Proceedings of the First International Conference on Information Science and Electronic Technology
52 articles
Proceedings Article
3D Simulation Model of Lunar Crater Based on Single CCD Image
Junlin Wang, Jiaqi Li, Binbing Liu, Zhankai Li, Xiaolin Tian
The paper gives an algorithm to simulate the crater topography from a single Charge Couple Device image. Refer to the Oren-Nayar reflectance model, several parameters of the lunar crater and constraint conditions have been added to this new algorithm, also the small craters have been enhanced in the...
Proceedings Article
Modification of Edon80 to Resist the Key Recovery Attack
Xiaomei Wang, Yunqing Xu
Edon80 is a hardware binary additive synchronous stream cipher submitted to the last phase of the eSTREAM project. The core of the cipher consists of quasigroup string e-transformations and it employs four quasigroups of order 4. The internal structure of Edon80 is highly pipelined, making it scalable...
Proceedings Article
Improved Resource Search Strategy Using Random Walk Based on Node Reputation for Unstructured Mobile P2P Network
Junwei Ge, Hongxia Shi, Yiqiu Fang
With the development of wireless communication technologies and mobile devices, the P2P network technology has the conditions to be used in wireless environments. Resource search is to discover requested object in mobile P2P network (mobile peer-to-peer network), which is one of the core issues of mobile...
Proceedings Article
Route Choice Research Based on Fast and Hierarchical Mobile Multicast
Zuhong Feng, Bin Li
Because of the high scalability and efficiency of multicast, more and more people pay attention to mobile multicast. The fast and hierarchical mobile multicast is one of the excellent multicast algorithms, but the transmission path in the fast and hierarchical mobile multicast is not the best. This paper...
Proceedings Article
An Accurate Diffraction Ultrasound Tomography Images Reconstruction Algorithm Based on LS_NUFFT
Jie Fang, Ping Yu, Zhiyuan Weng, Min Kong
According to the Fourier diffraction projection theory, the Fourier transform of projection data from multi-band frequency ultrasonic is distributed over complex plane in form of different radius arcs. The classical filtered back projection FBP algorithm isn't fit for distributing of the k space data,...
Proceedings Article
Remote Estimation of Leaf Water Content Using Spectral Index Derived From Hyperspectral Data
Chengfang Zhang, Zhiyuan Pan, Heng Dong, Fangjian He, Xingbang Hu
Monitoring crop water content by remote sensing has been an important problem for agricultural drought monitoring and water resources management. The triangular water vegetation index is affected by canopy structure parameters, such as leaf area index. To improve this, we used the method of ratio index...
Proceedings Article
The Robustness of Agile C2 Organizations
Yao Yang, Baoxin Xiu, Tingting Yang, Weiming Zhang, Weidong Bao
Agility is arguably one of the most important characteristics of successful Information Age organizations. The study of agility organizations is currently one of the hottest topics in the organization study field. In this paper, we first put forward an agile command and control (C2) organization model...
Proceedings Article
Construct Scheme to Second-period of Headquarters Performance Management System in State Grid
Jian Zhang, Yan Ma, Yan Hou, Dongwei Lv, Yuwei Yin
In order to enhance the performance management informatics level in State Grid Corporation, as well as strength the cohesion between headquarters performance management and authority work tasks, State Grid Corporation launched the second-period construction of headquarters performance management system....
Proceedings Article
Hybrid Method for License Plate Detection from Natural Scene Images
Boya Niu, Linlin Huang, Jian Hu
License plate detection is a key part in vehicle license plate recognition system. In this paper, we present a hybrid method for license plate detection from natural scene images for the all-day traffic surveillance environment. The proposed method includes two stages: rough detection and accurate detection....
Proceedings Article
Adaptive Data Mining Algorithm under the Massive Data
Weijian Mo
In order to solve the problem that Network Reduced accuracy and poor convergence in the existing neural network, which because sample large volumes of data and target data-independent. In response to this phenomenon, this paper put forward a data mining based on compensatory fuzzy neural network. It...
Proceedings Article
Multi-vehicle Ad-hoc Network Routing Algorithm with Ant and Quantum Particle Swarm Optimization Combined
Zhiping Wan
In order to improve data transfer efficiency of the vehicle self-organizing networks and reduce end transmission delay, this paper presents a Multi-vehicle ad-hoc network routing algorithm with Ant and quantum particle swarm optimization combined (AQVT). The algorithm based on the thinking of ant colony...
Proceedings Article
An Adaptive Algorithm for Music Beat Tracking
Zhanchun Gao, Yuting Liu, Yanjun Jiang
On the basis of Time Domain Analysis, this paper proposes a method for music beat tracking. Through this method, music beats are detected and tracked by timestamp and intensity value. Generally, the beat-areas of music signal converge more energy than other areas, therefore, the spots of beat can be...
Proceedings Article
CrazyCartoon the Design and Implementation of a User-defined Strategic Tower Defense System with MobileAR
Yiming Cai, Xiao Li
Completely different from existing computer games, CrazyCartoon system creates a blending of real (hand-drawn map by a player) and virtual (digital game) scene based on mobileAR technology, which enables players to customize the game strategies freely, such as the level switch and turrets' defensive...
Proceedings Article
Analysis on the Factors Restricting the Development of Solar-thermal Power Generation Industry in China
Zihan Gao, Jing Qiao, Yurong Huang, Yuanyuan Hou, Xiaochuan Wei
As the air quality and environmental pollution and other problems become increasingly serious brought by the traditional energy, the solar-thermal power generation is an important source for the new energy, and it becomes an investment hospot in the renewable energy field in the world. Based on the research...
Proceedings Article
Hierarchical Traffic Sign Recognition Based on Multi-feature and Multi-classifier Fusion
Yunxiang Ma, Linlin Huang
In this paper, we propose a fast and robust method for traffic sign recognition, which uses a coarse-to-fine strategy. The traffic signs are divided into main category and sub-category. At the coarse classification stage, we extract histogram of oriented gradients (HOG) feature from different spectral...
Proceedings Article
3D-DWT Improves Prediction of AD and MCI
Shuihua Wang, Yi Chen, Yudong Zhang, Zhengchao Dong, Elizabeth Lee, Preetha Phillips
In order to predict subjects with Alzheimer's disease (AD) and mild cognitive impairment (MCI) from normal elder controls (NC) more accurately, we compared two different kinds of discrete wavelet transform (DWT) based feature extraction techniques: multi-slice 2D-DWT and 3D-DWT. The dataset contained...
Proceedings Article
An Energy Efficient Multipath Routing Algorithm in Wireless Sensor Network
Dong Feng, Zhihong Qian, Xue Wang, Xiaohui Liu
Due to the energy and resource constraints of a wireless sensor node in a wireless sensor network (WSN), WSNs adequately need effective mechanisms for data forwarding to enhance the energy efficiency in networks. To solve this problem, Multipath routing protocols are often used to balance the network...
Proceedings Article
Improving Location Algorithm Based on Fuzzy Cluster in WSN
Xing Fang, Zhihong Qian, Chuxi Yang, Liang Qian
To reduce the impact of distance information errors, an improved location algorithm in WSN based on fuzzy clustering is proposed. It is explored that clustering methodology is employed to wireless sensor network localization schemes. By cluster analysis, the novel algorithm can figure out the distance...
Proceedings Article
Detecting Pit Defects on Rail Surface Using A Fast Detection Algorithm Based on Relative Gray Value
Wendi Weng, Houjin Chen
It is a challenge to detect pit defects on rail surface quickly and accurately in machine vision system. As the pit defects appear randomly, vary in size, distribute discontinuously, and are affected by rust, white noise, shadow and illumination during imaging, pit defects detection has become a difficulty...
Proceedings Article
Particle Swarm Optimization with Comprehensive Learning & Self-adaptive Mutation
Hao Tan, Jianjun Li, Jing Huang
As a representative method of swarm intelligence, Particle Swarm Optimization (PSO) is an algorithm for searching the global optimum in the complex space through cooperation and competition among the individuals in a population of particle. But the basic PSO has some demerits, such as relapsing into...
Proceedings Article
Application of Maxflow/Mincut Algorithm in Phase Unwrapping
Zhen Zhou, Guangmin Wu, Fanguang Zeng, Jianming Chen
Phase Unwrapping is an important and difficult problem in interference measurement.Its accuracy directly impacts on the application of the technology. In order to improve the accuracy of unwrapping, we use Bayesian decision theory, establishing the maximum a posteriori Markov random field energy model...
Proceedings Article
The Intelligent Texture Anti-counterfeiting Algorithm Based on DCT
Yicheng Li, Yujia Li, Jingbing Li
This paper put forward an algorithm based on DCT and human visual characteristics for the identification of texture anti-counterfeiting tags. Firstly, the method extracted the visual feature vectors of texture image through DCT, and then created a database of texture images’ feature vectors. Compare...
Proceedings Article
A Health Care Monitoring Terminal Based on Android Smart Phone
Ruihan Zhang, Zhan Zhao, Zhen Fang, Shulei Chu
With the promotion of mobile communication, sensor technology and smart phone, mobile health services is developed all around the world. This paper presents a mobile health service terminal based on Android smart phone. The physiological signals are collected by body sensors and then sent to the smart...
Proceedings Article
An Improved K-means Clustering Algorithm for Complex Networks
Hao Li, Haoxiang Wang, Zengxian Chen
The exploration about cluster structure in Complex Networks is crucial for analyzing and understanding Complex Networks. K-means algorithm is a widely used clustering algorithm. In this paper, a novel algorithm is proposed based on K-means. Considering, Complex Networks obeys Power-law Degree Distribution,...
Proceedings Article
A First-Order Differential Power Analysis Attack on HMAC-SM3
Limin Guo, Lihui Wang, Qing Li, Zhimin Zhang, Dan Liu, Weijun Shan
HMAC algorithm is one of the most famous keyed hash functions, and widely utilized. And SM3 is the only standard hash algorithm of China. However, most cryptographic algorithms implementations are vulnerable against side channel attacks. But specific side channel attacks on HMAC-SM3 have not been given...
Proceedings Article
A Transformation Method of OPM Model to CPN Model for System Concept Development
Wenlu Zhou, Feng Yang, Yifan Zhu
Modeling languages for concept development in System Engineering usually provide a static model and lack computational capability. We introduce and implement a method combing the Object Process Methodology (OPM), a holistic modeling language well suited to describe the concept model, and Coloured Petri...
Proceedings Article
Primal-Dual Approach for Uniform Noise Removal
Zhan Zhang, Wenyou Wei
In this paper, we consider the problem of uniform noise removal, which can be formulated as a minimization problem with L norm based constraints. A numerical difficult arises due to the property of the non-differentiability of the L norm. In this paper, we apply first-order primal dual approach to solve...
Proceedings Article
A Differential Power Analysis Attack on Dynamic Password Token Based On SM3 Algorithm
Limin Guo, Qing Li, Lihui Wang, Zhimin Zhang, Dan Liu, Weijun Shan
Dynamic password technology is one of the most widely utilized methods for identity authentication. The security of dynamic password system depends on the cryptographic strength of the underlying hash function. And SM3 is the only standard hash algorithm of China. However, most cryptographic algorithm...
Proceedings Article
A Refined Simple Power Analysis Attack on ECC with Countermeasures
Lihui Wang, Qing Li, Zhimin Zhang, Weijun Shan, Davidwei Zhang
Elliptic Curve Cryptography (ECC) is becoming widely deployed in embedded cryptographic devices. However, simple power analysis (SPA) attacks may retrieve secret keys by exploiting the power consumption of ECC devices. To resist the SPA attack there appear a number of countermeasures and the most widely...
Proceedings Article
Opinion Mining Research on Chinese Micro-blog
Changzhi Wang, Heyan Huang, Quanchao Liu, Xiaochuan Tian
We propose to simultaneously identify opinion targets and opinion-bearing words based on multi-features in Chinese micro-blog post, and decompose our task into three phases: (1) construct opinion-bearing words dictionary and identify opinion-bearing word in a sentence from Chinese micro-blog; (2) design...
Proceedings Article
Neural Network Blind Equalization Algorithm Based on Feed Forward Neural Network
Huiqing Zhao
Existing neural network algorithms have the problems of slow convergence and low accuracy. In response to this phenomenon, this paper presents a neural network blind equalization algorithm based on feed-forward neural network. And we proposed feed-forward neural network blind equalization algorithm by...
Proceedings Article
The Synchronous Algorithm of FTN Signaling on Independent Pilot Symbols
Ke Wang, Xiaohu Liang
Mazo discovered that the performance of system symbol error would not degrade with manual Inter-Symbol Interference(ISI) when symbol rate is faster at some extend. This paper which took FTN as background mainly explained the carrier synchronization performance of FTN signaling under additive white gaussian...
Proceedings Article
A Novel SPA Attack on ECC Using MMM's Conditional Subtraction
Lihui Wang, Qing Li, Zhimin Zhang, Weijun Shan, Davidwei Zhang
Elliptic curve cryptosystems (ECCs) are becoming more popular because of the reduced number of key bits required in comparison to other cryptosystems such as RSA. They are especially suited to smartcards because of the limited memory and computational power available on these devices. However, the side-channel...
Proceedings Article
Improved B-spline Elastic Registration for Medical Image Based on Feature Extraction
Yue Shi, Yangping Wang, Xiaogang Du
In order to improve the accuracy and efficiency of medical image registration, an elastic registration method based on feature extraction and B-spline has been proposed in this paper. The proposed method consists of two steps. First, feature points are obtained by using Harris corner detection algorithm...
Proceedings Article
Stream Cipher Based on Latin Cubes
Yukun Cheng, Yunqing Xu
Edon80 is a hardware binary additive synchronous stream cipher submitted to the last phase of the eSTREAM project. The period of keystream of Edon80 is relatively short and there is a key recovery attach on it. In this paper, by modifying the IVSetup mode and the Keystream mode of Edon80, and by introducing...
Proceedings Article
Model Merging Method Based on Fast Topology Coloring and Device Fuzzy Matching
Feng Li, Lingling Pan, Yijun Yu, Shuhai Feng
Model merging method is used to form a large power grid simulation model and to test dispatching system functions. A model merging method based on power grid model file that meets CIM-E standard is proposed, and fast topology coloring separates inner-grid from the whole file-based power grid model. According...
Proceedings Article
A Lip Characteristic Parameter-based Identity Recognition Algorithm
Yingjie Meng, Wei Chen, LiXin Bai
Most studies in lip-based speaker identity recognition fail to make full use of the changing characteristics of lips and have limitations of heavy information processing work and low rate of successful recognition. A new method of lip characteristics extraction and speaker identification based on the...
Proceedings Article
Realization of Key Technology of Trusted Network Connect Based on IF-MAP Protocol
Zelong Wang, Guoyang Cai, Wanzhen Liu
Network security has attracted increasing research interest in recent years. Through detailed investigations of the related structure of Trusted Network Connect (TNC), in this paper we research into the norms and key technology of Interface for Metadata Access Point (IF-MAP) protocol, as well as design...
Proceedings Article
2-D DOA Estimation of LFM Signals Based on Sparse Representation in Fractional Fourier Domain
Zhibo Shen, Songyang Liu, Yangyang Dong, Guoqing Zhao, Chunxi Dong
For the problem of two dimensional direction of arrival (2-D DOA) estimation of Liner Frequency Modulated (LFM) signals, a novel 2-D DOA estimation method is proposed based on sparse representation in fractional Fourier domain. First, utilizing the energy-concentrated characteristic of fractional Fourier...
Proceedings Article
Multi-scale Cardiac Electrophysiological Simulation: A GPU-based System by Computational Steering
Shanzhuo Zhang, Songjun Xie, Kuanquan Wang, Yongfeng Yuan
A cardiac electrophysiological simulation tool is essential for the study of the modern virtual heart. However, there is not yet an ideal tool that can satisfy the requirements of rapidity, flexibility and interactivity. In this paper, we propose a simulation system to cope with this problem, which is...
Proceedings Article
Constructing Open Teaching Platform Based on Internet
Haifeng Tang, Ying Liu, Deli Wang, Qingfan Meng, Lirong Teng
In order to solve the problem that on-line opening courses, in China, are hardly attractive to students, this paper present a multiple workflow and method of constructing open teaching platform. A series of quality factors are analyzed, such as the technical ability of members in making team and ideas...
Proceedings Article
A Dual-Broadband Circularly Polarized Slot Antenna for RFID Reader Applications
Hao Xie, Manxi Wang, Yusha Liu, Jun Hu
In this article, a compact RFID reader antenna operated on UHF band and WLAN with circular polarization is proposed. The antenna is comprised of an inverted L-shaped strip and an asymmetric U-shaped strip. The antenna is fed by a coplanar waveguide (CPW) line. The simulated result for -10-dB impedance...
Proceedings Article
The Application of the Information-gap Principle in Promoting English Language Skills in College English Teaching
Xiangwu Li
As one of the basic principles in communicative language teaching (CLT), Information-gap Principle (IGP) is also attached great importance to by some college English teachers nowadays in China. This paper has concentrated on expounding the roles of IGP in college English teaching (CET). The Information-gap...
Proceedings Article
Tactical Data Link Communication System Performance in Severe Electromagnetic Environment
Hao Xie, Manxi Wang, Jun Hu
A Tactical Data Link Communication System (TDLCS) simulation model is proposed utilizing the software of Simulink/Matlab, and the TDLCS performances of different parts are compared. Further, such simulator is adopted for evaluating anti-interference performance of the TDLCS for various electromagnetic...
Proceedings Article
License Plate Location Using Feedback Control Technology in Complex Environment
Lu Wu, Quan Liu, Wei Rao, Gang Chen
License plate can be distinguished from other areas of a vehicle by Edge detection, because the information at the edge area of the license plate is richer and more concentrated than the information at other areas of the vehicle. Comparing with other edge detection methods, we adopted Robert edge operator....
Proceedings Article
Coplanar-Waveguide Ultra-Wideband Bandpass Filter Based on Interdigital Structure
Yanyan Peng, Feng Xu
In this paper, a novel ultra wideband (UWB) bandpass filter based on interdigital structure is proposed. The proposed UWB bandpass filter is designed on coplanar waveguide (CPW) with the passband obtained by interdigital structure on the step-change center strip of CPW. The rectangular curling slots...
Proceedings Article
Application Research of Iterative Detection Strategy in the Crowdsourcing Quality Evaluation
Zhiyun Zheng, Xiaoqiang Guo, Zhenfei Wang, Dun Li, Quanmin Li
Crowdsourcing appeared on the Internet as a new service mode. In order to improve the accuracy of crowdsourcing results evaluation, it presents a crowdsourcing iterative detection strategy. According to the task crowdsourcing workers complete, we can use the principle that the minority is subordinate...
Proceedings Article
Detection of Sangeang Api Volcano Ash Cloud Based on Remote Sensing Image
Jiangshan Dong, Chengfan Li, Jingyuan Yin, Junjuan Zhao, Dan Xue
Large-scale volcanic ash clouds can threaten the safety of increasingly prosperous aviation transportation. The current recognition of the ash cloud mainly relies on the remote sensing technology. Taking the moderate resolution imaging spectroradiometer (MODIS) images of Indonesia Sangeang Api volcanic...
Proceedings Article
Pump Fluence Dependence of Ultrafast Carrier Dynamics in Bulk ZnSe
Gaofang Li, Fenghong Chu, Anduo Hu, Liang Xue, Zhenglan Bian, Chengxin Pang, Hong Ma
Ultrafast carrier dynamics of bulk ZnSe is investigated by means of the optical-pump terahertz-probe spectroscopy with pump fluence ranging from 38 to 239 J/cm2 at room temperature. With the laser pulse excitation at 400 nm, the negative transmission of terahertz pulse shows an ultrafast rising followed...
Proceedings Article
Study About the Trusted and Controllable Technology of the Information Network
Yu Wang, Weijie Han
Firstly, the connotation of the trusted and controllable information network is introduced. Secondly, the key technologies are summarized for realizing the trusted and controllable network. Finally, the mechanism for building the trusted and controllable security architecture for the information network...
Proceedings Article
Optimizing of Real-time Multi-scale Display of DICOM Image Based on CUDA
Yangping Wang, Peizhao Jiang, Yue Shi
The multi-scale display of digital imaging and communications in Medicine (DICOM) is the important step of detecting the lesions and making the radiotherapy plan. It is achieved by the dynamic regulation of the multi-scale display which also is called window operation to observe the organ tissues with...
Proceedings Article
A Similarity Based Community Division Algorithm
Lingjuan Li, Wei Wang
Community division is an important research topic in complex network area. In order to quickly and accurately find community structures in complex network, a similarity based community division algorithm named SCDA is proposed in this paper. This algorithm finds community structures by clustering the...