in Two-dimensional Cross-Moving Motion Simulation System with Multiple Objects, a multi-objective system is designed, which consists of a number of independent two-dimensional motion simulation systems, and...
Proceedings Article
Improved Threshold Secret Sharing Distributed License Authorization System
Hongmin Jiang, Ying Li
The demand for digital rights management (DRM) in P2P mode is increasing accordingly along with rapid popularity of the P2P networks. The key points in DRM are the management and issuance of digital content licenses. The traditional centralized authorizations have certain limitations in security and...
Proceedings Article
Fractional Feature Extraction and Pattern Recognition of Transformer Partial Discharge Sources
Guo-qiang Wang, Yong-li Zhu, Li-peng Liu
The recognition of transformer partial discharge patterns is helpful for evaluating insulation condition of transformers.Six typical kinds of partial discharge patterns are tested in the study.Based on the characteristics of the data,the partial discharge patterns were divided into several classes. Thus...
Proceedings Article
Run-time Leakage Reduction in Near-threshold Circuits with Gate-length Biasing Techniques
Yangbo Wu, Xiaohui Fan, Haiyan Ni
In this paper, we investigate the low leakage design method for near-threshold circuits with gate-length biasing techniques. A cost-effective gate length optimization method is presented. The basic logic gates and two full adders with gate-length biasing technique are implemented and simulated using...
Proceedings Article
TCAS/ ADS-B Integrated Surveillance and Collision Avoidance System
Yajun Xu
The air collision avoidance system is an important measure to ensure the flight safety. One of the sticking point of collision avoidance is surveillance precisely and reliably. So, it is necessary to develop an independent and reliable air-air surveillance system. A TCAS/ ADS-B integrated surveillance...
Proceedings Article
Loose accumulation grain size distribution measurement based on digital image processing technology
Yong He, Jinxiu Liu
Due to the large range of loose accumulation's grain size, traditional methods almost can not reasonably determine the grain size distribution.In this paper,there is a rapid measurement of its grain size distribution based on digital image processing technology. This method avoids the field sampling...
Proceedings Article
Design of A Micro SD Card based Security Middleware for M-Commerce
Guifen Zhao, Ying Li, Liping Du, Fei Duan
M-commerce security middleware is one of methods to achieve secure application. A micro SD card based security middleware is designed for new generation mobile commerce system constructed on the basis of SOA and using Web Service, smart mobile terminal, combining the commercial flow with technical flow....
Proceedings Article
Tracking Technique for Athletes in Skilled Video
Ailing Song, Kai Chen
Accurate analysis of athletes’ video is an effective technical way to improve the training effect, and the realization of tracing of athletes in the skilled video is essential for its analysis. Based on OpenCV (open source computer vision library supported by Intel) technology platform, we realize the...
Proceedings Article
Research on the Reliability of Evaluating the Efficiency of Commanding Information System
Jing-Xue Liu, Hong Li
When evaluating the efficiency of the commanding information system, the results are always questioned because of the fuluctuation of the data used. The article introduced a method which is suitable to measure the reliability of the evaluation efficiency of the commanding information system as per its...
Proceedings Article
Optical Proximity Correction Using a New Hyper Error Estimation Method
Pei-Shan Wu, Yu-Cheng Lin, Jui-Hung Hung, Tsai-Ming Hsieh
In recent years, semiconductor manufacturing process has made great progress. To avoid lithography hotspots and enhance the yield of integrated circuits, we can use Model-based Optical Proximity Correction (MBOPC) to improve image fidelity and printability. However, the optical lithography simulation...
Proceedings Article
Similarity metric in medical image registration
Jing Jin, Yunle Yang
Registration algorithm via various similarity measures is presented in this paper. Image registration is a process of align images so that they can get the same structure in the same spatial locations. During the registration, similarity metric is very important to measure the result as a standard. Different...
Proceedings Article
Reverse k-skyband query based on reuse technology
Tao Jiang, Bin Zhang, Lu Chen, Qing Liu, Jianyong Yan
In this paper, we introduce a new approach to finish reverse k-skyband (RkSB) query which returns all the points in given dataset P whose dynamic k-skyband contains specific query object q. The main ideas include reuse technology and early stopping. The former save the information of node accesses during...
Proceedings Article
A Data Warehouse Architecture supporting Energy Management of Intelligent Electricity System
Yan Li, Lifang Wang, Li Ji, Chenlin Liao
Intelligent electricity utilization is a topical and difficult subject in the study of smart grid. Current energy management systems do not have the capabilities of energy specific monitoring and management. Therefore, this paper addresses this deficit by introducing a data warehouse based energy management...
Proceedings Article
Parallel Random Walk Algorithm in VLSI Analysis
Jun Guo, Cangsong Zhang, Jiao Cui
Parallel computing techniques were introduced to improve random walk algorithm. A formal model was firstly adopted to explain the random walk problem. And then, the parallel features of random walk algorithm were discussed in detail. Finally, a parallel random walk algorithm was proposed and applied...
Proceedings Article
A Defects Investigate of Classic Turing Machine Model and Its Extension in Virtualization Environment
Xiaorui Wang, Qingxian Wang, Xiaolong Hu, Jianping Lu
The classical Turing machine model has defects in centralized control, sequential and determinate execution. So it is difficult to describe the computing in parallel environments and interactive systems. In this paper, we introduce several ideas for the extension of the classical Turing machine model,...
Proceedings Article
Deadlock Detection Based on the Parallel Graph Theory Algorithm
Xiaorui Wang, Qingxian Wang, Yudong Guo, Jianping Lu
Deadlock detection and release is an important means to maintain the concurrency of task in operating system, the relationship between system process and resources is usually described by means of resource allocation graph, the core of the deadlock detection is to determine whether there is a loop in...
Proceedings Article
Design of a High Performance 5.2 GHz Low Phase Noise Voltage Controlled Oscillator Using 90nm CMOS Technology
Mohammed A. Aqeeli, Zhirun Hu
In this paper, a novel Figure of Merit (FOM), low phase noise, LC-tank voltage-controlled oscillator (VCO) is presented. The work presents a fully integrated 5.2 GHz VCO designed in a 90nm CMOS process. The proposed VCO features a worst-case phase noise of -130.10dBc/Hz and -133.00 dBc/Hz at 600 kHz...
Proceedings Article
Design of Measurement Algorithm of Feedback Strength Factor of Optical Feedback Self-mixing Interferometry Systems based on System Generator
Wen Zhao, Huiying Ye, Yanguang Yu
The spectrum features of the external light phase of a semiconductor laser without optical feedback and with optical feedback are analysed based on the Lang-Kobayashi equations, which contributes to putting forward the measurement algorithm of feedback strength factor of optical feedback self-mixing...
Proceedings Article
Students’ comprehensive evaluation system based on data mining method
Yongrong He, Xiangjuan Bian
the paper researched comprehensive quality evaluation system of college student, and introduces data mining method to solve mess students data. Firstly, the paper construct students’ data warehouse, then construct comprehensive multi-dimensions OLAP (Online Analysis Process) model, and through classification...
Proceedings Article
A Platform for 3G and Internet-Based Healthcare System
Xingzu Guo, Xianxiang Chen, Zhen Fang, Shanhong Xia
A java web-based platform for 3G and internet-Based Healthcare System was designed to enable the guardian with chronic disease to get help. Apache Tomcat is used as web server and MySQL is used as database server. The healthcare system platform provides some functions such as querying physiologic data...
Proceedings Article
Improved K-medoids Clustering Algorithm under Semantic Web
Wentian Ji, Qingju Guo, Sheng Zhong, En Zhou
K-medoids clustering algorithm is highly efficient in classifying cluster categories. Based on algorithm analysis and selection improvement of centre point K, this paper sets up a web model of ontology data set object. It tries to demonstrate through experiment evaluation that the improved algorithm...
Proceedings Article
The Analysis of the Ontology-based K-Means Clustering Algorithm
Qingju Guo, Wentian Ji, Sheng Zhong, En Zhou
In view of research findings made from home and abroad on clustering algorithm and the traditional partition clustering method K-means algorithm, this paper first analyses the advantages and disadvantages of this algorithm and then combines it with ontology- based data set to establish a semantic web...
Proceedings Article
A Semi-Supervised IDS Alert Classification Model Based on Alert Context
Haibin Mei, Minghua Zhang
How to filtering false positives is a fundamental problem of IDS. Constructing alert classification model is one of efficient methods. However, the high cost of preparing training data and classification feature selection are key points in the problem. This paper gives a semi-supervised alert classification...
Proceedings Article
Development of waveform digitizing system for neutron detector
Zhong-Wei DU, Hong SU
The neutron detector of HIRFL (Heavy Ion Research Facility at Lanzhou) has been designed for in-beam nuclear experiments, capable of measuring neutron energy and discriminating neutrons from gamma-rays. The read-out electronics, receiving charge signals from photomultipliers of the neutron detector,...
Proceedings Article
Context-Aware Strategies For Recommender System On A Professional SNS Platform
Xianghui Zhao, Hui Liu, Wen Tian, Zhaopei Zeng, Lin Ye
The importance of recommender system on Social Network Services (SNS) platform has been recognized by researchers and practitioners in many disciplines, including e-commerce, information retrieval, social computing, data mining, marketing, etc. While a substantial amount of approaches focus on recommending...
Proceedings Article
An Effective Method and Device for Eye Detection with Physical Properties
Dongbing Quan, Yong Zhao, Jingjing Li, Hui Zheng
Accurate detection of eyes plays an important role in human-machine interfaces. In this paper, according to some physical characteristics, a new designed device for the new real-time and effective eye detection method is proposed. In this device, two physical characteristics are applied, they are the...
Proceedings Article
PSO algorithm based on GSO and application in the Constrained optimization
Hongxia Liu, Feng Zhou
In particle swarm algorithm, the introduction of glowworm algorithm, according to domain to determine a perception range, within the scope of perception of all the particles find an extreme value point sequence, which apply roulette method, choose a particle instead of global extreme value.So as to scattered...
Proceedings Article
An Improved Shuffled Frog Leaping Algorithm with Comprehensive Learning for Continuous Optimization
Liping Xue, Yinglong Yao, Hong Zhou, Zhiqiang Wang
This paper presents a shuffled frog leaping algorithm (SFLA) with comprehensive learning strategy (SFLA-CL) for global optimization. This algorithm uses a novel learning strategy whereby all other frogs’ information of the memplex is used to update the worst frog’s position. The strategy enables the...
Proceedings Article
A Precision Advertising System Based on Data Mining
Songtao Shang, Chu Qiu, Quan Qi, Kaihui Mu, Bo Wang
With the Internet development, advertising becomes more convenience for advertisement provider. More and more advertisements immerge on the Internet. But, these advertisements are not based on the user’s needs; everybody on the internet can see the same advertisement. So this paper introduces a precision...
Proceedings Article
Real-time Simulation of Large Bodies of Ocean Surface Based on Tessellation and Concurrent Kernels
Chen Si, Chunyong Ma, Ge Chen
We present an automatic water simulation method in large scale virtual environment that employed mesh based approaches. To begin with, multi-hierarchy mesh is generated using tessellation technique. Then, CUDA Concurrent Kernels technique is implemented to make Fast Fourier Transform (FFT) and Perlin...
Proceedings Article
A Q-learning-Based Dynamic Spectrum Allocation Algorithm
Chunying Lv, Jiyang Wang, Fei Yu, Hui Dai
Contraposing the status of spectrum resources is tension and spectrum utilization is low, the dynamic spectrum allocation technology is studied. Due to lack of central control entity in distributed cognitive networks, cognitive users need to select channel and power for communication intellective. Based...
Proceedings Article
Wide Band Frequency Agility Direct Frequency Synthesizer and Its Performance Analysis
Shizhao Huang, Yulin Yang, Liujun Wang, Xin Wang
This paper will introduce the design of wideband frequency agility synthesizer based on method of Simulate direct frequency synthesis, the full-phase coherence Modulation and Filter bandwidth control are applied in this synthesizer as designed .The main factors and solutions of the effect of the frequency...
Proceedings Article
Non Local Means Denoising for 3D MR Images
Hao Song, Jing Jin
Denoising is a crucial step to increase image conspicuity and to improve the performances of all the processing needed for quantitative image analysis. In this paper, the main method we proposed is Non Local Means. We carried out our experiments based on 3D MR images from Brain Web. We compared The NL-means...
Proceedings Article
A Meteorological Window Forecast System for Immersed Tunnel Construction
Meihong Lin, Weiqing Lü, Zongquan Ying, Linwang Su
This paper presents a solution for force and stability meteorological window forecast system of large-scale tunnel elements based on C/S+B/S mode, through the plug-in framework design pattern, the strong coupling relationship of each subsystem can be reduced in the process of system integration; the...
Proceedings Article
Source Digital Image Identification based on Cross-correlation
Yong-jie Xie, Yi Bao, Sen-feng Tong, Yu-hao Yang
Source camera detecting, which is about establishing whether or not the images of interest are taken by the same camera, is a challenging problem. Due to solve the digital image source identification problems, a new method is proposed using Cross-correlation Analysis. In the digital camera imaging process,...
Proceedings Article
Image Splicing Detection Based on Statistical Properties of Benford Model
Senfeng Tong, Zhen Zhang, Yongjie Xie, Xiaodi Wu
For the operation of the image splicing tamper, this paper proposes a novel approach for blind image splicing detection based on statistical properties of the Benford model. Having made discrete wavelet transform (DWT) to the test image, we extracted alternating current (AC) coefficients in discrete...