Proceedings of the 2016 2nd Workshop on Advanced Research and Technology in Industry Applications

+ Advanced search
384 articles
Proceedings Article

Parameter optimization of LS-SVM base on PSO prediction of field intensity in mine tunnel

Xunhong Li, Jinli Wu
The least squares support vector machines to solve small sample, nonlinear show some advantages, is very suitable for prediction of complex field intensity in mine tunnel , but the choice of kernel function and parameters for predicting the results have greater impact .PSO optimizing LSSVM parameters...
Proceedings Article

Stereo Matching Algorithm Based On Integration Of Multi-Measurement

Qiang Wu, Yuxiang Li, Shinan Lang
This paper presents a new measure method of stereo matching algorithm, which is based on image structure and pixel’s feature, named CGDSM. The matching cost calculate step consist of three similarity measure factors: pixel gradient similarity measure factor, pixel feature similarity measure factor and...
Proceedings Article

Research on the High Speed Image Transfer based on the Zynq-7000

Qiang Wu, Shuxin Zhao
Transferring Image data and Video data will expend a lot of bandwidth.this article raise an AXI DMA high speed communication interface design based on Zynq-7000.Compared with traditional DSP+FPGA architecture,the new Zynq7000 has many superiority.such as low cost,low power,low develop difficulty,software...
Proceedings Article

Improved Ant System Algorithm and its Application for Vehicle Routing Problem

Lulu Zhai, Iqbal Muhammad Ather, Zhijie Wang, Qianqian Zheng
The Ant Colony System combined with Variable Neighborhood Search (VNS-ACS) was proposed to relieve the limitations of typical Ant Colony Algorithm (ACA) vulnerable to stagnation and random results. Based on the idea of ACS algorithm, VNS-ACS algorithm improves the path search strategy and the local path...
Proceedings Article

The Design of Website Security Defense System Based on Honeypot Technology

Jun Yao, Jing Chen
With the rapid development of Internet, network security has become increasingly important, the existing network security technologies are all passive defense, which has its inherent disadvantages. In summary, to defense the constantly updated network attacks technology, the emergence of active defense...
Proceedings Article

Analysis of Network Risk System Based on Non-optimum Factor Assessment

Jin LI, Ping HE
The formation of non-optimum factors serves as the basis for existence of network risk system in uncertainty. Besides, the various characteristics and functions of the network security can be measured from the assessment of the non-optimum factor. By summing the practice, this paper has also come at...
Proceedings Article

The detection on tracking of a certain type equipment Based on AT89C52

Kan Cheng, Fu-Li Liu, Wei Liu, Pei-Wen Liao
For maintenance of a certain type of equipment, a detection Based on AT89C52 as the control center for the Certain Missile Equipment Tracking System was designed. The certain equipment elastic applies to all port resources of AT89C52,it complete power control, detection mode control,display driver, buzzer...
Proceedings Article

Sparse-Based Classification with Sub-dictionary Division and Weighted Combination

Junyan Wang, Chunmei Zhang, Dan Li
A novel classification approach for hyperspectral data based on sparse representation framework is proposed in this paper. This new method divides all spectrums of hyperspectral samples to sub-dictionaries based on spectral characteristics of the data themselves. Meanwhile, a weighting algorithm based...
Proceedings Article

Extreme Learning Machine based on Rectified Nonlinear Units

Jingtao Peng, Liang Chen, Iqbal Muhammad Ather, Ao Yu
Traditional Extreme Learning Machine (ELM) networks generally used S-shaped activation function, such as Sigmoid function and Tangent function. However, the problems of slow convergence speed and over-saturation exist. In order to solve the above problems and improve the performance of ELM algorithm,...
Proceedings Article

Technology Analysis and Application of Software Reuse to Electronic Information System

Xianyu Li
Based upon the synopsis of software reuse technology, this paper describes the software reuse process and puts forward software reuse framework. Meanwhile, practical analysis is carries out, and platform application mode is deduced that comprises development environment, management environment, operation...
Proceedings Article

Data Framework and Related Technologies of Electronic Information System

Hua Wang, Xianyu Li, Jianqun Zheng, Zhengmao Chen, Peitao Liu
Based upon the synopsis of big data and electronic information system, this paper puts up the data framework, carries out practical analysis and systematic application of data collecting technology, data synchronization technology, data excavation technology, and data analysis technology, and describes...
Proceedings Article

Design and Product Development of a Customized Lower Exoskeleton Rehabilitation mechanism

KuoChung Wang, HuangKuang Kung, ChinYu Wang
This study makes use of (1) LifeMod biomechanics software to construct customized user parameters; (2) the load conditions of hip joint and knee joint created by software analysis to serve as a basis of motor rating selection; (3) foot plantar pressure measurement plate and gesture recognition sensors...
Proceedings Article

Optimal Design of Loitering Munition Trajectory in Complex Battlefield Environment

Xuancen Liu, Longbin Liu, Min Xiang, Weihua Zhang
Loitering munitions would quickly reach the target area in the complex battlefield environment, and perform a variety of application advantages, such as total field reconnaissance, flexible cruise monitoring, weather monitoring, the battlefield damage assessment, relay communication and target attack,...
Proceedings Article

Research on Audio-visual Emotion Fusion based on Superposition Response

Hua Zhang, Wei Jiang
The research tries to study humans' responses to superimposed costimulatory signals. The information, including music, natural images, may be perceived through sound and visual stimulus. The procedure is interested in the superposition state of superimposed vibrations, whereby two or more signals are...
Proceedings Article

Classification and concentration prediction of combustible gas based on BPNN and PCA

Hanguang Xiao, Junchan Xu, Bin Tang, Zhou Zhang
Detection of combustible gases is very important to reduce the modality and disability of human in both of civil and military situation. In this paper, a method of detection combustible gases of acetone and ethanol was proposed by using back propagation neural network (BPNN) and principal component analysis...
Proceedings Article

The FPGA Implementation of Quantum Key Distribution Based on BB84 protocol

Huifang Li, Minghui Zhang, Kaibin Wang
A new QKD implementation scheme of BB84 protocol is introduced based on FPGA. Firstly, the overall design method and the functional division are described in detail. Then, the logic design of the sub-module are significantly studied, including random data module, laser source drive module, error correcting...
Proceedings Article

Modal Analysis of Folding Frame

Hailiang Li, Haitian Sun, Xiaoli Yan, Qi Liang
Study on folding frame to reduce the vibration in the process of transportation and work, the finite element model of folding frame was established by Pro/E and ANSYS Workbench and the modal analysis was performed, the vibration performance such as inherent frequency, vibration direction and extremum.etc...
Proceedings Article

Research on Ecological Benefit of Land Use in Fujian Province

Qiang Chen
in order to enhance the ecological benefit efficiency of land use as well as the aim of resources and environment protection, this paper by constructing index system establishment and design of land use ecological benefit, the evaluation index adopts comprehensive integrated weight method as well as...
Proceedings Article

Design and Simulation of Hydro-viscous Drive Experiment

Dexue Niu
In order to study the hydro-viscous drive mechanism, on the basis of establishing the oil slick calculation model of hydro-viscous drive among friction pairs, this paper designs the hydro-viscous drive structure and makes a theoretical analysis of the oil slick transmitting torque through taking viscosity-temperature...
Proceedings Article

Design and Optimization on Natural Lighting of One Large Shopping Mall in Guangzhou

Yu Heng Huang
this paper uses methods of combining with DEST and Radiance software to make simulation research on energy consumption of one large shopping mall in Guangzhou, it makes research on expression of indoor light environment and energy consumption of building under design strategy of different natural lighting...
Proceedings Article

MEMS Gyro Random Error On-line Modeling Based on Recursive Least-Squares Method of System Identification

Jiawei Wang, Keyu Qi, Kai Shi, Ke Liang, Jie Yan
To develop the guided projectile with higher hit precision, promotes gyro’s performance has immensely affection on trajectory measurement. According to the difficulty in method of MEMS angular rate gyro random error on-line modeling, this paper proposes a new algorithm of recursive least-squares method...
Proceedings Article

Dynamics Analysis and Trajectory Planning of Erecting mechanism

YuXi Liu, Qinhe Gao, Xiangrui Chen
The single-stage cylinder leveraged balance erecting solutions was adopted to solve multistage cylinder change-stage impact on the erecting mechanism which mathematical and simulation model is build. The dynamics performance is very significant for stability and rapidity of Erecting mechanism, therefore...
Proceedings Article

The Five Floor Elevator Control System Design Based on S7-300 PLC

Jiaxiong Wen
This paper describes the situation of China’s elevator industry. And apply technology of programmable logic controller to control system for five floor elevator. This technology not only improves the elevator reliability, maintainability, and flexibility while greatly extending the life of the elevator,...
Proceedings Article

Instantaneous Heart Rate Detection using Smart Phones Built-in Camera

Han Li, Hai Zhao
The limited smart phone battery and computational resources demand efficient and low-power consumption algorithms for the instantaneous heart rate detection using phone built-in camera. A phase detector based method is proposed to improve the performance of heart rate detection software using built-in...
Proceedings Article

An improved license plate characters binarization algorithm based on sub-pixel

Zhiyong Ju, Chaonan Wang, Xiaolei He
For the problem of traditional binarization algorithm can’t segmentation license plate adhesion or intermittent character effectively. This paper proposes a new binarization algorithm which use a curved surface fitting algorithm to get a new gray level image based on sub-pixel. Experiments show that...
Proceedings Article

Research on association rules based on Complex Networks

Zhenwei Yi, Lingyun Wei, Lizhu Wang
In most cases, the association rules mining (ARM) will generate a large number of rules, most of which are of no interest. In order to find the interesting rules from the large-scale association rules more effectively, this manuscript presents a new method to research the association rules based on Complex...
Proceedings Article

Design of intelligent greenhouse automatic control system based on C language

Jiaxiong Wen
The greenhouse can effectively improve the yield per unit area of land, out of season limits the growth of plants, based on this, puts forward a set of intelligent greenhouse automatic control system based on C language design, through the system can be realized in to carry on the accurate control of...
Proceedings Article

Longdong Loess Mechanics Characteristics and Analysis based on Conventional Triaxial Test

Binwei Zhang, Wanfeng Liu, Xiao Yang, Yue Wang
TSZ-6A type strain control triaxial compression apparatus is applied for indoor test of some soil samples in Gansu Longdong (Qingyang) loess landslide, unconfined shear test of undisturbed soil samples, and the loading and unloading test of loess remodeling. The influences of different moisture content...
Proceedings Article

The Development and Application of Extensible Computer Network Design System

Yi Wang, Liang Li
The mature development of computer network technology mainly is due to the combination with OSI network model’s feature of continuous software improvement. In the analysis process of software life cycle, improve the practicability of the software. This paper focuses on analyzing the development and application...
Proceedings Article

Finite element analysis model of anti-vibration performance of steel structure buildings

Fan Su
in order to study the anti-vibration performance of the steel structure buildings, the finite element analysis model was established. On the basis of reasonable selection of the type of finite element, the failure modes, ultimate load, maximum plastic rotation, ductility and energy dissipation performance...
Proceedings Article

Design and Implementation of Inspection System for Lift Based on Android Platform

Yan Zhang, Yanping Hu
In order to develop a more convenient way of lift inspection, this paper designs and implements the lift inspection system. This system uses SQLite to store the cache, so that inspectors can record without network. In this System, inspectors sign in in a new way—the QR Code. This paper uses a open source...
Proceedings Article

Small Celestial Body Image Restoration Based on Spectrum Characteristics

Tianyuan Tao, Zhiwei Kang, Jin Liu
To remove the blur of the image from optical navigation camera, a image restoration method based on spectrum characteristics is proposed. In this method, image denoising pretreatment is first implemented by the NSCT filter. Then, to obtain the minimum amplitude distance, the paper optimizes the image...
Proceedings Article

An observer deployment algorithm for locating the diffusion source timely in social network

Yubo Zhang, Xizhe Zhang, Bin Zhang
Locating the source of information diffusion on the social network is a challenging and significant task. It is important to control the spread of wrong information on the social network. An existing method is to observe a few nodes in the network and estimate the location of the source from the data...
Proceedings Article

A DFS Model for Forecasting Stock Price

Xiaolu Li, Hanghang Zhao, Kaiqiang Zheng, Shuaishuai Sun
Currently, forecasting stock price is the hotter topic for achieving the smallest lost in investment. However, the previous stock price forecasting model practically cannot satisfy the requirement of accuracy. To raise the forecast accuracy, a decomposition-forecast- synthesis (DFS) model is proposed...
Proceedings Article

The Simulation Modeling Research of ship Mechanical Equipment Impulse Response

Ming Gu, Haibo Zha, Yue Wang
With the constant development and application of computer information technology, especially in the field of computer application technology development, people’s dynamics research, modeling and calculation on complex mechanical system are becoming more and more common and feasible. Based on the simulation...
Proceedings Article

High Speed EMU Brake System Failure Mode and Hazard Analysis

Chunling Guan
In the whole structure framework of high-speed EMU, brake control system is a key part and stands in the core position. Brake control system’s normal and stable work directly relates to EMU’ safe and reliable operation condition, therefore, the strengthening of monitoring state and fault diagnosis level...
Proceedings Article

Economic Data Mining Research based on Complex Networks and factor analysis

Yajie Li, Tao Huang, Liwen Ma
Economical data mining is practical and meaningful. Economic development levels of different regions in China are varied. We use complex network analyzing method to make network graphs and did nodal analysis and community structure detection of these regions to indicate the difference of the economic...
Proceedings Article

The Application Research of FCM Clustering Based on Genetic Algorithm in the Telephone User’s Behavior

Hailiang Tang, Lei Shi, Bin Liu
Telecom user behavior analysis, is that in the case of gaining the basic consumption data of the users to disposal, count, and analyze the relevant data, and discover the law of the users consumption from it, and combine these laws with the telecom marketing strategies to find the problems in the current...
Proceedings Article

Design and Implementation of GeoScience Case Database on JSF Frame for Teaching

Zhenhe Zhao, Shilai Wang, Ping Zhang
Case base construction is of great significance for the promotion of case teaching. But at present there is no successful geosciences case library can be used as reference. So the construction and development of geosciences case library has significance to fill the gap. This article is about design and...
Proceedings Article

Analysis and Design of Charge Pump Configurations Based on Voltage Doubler for RFID

Mengxin Zhang, Jiancheng Li, Hongyi Wang, Cong Li, Li Yang
Charge pump is the configuration which can provide a voltage gain to program nonvolatile memory in radio frequency identification (RFID). In this paper, A complete theory of charge pump is presented, which shows that the influence of body effect on power dissipation and power efficiency is more and more...
Proceedings Article

Design of Ground-detect Equipment for Aircraft Electrical Anti-skid Braking System

Zheng Wang, Ding-jian Xie, Jia-li Fan
According to the principal of aircraft electrical anti-skid braking system a detection equipment was designed by integrity using PLC technology, LCD graphical displaying, measurement and control data processing, information storage and communication technology. The design schemes of hardware and software...
Proceedings Article

Research on Information Recommendation System of Internet Bookstore

Hualin Ma, Yinchu Ma, Liyan Zhang
This paper proposes a strategic data-mining and recommendation method. It helps us to get the weight attribute of type of book by using AHP, and we add it in association rules. Then the method clusters the customer and type of book, and gives some strategies of personalized recommendation. Internet bookstore...
Proceedings Article

The Research of Forest Fire Smoke Moving Target Detection Methods Based on Video Streaming

Zhijian Yin, Kun Xiang, Zhaopan Wu, Qiang Luo, Wang Fan
Moving target detection is the premise to classify and recognize the video images correctly. The smoke is a marked characteristic in the early forest fire. Through the analysis of the characteristics of forest fire smoke image, this paper studied several common moving target detection methods, analyzed...
Proceedings Article

Intelligent trajectory tracking vehicle based on image sensors

Maoyue Li, Jiabin Sun, Lijun Song, Yue Chen, Heng Sun
In this paper, an intelligent trajectory tracking car is designed and an intelligent control system based on Freescale K60 is proposed. CMOS camera Ov7725 is used as the main sensor, and the Bluetooth module is used to implement the communication between the front car and the rear car in real time. The...
Proceedings Article

Research on the optimization of data mining error system based on dynamic information

Qingru Sui
At present most of the data mining technology can only on the basis of the past to produce large amounts of data analysis processing, it is difficult to meet the fast pace of society people expect of knowledge novelty. Therefore, this article puts forward the dynamic information of the data mining technology,...
Proceedings Article

Probability of large-scale data set EM clustering algorithms based on partial information constraints

Xiao yan Liu
The current situation, the need for clustering of data is very large, and the use of traditional algorithm for clustering process often tedious and time consuming is very long, the effect is not obvious. Based on this, this paper proposes a data sets EM probability based on some constraint information...
Proceedings Article

Vulnerability Assessment of Shipboard Electric Power Information Network

Han Yang, Zhihao Ye, Dan Mei, Han Xiao
With the development of the Ship Power Network automation, the relationship between the Ship Information Network and the Ship Power Network becoming more and more closed, and it causes information factors will impact the ship's fragile of Power Information Network at the same time, but there are not...
Proceedings Article

Numerical Control AC Servo System Based on PMSM

Mengxiong Zeng, Jinfeng Zhao
The paper study object is the CNC servo system, and it presented three closed-loops control strategy based on PMSM. Through dynamic mathematical model of current loop, rotational speed loop and position loop were established and simplified. The closed-loop regulator was designed. The system was corrected...
Proceedings Article

An Implementation of FBCSP Replacing Feature Selection Method According to the Classifier

Kang Wang, Xueqian Wang, Gang Li, Bin Liang
Common spatial pattern (CSP) is a popular method for 2-class motor imagery electroencephalogram (EEG) classification. Filter bank common spatial pattern (FBCSP) is an improved version of CSP by introducing multiple frequency filters and a stage of feature selection. In FBCSP, methods for the feature...
Proceedings Article

Review of Modular Self-Reconfigurable Robotic Systems

Di Bao, Xueqian Wang, Hailin Huang, Bin Liang
Modular self-reconfigurable robotic system has been presented for more than 20 years. We will review the development of the system in this article. There are many categories of the system. Each category is introduced in detail in this article, and typical examples of each categories will be presented....
Proceedings Article

Research on the optimization method for equipment allocation of chemical reconnaissance system based on the weighted Voronoi diagram

Guohui Yan, XueZheng Zhu, Wenjie Zhu, Jin Gu, XueCheng Liu
According to the maximum hollow circle strategy of the Voronoi diagram, Starting from the basic principles for equipment allocation of the chemical reconnaissance system, the capability range of the three kinds of chemical reconnaissance nodes is determined by the ideal model of chemical reconnaissance...
Proceedings Article

Network security situation prediction based on singular spectrum analysis

Jizhi Wang, Bo Hu, Jianguo Jiang, Jiqiang Liu
Network security situation prediction based on historical data is to provide warning in advance with network administrator. However, the current proposed approaches ignores the fact that the original time series of security situation include the random component which is not able to be forecast. Singular...
Proceedings Article

Bill Fibers Extraction Method Based on Global Statistic Decision and Local Adaptive Segmentation

Ting Han, Jianbin Xie, Tong Liu
In order to solve the problem of high classifying error in the process of bill fibers extraction, an improved method is proposed for bill fibers extraction based on global statistic decision and local adaptive segmentation. First, locates the suspicious fibers regions in the H, S color space of the global...
Proceedings Article

Maximum Satisfaction Scheduling algorithm Based on Hadoop Architecture

Kuan-ting Chen, Jian-hua Huang, Yi Jin, Xi He
Based on the MapReduce job scheduling technology for design reference, this paper has put forward the maximum satisfaction scheduling algorithm of Hadoop to effectively solve the scheduling problems in MapReduce. The algorithm has tried to modify the original algorithm of Hadoop, configure a satisfaction...
Proceedings Article

Simulation Analysis of Liquid Pipeline Flow under the Pre Pressurized Tank

Yuxiang Zhang, Zhijia Li, Xin Zhang
In some special applications of industrial production and aerospace field, the liquid pipeline flow under the pressurized tank is a problem which should be concerned in the design and application of the closed media delivery system [1]. Design Modeler and Meshing module in Workbench is used to establish...
Proceedings Article

Simultaneous image encryption and compression scheme based on compressed sensing and Hyper chaos map

Xiao-yong Ji, Long-fu Zhou, Bing Yan, Sen Bai
Since the significantly low sampling rate and the determinacy of the measurement matrix, compressed sensing (CS) technique can be used for simultaneous image encryption and compression. However, some problems such as the huge size of the measurement matrix prevent its direct application. We find the...
Proceedings Article

Speech Emotion Recognition Based on Fuzzy K-NN Algorithm with Fractionally Spaced Blind Equalization

Tao Yuan, Chunhong Deng, WangYang Shi
Due to the noise and multi-channel room acoustic environment, practical speech emotion recognition remains an unsolved challenge. In this paper, we first study the fractional spaced blind equalizer for speech preprocessing. The noise interference is effectively removed and more detailed emotional features...
Proceedings Article

The Study of M- Learning Resource’s Intelligent Search in the “Internet+” Environment

Shu Jing Zhao, Zheng Hong Wang
In the development of today's human science and technology, course content and curriculum system are constantly changing; new concepts put forward frequently; subject border gradually becoming blurred, Course cross and fusion becoming more and more intense in the “Internet+” Environment. Thus, it is...
Proceedings Article

A Study on Campus Network Access and Export Management

Anli Yan, Shan Jing, Qi Qi, Bin Xiao
With the improving of the information construction of universities, universities’ network construction scale becomes bigger and bigger, it generally has various types of users, multi-exports network, and internal and external network resources distribution and so on. In order to improve campus network...
Proceedings Article

Analysis of Personalized E-Learning System on the Basis of Behavioral Data Mining

Duoduo Liu, Lihua Zhang
As the network has become an important platform for people to exchange information, online learning is becoming one of the human’s main channels for learning. In order to improve e-learning efficiency, the establishment of personalized recommendation system has becoming an urgent problem. At the same...
Proceedings Article

Resource Estimation in Distributed Data Stream Processing Systems

Minglu Fan, Yi Liang, Fei Liu, Mangmang Yang, Haihua Wang
Distributed data stream processing systems(DSPS) are widely used in real-time massive data processing scenarios for its characteristics of real-time and high throughout. In the real-world DSPS, the fluctuating arrival rate of the input data leads the consuming computing resource of DSPS to be time-variable....
Proceedings Article

Elastic and effective cloud-based solution in online education

Yi Jin, Jianhua Huang, Cheng Li, Qi Ye, Jun Yao
By default, OpenStack scheduling policy is random scheduling, without considering load balancing of the resource pool. This paper proposes an elastic and effective cloud-based solution in online education. OpenStack integrating with Cloudify is used to build the cloud. An elastic scaling approach of...
Proceedings Article

The construction of online course based on Python Language in cloud computing environment

Haiyue Li, Jianjun Zhang
Today's society is a decade where new thing and new ideas were popular. With the suggestion of "Internet +", the education is also gradually catch up with the pace of the times, it thrives in the network-based cloud computing environment. Based on the "Internet +" and the cloud computing environment,...
Proceedings Article

The Compression Method of Point Cloud Data based on the Hypotenuse-height Deviation Method

Chenghui Wan, Xiping He
The article describes a hypotenuse-height deviation compression method of magnanimous point cloud data based on hierarchy. Firstly the point cloud is stratified into several hierarchies which turn into linear point clouds, then compressed by using hypotenuse-height deviation threshold. By experiment,...
Proceedings Article

Verification of a hypothesis about unification and simplification for position updating formulas in particle swarm optimization

Jian Hu
Particle swarm optimization (PSO) has been a popular research area in artificial intelligence technology, where the two issues of theoretical analysis and premature convergence have been the focus of attention. However, due to complex dynamics in particle swarm, the former has been conducted only in...
Proceedings Article

The satellite communication link establishment scheme for offshore mobile platform

YuanMing Ding, ShiGuang Wang, Bo Song
Due to the establishment of current maritime satellite communication link is often used communication on the move system, but it often does not apply to the offshore mobile small platform, and the current research in this area is less. This article first on the basis of dynamic simulation of the motion...
Proceedings Article

The Multi-scale Model Study on Steel Latticed Arch

Mengsha Liu, Jingyuan Li, Jinsan Ju
In this study, Ansys was used to build a detailed finite element model of the steel latticed arch. The multi-scale model was adopted to analyze the behavior of the steel latticed arch and the finite element analysis results were analyzed comparing with the element beam model. The conclusion can be obtained...
Proceedings Article

Advanced Methods of 3D Stress Intensity Factor Assessment

Jinhua Tan, Rui Zhang, Xiangping Chen
This paper explains and demonstrates how to get stress intensity factors using different evaluation methods for a 3D plate with a straight through-thickness crack. The methods include interaction integrals, J-integral evaluation and energy-release rate. All results from these methods are compared with...
Proceedings Article

Diversification of Cloud Resource Allocation based on Improved Genetic Algorithm

Jian Wang, WenYang Ke, Ying Yin, Bin Zhang
Considering the optimization and multiple service levels agreement, this paper converts the resource allocation problem of Service-Based Software system in the cloud environment into a multi-objective optimization problem. Aiming at the cloud service resource allocation problem, this paper establishes...
Proceedings Article

Cuckoo Search Algorithm Based On Local Optimization In The PID Parameter Optimization

Lei Luo, Lixia Lv
In order to solve the problem that the cuckoo search algorithm is easy to fall into local optimal value and cannot find global optimal value, propose improved cuckoo search algorithm based on local search optimization strategy. By extreme dynamic optimization algorithm local search operator is introduced...
Proceedings Article

Information granularity of soft sets

Yaya Liu, Keyun Qin
Soft set theory, proposed by Molodtsov, has been regarded as an effective mathematical tool for dealing with uncertainties. This paper is devoted to the study of uncertainty measures of soft sets in the framework of granular computing. The similarity relation induced by a soft set is proposed and the...
Proceedings Article

A Multi-weight Adaptive Analysis Method of Students' Learning Behavior

Enqiang Shen, Ran Wei, Jin Ding, Quanyin Zhu
With the development of Internet information technology, all aspects of society are in development to digital, information-oriented. Student management system is widely used in Colleges and Universities. Student management system contains a lot of valuable data, and has not been fully excavated. This...
Proceedings Article

An Algorithm for Title Classification on Scientific News

Wujie Shao, Hongjian Zhu, YunYang Yan, Quanyin Zhu
Nowadays, with the rapid development of Internet, news is growing explosively. In order to improve the practical value of scientific news, an algorithm of text categorization which is used to classify scientific news is designed. The number of scientific news is 16034, which is gotten from web pages....
Proceedings Article

An improved QS algorithm for pattern matching of bit stream

Zhao Tao, Jianbo Yang, Peng Liu
On the condition of bit stream, for the reason of simple character sets of target strings and Pattern strings, the probability of appearance of absolutely bad character is very low. The bad character shift is not suited for pattern matching, because of it’s low efficiency. This paper gives the definition...
Proceedings Article

The Application of Cloud Computing in the Enterprise Credit Rating System

Xuyan Chun, Xieshu Fang
With the development of Internet banking and big data, the traditional credit rating in the sample data collection, model development, systems use and other aspects is affected. It mainly appears in the full quantization of data samples and enterprise behavior data which is unstructured, virtualization...
Proceedings Article

A Framework for Security Policy Derivation

Fei Peng, Tao Zhang, Weiguang Xu, Min Zhao
It is difficult for end users to configure security models in operation system without technical knowledge, since security models are defined by experts who have security experience. Indeed, there is no complete method to translate user security requirements into implementable security policies. In order...
Proceedings Article

An improved key frame selection algorithm on sub shots

Jianfeng Zhang, Shuming Jiang, Zhiqiang Wei, Shuai Wang, Huisong Wan, Jian Li
The algorithm based on multi-frame average is the classical algorithm in all kinds of key frame extraction algorithms. This method has better sense on averaging the extracted key frames. But it can only extract one frame at once, which limits the reflections about changes in the content of the lens....
Proceedings Article

Steganography of digital watermark based on Speed-up generalized morphological component analysis

Shaochun Ma, Qingsheng Kong
In this Letter, a novel steganography of digital watermark scheme which contains digital watermark embedding and extraction processes is proposed. The proposed scheme is based on an iterative process of Arnold scrambling transform which is controlled by secret key shared by copyright owner and authorized...
Proceedings Article

Enterprise Knowledge Access Control Based on Colored Petri Net

Xiaozhong Li, Xiaoqin Liu, Ying Liu, Peng Zhao
In the era of knowledge economy, knowledge management has been recognized as an important means to enhance the competitiveness of enterprises, and the access control of enterprise knowledge is a main mechanism of information system security. In this article, through analyzing the type of enterprise knowledge,...
Proceedings Article

The Study of Improved Fault Petri Nets Diagnosis and Its Application

Xiaozhong Li, Peng Zhao, Ying Liu, Xiaoqin Liu
The purpose of this study is to improve the efficiency of fault diagnosis and quickly aim fault propagation path. This paper introduces the modeling and reasoning methods of Improved Fault Petri Nets (IFPN) based on existing concept and method of modeling for fault Petri nets. IFPN shows network fault...
Proceedings Article

Research on Modeling and Simulation of Battery Swap Station Based on Discrete Event

Peng Han, Yue Zhang
This paper builds a model for the operation of battery swap stations based on discrete event and build corresponding simulation system for optimized configuration of battery swap stations. The results showed that both the quantity of the robots and the utilization of source were important factors to...
Proceedings Article

Study on the Agent-based Modeling Method and Simulation System of Consumers Respondence to the Price of Electric Power in Smart Grid

Peng Han, Qian Feng
This paper involved two parts: the agent-based modeling method and simulation system of the consumers in smart grid, to analyze electricity consumption in different conditions. This paper combines the key technologies of electrical disciplines and information science. The model of consumers in smart...
Proceedings Article

Discovering Authoritative users in Question Answer Communities: A Case Study of Stack Overflow

Yue Qi, Jiuming Huang
Question answer communities such as Stack Overflow and Yahoo! Answers are becoming more and more popular knowledge sharing communities, which have attracted great interest from both industry and academia. On such communities, people can ask questions of any kind and then wait for someone else to answer...
Proceedings Article

A study of English writing teaching mode based on computer network corpus

Weiwei Zheng
Network corpus is extremely convenient language learning and research resources. Some of them free and open to the public, the corpus has very high use value, can make use of the network resources to support classroom English teaching is domestic and foreign linguists and language teachers are concerned...