Proceedings of the 2nd International Conference on Teaching and Computational Science
64 articles
Proceedings Article
A Research on Dynamic Forms Verification Technology Based on PHP + Ajax
Shengju Yang
It is necessary to verify the input data to ensure the safety of high-quality software applications. The traditional WEB forms Verification under B/S model is characterized by the problems of restrictions by HTTP, refreshment of entire pages, long-time waiting of users, etc. In order to solve these problems,...
Proceedings Article
With the Construction of China Mobile Library Construction
Na Li
With China's rapid economic growth, China has significantly informatization development and progress, narrowing the distance with the developed countries. Development of information technology and the popularity of Internet applications, changing the way people read and approaches, but also changed the...
Proceedings Article
Digital City 3d Model Making Technology
Rui Jiang
Starting from the concept of digital city, this paper briefly introduces the specifications and requirements, the three-dimensional modeling of digital city are introduced from the practical Angle in the 3 ds MAX software used in two-dimensional environment tracing and extrusion method model, and use...
Proceedings Article
The Application of Media Asset Management System in Television Program Operation
Xi Wang, Haining Dong
Summarized the related concepts of the Media Asset Management System. Detailed analyzed the application of Media Asset Management System in the Television Programme in operation. The Media Asset Management System will enhance the core competence of TV media, reconstruct the value chain of TV media which...
Proceedings Article
High-efficiency Handwriting Recognition Online Shopping Systemby Mobile Devices
Sung-Jung Hsiao, Kuang-Yow Lian, Wen-Tsai Sung
This paper proposed an innovational method and technology real-time to carry out remote recognition system by a mobile device. User draws a pattern in the local browser to transmit to remote server that will to do recognized task and database search immediately. The recognition system is bidirectional...
Proceedings Article
Research on Resampling Algorithms for Particle Filter
Xiaohui Zeng, Yibing Shi, Yi Lian
Particle filter has been widely applied in many fields in recent years. In order to reduce the particle degeneracy problem, some resampling strategies are introduced to improve the real-time performance of particle filtering. In this article, we present many resampling algorithms and their modified strategy,...
Proceedings Article
Distributed Quality System under the Condition of Wireless Network
Mengqing Tanli, Yan Jiang, Rushu Peng, Chunliang Zhang
Comparison of wireless broadband and cable network is analyzed firstly, and models of distributed quality system under the condition of wireless network are put forward, and core technologies are discussed. The hierarchy model can be divided into four layers: device layer, disposal layer, control layer,...
Proceedings Article
Closed-loop Virtual Reference Feedback Control System Design
Hong-cheng Zhou, Zhi-peng Jiang
Firstly the controller using virtual reference feedback control design, at the same time considering the expectation of a given model match the closed-loop transfer function and sensitivity function, which need to be in the two objective function increases the expression in a model of the sensitivity...
Proceedings Article
Based on Bagging Method Moving Object Detection Design
Hong-cheng Zhou, Cun-bao Chen
Focusing on the disturbance of moving cast shadow, a Bagging moving cast shadow removal method is proposed. Collecting shadow discrimination features from multiple shadow discrimination models, a shadow detector is trained by employing Bagging ensemble based learning framework. The shadow detector can...
Proceedings Article
New Data Storage Auditing Protocols
Xinpeng Zhang, Chunxiang Xu, Wei Sai, Ying Li, Tao Zhou
Cloud storage is a kind of cloud computing services that allows users to store their data in a remote cloud. Because of the loss of data control, data owners will concern that their data will be misused or unauthorized access by other users, in addition, they also worry their data may be lost in the...
Proceedings Article
An Inventory Strategy with Emergency Order in Cluster Supply Chain
Benhe Gao, Yili Jiang
The enterprises in the cluster supply chain network not only cooperate in a chain, but also compete and cooperate cross other supply chains. We focus on bidirectional replenishment policy for the enterprises in two chains so that both of the enterprises can reduce cost. Meanwhile, we provide a research...
Proceedings Article
Overview of Security Enhanced Android’s Security Architecture
Chaowen Zheng
Security Enhanced Android is the integration of Android with SE Linux launched by NSA to strengthen security. This system adopting Mandatory Access Control prevents attacks and enforces application isolation. Also, it provides an implementation of SE Linux in current Android environment. Therefore the...
Proceedings Article
Design and Development of Route-selection and Decision-making System
Junfeng Zhang, Yan Shen
In the study of route selection, due to the diversity, fuzziness, no-determinacy and randomness of the evaluating index, it is very complex for the information processing and decision making, and the CAD system cannot solve these questions at present. This paper aims at the facts of Tianshan-Road, utilizes...
Proceedings Article
The Context of the Digital Media Practice Path of Tianjin Triple Play
Jun Ai, Xiaolong Jiang
Since the 1990s, digital technology has made rapid development in the field of mass communication has been the spread of traditional analog digitization process began, more and more digital media began to walk into people's daily lives. Since the new century, the media industry in the development of...
Proceedings Article
Research and Design of the Coal Mine Safety Supervision System Based on IOT
Liwang Zhu, Shaobo Zhang, Chengzhang Zhu
This paper studied the coal mine safety supervision technology systematically, and proposed an overall structure of an integrated safety supervision system with environment supervision, mine equipment monitoring and person / vehicle location management functions. Then, it intensively analyzed the functional...
Proceedings Article
A Stable Multipath QoS Routing Protocol Based on the Remaining Power of the Nodes in Opportunistic Networks
Xuebin Ma, Liting Wang
With the growing popularity of smart devices, people have increasingly requirements for network’s quality of service (QoS). There is a growing tendency in opportunistic networks to establish stable paths by using long path lifetimes, low routing overhead and high packet delivery ratio. According to recent...
Proceedings Article
A Unified Approach to Weighted L2,1 Minimization for Joint Sparse Recovery
Binqiang Ma, Aodi Zhang, Dongyang Xiang
A unified view of the area of joint sparse recovery is presented for the weighted L2,1 minimization. The support invariance transformation (SIT) is discussed to insure that the proposed scheme does not change the support of the sparse signal. The proposed weighted L2,1 minimization framework utilizes...
Proceedings Article
Road Obstacle Detection Based on Randomized Hough Transform
Jing Lv, Yuanyuan Shang, Hui Ding
Road obstacle detection is the core of pedestrian safety. As an effective image object detection method, Hough transform can detect straight lines, circles, ellipses, parabolas, and many other analytical graphics. This paper mainly detects bar deceleration strips and round well covers, owing to obvious...
Proceedings Article
Study on Learning Resources Recommendation Based on Tasks in Team Collaboration
Lin Gong, Jian Xie, Yang Liu, Xiaodan Zhang
Nowadays, learning team has become an important foundation for modern work. In a team, how to recommend learning resources to the appropriate team member according to the task requirements is a key factor of success. This paper firstly reviewed related methods and concepts in knowledge modeling and learning...
Proceedings Article
Design and Accomplishment of BS-based Supervisory System for Student Assignment Online
Xiao Wang, Jiashan Wang
Computer education has been developed into education of information technology with the rapid development in information technology represented by computer and Internet in the world today. Schools employ a load of approaches to investigate the efficiency in computer and information technology education,...
Proceedings Article
Research of Multi-export Campus Network Upgrade Program Based on Redundant Architecture
Shan Jing, Qi Qi, Na Yang, Runyuan Sun
In order to improve the stability and effectiveness when campus network user access to Internet, the paper, relied on the multi-export campus network environment and based on the analysis on characteristics and demands of the campus network users, completes the design of network upgrade program by adopting...
Proceedings Article
Research on University Library Digital Resources Integration under the Cloud Computing
Xinzhu Huang
With the rapid development of information technology, internet technology and communication technology, library resources building and information services of university is facing new opportunities and challenges and single library resources can not meet the needs of readers. This paper proposes a strategy...
Proceedings Article
Cluster Key Management Scheme for Wireless Sensor Networks
Qisheng Zhao, Xiaoming Liu
The information security of wireless sensor networks is a hot issue in research. This paper examines combining the scheme of the asymmetrical public key system and the threshold key scheme, and proposes a dynamic key management scheme through the second level key matrix of authentication mechanism from...
Proceedings Article
Vulnerabilities Analysis and Solution of VxWorks
Zhigang Zhang, Zhuo Lv, Jiansong Mo, Shuangxia Niu
The paper provides a brief introduction about VxWorks, analyzestheimportanceofOSsecurity, discusses the current revealed vulnerabilities, describes the risks the attack paths and the affected systems about them, and gives the solutions on this foundation.
Proceedings Article
Design and Implementation of Lightweight RMI Framework Based On HTTP Tunnel
Long-da Huang, Jin Liu, Su-yan Long, Jun-song Wang
Java RMI has greatly enhanced the ability to develop java distributed applications, but it is still difficult when passeing through the enterprise firewalls in the public network. Meanwhile, it need extra deployment and registry besides application programs deployment. The paper designed and implemented...
Proceedings Article
The Workflow Modeling Research Based on the Expanded P/T System
Long-da Huang, Jin Liu, Jun-song Wang, Su-yan Long
A workflow modeling method based on the expanded P/T system (hereafter to be called the xP/T system) is put forward to make the correctness verification of the graphical modeling easier and simplify the complication of Petri net modeling. Meanwhile the correctness verification of the modeling is given....
Proceedings Article
A Design of the Traffic Lights Intelligent Control System Based on ARM and Zig Bee
Fensu Shi, Ningning Ge
With the rapid development of economy,Road traffic environment is changing slowly,the efficiency of the people and car traffic is becoming more and more aroused people's attention,As one of important infrastructure of road network,traffic lights have a great impact on traffic efficiency.In the traditional...
Proceedings Article
The Research and Implementation on Extending Algorithm that High Response Ratio Tasks Schedule Preferentially on C/OS-II
Fensu Shi, Hua Wang
To overcome shortcomings that C/OS-II based on static priority scheduling policy may block the tasks in low priority for a long time task scheduling policy based on high response ratio scheduling preferentially is added and achieved .This scheme divided the task in the system into significant tasks and...
Proceedings Article
A Fast Context -Based Fractal Mobile Video Compression with GA and PSO
Junshe Wan, Linru You
Mobile video compression is an important method to translate multimedia from server to client, especially mobile video compress with fractal model is a good way to solution the unbalance computer capacity. Because computer capacity of servers are so powerful that complete encode of fractal video compress...
Proceedings Article
The Design and Implementation of Production Management Information System Based on B/S
Peng Zhang
this paper took the practical situation of some manufacturing enterprise in Tianjin as the basis of system demand to design and develop the overall framework and the function of various modules by analyzing and studying its internal management process and business process. Then this paper determined...
Proceedings Article
Illumination – The Navigation System Associated with Speech and Image Recognition Based on Location Service
Zhenyu Liu, Rong Bi, Jiawu Li, Heng Shen, Ye Song, Fang Zhao
this paper deals with the current navigation system for the visual-impaired people, developing an indoor and outdoor navigation system, Illumination, in association with speech and Image Recognition for them. For human-machine interaction, Illumination is launched by shaking the phone instead of traditionally...
Proceedings Article
Implementation of Traffic E-Government Cloud Technology for Department of Transportation
Jian Lian, Yan Zhang, Mingqu Fan, Haitao Pu
Transport is one of most important aspect of economy and social development in one country. For recent years transportation industry in China has made plenty of great achievements, in which the transportation industry as well as Department of Transportation contributed greatly. Gradually public services...
Proceedings Article
Improvement of Gradient Projection Algorithm for Nonlinear Programming
Dan Wang, Yong-ming Zhang
The search direction by making use of the matrix LU decomposition gradient projection algorithm for nonlinear programming is given, the stability of sparse and thealgorithm of this method can maintain effective constraintmatrix, the algorithm can be applied to large sparsenonlinear optimization problem...
Proceedings Article
A Optimal Design of New Touching Key
Li Zhang
JST080 is a capacitive touch-sensitive chip based on the principle of relaxation, which can design and implement touch key system with MCU. The system is qualified with simple hardware circuit, reliable performance and convenient usage. To improve the reliability of capacitive touch key system, in terms...
Proceedings Article
Development and Exploration of Cloud-based Three-dimensional Digital Resource Sharing Courses
Weifeng Zhu, Jun Tian
With the maturity of cloud technology and the advance of national education informatization process, the construction of professional courses has gradually focused on cloud-based three-dimensional digital resources sharing, thus breaking the shackles of traditional teaching mechanism. The focus of the...
Proceedings Article
Design and Application of AIS Technology in Marine Fishing Management
Yu Wang, Shuo Xu, Zhen-zhou Wang
This paper summarily introduced the production safety problems during operation process of fishing ships in China. In order to solve these problems, we present the range and significance of utilizing AIS technology in the fishing ships management, and summarily introduced the scale of AIS technology...
Proceedings Article
The Security Model of Broadcast Intelligent Terminal Application and Technology Realization on TVOS
Xin Wang, Delin Chen, Yue Sun, Xu Wang, Suying Yao
With the trends of intelligent terminal and broadband network, all kinds of intelligent terminal application based on internet emerge in an endless stream. How to ensure the security of the various applications running on the next generation operating system TVOS is a key technical problem to be solved...
Proceedings Article
Design and Development of the Online Examination System Based on B/S Structure
Hongmei Nie
Online examination is one of the crucial parts for online education. It is efficient and fast enough and reduces the large amount of material resource. An examination system is designed and developed based on web. This paper describes the principle of the system, presents the main functions of the system,...
Proceedings Article
Risk Evaluation for Security Network Based on Protection Model and Risk Entropy
Haitao Lv, Ruimin Hu
A security network is considered as a diagram of security systems deployed in different places in a guard zone. For a security network, its risk is an important metric to judge whether its protection effectiveness is good or not. How to evaluate the risk of a security network In this paper, the protection...
Proceedings Article
The Study of Corpus-based Interpreting Teaching from the Perspective of Eco-Translatology
Sheng-bai Chen
Eco-translatology not only improves the interpreting theories and practice but also acts as the guideline to the interpreting teaching. Therefore, this paper attempts to put forwards the implications for the improvement of interpreting teaching from the perspective of Eco-translatology, and explore the...
Proceedings Article
Exploration and Research of Practical Teaching System Based on Ability Training
Huiting Wu, Yi Wang
Applied talents are trained who has reasonable knowledge structure and ability to analyze and solve actual problem. We propose a practice teaching system based on ability training which used the ability training as the core. And a lot of research and practice have to be done according to curriculum system,...
Proceedings Article
A System Design of Opened Communication Principle Laboratory
Minghou Wu, Feng Xie, Zhenrong Zhang, Zhihui Ge
The paper has presented a new method of communication principle experiment reforming, and designed a new system of opened communication principle laboratory. This new method has solved the problems current existing effectively, which includes low utilization of experiment equipment, high-grade instruments...
Proceedings Article
Application of Matlab Notebook in the Course Teaching of Signal and System
Yaxun Zhou, Jianfeng Dong, Xingbin Zeng, Gangyi Jiang
Signal and System is a course with a lot of abstracting theories and mathematical derivations, and it is often needed to display the complex waveforms of some signals and simulate the signal processing process in order to better understand the relevant knowledge in the course teaching. To this end, Matlab...
Proceedings Article
Impact of Mobile Learning on Distance Education
Yongbin Zhou
Mobile learning is another new learning model following the emergence of digital learning, and a new research hotspot in the field of education technology. How to make effective use of mobile communications technology to assist the all types of teaching and learning has become the research center of...
Proceedings Article
Query and Service System Based on WebGIS Using in University Choice after the College Entrance Examination
Li-na Guo, Yi Wu, Xiao-gang Wang
In view of the current university choosing information query results in intuitive, legibility and comparative difference, space positioning, spatial analysis and visualization expression is not enough, we designed a college entrance examination select query service system based on WEBGIS. The system...
Proceedings Article
Web-based Research outcomes Management System for Secondary Department of University
Li-na Guo, Wei-wei Ran, Yu-na Jia
Undering the background of the campus informationization construction becomes mature day after day, it is a meaningful work to design research management information system to improve the research management level and efficiency of the university. This study took college of a university for experimental...
Proceedings Article
Fuzzy Synthesis Judgment Evaluating Model of Project Practice Teaching
Hua Cao, Hai Yin
Project practice teaching assessment investigate comprehensively that students master knowledge application and new knowledge, however, traditional test paper can’t meet requirement. This paper puts forward fuzzy synthesis evaluation model, which assesses roundly student’s performance in project practice...
Proceedings Article
A Study on Teaching Methods of Scope in VB6.0
Xiaoping Guo, Yichao Wu
VB6.0 is an object-oriented programming language. Scope is a part of the important concepts in programming. Treating variables declared in the universal declaration section of the form with different programming angle is the key is to elaborate the knowledge of variable scope in VB6.0. Better learning...
Proceedings Article
VTS Bilingual Teaching Simulation Model Based on Constructivism
Weidong Hu
Simulation technology has becoming so popular that it has been increasingly applied in the fields of undergraduate education and vocational training. Internationally, it has also played a great role in training Vessel Traffic System (VTS) operators. Bilingual teaching of specialized course carried out...
Proceedings Article
Research on the Integration of Information Systems Based on BPM
Zhaoxia Gou, Xiaoming Liu
The proliferations of isolated information management systems in colleges raise many issues of system integration, data sharing etc. In this paper, we describe the current problems in the information construct and analyze the benefits and limitations of platform integration options we then discuss how...
Proceedings Article
Exploration on Cultivating Students’ Abilities Based on Python Teaching Practice
Xinxiu Wen, Zeping Yang, Zhanquan Wang, Min Zhao
Computer programming courses (C, Java, C++, etc) intended for non-majors are facing a lot of problems in cultivating undergraduates’ abilities of computational thinking and problem solving. Students are frustrated with complex syntax of these languages and are confused with their practical applications....
Proceedings Article
The Evaluation of the Computer as an Assistant in Language Teaching and Learning
Rui Fu
Computer is applied in so many ways to assist education nowadays. The foreign language teaching and learning is not an exception. This paper is about the description and evaluation of the computer-aided education in learning and teaching English as a foreign language. Three main ways of the adoption...
Proceedings Article
The Study of Computer Forensics Based on the Course Construction and Reform
Ling Tang
Computer forensics has been an important part among computer science. . There is a course with the name college course named information crime in East China University of Political Science and Law. It has been set up since 2007. In this eight year ,the course get great achievements and honours. Besides,...
Proceedings Article
A Information Professional Personnel Training Mode Based on Social Requirement of Independent Colleges
Jinjiao Lin, Minqu Fan, Haitao Pu, Jun Li, Jian Lian
In recent years, whether the graduate are needed by the society has become more and mor concerns. In this paper, combining the students of independent colleges and our education practice, the social requirement oriented training mode is proposed. we construct and improve the pattern both conforming the...
Proceedings Article
Reflection and Practice of Vocational Education in Computer Major Students in Vocational Colleges
Fu Zhou
Based on the employment status of computer science graduates in vocational employment situation and using the butted perspective of education and market, this article analyzes the reasons of incapability of higher vocational computer science students. Finally, it puts forward that the education of higher...
Proceedings Article
From Subsidizing for Help to Subsidizing for Education, Improvement of Efficiency of Student Financial Aid Program in Advanced Education
Zhenquan Chen, Taipeng Wang
It is always one of the social spot lights that students whose family have financial difficulties in affording tuition fee of advanced education. University counselors and educational workers need to think carefully about how to raise the efficiency of financial aid program, so that the improvement from...
Proceedings Article
Application of Big Data in Higher Education
Liang-qiu Meng
There is a trend that, almost everyone, ranging from government departments to companies to Scholars, is either experiencing or anticipating unprecedented growth in the amount of data available in their world, as well as new opportunities and great value. In particular, this paper will discuss big data...
Proceedings Article
A Case Study of Teaching Large Class Based on Easyclass Platform
Baihong Tan, Daji Yu
In the context of the current widespread large classes teaching in universities of China, an in-depth analysis was carried out from the perspective of knowledge dissemination within internal organization and Collaborative Knowledge Building, the existing teaching pattern was generalized as a pyramid-shaped...
Proceedings Article
Current Situation and Countermeasures of Volleyball Teaching in Regular Universities
Qi-lin Hu, Li Chen, Yue-ming Duan, Yan-jun Wang
Since 2004’s Olympic Games, volleyball in China drops into a low point once again. One of the factors causing the situation is the ineffective development of the volleyball in colleges and universities. By investigating and analyzing the development of volleyball teaching and extracurricular activities...
Proceedings Article
Establishment of Hotel Accounting Direction Personnel Training Programs and Implementation
Tao Xue, Li Sun, Yanqiu Guan, Xiao Gong
Along with China's strong economic development in recent years, China's hotel industry took the opportunity of 2008 Beijing Olympics and ushered in the spring, star hotels have sprouted in various big-middle cities. According to Horwath management company statistics, Entire China had nearly 70 star hotel...
Proceedings Article
Multilevel Innovation Teaching Reform in Liner Algebra Dependedon Majors’ Features --A Case Study of East China University of Political and Law
Meijing Shan
Linear algebra is a core curriculum of science, economics and management majors. It is also a part of undergraduate entrance examination. It can cultivate the students’ logical thinking and computational thinking for qualified examination. This paper layered students, teaching contents and examination...
Proceedings Article
Research and Practice on Computer Hardware Curriculums Practical Teaching
Wei Zhang, Zhong-cheng Fan
The practical teaching is a very important process for students to develop their innovation abilities. In this paper, we analyzed the present state and problem of the hardware experiments teaching in university, propose opinions and suggestions of computer hardware teaching based on the experience of...
Proceedings Article
Strategies for Optimizing the Learning Effect of Online Courses through SNS Social Gene
Qiang Peng
As for the online learning, how to maintain the learners’ motivation and keep them completing the study of all the knowledge points is the difficulty when we do the design and development of online courses. In addition to making good resources of teaching content, improving the integration of online...
Proceedings Article
Experimental Study on the Validity of AES Systems in the College EFL Classroom
Li Li
Online Automated Essay Scoring (AES) is used to promote the teaching of EFL writing partly, but it can’t work very effectively for some reasons, mainly including misuse and the shortcomings of AES itself. The study tries to investigate the validity of AES by analyzing a questionnaire survey by means...