Proceedings of the 2018 International Conference on Network, Communication, Computer Engineering (NCCE 2018)

+ Advanced search
201 articles

Multi-view and Attention-Based BI-LSTM for Weibo Emotion Recognition

Xiaofeng Cai, Zhifeng Hao
Weibo emotion recognition is one of the main tasks of the study of social public opinion. BI-LSTM, as a derivative model of RNN,has been widely used in the task of text emotion analysis. However,existing models do not make good use of prior information sun as emotion words and emoji, and we always capture...

AADL-Based Flight Management System Modeling

Jiawei Zheng, Lichen Zhang
Flight management system is an important part of avionics system. Traditionally, the schedulability analysis of this system was carried out after the design of the system was completed and in the stage of implementation and verification, this made the system unable to accurately analyze the hardware...

Bound Action Policy for Better Sample Efficiency

Junning Huang, Zhifeng Hao
Reinforcement learning algorithm for solving robotic locomotion control problem has achieved great progress. Use a Gaussian distribution to represent the locomotion policy of the robot is a general way. A locomotion policy means the distribution of action output. However, in real-world control problems,...

A Reliable Data Hiding Scheme Using Jigsaw Sudoku

Wanli Lyu, Dongshuo Yin, Yu Zhang, Jiahao Deng
A distinctive data hiding method based on Jigsaw Sudoku is proposed in this paper. Different from other methods, the proposed method is based on Jigsaw Sudoku which is a kind of irregularly shaped Sudoku. Due to the novelty of Jigsaw Sudoku, the proposed method can provide a safer scheme for data hiding...

The Principle and Application of Deep Learning Algorithm

Pengfei Hu, Hao Tang
Deep learning is emerging as a multilayer neural network dimensionality reduction algorithm, the neural network model with multiple deep hidden layer through the formation of the high dimensional data of input layer feature extraction, to find a low dimensional nested data structure, the formation of...

A Fast-Meshless Method Based on GMRES For Two-Dimensional Acoustic Scattering Problem

Bingrong Zhang, Guibin Sun
The method of fundamental solution (MFS) has been known as an effective and simple boundary meshless algorithm. However, the MFS generates dense coefficient matrix and thus requires a lot of computation time for solving large-scale problems by using direct solvers in a personal computer. The generalized...

Blockchain-based Technology for Industrial Control System CyperSecurity

Mingyang Mao, Hong Xiao
With the development of the blockchain technology, and applications of blockchain technologies more and more widely, we can apply the Blockchains to Industrial Control System(ICS) for network security. The key technology of blockchain include: distributed ledge, asymmetric cryptography, consensus algorithm...

A Two-characters Experiment Design for IPv6 Routing&Forwarding Based on Modularization

Xin Yu, Bingliang Xu, Sheng Cai, Zhiyang Jin, Yanping Dong, Ming Gao
This paper brings forward an experiment design for IPv6 routing&forwarding which based on the special IETF ForCES technology, with the goal of more flexible using of IP routing&switch theory, better acquainted about inner architecture of network device, more familiar with the new technology of network...

Image Super-Resolution Algorithm Based on Deep Residual Network

Yang Liu
This paper puts forward to the image super-resolution algorithm based on the resent. The algorithm makes use of the depth residual network to reconstruct the low rate image, and the super-resolution images obtained by the cycle are, judged by the convolution neural network. The residual learning is introduced...

Design of a Digitally Controlled Full-Bridge LLC Resonant Converter

Xinwei Zhang, Xueye Wei, Xiaodong Wu, Xiaolong Yu
In this paper, a digitally controlled full-bridge LLC resonant converter based on DSP is designed. The frequency conversion control method is adopted to keep the output voltage constant and achieve the soft-switching of the switches. In this paper, the modes of operation of the full-bridge LLC resonant...

Radar Target Tracking Algorithm Based on Alpha-Beta Filtering

Dong Zhang, Jianping Jiang
Coastal radar tracking refers to the process of processing measured values from a target, maintaining the current state of the target, and associating them with the current and subsequent states of the target and performing smooth updating. With quick development of coastal and port vessel surveillance,...

Design of Efficient Dynamic Digital Channelization Structure

Chao Zhang, Hong Ma, Yiwen Jiao
In order to solve the problem of inflexible parameter settings in traditional dynamic channelization structure, a weighted overlap-add (WOLA) filter bank is proposed to implement dynamic channelization structure. The filter bank is deduced and emulated through MATLAB. The simulation results show that...

Data Structure and Application

Chang Liu
This paper expounds the concept and status of data structure from how the computer solves the practical problems through program design, based on the analysis of the connection and difference between data structure and algorithm, the general principles followed by data structure are given, and further...

A Review of Using Support Vector Machine Theory to Do Stock Forecasting

Meizhen Liu, Chunmei Duan
support vector machine (SVM) is developed based on statistical learning theory new method, its training algorithm is essentially a problem of solving the quadratic programming. This paper summarizes the basic principle of SVM, and then use SVM to stock prediction research status at home and abroad were...

Smooth Design of Broadband Beamformers Problem in Far Field

Mei Xiao, Dan Li, Zhiguo Feng
The design of broadband beamformers can be formulated as a minimax problem such that the maximum error between the actual response function and a given desired response function in a specified domain is minimized. There is a transition region between the passband region and the stopband region, and the...

The Application of Machine Learning in Data Mining under Big Data Environment

Weini Chen
With the development of economic globalization, the rapid development of industries in various fields, big data technology has attracted more and more attention. Network data is constantly being generated at an unprecedented rate, and it is necessary to intelligently process huge data, and then to make...

The Realization of Mobile Robot’s Dynamic Obstacle Avoidance with Deep Reinforcement Learning Based on Deterministic Strategy Gradient

Yunxiong Wu
When the deep reinforcement learning algorithm based on visual perception is applied to the issue of robot’s dynamic obstacle avoidance, the perception ability of convolutional neural network is combined with the decision control ability of reinforcement learning, and the process from raw visual input...

Research on the Data Service Application Based on Big Data

Yan Hou
The gradual progress of human activities and social production and increasing accumulation scale of information data have become a basic characteristic of modern society. The coming of information era has made the management of information data become the key work of guaranteeing social production and...

Exploration of the Forecast of Interbank Borrowing Rate Based on Artificial Intelligence

Ming Lu, Ning Yao, Xinxi Lu
In order to ensure the stability in financial markets and the position in international financial market game of China, this paper uses the method of artificial intelligence to research and forecast the interbank interest rates of banking industry, which is from the time dimension of the day wave. According...

HID Architecture and Design in Embedded USB Host System

Xin Li, Junchen You, Xinyi Zhou, Rentai Chen, Ci Tang
Universal Serial Bus (USB) is a personal computer interconnection protocol, developed to make the connection of peripheral devices to a computer easier and more efficient. USB has become the dominant standard for plug-and-play connections between personal computers and peripherals. USB connectivity has...

Study on College Attendance Platform Based on Bluetooth Technology and Android Platform

Jie Xiong
To improve the efficiency of classroom attendance check, a college attendance platform based on Bluetooth technology and Android platform is put forward to quickly check the attendance at classroom by scanning the Bluetooth address of students’ mobile phones. The teacher may check the attendance manually...

Anti-Occlusion Tracking Method Based on Kernel Correlation Filter

Weichuang Jiang, Fuxing Zhang
In the real scene, the target itself and the background will be unpredictable changes, such as the occlusion and other factors will bring greater challenges to the object tracking. In this paper, we proposed a method that handle the occlusion based on Kernel Correlation Filters (KCFFR, KCF with forward...

Live Video Streaming Authentication for Vehicle Multimedia based on Merkle Tree

Dongqi Han, Jindong Zhang, Yang Liu, Peibin Wu, Yiding Sun
Merkle tree has been widely applied in the field of P2P transmission. In this paper, an efficient authentication scheme is proposed in the integrity check module for vehicle live video streaming system by optimizing the construction and verification of the Merkle tree. It can create and check nodes at...

Mobile Monitoring System for Gas Sampling Based on Zigbee, 4G and Web GIS

Zhanying Zhang, Congcong Du, Yang Liu, Lixia Han
For the realization of the real-time collection, upload, visualization and intelligent management of air quality data, mobile management system of gas sampling was designed based on the technologies including Web GIS, ZigBee wireless sensor network, the 4G (4th generation) communication system and so...

Design and Implementation of Private Owner Code Region in Memory Protection Unit

Bo Qian, Weiping Jing, Bin Jiang
Embedded systems often use a number of multitasking operations and controls, these systems must have a mechanism to ensure the implementation of the current task, so that it has no effect on other tasks, that is, to prevent the system's resources and tasks are accessed illegally. There are usually two...

Derivation and Development of Noise Channel Information Transmission Capacity

Yutong Li
In this paper, we derive one of Shannon's theorems, the maximum capacity theorem of noisy channels :. The derivation of noisy continuous channel capacity is based on the derivation of discrete channels and most of the conclusions are a limit discretization of the corresponding theorems of discrete channels....

Improvement and Implementation of Feature Weighting Algorithm TF-IDF in Text Classification

Weisi Dai
Based on the introduction of the traditional feature weighting algorithm TF-IDF, based on the phenomenon that the eigenvalue extraction is not effective when the text to be classified is not uniform, an improved TF-IDF algorithm is proposed in this paper, which considers the uneven text distribution...

Design and Implementation of Chinese Traditional Medicine Association System Based on Improved Association Rules Algorithm

Ruixiang Wang
As an important descriptive data mining method, association rules based on apriori algorithm have been widely used in the discovery of the core prescriptions of traditional Chinese medicine, and the correlations between symptoms and syndromes, syndromes and modern examination results, and symptoms and...

Beam Pattern Design Method Based on Particle Swarm Optimization

Yan Rong, Shuqiang Gao
As a new and emerging intelligent algorithm, although young, but the particle swarm algorithm has a very important role in the development of modern society, so we can do nothing without it, its emergence in the academic community caused Depressed big wave. In this article, we try to give its principle,...

A Method of Recognition for Fake Plate Vehicles

Dongyu Guo
The investigation of fake plate vehicles mainly relies on the traffic police verifications and public tip-offs. It is inefficient and produces very little effect. Based on above analysis, a method of recognition for fake plate vehicles is proposed which to investigate the fake plate vehicles effectively,...

Research on IMM-UKF Based Civilian Unmanned Aerial Vehicle Integrated Navigation Algorithm

Ming Liu
The main navigation method of Civilian Unmanned Aerial Vehicle (CUAV) is Global Positioning System (GPS) navigation, GPS navigation failure will make CUAV lost control, resulting in heavy losses. How to ensure the reliability and navigation precision of CUAV under the failure of GPS is a hot issue currently...

The Big Data-Driven Industrial CPS Real-Time Processing System Based on Storm

Junyu Ye, Lichen Zhang
In industry 4.0, CPS will play a huge role in the industrial production and supply management [1-3]. CPS makes the industrial system more intelligent, making the subsequent salesbusinesses more data-oriented and intelligent. However, the industry environment produces large of data during the production...

A Review of Visual tracking Technology based on Infrared Image

Shijie Ren, Xiaogang Yang, Naixin Qi
Visual tracking is a hot topic in the field of computer vision, this paper firstly describes the classification and application of visual tracking, and highlights the advantages of object tracking based on infrared image by simple comparison. Combined with the research of this technology, tracking technology...

An Improved Hybrid Active Noise Control System

Xing Wu, Jiaming Liu, Binwen Fan
In order to achieve a good noise reduction effect in a closed space, an active noise control system was built. Hybrid control systems have faster convergence and better stability than feedforward control systems and feedback control systems. We will study feedforward, feedback and hybrid control systems....

Fast Deformation Part Model with CNN for Face Detection

Canzhang Guo, Yinwei Zhan
This paper proposes a fast deformation part model (DPM) with neural network (FDPDPM) for face detection. It can make fully use of the advantage of high level feature and classifier with spatial location information. In fact, this paper uses a truncated the variant of VVGNET and a pyramid of multi-scale...

The Technology and Implementation of Automatic Identification of Sensors Based on Semantic IoT

Dufang Fan, Xiushan Zhang, Jian Huang
With the development of semantic Internet of Things, there are many smart applications and services springing up in different domains. However, the gap between semantic representations and various sensor data formats used in IoT devices raises doubts and challenges for us. This paper aims to convert...

Parameter Calibration of CT System

Yurui Peng
In this paper, we use the known template to calibrate the parameters of the two-dimensional CT system. The calibration of CT system includes three aspects: the location of the center of the system in the square pallet, the distance between the detector units, and the 180 directions of the X-ray used...

Research on How to Measure the Success of Smart Growth of a City

Yurui Peng
In this paper, we construct an evaluation metric of sustainable development called ‘Smart Growth Score’ (SGS) combining with the 3E’s and the ten principles of smart growth. This provides a clearer description of how successful a city develops smartly. We build a scoring model called “Smart Growth Score”...

Static Routing Algorithm of Nano-satellite Constellation

Yilong Shi, Xiujie Jiang, Ping Zhu, Yufeng Zhang, Meng Liu
According to the work characteristics of Nano-satellite constellation, this paper studies the configuration of it and the static routing algorithm of it. Firstly, the coverage rates of different constellation configuration are given and the constellation configuration with the best coverage is confirmed....

Survey of Convolutional Neural Network

Xv Zhang, Chenxi Xv, Ming Shen, Xin He, Wei Du
In recent years, the breakthrough of deep learning in the field of artificial intelligence algorithms has triggered an academic upsurge which attracted more and more researchers. As a multi-layer perceptron, the key to its success lies in the local link and weight-sharing method. On the one hand, it...

A Survey of Network Measurement in Software-Defined Networking

Lu Wang, Yan Lu
The huge size of network and diversified business characteristics make network traffic difficult to predict and manage. Network measurement is an effective way which can ensure QoS (Quality of Service) and network optimization. However, due to the differences in the implementation rules of equipment...

Multi-Step Wind Speed Forecasting Using Signal Decomposing Algorithms, Bat Optimization Algorithm and Least Squares Support Vector Machine

Zhou Li, Chunxiang Li
Accurate forecasting of short term wind speed has been widely applied in the disaster early warning of civil engineering. Considering the characteristics of non-stationary and nonlinear of wind speed, the actual wind speed time series need to be decomposed first and then predicted. In this paper, a set...

Mathematical Derivation and Analysis of Success Probability of Bitcoin Attack

Yingyu Pan
By using block chain technology, bitcoin has realized a real de centralization and point to point digital currency system, which effectively solved the problems of "double payment" and "curbing inflation". Bitcoin has the value and function of money, therefore, in practical application, we need to consider...

Semi-Transparent Checkerboard Calibration Method for KINECT’s Color and Depth Camera

Zhengyang Wu, Wenzhe Zhu, Qing Zhu
This article describes a method for manually calibrating KINECT color and depth cameras using a semi-transparent checkerboard, and at the same time, the two images can be modeled by 3D projection. A detailed comparison of the resulting images and data is given for the specific experimental procedure...

Indoor Crowd Density Monitoring System Based on WeChat Public Platform

Zhitao Wang, Lei Ding
To reduce the cost of crowd density monitoring in indoor space, facilitate supervisors to monitor crowd density in indoor space at any time. The article uses the characteristics of indoor temperature and humidity changes with the number of changes and combines WeChat Public Platform and design this indoor...

Tangram Algorithm: High Image Quality Secret Sharing Scheme Using Two Steganographic Images

Wanli Lyu, Jiahao Deng, Yu Zhang, Dongshuo Yin
In this paper, our proposed scheme using two steganography images. Unlike other data hiding schemes, this scheme studies the characteristics of the Tangram puzzle model and the secret message bytes that make up the eight binary bits that are hidden into the two graphs. Key matrix M *, horizontal and...

Answer Quality Evaluation in Online Health Care Community

Binjun Zhu, Xiaofeng Cai, Ruichu Cai
Nowadays, through the online health care community platform, users can raise health related questions and doctors would provide corresponding answers. However, some answers could be low-quality and repeated. In this paper, we aim to evaluate and predict the quality of the answers in online health care...

Identification of Dangerous Goods in Human THZ Images

Hong Xiao, Feng Zhu
For terahertz image with low signal-to-noise ratio, serious blur and poor resolution, this paper uses the mean filter to denoise the terahertz image, and then uses Faster RCNN algorithm to detect and identify the dangerous goods in the terahertz image. Different from traditional algorithms, Faster RCNN...

Research on the Improvement of EPTA Parallel Thinning Algorithm

Rui Li, Xiaoyu Zhang
Aiming at the problem of non-smooth contours (contour noises, scratches and jitters), it is easy to generate redundant branches. Based on EPTA algorithm, an improved parallel thinning algorithm is proposed. Through an iteration that eliminates the restrictions and proportional iterations, the pixels...

Algorithm Is the Soul of Programming

Chang Liu
In this paper, the basic concept of the algorithm is introduced first. Then four basic design strategies commonly used in algorithm design are discussed. The divide-and-conquer strategy is the most commonly used strategy for designing effective algorithms. The dynamic programming algorithm is a method...