Skip to main content

2011 | Buch

Applied Informatics and Communication

International Conference, ICAIC 2011,Xi’an, China, August 20-21, 2011, Proceedings, Part I

insite
SUCHEN

Über dieses Buch

The five volume set CCIS 224-228 constitutes the refereed proceedings of the International conference on Applied Informatics and Communication, ICAIC 2011, held in Xi'an, China in August 2011.

The 446 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover a broad range of topics in computer science and interdisciplinary applications including control, hardware and software systems, neural computing, wireless networks, information systems, and image processing.

Inhaltsverzeichnis

Frontmatter

Intelligent Control and System

Target Localization Based on SIFT Algorithm

SIFT features are invariant to image scale, translation and rotation, and are shown to provide robust matching across a substantial range of affine distortion, so it is widely used in image matching. This paper presents the SIFT feature extracting process in detail, and the application in image matching and locating. This paper also presents an approach to use SIFT keypoints to calculate the coordinate transforming parameters between two images, and the expressions, finally accomplishing the target locating, which exist in two images together. Simulation results indicate that SIFT features have excellent performance in image matching. It is precision for target locating between two images based on SIFT algorithm.

Lei Bo, Jing Yuanping, Ding Jinlei
Find the Mona Lisa in the Louvre Study on Museum Exhibition Space and Visual Oriented Sign

This paper discusses space and visual sign in case of museum exhibition. The topic is drawn from the case of a famous painting, the Mona Lisa, which is collected and long-timely exhibited in the Louvre. The spatial pattern in the Louvre can be summarized as three-dimensional multi-layer spatial pattern. Exhibits are put orderly according to their ages and types. To help people find the Mona Lisa easily, a set of visual signs are well-marked from the entrance hall to the location of the Mona Lisa. The case of space and visual sign in the Louvre arouses our deeply thought. We should adjust measures to local conditions and take more care of evidences’ needs.

Min Huang
A Biclustering Technique for Mining Trading Rules in Stock Markets

Technical analysis including a large variety of indicators and patterns is widely used in financial forecasting and trading. However, it is difficult to select a combination of indicators that can well capture useful trading points in a specific market. In this paper, we propose a biclustering algorithm to find a subset of indicators with different periodic parameters which produce a similar profitability for a subset of trading points from the historical time series in the stock market. The discovered trading points are grouped into two categories: buy and sell signals. These trading points are applied to both of training and testing periods and the returns are compared with the conventional buy-and-hold trading strategies. We test this algorithm by using the Dow Jones Industry Average Index and Hang Seng Index. The results demonstrate that the trading strategies based on the discovered trading rules using the biclustering algorithm outperform the conventional buy-and-hold strategy.

Qinghua Huang
The Design of Image Similarity Tool Based on SCILAB

Nowadays, the plagiarism phenomenon is difficult to solve, due to comparison workload. Dealing with an article, you should consider both of text and image content. In this paper, we designed an open source software to calculate image similarity, especially for the image in the students‘ paper. We used SCILAB language to calculate data, TCL/TK language to design the interface and C++ language to implement the core algorithm. With each of their features, the software is gorgeous and effective. It is unique to implement the function with the combination of the three programming language.

Jianfeng Sun, Xiang Li, Yuan Zhan
Research of Event-Driven Enterprise Application Integration Base on Service Oriented Architecture

The development of informatization in the financial brings the opportunity, but also some new challenges.At present, financial mixed-business management is coming, which will involve financial departments of the bank, securities, insurance, fund, trust and futures and many other services. But now most of the application systems are usually focuses on one business link or management functions, the whole body do not have a high level of communication and integration. Operation of each application system is independent, sharing data is very difficult, therefore inevitably formation Each information island. Because of weak general Design and a lot of repetition , is very difficult, maintenance is very difficult. The successful implementation of integration of the basic functions in whole enterprise is the necessary measure. Financial should provide an open Enterprise Application Integration frame, make the existing applications and database according to implement integrated business, and can add the new application and system quickly. In this case, the enterprise can protect existing investment, integrate the original system according to market and business needs, and create new competitiveness.

Wei Lu, Yanfen Liu
Efficient Top-K Query Algorithms Using Density Index

Top-

k

query has been widely studied recently in many applied fields. Fagin et al. [3] proposed an efficient algorithm, the Threshold Algorithm (i.e. TA), to process top-

k

queries. However, in many cases, TA does not terminate even if the final top-

k

results have been found for some time. Based on these, we propose a novel algorithm: Density Threshold Algorithm (i.e. DTA), which is designed to minimize the useless accesses of a top-

k

query, and introduce a novel indexing structure,

Density Index

, to support our algorithms. However, we proved the DTA is not

instance optimal

in Fagin’s notion and we also propose an instance optimal algorithm named Selective-Density Threshold Algorithm (i.e. S-DTA). Finally, extensive experiments show that our algorithms have significant improvement on the efficiency, compared with the TA algorithm.

Dongqu Chen, Guang-Zhong Sun, Neil Zhenqiang Gong, Xiaoqiang Zhong
Task Allocation Mechanism Based on Genetic Algorithm in Wireless Sensor Networks

The main goals of target tracking in WSNs are, through optimizing task allocation on the premise of tracking accuracy, the communication distance can be shortened, the energy consumption can be reduced, and the lifetime of network can be prolonged. We propose a task allocation mechanism of dynamic alliance based on Genetic Algorithm to acquire the balance between the energy consumption and accuracy considered in area sum method. Simulation results show that, the proposed task allocation mechanism is reasonable and effective.

Xiaoqing Hu, Bugong Xu
Investigation of Multi-view Matching Models for Three-Line-Array Digital Imagery

Based on redundant image data provided by three-line-array digital imaging systems, the principle, working procedure of multi-view matching models, including GC

3

and MVLL multi-view matching model, were analyzed. Then, similarities and differences between GC

3

and MVLL model were delivered and compared respectively. Based on two ADS40 digital image datasets, multi-view matching experiments were done on both a similar and an occluded feature. The experimental results proved that the two models can synthesize a great number of overlapping images to enhance matching reliability, and compared with traditional single-stereo image matching models, possess great matching superiority.

Dazhao Fan, Song Ji, Rong Lei
Classifying Wetland Vegetation Type from MODIS NDVI Time Series Using Fourier Analysis

On the basis of multi-temporal MODIS (Moderate Resolution Imaging Spectroradiometer) data, this paper used a kind of supervised classification method to extract wetlands distribution of Sanjiang Plain. The NDVI (normalized difference vegetation index) time series data were got from 16-day MODIS data after processing by Harmonic Analysis of Time Series (HANTS). The shape of NDVI time series, which is diagnostic for certain vegetation phenology, was our primary classifier. A similarity measure based directly on the components of the Discrete Fourier Transform which introduced by J.P. Evans was used to determine a pixels class membership. Based on the difference between vegetation phenology, seven kinds of vegetation had been classified: swamp, meadow swamp, bottomland, paddy field, dry land, bush and woodland. The spatial distribution of natural wetland (swamp, meadow swamp, open water) and manpower wetland (paddy field) were extracted. Validation shows that total classification accuracy is 79.67%, Kappa coefficient is 0.7525. Results indicated that this Fourier component similarity measure produced an objective, computationally inexpensive and rapid method of wetlands classification.

Xiaodong Na, Shuying Zang
Application of Hilbert-Huang Transform to Fault Feature Extraction of Offshore Platforms

Conventional techniques for feature extraction are based on the stationary process and linear theory, so they are unsuited for processing the non-stationary signals. Hilbert-Huang transform (HHT) has been proposed recently and is specially fit to explore the non-stationary signals. The paper utilizes HHT to analyze the signals from the WZ12-1 platform. First, we employ a simulation signal to measure the performance of empirical mode decomposition (EMD), which is the core of HHT. Next, the HHT method is applied to extract the fault feature from the signals collected from the WZ12-1 platform and successfully reveals the reason causing the excessive vibration of the WZ12-1 platform. The results indicate that HHT could be a helpful method for the fault feature extraction of mechanical systems.

Chunhong Dou
A Novel Method of Abnormal Behaviors Recognition

We propose a hybrid Bag-of-Words model for classifying and recognizing human abnormal behavior, and present an h-pLSA model for semi-supervised learning and classify video and text information simultaneity. The experiments show some encouraging results, which indicate that the method can be a choice for solving the problem described.

Ruitai Li, Chunfang Zhang, Guanghui Zhong
Research and Implementation of the Uniform Authentication Based on Web Service

In order to improve the efficiency of distributed environment in identity authentication, this paper presents a scheme about the unity identity authentication in web service application system. Designment of the scheme adoptes the Cookie, SSL technology and opening interface, provides the user identity authentication between local and remote systems, and ensures user login security at anywhere and gives the access authority. Experimental results shows that the scheme in data transmission of real-time, synchronicity and efficiency, achieves good effect and improves the web application security. This solution will have good practical value and application prospect.

Songhao Jia, Jinliang Guo, Cai Yang, Xiaoxia Liu
Computer-Aided Composition Method of Children’s Song Based on Grammatical Evolution

Computer-aided music creation has become a key research direction. Grammatical Evolution (abbreviation GE) as a new evolutionary computation technique based on formal grammar is applied for composing children’s songs. A children’s song composition method based on GE is proposed in this paper and proves to be feasible and effective with experiments. This method provides a viable and meaningful idea for computer-aided music creation.

Zhang Dakun, Zhang Chang, Jiang Guiyuan
Decision Making Technique of Processing Technology

Has discussed Decision Making Technique of Processing Technology(DMTPT), apply the theories of both value engineering and operations research, having obtained optimal design indexes for either individual or comprehensive processing technology. The key computer program of Hungary’s algorithm for optimal design of technology has been given.

Zou Qing-hua
Research of Dynamic Priority Improvement Method in μC/OS-II Real-Time Operating System

This paper analyzes in embedded real-time operating system of

μ

C/OS-II, the shortcomings of achieving the dynamic priority, proposes concepts of the two levels cut-off time and analyzes how to set the two cut-off time and relationship between all of time, and puts forwards getting the dynamic priority method.

Xianmin Wei
A New Method of Automatic Monitoring DC Breaker by Using GPRS Technique

To get the full information of the current in different circuit, a new method is put forward to monitor the D.C. breaker by using the GPRS technique when the breaker is switching of. Also, the software and the hardware of the monitoring system are designed and developed. This system chosen Hall current sensor to measure the signal of reference current in different circuit when DC circuit breaker is in breaking process; By BECKHOFF’s CX1020 and EL3702 terminal collecting the signal; Using the KL6001 serial terminal interface module and H7210 GPRS DTU consisting of transport systems and transmitting data via GPRS network; The monitoring center which can receive, display and process the data packet is developed by a VC-based. We build the oscillation circuit to detect the monitoring system in the laboratory. The test result indicates that this system can meet the requirements well for data collecting on real time and transferring in security. The waveform of each loop’s current can be displayed in the virtual oscilloscope which provides crucial information to analyze the health state of the breaker.

Jun Wang, Tao Ning, Zhihua Li, Wei Chen
Research of Video Transmission System in Wireless Sensor Network

In this paper, we introduced a design program of remote video transmission system which is based on the hardware platform of S3C2440 and embedded operating system of Linux. It described the overall structure and implementation of the various parts, and gave the realization of the key features in this software. In the system we used the MPEG-4 video compression algorithm. The system implemented video transmission in wireless local area network, and compared with the traditional video monitoring systems, this system had more advantages, such as small size, low cost, stable and reliable.

Xu Chunsen, Zhao Yanjuan, Zhang Yan
An Improved Apriori Algorithm

Association rules mining occupies an important position in data mining. In order to improve the efficiency of mining of frequent itemsets, contrapose the two key problems of reducing the times of scaning the transactional database and reducing the number of candidate item sets, an improved algorithm is presented based on the classic Apriori algorithm. The theoretical analysis and test results show that the improved algorithm is better than Apriori algorithm significantly on efficiency.

Jianlong Gu, Baojin Wang, Fengyu Zhang, Weiming Wang, Ming Gao
A Process Modeling Method Based on Cooperation Pattern Research in Airplane Design

A process modeling method was raised based on cooperation pattern in airplane design, aiming at the difficulty of complexity and enormous magnitude of airplane design process. By investigating design steps, tools and organization of airplane design experienced, 3 cooperation patterns were summarized. Detailed modeling method based on cooperation pattern and Petri net was described, proven to be less specialized knowledge dependent and convenient.

Zhou Anning, Liu Yi
Present Research Status and Future Trends of Microbial Enhanced Oil Recovery

In this paper, we introduced the application status of microbial enhanced oil recovery technology at home and abroad, illustrated the basic concept, mechanism and application method, the advantages and problems of the technology were also discussed, on this basis, we discussed the trend of microbial enhanced oil recovery technology, and concluded that the MEOR is one of the most important way to enhanced oil recovery.

Songyuan Liu, Shuang Liang
The Algorithm Design and Application of the Neural Network

In order to improve oil and gas production, taking advantage of advanced neural network tools to design an appropriate algorithm to predict the extent of oil and gas damage and then to protect the oil and gas layer provided a strong guarantee of promoting oil and gas production. The application in Karamay Oilfield shows that combining neural network toolbox of Matlab with the sample data of the oil and gas layer training and establishing a set of mathematical models to predict the damage extent of oil and gas layer provides a powerful help to protect the oil and gas layer. The neural network prediction model has played a positive role in promoting the oil and gas production and enhancing the application of neural network system in oil and gas forecasting.

Junping Shi
Parameter Estimation of High-Voltage Circuit Breaker Based on Genetic Algorithms

A method of parameter estimation of High-Voltage circuit break based on genetic algorithms is proposed in order to estimate the parameters of capacitance, inductance and resistance in oscillation circuit DC circuit breaker and then properly assess the performance of DC circuit breaker. In this paper A genetic algorithm is introduced and applied in parameter estimation of High-Voltage circuit breaker and then compare it with the traditional MATLAB curve fitting, the result clearly reveal the advantages of genetic algorithm.

Tao Jin, Wei Chen, Tao Ning, Zhihua Li
Development of an Implanted Neural Prostheses

To research and design a type of implantable functional electrical stimulator for restoring the injured peripheral nervous system. The crucial circuits of the implantable neural prosthesis were designed based on the digital signal processor TMS320VC54x and programmable logic device XC95144XL, corresponding program were developed and an experiment was carried on for verifying the system. Results show that the prototype realized the bi-directional wireless communication between the implantable simulator and the external controller. The output of stimulation pulse width, duration and some other parameters are controllable. This low power and system integrated implantable neural prosthesis stimulator could generate biphasic stimulating pulses, which after improving and optimizing could be used for repairing injured nerve system.

Hongyun Liu, Weidong Wang, Zhengbo Zhang
Image Feature Extraction Method Based on Shape Characteristics and Its Application in Medical Image Analysis

With the continuous development and perfection of computer-aided diagnosis technology, image feature extraction methods are more and more used in medical image analysis, which increase diagnostic accuracy and work efficiency of doctors. In this article, common image shape features and their characteristics are introduced. Methods of shape characteristics are summarized, and their applications in medical image analysis are introduced.

Jianhua Liu, Yanling Shi
Study on the Traverse Mechanism with Rotary Wings

Traverse mechanism with rotary wings is a new generation mechanism, which moves the filament back and forth continuously by a pair of blades rotating in opposite direction and conduces to increasing the winding speed further. The internal connections of structure parameters can be determined through the geometrical relations of mechanism parts, the variational regularity of reciprocating velocity of filament can be analyzed in accordance with composition theorem of velocities. Thus, the operation property can be perfected and the reciprocating velocity of filament can be uniformed by regulating the structure parameters, and the requirement of winding the cylinderical package can be satisfied. And the theoretical foundation and implementing means are provided for rational machine design of traverse mechanism with rotary wings.

Zhang Xu, Wei Jian, Du Lijuan, Zhao Ming, Li Tianwei
Analytic Invariant Curves in a Two Dimensional Complex Discrete Dynamical System

In this paper, we are concerned with the existence of analytic invariant curves of a 2-D mapping in the complex field ℂ. Employing the method of majorant series, we need to discuss the eigenvalue

α

of the mapping at a fixed point. We discuss not only these

α

at the hyperbolic case 0 < |

α

| < 1 and resonance, i.e., at a root of the unity, but also those

α

near resonance (i.e., near a root of the unity) under Brjuno condition.

Lingxia Liu
Improvements of Genetic Algorithm to the Knapsack Problem

This paper constructs a Genetic Algorithm to the Knapsack Problem and makes several modifications to improve the algorithm. By keep the group of best chromosomes the best solutions can be improved step by step. Adaptive hybrid probability and mutation probability are applied when more duplicated answers appears, constantly increasing hybrid probability and mutation probability can enlarge the searching horizon base on the preliminary results. Multi-point crossover can also make searching scope larger and conducive to better outcomes. A roulette function is defined that provides a comparative series of probabilities, by which definitly priority of chromosomes at front position is achieved. This paper also provides contrastive results to show the effect of these improvements. the measures of keeping top chromosomes and the new roulette function is new.

Zhang Haibo, Cai Liwen, Gao Shenyong, Cheng Jianguo, Yu Feng, Li daqing
Polarity Analysis Based on an Improved Feature Selection Algorithm

Polarity analysis is a technique that analyzes text according to the attitude implied from it. Since the correspondence between the attitude and surface word features is subtle, the ordinary methods for topical text analysis are not sufficient for polarity analysis. This paper proposed a classification method combined with feature selection algorithm to the problem. Firstly, all possible feature schemas are designed and features are collected. Then a feature selection algorithm named improved SIMBA is used to distill the candidate features. In the last, the selected features are used as clues for a standard classifier. Experiment shows that the performance is better than that of previous method on the same dataset.

Tian Weixin, Zheng Sheng, Wang Anhui
A New Method for Stochastic Simulation of Macromolecule Conformation

The conformation statistics of single chain of polymer is a most basic and important problem in polymer science. Common polymer chain could do internal rotation around its chemical bond because thermal motion, this makes polymer chain’s form change ceaselessly. Because the molecular weight of macromolecule is very large, the number of polymer conformation is too large to be resolved using the common mathematical methods. This paper researches the free rotation chain conformation in non-lattice chain of high molecule. Through setting-up mathematical model, a new method is proposed to simulate the polymer chain. Simulation result shows the polymer conformation in microcosmic and reflects the characteristic “random coil” of polymer chain actually. These results provide an important basis for further quantitative analysis and optimal design.

Hu Shu-yong, Zhang Lie-hui, Yao Heng-shen
An Approach for IPSecVPN Network Topology Discovery Based on Layer 3 Topology

Network topology discovery is crucial to auto network management system. In research area, the reseach of Layer 3 topology discovery uses ipRouteTable [1,2], which efficiency is slow. This paper proposes a improved approach to Layer 3 discovery algorithm. Then, this paper gives the time complexity of algorithm analysis. And this paper proposes a approach to discover IPSecVPN protocol topology based on Layer 3 topology. In addition, the architecture of topology discovery module proposed is helpful to further topology discovery. Those alogrithms relied on SNMP MIB information have been implemented in Java and tested in several enterprises network. The discovering results demonstrate that it is accurate and efficient to discover Layer 3 topology and IPSecVPN protocol topology.

Dancheng Li, Tianyi Yin, Cheng Liu, Chunyan Han, Yixian Liu
Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc Network

This paper discusses possible DoS attacks induced by IEEE 802.11 in wireless Ad hoc networks. The protecting flow based solutions are emphatically analyzed with respect to CCA(Colluding adversaries attack) DoS attack at MAC layer. This paper proposes the principles of protecting flow design. By placing protecting flows in different positions, we compared the throughput and delay of these flows being attacked. Simulation results show that the design rule of protecting flow is effective and applicable.

Jian Su, Huining Liu
Research of Weighted Frequent Patterns Algorithm Based on Web-Log Mining

Web log mining is one of web mining. The process of the Web log mining is introduced. This paper proposes the WFPM algorithm which is improved according to FP-Growth and uses it to mine the weblogs. The new algorithm can find the weighted frequent patterns between pages in the webs, and then helps web managers or companies to improve the web designs or business decisions. The experiments show that in the process of using WFPM algorithm is more efficient in time and space.

Lixia Zou, Haiyan Xue
Research on Method of Bezier Triangular Curved Highway Surface 3D Restructure

This paper mainly deals with general process and method of route 3D model in highway exploration and design. We use Delaunay triangular grid to construct the ground model. On the basis of these, we further use triangular Bezier curved surface and effectively solve the problem of large quantity of 3D restructure data and unsmooth facet.

Weiyong Ji, Jianjun Cui, Shaohua Zhang
Study on the Method of Matching with Cartoon Sequence Graphics on the Base of Character′s Centroid

This paper aim at the common problem that adopting the artificial operation way to control the corresponding relationship among the original paintings in the process of the animation production at present, putting forward the Series graphics matching based on the centroid of the character, it efficiently solve the problem which the inconsistence of the original graphic object in numbers during the matching process and then obtain a well effect.

Baoyin Zhang, Jianjun Cui, Weiyong Ji
Fuzzy Rees Hypercongruences on Hypersemigroups

Fuzzy Rees congruences on semigroups have been introduced and studied by Xie. In this paper, Rees hypercongruences and fuzzy Rees hypercongruences on hypersemigroups are studied. Moreover, we generalize a homomorphism theorem of Davvaz in [Bull. Malays Math. Soc. 23(1)(2000), 53-58].

Fei Gao, Xiang-Yun Xie
The Application of the Pseudo Vector Multiplication in the Image Encryption Algorithm

In this paper, we first designed one kind of the pseudo vector multiplication on the digital image pixel gray value, then introduced a novel digital image encryption algorithm, which is based on the 2D Arnold transformation and the pseudo vector multiplication. At last, the large number of simulation results and analysis have both shown that the proposed algorithm has very good diffusion properties and is a very good encryption algorithm.

Xiang Liu, Zongying Li
Innovation Pattern Recognition of Equipment Manufacturing Industry Based on Jing You Method

Innovation pattern recognition of equipment manufacturing has been attached great importance to scholars and practitioners. Based on the analysis of primary pattern recognition methods, choose match better conforming to rules method to recognize each type of equipment manufacturing industry innovation pattern. It is a quantitative recognition method, which relies on ideal solution evaluation method, the innovation pattern is expressed by weight structure which can show the industry performs better or not from every recognition indicator’s perspective, according to the innovation recognition indicator system constructed and the relevant data of each type, the innovation pattern characteristic of each type included in the industry is analyzed specifically and hierarchically. Countermeasures and suggestion are put forward based on the analysis result.

Hou Xi-lin, Zhang Li-li, Liu Sen, Zhao Xi-nan
Face Recognition Using Discrete Cosine Transform and Fuzzy Linear Discriminant Analysis

In order to solve the problem of uncertainty that occurred in the field of face recognition because of the variations of the facial expressions, illuminations and poses as well, a new feature extraction method for face recognition is proposed in this paper. The method combines the DCT with FLDA. Firstly, DCT is performed on the entire face image to obtain all the components in the frequency domain. Due to the energy compaction, only the lower frequency components will be retained and thus, the dimension reduced features are obtained, then FLDA is employed to extract the most discriminating features. Finally, the nearest neighbor classifier is employed for classification. The results of experiments conducted on Olivetti Research Laboratory (ORL) database show that the proposed method is better than other methods in terms of accurate recognition rate.

Qi-wen Zhang, Wen-xia Du, Liu-qing Yuan, Ming Li
Morbidity Research on Grey Forecast Model

This paper researches on the morbidity problem for the GM(1,1) model with the accumulating method based on the condition number theory. It proves that we can get a new healthier model by make a multiple transformation on the initial data, and the transformation doesn’t affect the precision of the model. Therefore, morbidity problem for the GM(1,1) model with the accumulating method is resolved well.

Ying Wei
Distributed Range-Free Localization Algorithm for 3D Wireless Sensor Networks under Irregular Radio Propagation Model

This paper presents a novel Distributed Range-free Localization Algorithm(3D-DRL) for three-dimensional wireless sensor networks under irregular radio propagation environment. In the scheme, the sensing space is divided into cubic cells with resolution a and each anchor, equipped with Global Positioning System (GPS), votes for each cubic cell. Each unknown node averages the COG (center of the gravity) of cells with highest votes as its estimated location. The scheme eliminates the requirement for specific positioning hardware, avoids the need for any interaction between the individual unknown nodes, and is independent of node densities and network topologies. Simulation results indicate that the average localization error is below 3 meters, when DOI(Degree of Irregularity)=0.1, ANR(Anchor to Node Range Ratio)=2.5 and all nodes are randomly deployed in 100×100×100 m

3

scenarios. Especially, all unknown nodes can localize themselves by adjusting ANR.

Jianping Xing, Dehua Wang, Yang Liu
HCI Using a Robust Hand Tracking Method

The interaction between man and computer has become an important topic as it can generalize the use of computers, robots and other intelligent machines. For active H/R interaction scheme, the computer needs to detect human faces in its vicinity and then interpret canonical gestures. In this paper, we firstly present a method to track the hands robustly in videos recorded by a camera, and then by compute the similarity of the trajectories of the hands’ motion, we can interact with computer by some simple sign languages. An efficient color segmentation on the skin-like colored pixels is used. Then we locate the hands by a fast optic flow method which is computed only by the skin-like image blocks. At the last stage, we get the hand motion trajectory and map it to a string. By String Edit Distance method, we can compute the similarity of the string representing input hand command with some template strings denoting sign language pre-trained and stored in database. We can let the computers or some other machines recognize some simple words like "UP","DOWN","OK", "LEFT","RIGHT" and etc. Results of tracking and recognition are illustrated in the paper and show the process robustness in cluttered environments and in various light conditions. The limits of the method and future works are also discussed.

Shilin Zhang, Hui Wang
A Hybrid Genetic Algorithm to Solve Zero-One Knapsack Problem

In order to overcome the disadvantages of the traditional genetic algorithm and improve the speed and precision of the algorithm, the author improved the selection strategy, integrated the greedy algorithm with the genetic algorithm and formed the hybrid genetic algorithm. The paper discussed the basic idea and method to solve the zero-one knapsack problem using this hybrid genetic algorithm. The experiments prove the feasibility and validity of the algorithm.

Qing Chen, Yuxiang Shao
Research on the Authenticated Encryption Technology in CCSDS

U.S. NASA, European ESA, Japanese NASDA and other institutions all have adopted the CCSDS as space communication standards; CCSDS has shown the latest technological developments in space communication system. This paper analyzed security threats in space communications system. The TC data protection methods were summarized firstly, then the performance of several encryption algorithms used in TC protocol was compared. SCPS-SP protocol and SCPS-SP data security process were introduced also. At last, an interoperation method between SCPS –SP and IPSec will be put forward.

Gong Chang-Qing, Yang Ya-Hui
Quality Assessment in Virtual Surgical Training

Simulation-based surgical training is beginning to be recognized by medical society with its apparent benefits. As an important function of virtual surgical training system, providing systemic and competitive surgical quality assessment to trainees is still a brand new field. In this paper, we present several metrics and their corresponding measurement methods used in our surgical training system designed for UK’s Royal Bournemouth Hospital to assess trainees’ task accomplishing quality. Classification algorithm and evaluation result of the training record is concisely discussed at the end of the paper.

Hui Liang, Minyong Shi
The Deceptive Effect of Blinking Decoys on ARMs

The idea of blinking operation of decoyed radar system is presented and its deceptive mechanism to ARM PRS (passive radar seeker) is analyzed. Several kinds of blinking modes are put forward. The simulation shows that blinking mode is one of the important operation modes of decoyed radar system, which can provide much more possibilities for the safety of radar confronting threat from ARM.

Dong Wen-feng, Liu Quan, Cheng Zhong-kuan, Pan Zi-kai
Design of Virtual Reclosing System

Adaptive auto-reclosure has many advantages over the conventional approach. For the single-phase grounding fault, two-phase grounding fault, two-phase fault, this paper analyzes the characteristic of post-fault voltage. And this paper distinguishes the transient faults and permanent faults on transmission lines using voltage criterion. The concept of virtual instruments is also introduced in this paper, and the virtual reclosing system is developed which takes the graphical programming software LabVIEW as software development platform. This system is excellent for friendly interface and simple operation. It can be applied to the test research and lab teaching of the new method of adaptive auto-reclosure with practical significance.

Qian Zhang, Qun Mei
Emulation of Dynamic Secondary Cooling and Soft Reduction in Continuous Slab Casting

Aiming at dealing with the center segregation, center porosity and slab crack in the steel-making process. We propose a continuous casting slab soft reduction and two cooling control method. This method is implemented in a software system. Through the establishment of two-dimensional unsteady heat transfer model for discretization draw reasonable temperature field distribution model, cold water model and pressing position prediction model. The experimental results show that the proposed method appears to be better accuracy.

Peng Rui, Zhang Xiao Long, Zhang Hua
Gaussian Process Machine Learning Model for Forecasting of Karstic Collapse

Aiming to the fact that it is still difficult to reasonably forecasting the karstic collapse, the model based on GP machine learning is proposed for forecasting of karstic collapse. According to few learning samples, the nonlinear mapping relationship between karstic collapse and its influencing factors is established by GP model. The model was applied to a real engineering. The results of case study show that GP model is feasible, effective and simple to implement for forecasting of karstic collapse. Compared with artificial neural networks and support vector machine, it has attractive merits of self-adaptive parameters determination and excellent capacity for solving non-linear small samples problems.

Yan Zhang, Guoshao Su, Liubin Yan
Study of a Scheme of Bid Evaluation by Experts Based on Chinese Remainder Theorem

Bid evaluation, the most important link during a tender phase, is easily influenced negatively by human factors. A method based on Chinese Remainder Theorem is proposed, by which all the experts who grade tender documents are anonymous, all the scores are unknown before they are submitted to a bid invitation unit, and any score is not associated with the identification of an expert. If there are any dishonest behaviors during a bid evaluation, the scores given by dishonest experts can be deleted from the results.

Xiaohan Sun
Converting Digital Image to SVG for User Interaction

This paper presents a novel method to convert digital image to be Scalable Vector Graphic (SVG) format using the similar features of pixel, and make the converted SVG file becomes interactive. For example, we have a panoramic digital image of a school. There is lots of buildings and roads on it, and now we are going to construct a map application with this digital image for the school. This application ought to have functions, such as clicking to show building’s information, searching for road by road name etc. It must be a big job to repaint an interactive image for the school. This paper introduces a method that aims at solving this problem. First, we directly convert digital image to SVG file through the way of one pixel of digital image to one rectangle of SVG. Then it allows user to select one or more ‘seed’ SVG pixels by which program can find a region with similar pixel feature. Finally, it can also detect the edge of the region and allows user to add event listener to the region.

Qiang Wei, Dancheng Li, Cheng Liu, Binsheng Liu, Zhiliang Liu
Research on the Customer Consumption Classification Model Based on RS-NN

Since customer consumption attributes are multi-dimensional, related and uncertain, this paper proposed a customer consumption classification model based on rough set and neural network (RS-NN). Due to the rough set characteristics of customer consumption classification, the research framework of this paper was constructed by preprocessing knowledge space, establishing classification model and applying the classification model. Besides, based on RS, this paper also described consumption attributes reduction, classification rule extraction, and original topology of RS-NN construction, network model training and testing. Then a case study on telecom customers shows that RS-NN is better than BP-NN in construction, classification efficiency and prediction accuracy, which means RS-NN is an effective and practical new method for customer classification.

Wan Yinghong, Cao Xiaopeng, Yue Ying, Hu Wanping
Influencing Factors of Sports Consumption: Provincial Evidence in China

This paper made qualitative analysis about influencing factors of sports consumption using of mathematical methods, and makes empirical analysis based on China’s provincial data of sports consumers from 31 provinces, municipalities and autonomous regions in 2009. The results show that, both material and cultural factors can impact sports consumption. The income level is the main factor and it basically determines the sports consuming behavior of the residents. And other factors, such as basic sports facilities, leisure time and cultural values of consumption, are associated with residents’ decision-making on sports consumption, but they all have very little effects.

Hua Chen, Xinke Yin
Study on Security Architecture for Internet of Things

The development of Internet of Things(IoT) will bring a new ubiquitous computing and communication era. Due to the lack of security mechanisms in the early Internet, we had to build patches to improve the security of it, which leads to that the Internet security is always a big risk. To avoid the same thing happened in building IoT, the security of IoT should be systematically studied from the beginning design of the IoT. In this paper, based on the studies on the IoT architecture and the analysis on the secure threats in IoT, the security architecture of the IoT is presented on the basis of the secure architecture of the information system, the related secure problems in the IoT are analyzed from the aspect of the secure service, secure domain and network layer. In addition, the limitation and the hardness work for the future are pointed out in this field.

Hui Li, Xin Zhou
Emotion Recognition from Physiological Signals Using AdaBoost

Emotion recognition is one of the key steps towards emotional intelligence in advanced human-machine interaction. This paper adopted principal component analysis (PCA) to dimensionality reduction and combined AdaBoost algorithm to be served as classifier. Experimental result shows that the classifier performance was effective and steady. Emotion recognition impression was fairish and reasonable for special affective state groupings.

Bo Cheng
Search on Security of Wireless Sensor Network in Facilities on Sports Venues

Security issue of sensor networks is greatly different from that of conventional networks. In this paper, the characteristics analysis of wireless sensor network(WSN) has been carried out firstly, through analysis, the security architecture of sensor networks is proposed, trying to outline a general illustration on this area, and then security defense on the wireless sensor network security issues has been implemented secondly, finally the pairwise keying algorithm has been described and analyzed ,from above all, the ultimate security solution of wireless sensor network has been proposed.

Liu Bin, Wang Long, Zhang Guo-Feng
Realization of the Minimum Cost Spanning Tree’s Storage and Optimization in Prim Algorithm

This paper designs a special data structure for vertices in the network. the storage of edges in minimum cost spanning tree(for short, MCST) has been realized by the vertex array ,which is created by the special data structure. Through the vertex array, the vertices in V-U set constitute a static bi-directional circular linked list, so Prim algorithm realizes truly operation selecting the shortest side though the V-U set, by which the Prim algorithm is optimized to improve the efficiency of the operation. For the same vertex lying in U and V-U at the different moments, the special data structure makes storage space to be fully used and improves space utilization.

Pan Da-zhi, Liu Zhi-bin, Chen You-jun, Ding Xian-feng
Object Tracking Based on Unmanned Aerial Vehicle Video

The video sequence images about the ground targets of dynamic information are obtained from the high speed unmanned aerial vehicle, the camera movement has brought some difficulties to the target detection, object tracking. With the characteristics of displacement of the background in UAV video sequences images, the moving target detection and tracking technology is divided into three parts: motion estimation, target detection, object tracking. Because of the target smaller, lower resolution in the UAV video sequences image, so a region-based tracking algorithm is proposed. The computation of method, the speed of computational meets the needs of real-time tracking, experiment and achieved good results.

Xiong Tan, Xuchu Yu, Jingzheng Liu, Weijie Huang
Design and Implimentation of Rural New Energy Source Gis System Based on Kml

Upon analysis and summery of the theory and technical research of new energy in rural area, this paper achieved rural new energy GIS system based on B/S structure applying Microsoft’s NET as the development platform and C# as the programming language. With the energy statistics and planning program as the core of process and analysis module, this system builds up a solid document management and functional module on GUI display applying the key technology such as KML and Web-GIS, which eventually enable the display of the energy information on Google Earth and Google Maps. In addition, a test case prefecture has been taken to test on the system’s main modules preliminarily. The result indicates that the system realized the function of energy statistics and planning effectively, with a good interaction and convenient performance.

Li Tan, Lu Wang, ChongChong Yu, Jie Liu
Development of Real-Time Register System for Printing Press Based on μCOS-II

The fundamental composition and operating principle of color register system for printing press have been studied. Base on deep analyzing the characteristic of register system at home and abroad, a real-time monitoring system for printing press registration control has been proposed based on multitask real-time operating system

μ

COS-II. Using Data Flow Diagram analysis method, the register system is divided into five basic tasks. Assigning these tasks’ priorities properly and designing inter-task communication and synchronization mechanism, the system performance has been optimized. Finally, its efficiency has been proved by an example.

Guodong Sun, Daxing Zhao
Locally Optimum Detection of a Noise Model Based on Generalized Gaussian Distribution

In order to optimize signal detection in non-Gaussian environments, the work is addressed to provide realistic modeling of a generic noise probability density. The model depends on few parameters which can be estimated quickly and easily, and so general to be able to describe many kinds of noise such as symmetric or asymmetric. To this end, a new model is introduced, which derives from the generalized Gaussian function, and depends on there parameters: kurtosis, for representing variable sharpness, left variance and right variance, for describing deviation from symmetry. The model is applied in the design of a locally optimum detection test.

Yanqing Dai, Gang Tang, Taiyue Wang
New Development of Simulation Methods on Refrigeration and Air Conditioning Equipments

Development status of classical simulation technology and application status of artificial intelligence on refrigeration and air conditioning equipments were introduced. The new concept of intelligence simulation was also primarily introduced, and the further development direction of simulation and optimization was put forward lastly. The modern artificial intelligence technology (fuzzy-neural network method) improving on the traditional numerical simulation has theoretic and practical inevitability. Only the combination of the fuzzy-neural network method and the traditional simulation model is likely to get the optimal general simulation effect. The intelligence simulation method of refrigeration and air conditioning equipments has well application foreground.

Cao Wensheng
Assessing Dynamic Neural Networks for Travel Time Prediction

Ularly suitable for predicting variables like travel time, but has not been adequately investigated. This study compares the travel time prediction performance of three dynamic neural network topologies with different memory settings. The results show that the time-delay neural networks out-performed the other two topologies. This topology also performed slightly better than the multilayer perceptron neural networks.

Luou Shen, Min Huang
Fault Feature Extraction of Gearboxes Using Ensemble Empirical Mode Decomposition

The paper employs ensemble empirical mode decomposition (EEMD) to extract the fault information from the signal collected from a defective gearbox. In view of the shortcoming of the mode mixing which empirical mode decomposition (EMD) fails to overcome, the EEMD method is used to decompose the signal captured from the defective gearbox and successfully separate the different components from high frequency to low frequency. Then, the first four intrinsic mode functions (IMFs), containing the most energy of the signal, are extracted; by analyzing the spectrum of the first four components, we succeed in uncovering the reason causing the fault of the gearbox. The results show that the EEMD method could be feasible to diagnose the fault of the gearbox.

Jinshan Lin
Data Mining Method for Incident duration Prediction

Traffic incident management and information dissemination strategies will benefit from the prediction of incident duration in real time. This study investigates the development of an incident duration prediction model based on a detailed historical incident database. A data mining technique, namely the Bayesian Network was applied to develop the prediction models. The analysis results suggest that the Bayesian Network model is advantageous in terms of accurate prediction and the convenience of application.

Luou Shen, Min Huang
Research and Application of Credit Score Based on Decision Tree Model

In order to timely and properly analyse the customer credit assessment, and to speed up the decision-making speed, here introduced the application of data mining technology used in the bank on the users” evaluation, and establish a decision tree model of customer credit evaluation which is aimed at improving the credit rating quality . And introduced the basic process of decision tree algorithm. Bank customer’s credit is classified as background. Using the decision tree algorithm C4.5 as the most classic tools, specific studies of business understanding, data understanding, data preparation, modeling, evaluation and implementation of aspects of publishing have been done. Customer credit, using the decision tree classification algorithm, obtained a series of decision rules with which a bank to make the right decisions.

Jiang Wei-Li
Rank and Kernel of a Binary Code

Given two binary codes of length

n

, we construct a code of length 2

n

. The construction works for linear and nonlinear codes. For the linear codes, we obtain that the dimension of the final code is 2

k

1

 + 

k

2

 − 

dim

(

C

1

 ∩ 

C

2

), which

dim

(

C

1

) = 

k

1

, and

dim

(

C

2

) = 

k

2

. In this paper, we get that both parameters are the relation of the corresponding ones of the starting codes.

Xiaoyan Zhang
Analysis and Research for Multi-mode Identity Authentication of E-Commerce

With the continuous speed-up of society informatization, the action of E-commerce is more and more extensive. Meanwhile safety troubles increase steadily, it severely restrict the development of E-commerce. How to handle and keep away the safety problems is becoming the vita points of Internet trading. This paper is mainly to investigate the identity authentication technology in commerce, analyse the advantage & disadvantage of identity authentication technology based on PKT and identity authentication technology based on biometric characters. Consequently it integrates these two technologies and puts forward the protection password of biometric authentication. Via the password protection of biometric authentication, it settles the identity authentication in E-commerce trust management thoroughly.

Ge XiaoMin, Wu CuiHong
Study of Key Technology for Laser Scanner Based Measurement of Railway Complete Profile

To know well of the railway complete profile dimensions and its variation trend is an effective measure to guarantee rail traffic safety. This paper probes into key technology for dynamic measurement of railway complete profile based on laser scanner, proposes corresponding solutions, including the calibration of the laser scanner, the application of laser rangefinder in train positioning system, the algorithm of adjacent line spacing and contact line height detecting. At the end, gives a brief introduction of the software system for railway complete profile detection.

Yumei Zhang, Hongmei Shi
Path Planning for Mobile Robot Based on Fuzzy Control

A path planning for mobile robot is studied. An algorithm based on fuzzy control is presented and a reasonable and applicable fuzzy control table is constructed. In view of deadlock problem that the local path planning has, the deadlock prevention mechanism is established. When the robot detects dangerous obstacle field which possible causes deadlock, the robot will travel along the edge of the obstacle to escape from the obstacle through the deadlock prevention mechanism, and thus deadlock is avoided. When deadlock can’t be avoided in some complex environments by the deadlock prevention mechanism, the deadlock resolution strategy would be adopted to eliminate the deadlock. The algorithm offers a new idea of the solution of deadlock. Simulation results in several kinds of environments prove the effectiveness and feasibility of the algorithm.

Tongxiang He, Peng Li, Ningqing Han
No-Model Tracking by Data-Driven Method Using BP Networks

In the model-driven tracking approach, the tracking performance is mainly based on the system model. But the accurate model is difficult to obtain, while data-driven tracking approach can’t depend on the accuracy of system model and it can tracking by the measurement data. This paper use BP net to develop a data-driven tracking. The BP net is trained by system measurement and prediction get by Kalman filter and the tracking as the output data. The simulation has shown that the data-driven tracking by BP net can obtain good performance even when the moving target is different.

Jin Xue-bo, He Hai-ran, Wang Ya-ming, Yuan Meng-yang
A Controlled Seismic Emulator: Regenerating Earthquakes via a Robot

In recent years, earthquakes have caused the collapse of numerous constructions and buildings, and killed thousands of people. A small scale seimic emulator is designed to regenerate seismic waves, which can be used to evaluate the performance of a scaled buidling or construction in civil engineering. The emulator is a robot device that consists of a plate movable in a planar plane, two DC servo motors with built in quadrature encoders for acutation and sensing, and a NI CompactRIO for control signal. A control strategy based on inverse dynamics and feedback is used to track the recorded seismic waves.

Guangyu Liu, Feng Song, Jiang-Feng Tao, Guang Ma
The Location of the WSN-Nodes Based on RSSI

Particular introduced the ranging theory, the correction technology and the location algorithm of the WSN’s ranging location based on the RSSI (Received Signal Strength Indication). For the problem of the nonlinear equations need to be solved in the location algorithm, this paper uses the UKF (Unscented Kalman Filter) algorithm, uses the algorithm’s nonlinear model, applys a minimal sample point-group to approximate the distribution function of system function. This sample group can really obtain the mean value and variance of system state. When according to the actual evolution of nonlinear model, it can be well carrying on fitting to the posterior mean value and variance of nonlinear function. The simulation results indicated that the node location’s estimation accuracy is within 5% for using the UKF algorithm. Visually , it has better tracking function and filtering consequence to solve the problem of the nonlinear maneuvering objective tracking.

Jiachun Zheng
Lithology Recognitions of Coal-Bearing Strata on BP-ANN in Qiongdongnan Basin, Sea of South China

Lithology identification of coal-bearing Strata has been a difficult problem in the geology for a long time, especially in the deep sea area. So it is very significance for us to study the mathematics way to recognize the coal-bearing lithology of well logs. In this paper, BP-ANN was introduced to apply to the predicate the lithology. And take the Qiongdongnan Basin as an example, the Yc13-1-a1well samples was used. By the study of it, the result was found correctly. So this way is useful and may be popularized.

Lv Dawei, Ding Xigui, Li Zengxue, Liu Haiyan, Chen xiaoyan
The Intrinsic Relationship between Security Mechanisms and Trust Mechanisms

Security and trust are closely related. No trust, no security. The nature relationship between security mechanisms and trust mechanisms in this paper is proposed. Firstly, the existing trust mechanisms are classified, and then the corresponding relations among trust mechanisms and different security mechanisms are analyzed. Finally, a comprehensive trust model for open networks is presented. The model is extensible multi-layer structure, and it is suitable for the establishment of open network security mechanisms.

Guo Yimin, Guo Yajun, Peng Fei, Gao Huidan
Research on Real Estate Monitoring and Forewarning System Based on System Dynamics Model

This paper concerns the monitoring and forewarning of real estate in China and attempts to establish a simultaneous equation model using housing price factors as its endogenous variables. The study bases itself on system dynamics and an analysis of real estate prices. It aims to set up a real estate monitoring control system, applying Granger causality test on the correspondence between housing and land prices in Shanghai. It discusses theoretical and practical factors involving urban housing prices and their correlations, and also offers corresponding control policy recommendations.

Demin Wu, Wenyong Dong, Chao Zhou, Kai Tang, Aidi Lin
A Novel Method for Fluence Map Optimization with Dose Volume Constraints in IMRT

Doctors judge whether the inverse plan can meet the clinical requirements according to their experiences on the dose volume curve, which was used to characterize the dose deposition of each organ in radiation therapy. However, when the dose volume constraints were added to the inverse planning model, the resulting non-convex programming problem needs a complex solving process, which may not lead to a good solution. In order to solving this problem efficiently, a new heuristic algorithm was introduced. In this method, rather than using the traditional dose sorting information, a new geometry distance, getting from the transformed standard quadratic form, was used to guide the constrained voxels’ selection. Combining with the effective voxels adding scheme and the quick local optimum searching by quadratic programming, the whole solving process is very fast. Through testing on the head-neck case and prostate case, the results show the new heuristic information is more suitable for adding constraints than the dose dependent way. Therefore, it is a stable solving algorithm for the fluence map optimization process with dose volume constraints.

Haozheng Ren, Yihua Lan, Cunhua Li, Xuefeng Zhao, Zhifang Min
Existence and Uniqueness of Strong Solution for Predator-Prey System of Three Species with Age-Structure

In this paper, existence and uniqueness of strong solution are proved for predator-prey system of three species with age-structure in Hilbert space. Using Gronwall’s lemma, some criteria of existence and uniqueness of strong solution are obtained for predator-prey system of three species with age-structure.

Chen Li-Yu, Zhang Qi-Min
Reducing Computational and Memory Cost for HMM-Based Embedded TTS System

In this paper, we present several methods to reduce the computational and memory cost to embed HMM-based TTS system. We firstly decrease the number of HMMs by applying decision tree based context clustering technique. Secondly propose address-based model compression technique to compress the model size without degradation in synthesis speech quality. Thirdly reduce the feature vector size to decrease computational and memory resources. Finally, fixed-point implementation is taken to fit the TTS system requirements to embedded devices’ resource. Experimental results show that the system size can be compressed to 3.61MB from 293MB, memory and computational cost are low enough for real-time embedded application. Subjective evaluation shows that the synthesis speech quality is fairly good.

Rong Fu, Zengliang Zhao, Qixiong Tu
A General Survey on Technological Developments of Oil Leakage Detection over the Past Decade

This paper gives a general introduction of the mechanism and hazards of oil and gas pipeline leakage. And it also discusses the major methods, especially the latest developments of oil leakage detection in China and abroad. Furthermore, the trend of future development in the field of oil leakage detection is probed in the paper.

Zhigang Lou, Hongzhao Liu, Mingdu Hu
Selecting Principle and Equipment of Valve Tappets

Valve clearance is crucial to the engine efficacy, so proper valve clearance is required in engine assembly. In this paper we present the definition of valve clearance and the selecting principle of valve tappets, and the equipment called Valve Tappet Selecting Machine. The Valve Tappet Selecting Machine for 3-cylinder overhead camshaft engine has been developed based on the definition of the valve clearance and the selecting principle of valve tappets, which comprises Cylinder Head Measuring Machine and Camshaft Measuring Machine. The errors of the Tappet Selecting Machine were analyzed; the repeatability and the accuracy of the Cylinder Head Measuring Machine and the Camshaft Measuring Machine were tested, the data suggest that the measurement is high precision, and valve clearances will be under control strictly with the Valve Tappet Selecting Machine.

Lian-Hu Xu, Yi-Bao Yuan, Lei Wang
Systems Analysis Causes and Countermeasure of Environmental Problems in China

In this paper, we analysis the causes for environment pollution. Through a comprehensive analysis of the causes of environment pollution, we recognize the five reasons for the deterioration of environmental quality caused by in China. Then, we propose measures to solve environmental problems. These studies will help solve China’s environmental problems. It is may be importance to sustainable development of China and the global.

Lu Yali
Academic Emotions Model Based on Radial Basis Function in E-Learning System

The traditional e-learning system lack of emotional teaching function’ it is an important direction for the development for personalized online education that emotion recognition will be the introduction of interactive e-learning system. Paper to establish e-learning situations learners model of academic emotions using neural network learning in radial basis function (RBF), Experiments show that the method is an efficient method that provides an important theoretical and technical support for personalized e-learning.

Wang Wan-sen, Guo Chun juan, Liu Shuai
Design and Implementation of Twister Algorithm Based on FPGA

Recent breakthroughs in cryptanalysis of standard hash functions like SHA-1 and MD5 raise the need for alternatives. The Twister hash function is developed by a team by Ewan Fleischmann in response to the call for proposals for a SHA-3 cryptographic hash algorithm by the National Institute of Standards and Technology. In this paper, introduces the logic structure of Twister algorithm. Using the structure advantage of FPGA hardware devices and give the FPGA Design and Implementation project of Twister algorithm. Final the timing simulation of some modules were given.

Zhang Lei
Research on the Forming Mechanism of Multiple Wave in the South Yellow Sea

The purpose of this paper is to fully understand the forming mechanism of multiple wave of the South Yellow Sea. According to W5-st1 well logging parameters and the processing profiles of the cross-well line,we established a geological model and carried out forward modeling studies.To carry out forward modeling studies by using elastic wave equation and considering the differences by changing conditions of the free surface.With the study results and the actual seismic data,we can fully aware the characteristics and forming mechanism of multiple wave of the sea area.

Tong Siyou, Hao Wei, Liu Huaishan, Zhang Jin, Wang Linfei, Wang Shulun
Statistical Modeling for LSB-Based Image Steganalysis: A Systematic Perspective

Steganalysis is a science of detecting possible hidden messages in an apparently innocuous cover medium, which is usually modeled as looking for a characteristic function that can discriminate effectively the stego from the cover. In this paper, we investigated the statistical models available for typical tools of LSB-based image steganalysis, focusing on their relations with the statistics of cover images, of secret messages, of operations acted upon the cover image, in an effort to theoretically form a systematic perspective which helps cast better insights into different steganalytic methods of inherent consistence. We proved the equivalence of some statistical models as results and compared the difference of effectiveness among these consistent statistical models.

Xiaoming Yao, Wencai Du, Taijun Li, Longjuan Wang, Honglei Li, Hanwei Wu, Zequn Wang
Image Resizing Based on Self-adapting Significant Map

The image resizing methods are roughly categoriz-ed into two classes: simple scaling method and content aware resizing. The former is trivial, while the later is able to preserve visually prominent features in the resized image. The measure approach of visual saliency plays an important role in the content aware resizing method. This paper introduces a new saliency measure, self-adapting significant map, which characterizes the prominent features using gradient, saliency map and resizing ratio. Owing to taking resizing ratio into consideration, our computation approach automatically smoothes the significant map when the resizing is highly non-homogenous. Based on this computation approach, we propose a new content-based resizing method, which can reasonably preserve the important and less-important regions according to the resizing ratio. Experimental results show that our method outperforms the similar resizing method when the resizing ratio is bigger.

Niu Fenghui, Li Haisheng
Research on Intelligence Decision-Making Analysis and Optimization Design Development of Pavement Management System

The present research, based on system engineering, information engineering technology, applied mathematics, and the theories and methodology of safety predicative assessment, carried out a thorough and in-depth research into the intelligence decision-making and analysis for optimization design development of road surface maintenance system from the aspects of data support, road performance assessment and optimization and selection scheme for maintenance decision-making and strategies. In addition, the optimization algorithm is provided for data categorization and sifting as well as the division of storage units. Then, an optimization model is constructed based on the load bearing capacity of road structures, road quality for driving, road safety for driving together with road surface damage. At last, based on multi-model predications and the correlation analysis for predicative concepts of decision-making flow for road surface performance, the PPM optimization model is constructed for protective maintenance modules for road surface and the mathematical model and method are offered for the optimization and selection of strategic schemes.

Dai Xue-zhen, Xing Lei, Zhang Bo
Laplacian Maximum Scatter Difference Discriminant Criterion

Linear Laplacian Discrimination (LLD) as a non-linear feature extraction method has obtained very extensive applications. However, LDD suffers from the small sample size problem (SSS) and/or the type of the sample space when it is used. In order to circumvent such shortcomings, in this paper a Laplacian Maximum Scatter Difference Discriminant Criterion (LMSDC) is proposed by using new contextual-distance metric and integrating maximum scatter difference discriminant criterion(MSDC) into LDD. The proposed criterion can obviously decrease the dependence on the sample space and solve small sample size problem. The experimental results indicate the above advantages of the proposed method LMSDC.

Jun Gao, Lili Xiang
Method of Underwater Autonomous Weapon System Hitting Control Based on PSO

Basic makeup and function of underwater autonomous weapon system are introduced, and hitting process model and control parameters are analysed. Concerned with simulation environment of hitting process, a method of underwater autonomous weapon system hitting control based on particle swarm optimization (PSO) is advanced, which makes quick optimization of hitting control parameters come true and improves precise hit of weapon system. It is showed by Lots of numerical values simulation that this method can effectively make optimization control of hitting process, provide credible theoretical basis for study of systemic optimization control, which has good application prospect in future combat use of weapon system.

Pengfei Peng, Zhong Liu, Jun Xing
The Design of the Network Configuration Management Based on NETCONF Protocol

NETCONF protocol as a new protocol make up the deficiencies of existing configuration management. It improves network efficiency and automation level. Based on the in-depth study of NETCONF protocol principles, this paper designs NETCONF network management software.

Jianqun Cui, Keming Jia, Libing Wu, Chuanhe Chen, Mincai Lai
Resource Allocation: An Optimum-Seeking Approach under the Uncertainty for PERT

on the basis of Resource optimum-seeking approach, the article estimate earliest finish time, optimistic time and pessimistic time and calculate expectation and variance of each process. The resource allocation problem can be resolved by using the “branch-and-bound” algorithm. The article explores how to choose path with the different expectation and variance, Especially, the problem can be resolve by coefficient of variation. The method can overcome the subjectivity which comes from personal preference options.

Li Changqing, Zhang Mang
Influencing Factors Research of Phenol Wastewater Treatment by Cathode Electro-Fenton Method

In this paper, the method of cathode electro-Fenton was used to study the influence of different controlling factors on phenol wastewater treatment and reaction kinetics of phenol oxidative degradation. The experiment was made in homemade three-dimension electrode reactor. The effect of the phenol wastewater treatment was studied by changing pH, electrolysis voltage and dosage of Fe

2 + 

, while the other reaction conditions were fixed. When pH was 3, electrolysis voltage was 15V and dosage of Fe

2 + 

was 0.6mmol/L, the effect of phenol wastewater treatment was the best, phenol removal rate reached to 91.85%, the effect reached the first level of reaction kinetics.

Yafeng Li, Yuzhuo Guan, Cuicui Tao
Numerical Simulation Reaseach on Stress Field Distribution of Coal Bed Fault Structure Formation and Evolution

Using finite element numerical simulation software, ADINA, the formation of a fault structures under the action of tectonic stress was simulated. With the formation of coal-bed fault under a modern tectonic stress field, the destruction conditions of coal and the distribution of stress were simulated. Simulation results show that a tectonic fault structures under the action of the formation of coal seam, in the footwall near the fault plane of the seam and near the bottom of the fault plane of the plate at the top, coal vulnerable to damage; fault structure after the formation of lead in different Direct stress and horizontal stress combinations, are in reverse fault footwall fault plane exist in the vicinity of stress concentration phenomena, reverse fault stress field in the direction of maximum stress from the direction of the main decisions, and normal faults only in the level of stress and vertical stress closer, the stress field in the direction of the major decisions by the vertical stress. Conclusion of the study for the coal and gas outburst prevention and control has important theoretical guidance.

He Jun, Zhai Pei jie, Chen Xin sheng, Jing Fu xing
Backmatter
Metadaten
Titel
Applied Informatics and Communication
herausgegeben von
Dehuai Zeng
Copyright-Jahr
2011
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-23214-5
Print ISBN
978-3-642-23213-8
DOI
https://doi.org/10.1007/978-3-642-23214-5