Search all articles

+ Advanced search
Search articles within:
193094 articles
Proceedings Article

Research on data mining methods of potential risk for large cloud computing network

Chen Wang
During the study process of mining methods for data of potential risk in large cloud computing network, when mining data of risk with traditional methods, principal element features and context features of data have significant fluctuations, which results in inaccurate data mining results. For this,...
Proceedings Article

SAW Sensor Technology and Its implementation and application in Electric Power Temperature Measurement

Weihai Song, Jie Tong, Dongfang Wang
This article firstly has an overview of Surface acoustic wave (SAW) sensor technology, including its history, principle, compare of resonate type and delay-line type. SAW technology is also compared with other temperature sensor technologies. To meet the temperature detecting requirement, we have developed...
Proceedings Article

Analysis of Building Energy Efficiency and Wall Heat Preservation

Zhaoxia Han
Rapid development of economy speeds up the pace of China's urbanization. The gradual increasing of structures increases energy consumption. In order to adapt to the development of our country's economic society, the attention to environment protection is strengthened in our country. The energy consumption...
Proceedings Article

Design and Research on Examination Performance Assessment System for College Student Course

Shuwen Chen
In the process of designing college student course examination performance assessment system, with the current algorithm to design examination performance assessment system, only based on the theoretical view to assess the quality of qualitative course examination scores, results in the passive situation...
Proceedings Article

Mobile terminal 3D image reconstruction program development based on Android

Qinhua Lin
During the study process of mobile terminal three-dimensional reconstruction program development based on Android, due to the adoption of the current algorithm for 3D image reconstruction program development, the definition of established model is low, leading to the problem of poor fidelity for 3D image...
Proceedings Article

Implementation of UCDOS Font Interface Based on QT

Jian Huang, Qian Zhao, GuoMing Li
After analyzing the interface work principle of the lattice font supported by QT and UCDOS font feature,It is found that the open source QT is lack of the lattice font more than 16*16 size. For this shortcoming, the UCDOS font is combined with the QT seamlessly. Thus, the QT can use any font in the UCDOS...
Proceedings Article

Electricity communication transmission network risk calculation model design and management system achievement

Hailong Xiao, Chunyu Liu, Yongsheng Zhang
Electricity communication transmission network is the key support network of the power grid. Its security has direct significance to the stable operation of the power system. The article brings out a re-definition of risk. According to the threat of natural disasters, equipment and human resources in...
Proceedings Article

The motion simulation of three-DOF parallel manipulator based on VBAI and MATLAB

Zhuo Zhen, Chaoying Liu, Xueling Song
In order to truly reflect the object situation of catch and place of the three-DOF parallel manipulator based on machine vision, and on the basis of the modeling of the trajectory and mechanical structure, this paper mainly focuses on the analysis on the manipulator system by using the co-simulation...
Proceedings Article

The Electric Power Communication Transmission Network Risk Assessment Index System Research Based on AHP

Chunyu Liu, Jinyu Luo, Yongsheng Zhang, Jie Zhang
By studying the SDH equipment of EPCTN, and the principles and methods of building the index system, combining with the actual situation of electric power communication operation, this paper establishes the index system of EPCTN risk assessment which includes target layer, rule layer, and index layer....
Proceedings Article

2-D DOA Estimation for Acoustic Vector Sensor Array Based on Greedy Block Coordinate Descent Algorithm

Jie Hu, Wei Li, Shaojun Zuo
This paper presents an approach for the estimation of two-directional (2D)direction-of-arrival (DOA) using Acoustic Vector Sensor array based on greedy block coordinate descent(GBCD) algorithm, which can achieve faster convergence rate and better estimation accuracy. Moreover, a weighted form of block...
Proceedings Article

Structure Analysis of Transmitter Coil in Electromagnetic Launch Interceptors

Liangming Zhu, Yanjie Cao, Weibo Li
This paper introduces the composition and working principle of, electromagnetic emission interceptors, establishes the three-dimensional model of transmitter coil, analyzes magnetic - structure coupling of the transmitter coil, gives the transmitter coil magnetic field and stress field distribution and...
Proceedings Article

A Novel Personalized Recommendation Method in E-business Based on Kansei Image

Guangqian Zhang, Enshui Yu
Personalized recommendation technique is an important technology to solve information overloaded in e-commerce. But recently new commodities are emerging constantly, so it is required to recommend commodities that consumers aren’t familiar with but interested in. Consequently our study proposes a method...
Proceedings Article

A Generalized Weighted Closed Sequential Pattern Mining Algorithm with Item Interval

Haitao Lu, Shuo Li
The algorithm of this paper inserts pseudo items which are converted from item interval to obtain equal extended sequence database; it defines item-interval constraints, which are relative to the item weight, to prune the mining patterns. Through doing this, the algorithm avoids mining the patterns which...
Proceedings Article

Relations between the solutions to matrix equations AXA=B and CYC=D

Jing Wang
In this paper, we present some results on the relations between the solutions to matrix equations AXA=B and CYC=D, where B and D are Hermitian matrices.
Proceedings Article

A CM-based model for 802.11 networks security policies enforcement

Karl Mabiala Dondia, Jing Ma, Feng Tao
In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is due to the “plug-and-play” nature of the technology and the mobility. The lack of physical containment due to the...
Proceedings Article

Solutions for a coupled system of nonlinear fractional differential equations with integral boundary conditions

Yunhong Li
In this paper, we investigate a coupled system with integral boundary conditions of nonlinear fractional differential equations. Using Leggett-Williams theorem, the existence of solutions is obtained. An example is given to illustrate our result.
Proceedings Article

Discovery Algorithm for Network Topology Based on SNMP

Yun-ting Zhou, Mao-lin Deng, Feng-zhu Ji, Xiao-gang He, Qi-jie Tang
Since computer network has become the basis of the information society, network topology has also become an important part of network management. The theory foundation of the network topology algorithm based on SNMP has been introduced in this paper, and the algorithms of network topology discovery based...
Proceedings Article

Network Security Situation Assessment Based on FAHP

Feng-zhu Ji, Yun-ting Zhou, Qi-jie Tang, Fang-xiang Hu, Shao-feng Ma
In order to solve the problem of methodology subjectivity, long modeling time and low classification accuracy in the information security risk assessment, a network security situation assessment model based on FAHP has been proposed in this paper. Via building a network security index system, using the...
Proceedings Article

A Label Extended Semi-supervised Learning Method for Drug-target Interaction Prediction

Jie Zhao, Zhi Cao
Computational methods for predicting the new drug-target interactions are more efficient that those experimental methods. Many machine learning based methods have been proposed but most of them suffer from false negative problem. In this paper we extend the original label matrix and adopt weighted lose...
Proceedings Article

Cluster lag synchronization of complex networks with nonidentical dynamical nodes via Adaptive control

Shuguo Wang, Haitao Cao
In this paper, synchronization analysis is investigated for an complex networks with time delay. It is assumed the nodes in the network to be nonidentical. In order to achieve cluster synchronization, this paper uses an adaptive controller on each node, by utilizing the Lyapunov stability theory, a new...
Proceedings Article

Assessment and prediction system of sustainable development

Yixuan Han
In this paper, an effective model is constructed to discuss the sustainability of a country. We define Coordination Coefficient (CC) to measure the sustainability of a country or a policy and use the value of CC to define how and when a country is sustainable or unsustainable. To consider all the possible...
Proceedings Article

A fast SPIHT algorithm based on the end scan threshold

Changhua Liu, Xiaole Xu
A fast set partitioning in hierarchical tree (SPIHT) algorithm based on the end scan threshold is proposed in this paper. Because the coding process of the SPIHT needs repeat scanning and sorting, so it takes a lot of extra time and storage space. In order to save the time and space overhead, the end...
Proceedings Article

A Palmprint Recognition Method Based on Gabor Wavelet and Local Direction Pattern

Mianshui Yu, Xiaomeng Xie
Palmprint recognition is an emerging biometric technology that identifies a person based on the hand image. In this paper, a novel palmprint identification method based on Gabor wavelets and Local Direction Pattern (LDP) techniques has been proposed. The Gabor response images at different scales and...
Proceedings Article

Study on the Impact of Big Data on Radio and Television Ratings

Jianping Chai, Xingyi Pan, Fulian Yin, Juanfang Chai
For problems, such as the low accuracy and easily polluted data of the traditional sampling ratings index calculation method, we conduct research on the ratings of big data. Firstly, we argue the effect of the amount of data on the accuracy of the ratings, and do experiments using real data. By sampling...
Proceedings Article

The Study On A Decision Tree Based On The Classification Preference Ratio

Jing Lin
The decision tree is an important data mining method for classification. Granular computing has been applied to the decision tree, then a new decision tree based on the classification preference ratio of attribute is proposed. This decision tree is a hierarchical granularity tree. In information systems,...
Proceedings Article

Research on Small Satellite Formation Scheme for Earth Observation Task

Zheng-yu Zhao, Yuan-wen Cai, Yi-bin Zhao, Yan Li
The demand of earth observation data is increasing currently and the demand of observation data accuracy, real-time, and continuity is improving continually. Aiming at this problem, the small satellite formation scheme for earth observation task is researched. The significance of the small satellite...
Proceedings Article

The Method of Multi-attribute Target Recognition Based On Laser Detection

Jian-biao Chen, Hua-yan Sun, Yong-hui Zheng
Ideal result of target recognition can’t be obtained just with single attribute. In order to improve the performance of target recognition and reflect the physical attributes of the target, some attributes are extracted from the high range resolution profile of the unknown target to form an multi-attribute...
Proceedings Article

Smooth Test for Multivariate Normality

Yan Su, Ya-Ping Huang
Based on the smooth test for uniformity on the surface of a unit sphere , a new test for multivariate normality is presented. The test statistic does not depend on the parameters in the multivariate normal distribution. We obtain the asymptotic null distribution of the test statistic. The test procedure...
Proceedings Article

A Fusion Method of Rocket Launchers’ Testing Information Based on the Improved D-S Evidence Theory

Yi-bin Zhao, Zheng-yu Zhao, Xiao-chen Xing, Guo-feng Xu
In order to make more effective decision level analysis on the testing information of rocket launchers, this paper analyzes the existing disadvantages of evidence theory, draws into the concept of weight coefficient integrated with existing improved method, proposes new improvement of the combination...
Proceedings Article

The CFD Numerical Simulation of H-Boat

Weimin Yang, Yanna Zhang, Shujiang Li, Caixia Shi
Using commercial software CFD (Computational Fluid Dynamics) analysis of fluid to simulate the H-Boat. Based on the numerical methods, use the VOF (volume of fluid) method to simulate the free surface, and use RNG (Renormalization-group) model to close RANS (Reynolds Average Navier-Stokes) equations...
Proceedings Article

Design of Analysis Platform Used for Studying Soft Error Characteristic of 3D SRAM

Peng Li, MinXuan Zhang, ZhenYu Zhao, Quan Deng
This paper designs a novel 3D SRAM soft error analysis platform. It is used for studying the soft error characteristic of 3D SRAM stacked by multi dies and guiding the radiation hardened design for 3D SRAM. This platform integrates simulation tools including Geant4, TCAD and Nanosim, data recording and...
Proceedings Article

A Semantic Approach towards Multi-Agent Choreography in Clinical Decision Support

Haifeng Chen, Liang Xiao, Jingbai Tian
A distributed environment, medical decision-making process is becoming increasingly complex, and it usually needs more medical roles to complete the diagnosis and treatment of one complex disease. However, these medical roles typically distribute in different work environments, so the organization and...
Proceedings Article

A Precise Model of TSV Parasitic Capacitance Considering Temperature for 3D IC

Quan Deng, Min-Xuan Zhang, Zhen-Yu Zhao, Peng Li
As the technology of three dimension integrated circuit (3D IC) develop quickly, through silicon via (TSV) plays a basic and important role. In consideration of real working environment, factors as temperature and working voltage are studied by TCAD simulator. And the contribution of physical sizes and...
Proceedings Article

A Feature Extraction Method for Hardware Trojans Detection

Zhixun Zhao, Lin Ni, Shaoqing Li, Yubo Shi
Recently Hardware Trojan has been widely studied for its threat to IC security. The method based on power side-channel information is an effective one in various Hardware Trojan detection methods proposed at present. However, there is a problem that Hardware Trojan power is difficult to be distinguished...
Proceedings Article

Scene understanding based on Multi-Scale Pooling of deep learning features

DongYang Li, Yue Zhou
Deep convolutional neural networks (CNNs) have recently shown impressive performance as generic representation for recognition. However, the feature extracted f¬rom global CNNs lack geometric invariance, which limits their robustness for classification and detection of highly variable objects .To improve...
Proceedings Article

Multiobjective Artificial Bee Colony Algorithm for S-box Optimization

Guanjie Qin, Xuemin Cheng, Jianshe Ma
Substitution box (S-box) is an important nonlinear component in block cipher algorithms. Evaluating the cryptographic properties of an S-box requires attention to criteria such as nonlinearity, differential properties, and diffusion properties. In this paper, Artificial Bee Colony algorithm was introduced...
Proceedings Article

Real-time study of remote highway snow warning technology

Huaqi Zhao, Changyong Xiang, Guojing Li, Bin Wang, Shijie Zhang, Dazhi Wen
Snowfall directly affects the traffic safety and a lot of accidents happened every year because of the snowfall. If the traffic department can timely detect the thickness of the snow on the highway and clear the snow in time, the rate of traffic accident will reduce and won’t make much trouble for people....
Proceedings Article

Effects of Soft Information Quantization Precision on LDPC Performance for NAND Flash Application

Changlai Song, Haozhi Ma, Liyang Pan
(17664, 16512) LDPC code is simulated under AWGN channel. The simulation is led on FPGA platform, with Layered Normalized BP-Based decoding algorithm. The shifting of measurement point is under consideration, where the soft information for decoding is inaccurate. LDPC performance under different situations...
Proceedings Article

Computer vision feature recognition method based on Improved Wavelet arithmetic

Lili Liu
in the process of studying on computer vision feature recognition method, with the current algorithm for feature recognition, the amount of calculation is large, and noise is strong, recognition rate is low. For this, a computer vision feature recognition method based on Improved Wavelet arithmetic is...
Proceedings Article

Analysis of mathematical modeling in particular clustering process of mixed data

Yuanyuan Xu
the analysis method of mathematical modeling in particular clustering process of mixed data is of great significance for improving the ability of data analysis. The traditional method for specific clustering process mathematics modeling of mixed data is based on K-Means clustering algorithm, it is easy...
Proceedings Article

Research and Simulation on effective classification model of nonlinear data

Fenglin Tang, Min Chen
in the classification process of nonlinear data, due to large amount of the data of nonlinearity, the correlation between nonlinear data is reduced, resulting in the classification results of nonlinear data is not ideal. Therefore, this paper proposes a fast clustering algorithm based on improved quantum...
Proceedings Article

Modeling Analysis for the effect of night environment on athlete’s psychological intervention

ChunSheng Liu
the analysis of the effects of night environment on athlete’s psychological intervention has a momentous significance for promoting the performance of athletes. The traditional algorithm not fully considers the instantaneous and disorder of night environmental psychological change, resulting in the reduced...
Proceedings Article

Study on design method for anti-collision in large scale network control software

HuanLiang Li
the anti-collision problem of large network control software is studied. With the increase of the control task amount of large network control software, the randomness for network control is enhanced, the traditional anti-collision design algorithm is hard to establish the accurate anti-collision model...
Proceedings Article

Simulation analysis of peak period income estimation model in tourism scenic of minority Areas

DongYan Sun
in the process of peak period income estimation in the tourism scenic of minority areas, the estimation results obtained by traditional estimation methods are affected by the mutability of tourist amount, existing local optimal problem, causing bigger error. Therefore, this paper proposes a method of...
Proceedings Article

Study on effective detection method for specific data of large database

Jin-feng Li
in the process of detecting specific data of large database, when the traditional detection method is utilized for detecting specific data, it is vulnerable for interference of mass information, which makes the specific data detection process time-consuming, and of low efficiency. For this, an effective...
Proceedings Article

Simulation on optimized complex process modeling based on XML

Ting-yan Ren
in the XML complex process relationship design problem, in multidimensional dynamic list scheduling algorithm, for the defect of platform (Group) selection caused by static priority of platform, an optimized priority calculation method is designed based on XML complex process modeling, during the process...
Proceedings Article

Research and Simulation of classification storage technology under the cloud computing environment

Ting Li
classification storage technology under the cloud computing environment is studied to improve the performance of data management. In the process of data management, how to process classified storage for data effectively, has become the core problem in the data field. How to carry on the management for...
Proceedings Article

Optimization design of effective management model of large construction project

Xiao-li Liu
in the management process of large construction projects, the related factors and the influenced parameters are various. A mathematical model of construction project management is complex, it is difficult to form effective project management measures. In the traditional architectural engineering project...
Proceedings Article

Statistical analysis of the spatiotemporal characteristics of loess landslide in Qingyang area of Gansu province

Binwei Zhang, Wanfeng Liu, Xiao Yang, Yue Wang
according to the present situation of loess landslides in Qingyang area through frequent field visits, and statistical information analysis, for the "seven county and one area" administrative division in Qingyang area, the distribution curves and statistical characteristic diagram is established, to...
Proceedings Article

Study on detection method for mixed network structure robustness in 4G network

Hui-min Chen
detection method for mixed network structure robustness in 4G network is researched. BP neural network algorithm is utilized to detect mixed network structure robustness in 4G network, because the 4G network reflects the exchange of information between individual and individual, randomness factors of...