Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation (ISCCCA 2013)

+ Advanced search
221 articles
Proceedings Article

The Complex Blind Deflation Algorithm Based Particle Swarm Optimization with Survival of the Fittest Mechanism

Wei Zhao, Chunpeng Dong
For multi-constraint nonlinear optimization, this paper puts forward a complex blind deflation algorithm based particle swarm optimization with survival of the fittest mechanism(CBD-PSOSFM) which has faster convergence speed, and then gives a quantificational formula of the improved convergence speed,...
Proceedings Article

A New Derivation of TGR with Naked Antenna in Lossy Medium

Xinbo Qu, Bihua Zhou, Zheng Wan, Wei Shi, Xiaogang Xie
A new derivation of Transient Grounding Resistance(TGR) has been proposed in this paper. Take grounding system as naked antenna in lossy medium, and then get the input resistance of naked antenna in a given frequency based on Helen current integral equations. With inverse Fourier transform, the resistance...
Proceedings Article

The Analysis of Transient Grounding Resistance of Portable Horizontal Grid Earth Electrodes

Xinbo Qu, Bihua Zhou, Ningsheng Cao, Yapeng Fu, Xiaogang Huang
Based on current situation of mobile equipments’ earth devices, a new type of portable horizontal grid earth electrode has been designed. With the impulse ground measurement system, different number of earth electrodes’ responses to double exponential pulse current have been tested on cement grounds....
Proceedings Article

The AS' Property and Policy of MANET Structure Tourism Network

Qin Yuan, Yong Wang
MANET(mobile ad-hoc network) is an independent NET AS SYSTEM, which has much difference with wired network.It does not depend on fixed main network( but can be cooperated with main network). This article puts forward a kind of ASN structure during the design of MANET Tourism Network. So it solves the...
Proceedings Article

A New Multivariate-based Ring Signature Scheme

Lingling Wang
Most of the existing ring signature schemes are based on traditional cryptography, such as RSA and discrete logarithm. Unfortunately these schemes would be broken if quantum computers emerge. The MQ-problem based Public-Key Cryptosystem (MPKC) is an important alternative to traditional PKCs for its potential...
Proceedings Article

Research on Integrated Monitoring System of High-voltage Tower

Huichun Huang, Wei Jiang, Renjie Hu
The monitoring and stable operation of high-voltage tower is an important direction of strong grid research. Transmission monitoring includes the forecast of early faults and real-time state estimation. There is no domestic report on related research. Some simulation in laboratory had been done and little...
Proceedings Article

Research on Vulnerability Detection for Software Based on Taint Analysis

Beihai Liang, Binbin Qu, Sheng Jiang, Chutian Ye
At present, Cross Site Scripting (XSS) vulnerability exists in most web sites. The main reason is the lack of effective validation and filtering mechanisms for user input data from web request. This paper explores vulnerability detection method which based on taint dependence analysis and implements...
Proceedings Article

A Genetic Algorithm-Based Quasi-Linear Regression Method and Application

Fachao Li, Kena Zhang
Regression analysis, as an important branch of statistics, is an effective tool for scientific prediction. Genetic algorithm is an optimization search algorithm in computational mathematics. In this paper, a new regression model named quasi-linear regression model is established. Further, its implementation...
Proceedings Article

Researchment and Realization Based on Android Database Application Technology

Ming Xu, XinChun Yin, Jing Rong
This paper puts forward and realizes local model SQLite and remote model SQL Server two different database processing technology based on Android system according to mobile platform for database technology application deep-demand. Meanwhile, this paper expounds the function of WebService when Android...
Proceedings Article

Structure-based pharmacophore models generation and Combinatorial Screening of ICE Inhibitors

Yanling Zhang, Yuanming Wang, Yanjiang Qiao
Eight structure-based pharmacophore models of Interleukin-1 converting enzyme (ICE) inhibitors were generated by LigandScout based on ICE inhibitor complexes from the Protein Data Bank (PDB). A combinatorial screening method based on multiple pharmacophore models were proposed in present study, since...
Proceedings Article

Analysis of MMSE-based anti-interference performance for MIMO-UWB systems

Biao Yan, Jiamin Wang, Dingping Guo, Saiyan Cai
The combinations of MIMO (Multiple-Input-Multiple-Output) and UWB (Ultra-Wide-Band) systems greatly improve the performance of the UWB system. For the MIMO-UWB system, a new decoding scheme is proposed based on the STF (Space-Time-Frequency) coding and it can reduce the decoding complexity. The simulation...
Proceedings Article

Research on Signal "Batch-increasing" Phenomenon of Superheterodyne Reconnaissance Receiver

Yanzhong Hao, Hongliang Zhang, Fuchun Zhang, Hui Wang, Zhengdong Xu, Duo Wang
For the superheterodyne reconnaissance receiver detected "signalBatch-increasing" phenomenon, research on radar signal sand the intercepted characteristics of reconnaissance receiver from the frequency domain, pointed out that "Pulse-width split" and "Pulse-width truncated" caused by Emitter signal spectrum...
Proceedings Article

Electric Scissor Aerial Work Platform Solenoid Valve Research

Guojun Pan
Electric scissor aerial work platform generally uses hydraulic cylinder to lift. The decline solenoid valve is an important part of the entire hydraulic system, which usually installed in the bottom of the hydraulic cylinder. The main function is locking hydraulic cylinder to prevent the platform sinking...
Proceedings Article

Equipment Maintenance Support Analysis Model Based on Field-Theory

Wei-yi Wu, Ping Gu, Jie Liu, Bin Liu
At present military activities have been influenced deeply by the information revolution, in the same way the equipment support activities are confronted with tremendous challenge and many problems appeared. The equipment support ability is not satisfied with its target in the traditional method along...
Proceedings Article

An improved algorithm based on LEACH protocol

Wei Liu, LeLe Wang
In this paper, taking into account the shortcomings of wireless sensor networks, LEACH algorithm, the algorithm has been improved on this basis. The design of the E-LEACH algorithm, which extend the network lifetime, improve node energy utilization, and the effectiveness of this algorithm through simulation...
Proceedings Article

Compute Three-Dimensional Reconstruction of Brachial Plexus and its Surrounding Tissues by using Chinese Visible Human (CVH) Data Anatomical foundation for brachial plexus entrapment

Qi Li, Bingfang Zeng, Weiqing Kong, Changqing Zhang
We selected cervical cross section image from CVH-F1 (Chinese Visible Human – Female, No.1) database. After labeling the relative structures, we made 3D reconstruction of brachial plexus and surrounding tissue by computer reconstruction technique. In cervical cross section image, tissues like vertebrae,...
Proceedings Article

Reliability analysis of Structured P2P System

Tai Zhang, Sheng Wang, Dan Liao
Reliability is most important for structured p2p systems and how to exactly evaluate the metric-“loss rate” which is tightly related to reliability is a hot topic and challenge. Many research works of the loss rate only consider the situation that the loss rate is caused by next hop node failure (NF)....
Proceedings Article

Target Classification Using PAS and Evidence Theory

Li Jia, Hai Yan, Guohui Li, Hui Zhang
This paper presents a novel Dempster-Shafer evidence construction approach for aircraft aim recognition. The prior-probability of the properties of aircraft was used for establishing a probabilistic argumentation system. Dempster-Shafer evidence was constructed by assumption- based reasoning. Therefore,...
Proceedings Article

Clock Compensation Strategy in Train Ethernet

Xiaoyong Zhang, Jun Peng, Shuo Li
How to degrade the delay time of gateway queuing with heavy network load in train communication networks is the key to guarantee the stability of the train. This article models the queue scheduling problem modeling into reinforcement learning process, puts forward an adaptive weights learning polling...
Proceedings Article

Design of Campus Smart Card System

Weichun Lv
With the fast development of campus informationization, the complexity of comsumption types and identification of college teachers and students also increases, which raises more strigent requirements to college management. This essay illustes the overall planning of campus Smart Card system, discussing...
Proceedings Article

Pixel-level Image Fusion Based on Programmable GPU

Hong Li, Gao-Feng Tang, Fen-Xia Wu, Cong-e Tan
A novel algorithm which is image fusion based on GPU is proposed. The fused rule is regional energy. In recent years, the power of the computing of GPU has been greatly improved, which results that using it for the general-purpose computing has a rapid development. The essay researches on implementing...
Proceedings Article

Edge-Magic Total Labellings of Some Network Models

Hongyu Wang, Bing Yao, Chao Yang, Sihua Yang, Xiang’en Chen, Ming Yao, Zhenxue Zhao
It has been known that edge-symmetric graphs can be used as models of some scale-free networks, such as hierarchial networks and self-similar networks, such as graph colorings can be used for distinguishing objects of communication and informa-tion networks. We study the edge-magic property of edge-symmetric...
Proceedings Article

A Topology Control Algorithm Based on Pass Loss for Wireless Sensor Network

Nanxi Luo, Jie Bao
We present PLTC,a distributed topology control algorithm that based on pass-loss for wireless sensor network .In contrast to the algorithm based on RSSI,it can be applied on a heterogeneous network and nodes with different transmitting power.In this paper,we discuss the shortcomings of other parameters...
Proceedings Article

Multi-focus Image Fusion Using Curvelet Transform

Yong Li
Curvelet transform is a new muiti-scale geometic analysis, which has the characteristics of anisotropy. It is more suitable for the analysis of image curve edge characteristics than wavelet. Thus, in this paper it is applied to multi-focus image fusion, and used fusion rules that suitable for the characteristics...
Proceedings Article

Optimal Power Consumption Analysis of Two-level Hierarchical Model and Non-hierarchical Model

Ganglin Zhang, Guangcan Liu, Weibing Chen, Cheng Yang
Energy scarcity is one of the most critical problems that occur in wireless sensor networks compared to traditional networks. However, the problem has been partly solved by building the power consumption model of WSN. This paper is based on a simple wireless sensor network model, it gives the optimal...
Proceedings Article

A New Design of Three-Legged Robot of Mechanical and Control System

Haotian Cui, Wang Yang, Qingqing Li, Yueqing Yu, Lizheng Ma, Yumo Wang
A new type of three-legged robot design scheme is proposed and the movement control of it is studied in this paper. Spatial crank rocker mechanism (RSSR) is used to will the motor rotation into a leg swinging in mechanical design. Advanced reduced instruction-set computer machines (ARM) chip, wireless...
Proceedings Article

Development Scheme of Mobile Campus Information Integration Platform Based on Android

Hongxin Hu, Ming Cui
This paper reports on the design of software based on Android operating system, which enables smart phone, tablet PC and other devices to communicate with WEB server through the network. The WEB server then sends the data got from connection with school shared database to Android client device in JSON...
Proceedings Article

The use of computer-aided teaching software in the teaching of basketball tactics

Yanjun Chang
The development of computer-aided technology provides the material basis for the construction of the integration of learning theory and basketball tactics course. But computer-aided technology itself does not naturally promote teaching, how it reasonable design, the use of computer-aided technology can...
Proceedings Article

Security Analysis of Cryptographical Module for FPGA

Haitao Sun, Jie Liu, Deqing Xue
FPGA has been used abroad all fields about space, military, auto. It is the best choose of cipher protocol and arithmetic achievement. Its security has been concerned. In this article the authors design a Hardware Trojan of transmitting key information towards FPGA. It is important to realize the implement...
Proceedings Article

Analysis and Implementation of Raptor Codes for Video Multicast

Geng Wei, Congjuan Li, Yudong Zhang
Packet loss is unavoidable in IP multicast using the UDP protocol that will serious influence video quality. In this paper we use the Raptor codes for video multicast to improve the video quality. Firstly, the principle of Raptor codes is analyzed in detail. Then the Raptor codes is implemented and transplanted...
Proceedings Article

A Method of Opinion Tendency Analyzing Based on Regular Expression

Zhijuan Wang
Negative Internet information is harmful for social stability and national unity. Opinion tendency analyzing can find the negative Internet information. Here, a method based on regular expression is introduces that needn’t complex technologies about semantics. This method includes: building negative...
Proceedings Article

Research and Design on the System of Wave energy of Seawater Desalination with Negative Pressure

Chao Wang, Weigang Zheng
Based on the marine drilling platform or the freshwater shortages of barren island that need to be developed, the paper proposes a new type of energy saving through the wave energy device to manufacture freshwater. The wave energy of the sea can be converted into the negative pressure of the system through...
Proceedings Article

The design of water supply automatic control system of ship based on PLC

Rui Wang, Weigang Zheng
the design of vessel centralized water supply system which can use diesel exhaust heat and solar energy hybrid, the system is better than the traditional water supply system and it can make full use of waste heat and solar energy,so the design will save the energy and protect environment .PLC centralized...
Proceedings Article

High Performance Data Processing Pipeline Of Chinese Solar Radio Heliograph

Fan Zhang, Feng Wang, Wei Wang, Wei Dai, Hui Deng, Kaifan Ji, Yihua Yan
The Chinese Solar Radio Heliograph (CSRH) is a new generation radio heliograph would produce more than 4 terabytes data every day. As a aperture synthesis telescope, CSRH is facing the challenge of processing and storing such a vast data. Pipeline system is the key issue of data automatical processing...
Proceedings Article

Application of Performance Motion Capture Technology in Film and Television Performance Animation

Manyu Zhang
In today’s animation films, virtual character animation is a research field developing rapidly in computer graphics, and motion capture is the most significant component, which has brought about revolutionary change for 3D animation production technology. It makes that animation producers are able to...
Proceedings Article

Network layer network topology discovery algorithm research

Jianxia Ge, Wenya Xiao
Along with the development of the network information age, people on the dependence of the computer network is more and more high, the computer network itself the security and reliability of becomes very important, the network management put forward higher request. This paper analyzes two algorithms...
Proceedings Article

Design of State Feedback Controller for Discrete Systems with Time-delay

Shuai-tian HE, Zhi-chang LI
The stability analysis and controller design of discrete linear systems with time-varying delay are addressed. Firstly, the uniformly asymptotical stability criterion with adjustable parameter is derived by Lyapunov-Razumikhin approach. Then, the stabilization approaches for linear systems with time...
Proceedings Article

The Application of Information Visulization to English Lexicology for College English Majors

Xiaoqing Cui
By employing relative theories of information visualizaion and teaching methodology, we apply a practical course of College English majors to this information visulization assisted teaching, hoping to find that it is conducive to motivating English learners towards information acceptance and ultimately...
Proceedings Article

The Characteristic Parameter Estimation of Low Temperature Target Weak Signal Based on VanderPol-Duffing System

Yanchun Xu, Danfeng Zhao, Mi Lu
The weak signal, which is usually submerged in strong noise, is very difficult to detecte for its amplitude and frequency. The dynamic properties of VanderPol-Duffing are studied in this paper. Such system can go into the chaos under certain parameters. In chaotic state the disturbance of weak periodic...
Proceedings Article

Research on the Security of Massive Data Storage

Guanghui Zhai, Juan Li
Storage of massive data is receiving more and more attention in recent years and it has been widely used in many fields, meanwhile, its security is facing a great challenge, too. In this paper, we propose a distributed authentication protocol to ensure the security of massive data storage, this method...
Proceedings Article

Applications of Modern Information Technology in the Teaching of College Curriculums

Wenya Xiao, Jianxia GE
In this paper, it carries out more in-depth study on the integration of modern educational technology with college curriculums, especially on the application of multimedia technologies in the college teaching and obtains some valuable achievements. There are many issues worthy of study on the integration...
Proceedings Article

Self-healing research of ZigBee network based on coordinator node isolated

Ming-Jiang Huang, Tao Wang
A single-chip solution is proposed to realize the node design based on 2.4 GHz ZigBee wireless sensor network. Mesh network topology is achieved by the use of ZigBee Pro protocol stack on the hardware platform. When the packets are successfully sent to the coordinator node, a relevant event will be generated...
Proceedings Article

Webpage Tamper-resistant Strategy Based on File System Filter Driver and Event-triggered

Zhenqi Wang, Weiping Wang
In order to develop a more practical, higher security and less time-consuming webpage tamper-resistant system, we proposed a webpage tamper-resistant strategy on the basis of original tamper-resistant strategies and technologies in the paper. This strategy adopted the file system filter driver and event-triggered...
Proceedings Article

Second-order IIR Notch Filter Design and implementation of digital signal processing system

Chun Mei Wang, Wei Cai Xiao
In this paper the AC power 50Hz power interference, we use IIR digital notch filter method for industrial frequency interference filter. From the design of IIR digital filter method proceed with, on the IIR digital notch filter simulation, the algorithm deduced, on the fixed-point DSP programming method...
Proceedings Article

Reserch on Intelligent Tutoring System Model Based on Multi-AGENT In Mobile Environment

Jianhua Wang, Yan Yu
Along with the mobile network techniques become more progressive and perfect, the mobile terminal is as a kind of tool, way and assisting power.Its role and status has become more and more significant in the field of intelligent teaching system development. It combines the traditional intelligent teaching...
Proceedings Article

The Design of an Miniature Underwater robot for Hazardous Environment

Bin Fang, Wusheng Chou, Xiaoqi Guo, Xin Ma
An miniature underwater robotic system for hazardous environment has been developed. The system consists of an underwater robot, a robot control station and a cameral control station. The underwater robot is installed two cameras for inspection, one is a camera of radiation resistant with two-freedom...
Proceedings Article

Ontology based Domain Resource Semantic Retrieval Model

Shiliu Wang, Gongjie Zhang
Retrieval technology has been widely used, but most of the current retrieval models are based on the logic matching of characters without considering user’s query requirements and objectives in semantic level, which makes the retrieval results deviate from the retrieval intention of users. Based on the...
Proceedings Article

Tourism Domain Ontology Construction Method Based on Fuzzy Formal Concept Analysis

Yan Liu, ShengQuan Liu, Peng Li
In this paper, fuzzy formal concept analysis is introduced to the tourism domain ontology construction process, first fuzzy formal concept analysis of uncertain information in the domain of tourism then through the conceptual clustering generated fuzzy concept hierarchy, lastly mapping to get fuzzy ontology...
Proceedings Article

The Application of Web Mining in Distance Education Platform

Yuanyuan Liao
Although the rapid development of the modern distance education, there is still some shortcomings. In order to overcome these shortcomings and use a large number of data in these remote teaching sites effectively, it is necessary for the introduction of data mining technology to the modern remote education...
Proceedings Article

Cognitive Radio as Enabling Technology for Dynamic Spectrum Access

Nai-qi Wei, Zi-li Chen
Frequency spectrum scarcity is currently one of the mostly discussed topics in wireless communications. When there is no free spectrum available, no new broadband communication techniques can be put into operation. The double use of already assigned frequencies leads to interferences. A possible solution...
Proceedings Article

Ontology Model for Situation Awareness of City Tunnel Traffic

Lin Li, Weiguo Wu, Nian Liu
Networking of city tunnel monitoring systems is an application instance of Internet of Things. Situation awareness of city tunnel traffic is a method of analyzing the traffic safety of city tunnel. This paper studies the ontology model for monitoring tunnel traffic situation. The model reflects the basic...
Proceedings Article

A Probabilistic based Redundancy Control Algorithm for Wireless Sensor Network

Haitao Wang, Jianzhou Li, Li Yan, Xueping Zhang, Hui Chen
Existing redundancy control algorithms in WSN often have some evident shortcomings such as hypothesis is too much, application backgrounds are not clear, the precision of redundancy control is low and computing complexity is high. In this paper a probabilistic based redundancy control algorithm (PBRCA)...
Proceedings Article

Template-based Delta Compression of Large Scale Web Pages

Kai Lei, Guangyu Sun, Lian’en Huang
Delta compression techniques are commonly used in the context of version control systems and the World Wide Web. They are used to compactly encode the differences between two files or strings in order to reduce communication or storage costs. In this paper, we study the use of delta compression in compressing...
Proceedings Article

The Study of Stage Assessment Scheme of Programming Courses Based on Experiment

Dan-dan Zhao, Chun-li Xie, Hai-yu Song
Through analyzing the problems in the assessment of computer programming courses, a stage assessment scheme based on experiments is presented in the paper. Experimental arrangement is consistent with theoretical progress, and experiment subjects are established according to theory course units in this...
Proceedings Article

Research on Property and Model Optimization of Multiclass SVM for NIDS

Jianhao Song, Gang Zhao, Junyi Song
By investigating insufficiency of typical artificial intelligence algorithms aiming at the high rate of False-Positives and False-Negatives in the Intrusion Detection Systems (IDS), this paper presents an approach that Support Vector Machine(SVM) is embedded in Network Intrusion Detection System (NIDS)....
Proceedings Article

A Practical Fuzzy Adaptive Control Strategy for Multi-DOF Parallel Robot

Wei Meng, Zude Zhou, Quan Liu, Qingsong Ai
Multiple Degrees of Freedom (DOF) parallel robots possess the advantages of being compact structure, great stiffness, stability and high accuracy, so such platforms have been widely used in application areas as diverse as the spacecraft motion simulators, radio telescopes, and medical rehabilitation...
Proceedings Article

Research on Intelligent Borehole-Surface Electrical Method Multi-Parameters Detection System

Zhengsen Jia, Jun Lin, Xuetao Li, Lei Shao
Accurate detection of the direction of hydraulic fracturing cracks in the oil field is one of the crucial factors in rational exploitation of the remaining oil and enhanced oil recovery. In this paper, using the potential and the potential gradient test methods and virtual instrument technology, we design...
Proceedings Article

Scalable Parallel Motion Estimation on Muti-GPU system

Dong Chen, Huayou Su, Wen Mei, Lixuan Wang, Chunyuan Zhang
With NVIDIA’s parallel computing architecture CUDA, using GPU to speed up compute-intensive applications has become a research focus in recent years. In this paper, we proposed a scalable method for multi-GPU system to accelerate motion estimation algorithm, which is the most time consuming process in...
Proceedings Article

A Secured Distributed and Data Fragmentation Model for Cloud Storage

Lixuan Wang, Lifang Liu, Shenling Liu, Dong Chen, Yujiao Chen
The increasing popularity of cloud service is leading people to concentrate more on cloud storage than traditional storage. However, cloud storage confronts many challenges, especially, the security of the out-sourced data(the data that is not stored/retrieved from the tenants’ own servers). Security...
Proceedings Article

Emotional Interaction Agents in Intelligent Tutoring Systems

Yu Sun, Zhiping Li, Yaowen Xia
A model of emotional interaction agents in intelligent tutoring systems is presented in this paper, and the functionalities of the key components of the agents are described. To improve the emotional interaction between learners and the system, a kind of emotional interaction agents which can deduce...
Proceedings Article

Building quotient cube with MapReduce in hadoop

Juan Zhang
In order to solve the problem that how to improve the efficiency of query and calculation in massive data, a method of building quotient cubes in Hadoop plateform which combined the advantage of the quotient cube and MapReduce model is proposed in this paper. At first, all cubes will be established and...
Proceedings Article

Design Network Teaching Evaluation System Based on MVC

Yali Su, Bisheng Fu
The traditional teaching evaluation system is high cost, complex and low efficiency, This paper proposed based on Model-View-Controller(MVC), use Struts and Spring and Hibernate framework technology to achieve design of the Network Teaching Evaluation System(NTES). It can remedy the defects in traditional...
Proceedings Article

Performance optimization mehtod on smart grid information platform

Lin Qian, Dong-hui Li, Xiao-zhi Wu, Guang-xin Zhu, Jiang-hui Liu
In recent years, with the development of economics, Chinese government feels obliged to build a strong smart grid, state grid company starts the construction process of SG-ERP system comprehensively. However, system performance bottleneck gradually has been spotted due to expanding of IT systems. So...
Proceedings Article

Image Retrieval Based on Color-Statistic Feature

Jinmei Liu, Jizhong Li
Color is the most widely used visual feature in content based image retrieval. The visual coherence color space, HSV, is adopted to represent image. Hue component is used to denote color. Hue difference statistic is proposed to extract color change information as supplement to color feature. The image...
Proceedings Article

Application of the CNC system based on PMAC in Laser Forming Machine

Chun Shang, Peng-fei Guo, Guang Yang, Hong-you Bian, Peng Qi, Lei Cai
With the research of the main structure of the CNC System, the design philosophy of the CNC System based on PMAC in Laser Forming Machine was put forward. This system takes PMAC as control model of CNC and PC as system supporting units, which is a double CPU CNC system——the CNC system model of "PC+PMAC"....
Proceedings Article

A Solution for Anonymous Routers Discovery Based on Source-Routing Traceroute

Jiang Du, Yu Li
Discovery of computer network’s topology is always an important basement for network management. As IPv6 becomes the official standard, topology discovery methods should be changed as well. In IPv6 network, Anonymous Routers (AR) is one problem that we must deal with. AR is one kind of router we don’t...
Proceedings Article

Study on Improved Flexible Neural tree Optimization Algorithm

Yu Wang
The BP neural network is easy to fall into local minimum point, the algorithm convergence speed slow, this paper puts forward an improved algorithm of flexible neural tree, introduced the basic theory knowledge of Flexible neural tree , analyzes the characteristics and advantages of the neural tree....
Proceedings Article

Research and Practice of Application-level Maintenance Platform Based on ITIL

Canquan Li, Gang Wu
There are many studies about application-level maintenance at present, with different levels and depth and business logic. However, there are some common characteristics from two respects: incident management and problem management of ITIL. This paper designs an application-level maintenance platform...
Proceedings Article

Multi-Satellite Observation Scheduling Based on a Hybrid Ant Colony Optimization

Kebin Gao, Guohua Wu, Jianghan Zhu
In this paper, we attempted to find an effective method to resolve multi-satellite observation scheduling problems. Firstly, an acyclic directed graph model for multi-satellite observation scheduling was constructed. Secondly, based on the graph model, we presented a novel hybrid ant colony optimization...
Proceedings Article

Analysis and Research of Monitoring and Controlling on Greenhouse Environment in Facility Agriculture

Qi-guo Yao, Yu-liang Liu
Along with the development of facility agriculture technology, the greenhouse industry constantly upgraded. Applying sensor technology, electronic technology, communication technology and network technology to regulate and control the greenhouse environmental factors will greatly boost greenhouse industry...
Proceedings Article

Technical and Economic Analysis on Renewal of Shipborne Measurement and Communication Equipments

Yongliang Zhang, Jiang Zhou, Xiaochun Liu, Jun Xue
Shipborne measurement and communication equipments are central parts of space measurement ship. Renewal of the equipments is very important for space measurement tasks. Also it is important to save cost for continuable development. The paper proposes the problem of technical and economic analysis of...
Proceedings Article

Research of Computed Tomography Inversion Algorithm for Coal Face Based on Ground Penetrating Radar

Feng Yang, Cui Du, Meng Peng, Zequan Feng, Yangyang Sun, Enlai Li
Currently, mine safety is the focal point in mining activity. As a new and advanced approach for geophysical prospecting, the ground penetrating radar (GPR) is used in the mine disaster detection. Aiming to solve the restriction of low resolution and limited depth of the GPR in the deep coal seam detection,...
Proceedings Article

Remote monitoring system design based on configuration software

Qian-hu Xiao, Shao-jie Weng
Configuration software adopts configuration program mode, and has good secondary development function and portability. After analyzing configuration software of home and abroad, a set of remote monitoring system that monitors soil moisture is developed using KingView 6.55 in this paper. This system realizes...
Proceedings Article

Hospital Information System: Closed-loop Application Based on Radio Frequency Identification

Hong Wang, Yuanli Wu
To prevent medical errors or even accidents, our solution is to design the closed-loop application based on Radio Frequency Identification (RFID) technology in the Hospital Information System (HIS). We focus on the information improvement for doctor's order based on RFID. The whole closed-loop process...
Proceedings Article

Study on the Formation Control Methods for Multi-Agent Based on Geometric Characteristics

Lili He, Xiaochun Lou
Multi-agent formation control is the process in which the teams formed by multiple agents move to specific target or specific direction. The formation method of the linear formation and circular formation are given in this paper, based on the geometric characteristics of the formation formed by multi-agent....
Proceedings Article

Feature Selection Algorithm for Palm Bio-impedance Spectroscopy based on Immune Clone

Lin-tao Lü, Peng Li, Yu-xiang Yang, Fang Tan
According to the features of Palm bio-impedance spectroscopy (BIS) data, this paper suggests a kind of effective feature model of palm BIS data— elliptical model. The model combines immune clone algorithm and least squares method, establishes a palm BIS feature selection algorithm, and uses the algorithm...
Proceedings Article

Security Analysis of MD5 algorithm in Password Storage

Mary Cindy Ah Kioon, ZhaoShun Wang, Shubra Deb Das
Hashing algorithms are commonly used to convert passwords into hashes which theoretically cannot be deciphered. This paper analyses the security risks of the hashing algorithm MD5 in password storage and discusses different solutions, such as salts and iterative hashing. We propose a new approach to...
Proceedings Article

A kind of ECC - KNN classifier's vehicle identification algorithm

Lin-tao Lü, Huan Gao, Yu-xiang Yang
this article presents an improved classifier vehicle identification algorithm to improve the efficiency of the existing vehicle recognition algorithm. First, using edge orientation histograms to extract image characteristics, then, Error correction coding is applied to the classification of classifier,...
Proceedings Article

Design and Application of a Policy-driven Interactive Security Model

Ronghua Guo, Ying Zhou, Yuhan Zhang, Yongqiang Bai, Jiawei Du
It is difficult to build a perfect security system due to passive protection methods or isolative security devices. Principles of several interactive models are analyzed at first. And then a policy-driven interactive security model, which implements an integrated security system between many devices...
Proceedings Article

Design and Implementation of Intelligent Vehicle Control System Based on Camera Sensor

Shubra Deb Das, Jue Yang, Muktadir Rahman Chowdhury, Mary Cindy Ah Kioon
In this paper we propose a intelligent vehicle system design with MK60N512VMD100 as the micro-controller unit and CMOS image sensor to obtain image information of the track. Our proposed comparator circuit instead of an A/D conversion to obtain the binary image enables us to achieve a bigger field of...
Proceedings Article

Application of Multimedia and Network English Teaching In Multiple Intelligence Development

Zhaoxu Han, Wei Wang
Based on Howard Gardner s Multiple Intelligence theory, this paper puts forward that college English teaching assisted by multimedia technology and network could promote multiple intelligence to the greatest extent. By taking advantage of students-center, teachers-mediator, task-base drive, constructivism...
Proceedings Article

The Design of social security information management system

Wanli Cao
The social security information management system based on three-tier model and the client-server framework is built, which in close connection with social security archives information. At the same time, the amount of data, namely the underlying architecture code design, system architecture design,...
Proceedings Article

Detecting App-DDoS Attacks Based on Marking Access and d-SVDD

Jin-ling LI, Bin-qiang Wang
In order to enhance the extensibility of current attack feature extracted and detection means for App-DDoS(Application Layer Distributed Denial of Service, App-DDoS)attacks, a novel feature extracted method based on marking access and a new detection algorithm named d-SVDD are proposed. After expressing...
Proceedings Article

A Train Hot Bearing Detection System Based on Infrared Array Sensor

Ying Wang, ZhengRong Wu
Train wheel hot bearing is the primary cause of cutting-axle fracture and severe hotbox accidents, which poses a great threat to the safety of railway transmission. It is necessary and vital to research and develop the technique of hot bearing detector and corresponding system for maintaining the reliable...
Proceedings Article

Application of Using Simulated Annealing to Combine Clustering with Collaborative Filtering for Item Recommendation

Zhiming Feng, Yidan Su
Item-item collaborative filtering was widely used in item recommender system because of good recommend effects. However when facing a large amount of items, there would be performance reduction, because of building a very large item comparison dataset in order to find the similar item. K-means cluster...
Proceedings Article

Prototype Design of Self-securing Portable Storage Device

Li-jue Zhu, Wen-tao Zhao, Hui-jun Wu, Yong Liu, Zhao-ming Hu
Embedding the security mechanism into the device is the core of self-securing, on purpose to provide the device with the ability of self-defense. Currently, security of portable storage device is commonly depends on the host, which makes the data easy to be attacked or stolen. Researches on self-securing...
Proceedings Article

Multi-parameters Measurement Based on STM32 ARM of Dual-excited Electromagnetic Flow Meter in Partially Filled Pipes

Ji Suo, Chunqing Qi, Hongbing Zhang
The dual-excited electromagnetic flowmeter with arc-electrodes in the paper can measures liquid level and flow velocity. A pair of electrodes is set as signal injection electrodes on the pipe bottom. AC signal injected used to determine liquid level. The theoretical analysis and experiment results indicate...
Proceedings Article

Research on Iterative Method in Solving Linear Equations on the Hadoop Platform

Yi-di Liu
Solving linear equations is ubiquitous in many engineering problems, and iterative method is an efficient way to solve this question. In this paper, we propose a general iteration method for solving linear equations. Our general iteration method doesn’t contain denominators in its iterative formula,...
Proceedings Article

Design and Application of a Network Security Model

Shiping Xu, Yuhan Zhang, Ying Zhou, Yongqiang Bai, Haipeng Fu
This paper analyzes the deficiency of P2DR security model, and proposes a kind of new active dynamic security model AD-RPPDRRM, in which risk analysis, management and recovery are imported. On the basis of this model, basic technologies used to implement the defense in depth system are discussed. At...
Proceedings Article

A survey on smartphone security

Di Liu, Ni Zhang, Kun Hu
This paper proposes a survey on smartphone security from the aspect of mobile malware, specifications related to smartphone security, and smartphone security solutions. The contribution of this paper helps people to quickly know about definition of malware, attack channels and black industry chain of...
Proceedings Article

Customized MMRF: Efficient Matrix Operations on SIMD Processors

Kai Zhang, Yaohua Wang, Shuming Chen, Zhentao Li, Liang Wen
Wireless communication and multimedia applications feature a large amount of matrix operations with different matrix size. These operations require accessing matrix in column order. This paper implements a Multi-Grained Matrix Register File (MMRF) that supports multi-grained parallel row-wise and column-wise...
Proceedings Article

Multiple Constrained QoS Routing Algorithm Based On Genetic Algorithm In Overlay Network

JunWei GE, JinXin Deng, YiQiu Fang
How to depend on different services provide different guarantee of QoS, and to ensure the effective use of network resources will become an important task in overlay network. In this paper, we consider constraints of network bandwidth, delay, loss rate, cost ,and base on the resources of current global...
Proceedings Article

Multipath ring Routing in Wireless Sensor Networks

Guimin Huang, Wujin Tao, Pingshan Liu, Siyun Liu
In the past years, the routing problems of wireless sensor network (WSN) have attracted great interest, and many routing protocols for WSN have being proposed. However, these routing protocols pay little attention to the transmission reliability. Therefore, this paper proposes a new multipath ring routing...
Proceedings Article

A Novel Network Survivability Analysis and Evaluation Model

Chunlei Wang, Dongxia Wang, Qing Miao, Liang Ming, Lan Fang, Yiqi Dai
Network survivability has the characteristics of complexity, dynamic evolution and uncertainty, which has become one of the most important factors for analyzing and evaluating network performance. Network survivability analysis and evaluation is a process of analyzing and quantifying the degree to which...
Proceedings Article

Subnet Broadcast Polling Algorithm of Network Management Based on SNMP

Meigen Huang, Zhilei Wang
The current data collection of a network device in the network management system exists low real-time and long polling cycle, this paper proposes a subnet broadcast algorithm based on SNMP. The algorithm introduces the idea of Subnet division and broadcasting, when polling, the algorithm polled network...
Proceedings Article

A General Architecture for Monitoring Data Storage with OpenStack Cloud Storage and RDBMS

Bin Hu
The process monitoring and fault diagnosis is one of the important problems in the process industry. Archived monitoring data is valuable for long-term analysis and decision making. In this paper, we propose a general architecture to manage and storage archived monitoring data. It has been implemented...
Proceedings Article

Design and Implementation of LAN-sensitive Information Interception and Analysis System

Shaofeng Lin, Weifeng Sun, Linna Fan, Hua Wang
The LAN usually hides internal network structure by NAT to share a public IP address in the internal network, and thus it is hard to locate the source host precisely distributing sensitive information for a large-scale information monitoring system by analyzing the intercepted packets. So it is hard...
Proceedings Article

Impact of Indirect Network Effect between Two Sides on the Diffusion and Pricing of Platform

Chuan Zhang, Weida He
Platform’s diffusion is sophisticated because of indirect network effect between two sides; there will be a peak or several peaks of diffusion rate. Platform’s diffusion can be divided to two stages: the stage before its take-off of potential market size and the stage after its take-off of potential...
Proceedings Article

Website information extraction based on DOM-model

YaFang Lou, YiChong Zhang, ZhiJun Yuan
With the rapid development of network technology and the promotion of application, web has become the main platform of the issuing and accessing information. It is current research focus, how to obtain the information required by the user from the vast information source. This paper presents an extraction...
Proceedings Article

The existences of frame wavelet set

Wan-She Li, Hong-Xia Zhao
In this paper, Let be a real expansive matrix, it mainly discusses the existences of frame wavelet set, we discuss the characterization of frame wavelet sets in , and several examples are presented, in order to deepen the understanding of frame wavelet set, which gives the two related theorems; we try...