Search all articles

+ Advanced search
Search articles within:
190152 articles
Proceedings Article

Analysis on anonymity of P2P anonymous communication system

Chenfei Xu, Hua Zhang, Qiaoyan Wen
Most of existing anonymous communication systems adopt “mixes” nodes to encrypt and relay the communication messages. Extensive works have been done on this field to find methods that can effectively resist the attacks. However, the adversaries can perform the attacks through the relationship between...
Proceedings Article

Study of tungsten deposited on amorphous Si, Si (111) and SiO2 using direct-current magnetron sputtering

Rui Zhang, Xiangquan Jiao, Hui Zhong, Yu Shi
Tungsten (W) commonly serves as the electrode layer or acoustic reflector layer for the highly columnar growth of AlN piezoelectric thin films used to fabricate film bulk acoustic resonators in power applications. The structure of W film directly influences the texture of AlN thin films above. Moreover,...
Proceedings Article

Research on Elevator Energy Feedback based on Active Inverter

Zeyu He, Jinhu Liao
Aiming at reducing the elevator’s energy consumption, this paper analyses the energy feedback technology, and designs an energy feedback system used for elevator which can return the extra energy to the power grid in the generating state of the motor. The system adopts active inverter technology to achieve...
Proceedings Article

A WiFi-based Positioning Parking Guidance System

Lingli Mei, Mingxi Cheng
With the development of economic and the growth of the city, the number of vehicles has also increased rapidly, parking problems continue testing the ability of the city's public services. To solve this problem, we hope to find a more accurate and more convenient program to find the car, so we propose...
Proceedings Article

Radar Network Threat Estimation Based on Beidou

Limin Liu, Yan Song
Networking radar can make full use of resources and due to the advantages of single radar, making the detection, localization, tracking, identification, and other aspects of the threat of judgment performance has been greatly improved. With the gradual improvement of the Beidou system, powerful communication...
Proceedings Article

Detection and tracking of multiple moving targets in complex conditions

Tao Xu, Chaobing Huang, Mengqiang Zhu
Detection and tracking of multiple moving targets in complex conditions has always been a hot and difficult problem, which mainly includes that the tracked target is occluded, the characteristics of target and background are similar, illumination and background are changing over time, etc. In order to...
Proceedings Article

Research on Flight Grasps System of Four-rotor Aircraft Based on Vision

Zhennan Ma, Feng Yu, Xiaoming Feng, Bingbing Yan
In order to ensure interior target is grabbed by the four-rotor aircraft, the camsift algorithm of OpenCV is adopted, through the recognition of the target, at the same time, the positioning of the aircraft and alignment of target are conducted to achieve grab. The target object is placed on the ground...
Proceedings Article

A Simple Method of Ship Dynamic Trimming Optimization

Qiang Zhang, Zhaoxin Zhou, Xiangxin Cheng, Na Jiang, Fanyi Kong
In order to cope"Guidelines for voluntary use of Energy Efficiency Operational Indicators( EEOI)", a simple method of adjusting ship trimming of a voyage has been attempted,which can minimize the energy consumption and economize cost.A method of ship dynamic trimming optimization base on loading computer...
Proceedings Article

Research of Ship Maintenance Management Platform Based on Cloud Computing

Xin Liu, Qiang Zhang, Shouba Wang, Xiangxin Cheng, Junjie Tang
The digital management of shipping business information is an inevitable trend.Compared with traditional management mode, it’s more convenient, efficient and traceable. The maintenance management platform based on Cloud Computing manage the business information, providing platform service for other systems...
Proceedings Article

Detection of Sensitive Behavior on Android with static taint analysis based on classification

Yayun Chen, Hua Zhang
This paper devotes to the APK sensitive behavior was studied by classification, and quantifies the APK sensitive behavior, finally after a quantitative APK sensitive behavior can be measured on the basis of the APK sensitive value, through the unique static detection method based on classification show...
Proceedings Article

Vulnerability Analysis on the Cloud Network Topology

Ke Chen, Hua Zhang
In recent years, cloud computing is developping rapidly, and many companies put much effort to set up their own private cloud or public cloud. However, structures of cloud network topology are not of the same quality, and many network builders are tend to ignore the vulnerability of network topology...
Proceedings Article

Research on a novel Dual-Base Transistor (DUBAT) in 0.5 m Standard Si-base CMOS Process

Yan Chen, Changlong Liu, WeiLian Guo
A novel Dual-Base Transistor (DUBAT) having a negative-resistance characteristic is presented. This device contains a lateral p-n-p Bipolar-Junction-Transistor (BJT) and a Hybrid-Mode Transistor, and is fabricated on silicon based 0.5 m CMOS process, compatible with the standard CMOS technology as distinct...
Proceedings Article

Serial robots geometrical parameter identification using modified quantum behaved particle swarm optimization

Haomeng Tong
Knowledge of stringent value of the robot end-effector position is necessary in several industrial applications such as macroscopic structure measurement and assemblage. However, industrial robots cannot meet this challenge because of numerous errors. This paper presents a new method using quantum behaved...
Proceedings Article

A Novel Approach of intrusion detection system design for computer network security

Julan Yi
With the development of computer networks, protecting the network information from a variety of attacks are becoming increasingly important as the fundamental purpose of network security. However, due to the diversity of computer networks linking having uneven distribution terminal and network openness,...
Proceedings Article

The Design of Electronic Data Evidence Collection System Based on C/S Structure

Honghui Gong, Yanwei Xu, Ting Zhang
In the computer network crime and network security means defense technology escalating the situation, a growing number of technical and legal experts come to realize, is completely dependent on network security technology to combat computer-related crime can not be very effective, it must apply the law...
Proceedings Article

The Key Technology of Electronic Evidence Collection Research Based on Cloud Computing

Yanwei Xu, Honghui Gong, Ting Zhang
A computer system for the new types of objects and tools of criminal activity gradually spread, combat and prevent computer crime has become the public security of the judiciary need to be solved. In this case, the digital forensics have come into being. Digital forensics collected electronic data is...
Proceedings Article

Web-based Building Energy Consumption Monitoring and Conservation Service

Wei Dong
Building in operational use energy consumption including energy consumption of buildings in the course of the lighting, refrigeration equipment, power equipment and services, gas, water, elevators and the like. In energy-efficient buildings, not only to emphasize energy conservation technology, but also...
Proceedings Article

Computer-assisted Three-Dimensional Sports Training System Analysis and Design Research

Li Zhou
sports simulation helps sports training, the transition from primarily based on the human eye's method to the traditional method based on anthropometric high-definition video capture and analysis; from experience-based training methods to the stylized sports science shift analysis method, leading to...
Proceedings Article

An Exploring Research on Key Technology of CAN Bus Configuration for the Industrial Automation Applications

Xuexuan Zhu
Herein fieldbus control system configuration software is hardware platform, the first about the definition and development of domestic and international fieldbus, specifically discusses the characteristics and hierarchical structure CAN bus, followed by a detailed analysis of the development of the configuration...
Proceedings Article

The Research on Wisdom City‘s Informatization System Design Based on Cloud Computing

Wei Tang
The information system construction has become the focus of the wisdom of urban construction. Multiple applications of information technology has formed the traditional property management, e-government. But between these systems independent of each other to form a plurality of data silos, resulting...
Proceedings Article

The design and implementation of UML-based students’ information management system

Min Huang
Based on the background of the development of colleges and universities students’ information management system, this paper discussed the application problems of UML in this system modeling. The unified modeling language (UML) is adopted to carry on the modelling for the framework relation of students’...
Proceedings Article

Research on the urban management monitoring and command center

Yunli Cheng, Huili Xue
In order to improve the level and efficiency of urban management in Heze, Shandong province, office of Heze urban management committee and the city construction information center want to build an urban management command center, to enhance the comprehensive law enforcement efficiency and the level of...
Proceedings Article

(paper withdrawn) Simulation of multiple proton implantations field stop IGBT

Renfa Huang, Dongqing Hu, Yu Wu, Yunpeng Jia, Shikai Zou
Based on a new buffer layer, the characteristics of multiple proton implantations field stop IGBT ( MPI-FS-IGBT) were simulated and analyzed Different from the conventional field stop IGBT (FS-IGBT) which has an abrupt thin buffer layer and grade-doping field stop IGBT(GFS-IGBT) whose buffer layer was...
Proceedings Article

A method of three-dimensional subdivision of arbitrary polyhedron by using pyramids

Ji-Bo Liu, Zhi-Hong Wang, Yue-Guan Yan
The key research of this paper is the algorithm that using pyramids to divide the arbitrary polyhedron. The core idea of this algorithm is as follows. Store the vertices of the outer boundary surfaces of the polyhedron anticlockwise, and store the vertices of the inner boundary surfaces clockwise. When...
Proceedings Article

A Novel DOA Estimation Based on State Space Balance Method and Its Performance Analysis

Hong Xiang, Jun Wang, Zhaotao Qin, Hai Jiang
Considering the high speed space targets, the real time processing is required with only a few snapshots. Meanwhile, the algorithm based on state space method performs well in the parameter estimation. In this work, we present a novel Direction of Arrival (DOA) estimation based on state space balance...
Proceedings Article

A real time power line detect system based on stereo vision

Xingang Mou, Wei Luo, Xiaoliang Zheng, Xiao Zhou
In recent years, Unmanned Aerial Vehicle(UAV) is widely used for power lines patrol. While it's more efficient than manually patrolling, the UAV may easily collide with power lines. So measures must be taken to detect the distance between UAV and power lines. This paper presents a real time power line...
Proceedings Article

Key Tasks of Research on Agricultural IOT Technology and Service Innovation

Jifang Liu, Jianhua Zhang, Shuqing Han, Fantao Kong
The application of the Internet of Things, cloud computing, big data, mobile Internet and other modern information technologies in the transformation and upgrading of the whole industrial chain of agriculture is of great significance to accelerate the development of agricultural information and modernization....
Proceedings Article

Capability Assessment Model for Software Outsourcing Service Providers Based on Interval Evidential Reasoning

Sheng-Qun Chen
An enterprise may benefit from software business outsourcing depending on the suitability of the outsourcing service provider. This research addresses the assessment of the contracting capability of software outsourcing vendors and proposes a decision-making model based on Interval Evidential Reasoning...
Proceedings Article

Selection of Supply Chain Partners for Small and Medium-Sized Manufacturing Enterprises

Tongjuan Liu, Lanqing Yang
Supply Chain Partnership means a strategic relationship which is reached a long-term cooperation agreement between upstream and downstream entities in the same supply chain. Establishing a good supply chain partnership help to reduce the cost, shorten the reaction time and create the new market value...
Proceedings Article

The Applied Research of the Network Coding Technology in the Transmission Mode of Multi-point to Single point Wireless Signal

Yue Li, Zuhua Peng
Nowadays, the biggest problem that has influenced the using effect of wireless networks is that the transmission signals are easy to be affected by the external factors as well as the hardware equipments which are easy to be damaged, which lead to the phenomena like bad performance of transmission signals,...
Proceedings Article

Research of adaptive middleware based on context aware

Jing Zhang, Guangyu Wang, Xiaoli Wang
The limitation of mobile environment and equipment, brings the new challenges for pervasive computing. This paper analyzes the problems existing in the traditional middleware technology in pervasive computing, puts forward the necessity of adaptive mechanisms in middleware implementation. Through the...
Proceedings Article

The Empirical Research of Demand Response on the Smart Power Consumers

Bin Yang, Wenjun Ran, Kun Shi, Dezhi Li
Demand response in power demand side management plays an important role. In this paper, we achieve the user electrical equipment monitoring through selecting of appropriate scale of residential customers, according to different power consumption behavior pattern, through the deployment of interactive...
Proceedings Article

The Modeling and Design on Automatic Control System for Hydraulic Log-core Veneer Lathe

Guangming Xiong, Lijun Guo
The mathematical variable speed feeding model of the cutter is established in this paper, the curve of the cutter's feeding speed with the diameter of the log changed is deduced and a new-style hydraulic log-core veneer lathe control system is designed by the model. C8051F020 type single-chip becomes...
Proceedings Article

The Effect of CuO addition on low temperature co-firing PZT ferroelectric ceramics in multilayer device application

Xiumei Shi, Tao Zeng, Hong Cui, Lijun Zhang
Low-temperature sintering of Pb0.995Cd0.005(Zr0.965Ti0.035)O3 ceramics was investigated using CuO as a sintering aid. Effect of CuO addition on the sinter ability, microstructure, and electric properties of PZT ceramics were systematically studied. The addition of CuO significantly promoted the densification...
Proceedings Article

A New Agricultural E-commerce Model Based on the Information Transmitter and Pre-sale Strategy

Yufeng Zhuang, Hang Zhao, Chi Zhang, Zilin Di
In China, countless docking problem always exists in the agricultural production and marketing process. It often leads to blind planting and unsalable depreciated phenomena. Although the e-commerce is a good idea of exchanging supply and demand information and reducing the circulation cost, it faces...
Proceedings Article

Using Förster energy transfer for fabrication of organic light-emitting device

Lishuang Wu, Huishan Yang
Blue fluorescent material combined with red uorescent dye doped into tris-(8-hydroxyquinoline) aluminum (Alq) in multilayer organic light-emitting diodes(OLEDs) were investigated. Basis device architecture is indium tin oxide (ITO)/ N,N -bis-(1-naphthyl)-N,N -diphenyl-1,1 -biph-enyl-4,4 -diamine(NPB...
Proceedings Article

Optimization Design of Car front Structure Based on Pedestrian Protection

Jia Yao, Mingjia Liu, Wei Lu, Jiyi Luan
For reducing the injuries of pedestrians when the collision accidents between pedestrian and vehicle occur, the design of car front structure has been proposed based on pedestrian protection, the design scheme includes a mechanical cushion structure of car bumper and a mechanical bounce device of hood...
Proceedings Article

Optimization Design of Inner Structure and Material of Cars Front Bumper Based on Finite Element Method

Wei Lu, Jia Yao, Xiangdong Liu, Lei Xing, Xingwang Lv, Jing Yao
The ideal design of the bumper should take full advantage of the bumper plastic deformation to absorb most crash energy in automobile collisions. In the paper, the bumpers with different inner structure (circular cross section form and honeycomb cross section), different materials (Al alloy, structural...
Proceedings Article

Exploration of Curriculum Reform of Mobile Communication Technology for Application-Oriented Universities

Yu Zhang, Qiaoyun Sun, Shuguang Zhang, Min Wang
Mobile Communication Technology is one of the most important professional courses of communication engineering specialty. Traditional teaching patterns from ordinary universities are not suitable for application-oriented universities. To improve the teaching quality of this course, unsuitable points...
Proceedings Article

Analysis of Product Competitive Factors in Agricultural B2C Platform Based on Factor Analysis

Zhangyuan Xiong, Hongzhi Yu, Lulu Liu, Fucheng Wan
Based on factor analysis, this paper study on the current product competitive factors in agricultural B2C platform. By analyzing the data that is the sales of commodities, price, number of popular, shop credit rating, and evaluation of commodity, and explore the factors of commodity competitiveness,...
Proceedings Article

High Availability of Network Service on Docker Container

Yikang Liu
In recent years, a new technology, container, has been developed rapidly. More and more services are deployed on a container. In order to ensure the high performance and high availability of these services, a system which can provide the technology of high availability is essential. Container, as we...
Proceedings Article

A SDN-based IP Address Hopping Method Design

Ke Zheng, Xin Zhao, Xiao Li, Yao Zhou
To mitigate growing cyber threats, this paper builds on previous researches on proactive defense and Software Defined Network to propose a SDN-enabled IP address hopping method design, including the basic model, detailed hopping process, key generation and SDN controller.
Proceedings Article

An Efficient K-SVD Algorithm of Dictionary Learning for HRRP Targets Recognition

Kun Chen, Yuehua Li, Yilu Ma
Inspired by the characteristics of sparse representation, we consider to recognize three military targets. To overcome the target-aspect sensitivity in radar high resolution range profile (HRRP), an improved dictionary learning algorithm, called auto-optimized fast K-SVD (AOF-KSVD), is proposed in this...
Proceedings Article

Data Communication of Process Control System for Plate Mill

Zhijie Jiao, Xiaotong Meng, Chunyu He, Jun Wang
For plate mill, data communication between Process Control System (PCS) and other system are built with different communication methods. The communication between PCS and Basic Automation system (BAS) is based on the industry Ethernet. Every 200ms, BAS sends actual data to PCS, and PCS sends setup data...
Proceedings Article

Simulation Method of Rolling Mill Process Control System with Actual Information

Zhijie Jiao, Ruiyu Gao, Chunyu He, Jun Wang
For the purpose of mill Process Control System (PCS) debugging and optimizing, a new simulation method is used. The actual information of rolling process is gathered and sent to the PCS cyclically. This information is saved by PCS. During simulation process, the actual information is read and playback....
Proceedings Article

Integer ambiguity solution based on artificial swarm algorithm

Shugang Liu, Yajing Zhang
One of the keys to precise position of using double difference carrier phase measure is to resolve integer ambiguity. Least-square ambiguity decorrelation adjustment(LAMBDA) is relatively fast and precise in integer ambiguity resolution of double difference carrier phase measurement. The LAMBDA consist...
Proceedings Article

Numerical prediction research on the evaporation rate of liquid cargo tank for LNG Filling Vessel Based on Ansys

Yunlong Wang, Yanyun Yun, Ming Chen, Yan Lin
With the increase of LNG power ship, the facility and equipment of LNG fuel filling for LNG power ship have become an important problem. LNG filling vessel is a good development direction of LNG filling technology because of its advantages of self navigation ability, safety and reliability, flexible...
Proceedings Article

Music feature extraction based on fractal dimension theory for music recommendation system

Bi Li, Qiang Tao, Xiang Li
Music feature extraction is widely used in music recommendation system. The recommended music is somewhat similar in the form of melody. This phenomenon exhibits a repeating pattern that between the music set and the recommended one, which reveals that the similar music has the characteristics of fractal...
Proceedings Article

Test of Exception Handling in Different Java Virtual Machine

Tingting Li
Exception Handling in Java and other languages make it possible to raise exception and attaching exception handlers to particular blocks of code. In most research, more people focus on testing of exception handling of programs, Alexandre L. Martins [1] force the execution of exceptional path to improve...
Proceedings Article

Analysis of the Resource Affinity in NUMA Architecture for High Performance Network

Zhiyuan Bo
Multicore system is processors and the high speed network adapter is very common in cloud computing. So it becomes more and more important to make full use of recourses such as CPU, memory and I/O devices. However, traditional system architecture just consider about CPU and memory, cannot meet the need...