Proceedings of the 2015 International Conference on Automation, Mechanical Control and Computational Engineering
421 articles
Proceedings Article
Multiobjective Artificial Bee Colony Algorithm for S-box Optimization
Guanjie Qin, Xuemin Cheng, Jianshe Ma
Substitution box (S-box) is an important nonlinear component in block cipher algorithms. Evaluating the cryptographic properties of an S-box requires attention to criteria such as nonlinearity, differential properties, and diffusion properties. In this paper, Artificial Bee Colony algorithm was introduced...
Proceedings Article
Real-time study of remote highway snow warning technology
Huaqi Zhao, Changyong Xiang, Guojing Li, Bin Wang, Shijie Zhang, Dazhi Wen
Snowfall directly affects the traffic safety and a lot of accidents happened every year because of the snowfall. If the traffic department can timely detect the thickness of the snow on the highway and clear the snow in time, the rate of traffic accident will reduce and won’t make much trouble for people....
Proceedings Article
Effects of Soft Information Quantization Precision on LDPC Performance for NAND Flash Application
Changlai Song, Haozhi Ma, Liyang Pan
(17664, 16512) LDPC code is simulated under AWGN channel. The simulation is led on FPGA platform, with Layered Normalized BP-Based decoding algorithm. The shifting of measurement point is under consideration, where the soft information for decoding is inaccurate. LDPC performance under different situations...
Proceedings Article
Computer vision feature recognition method based on Improved Wavelet arithmetic
Lili Liu
in the process of studying on computer vision feature recognition method, with the current algorithm for feature recognition, the amount of calculation is large, and noise is strong, recognition rate is low. For this, a computer vision feature recognition method based on Improved Wavelet arithmetic is...
Proceedings Article
Analysis of mathematical modeling in particular clustering process of mixed data
Yuanyuan Xu
the analysis method of mathematical modeling in particular clustering process of mixed data is of great significance for improving the ability of data analysis. The traditional method for specific clustering process mathematics modeling of mixed data is based on K-Means clustering algorithm, it is easy...
Proceedings Article
Research and Simulation on effective classification model of nonlinear data
Fenglin Tang, Min Chen
in the classification process of nonlinear data, due to large amount of the data of nonlinearity, the correlation between nonlinear data is reduced, resulting in the classification results of nonlinear data is not ideal. Therefore, this paper proposes a fast clustering algorithm based on improved quantum...
Proceedings Article
Modeling Analysis for the effect of night environment on athlete’s psychological intervention
ChunSheng Liu
the analysis of the effects of night environment on athlete’s psychological intervention has a momentous significance for promoting the performance of athletes. The traditional algorithm not fully considers the instantaneous and disorder of night environmental psychological change, resulting in the reduced...
Proceedings Article
Study on design method for anti-collision in large scale network control software
HuanLiang Li
the anti-collision problem of large network control software is studied. With the increase of the control task amount of large network control software, the randomness for network control is enhanced, the traditional anti-collision design algorithm is hard to establish the accurate anti-collision model...
Proceedings Article
Simulation analysis of peak period income estimation model in tourism scenic of minority Areas
DongYan Sun
in the process of peak period income estimation in the tourism scenic of minority areas, the estimation results obtained by traditional estimation methods are affected by the mutability of tourist amount, existing local optimal problem, causing bigger error. Therefore, this paper proposes a method of...
Proceedings Article
Study on effective detection method for specific data of large database
Jin-feng Li
in the process of detecting specific data of large database, when the traditional detection method is utilized for detecting specific data, it is vulnerable for interference of mass information, which makes the specific data detection process time-consuming, and of low efficiency. For this, an effective...
Proceedings Article
Simulation on optimized complex process modeling based on XML
Ting-yan Ren
in the XML complex process relationship design problem, in multidimensional dynamic list scheduling algorithm, for the defect of platform (Group) selection caused by static priority of platform, an optimized priority calculation method is designed based on XML complex process modeling, during the process...
Proceedings Article
Research and Simulation of classification storage technology under the cloud computing environment
Ting Li
classification storage technology under the cloud computing environment is studied to improve the performance of data management. In the process of data management, how to process classified storage for data effectively, has become the core problem in the data field. How to carry on the management for...
Proceedings Article
Optimization design of effective management model of large construction project
Xiao-li Liu
in the management process of large construction projects, the related factors and the influenced parameters are various. A mathematical model of construction project management is complex, it is difficult to form effective project management measures. In the traditional architectural engineering project...
Proceedings Article
Statistical analysis of the spatiotemporal characteristics of loess landslide in Qingyang area of Gansu province
Binwei Zhang, Wanfeng Liu, Xiao Yang, Yue Wang
according to the present situation of loess landslides in Qingyang area through frequent field visits, and statistical information analysis, for the "seven county and one area" administrative division in Qingyang area, the distribution curves and statistical characteristic diagram is established, to...
Proceedings Article
Study on detection method for mixed network structure robustness in 4G network
Hui-min Chen
detection method for mixed network structure robustness in 4G network is researched. BP neural network algorithm is utilized to detect mixed network structure robustness in 4G network, because the 4G network reflects the exchange of information between individual and individual, randomness factors of...
Proceedings Article
Simulation and analysis of Hotel optimal guest stream evacuation model in the tourist season
Bo Wen
During calculation process of hotel guest stream evacuation in the tourist season, the genetic algorithm is used to constantly generate optimal method, based on the theory of "survival of the fittest" to operate unlimited reproduction for the better method, which makes the algorithm premature convergence,...
Proceedings Article
Study on the method of fast mining for intelligence data in a library database
Yu Jie
The fast mining method for intelligence data in library database occupies an important position in the field of data processing. With traditional algorithm to dig intelligence, when encounter the interference of characteristic similarity, fuzzy rules are utilized to establish mining association rules,...
Proceedings Article
Study of Vehicle Handing Stability Based on ADAMS/Car
Yuguang Li, Changfei Liang, Shufen Wang
Vehicle handling stability is an important factor which affects vehicle safety. In order to study Vehicle handling stability, we established a dynamic virtual prototype model of a car in ADAMS/Car software, and make simulation of the single lane change on different velocity and steering angle. And we...
Proceedings Article
Risk Management Theory Application in national information security risk control—Analysis of the relationship between classified protection and risk management
Maning Bi, Yuan Jing
The risk management theory has been applied in information technology area for many years. And it has been regarded as an effective information security solution and approach. With the full expansion of information classified security protection implementation, persons are puzzled by the relationship...
Proceedings Article
Design of College Students English Contest System Based on NET Platform
Chun Jin, Ruonan Xing
With the development of information technology, the Information Management System of the English Contest for College Students is presented to strengthen the Management Information. By analyzing the management content and workflow of the English Contest for College Students, integrated network technology,...
Proceedings Article
A Software Testing Optimization Method Based on Negative Association Analysis
Lin Wan, Qiuling Fan, Qinzhao Wang
Association rules mining oriented to software defect data plays a significant role in exploring the relationship between software defect data. What’s more, it can provide guidance for software developers and testers. What negative association rules describe is mutually exclusive relationship between...
Proceedings Article
Application of J48 Decision Tree Classifier in Emotion Recognition Based on Chaos Characteristics
Chun yan Nie, Ju Wang, Fang He, Reika Sato
Physiological signals are external manifestations of emotions. Mood swings can be expressed by the change of physiological signals. Because these performances are not controlled by the individual subjective consciousness, the conclusions are more objective and true. The method based on the statistical...
Proceedings Article
Extraction and Analysis of Chaotic Characteristics about Multiple Physiological Signals under Different Emotions
Chun yan Nie, Ju Wang, Fang He, Reika Sato
We extract the chaotic characteristics of multiple physiological signals in this paper, and the relevant algorithms for extracting chaotic characteristics are given respectively. Based on different algorithms we respectively calculate four kinds of chaotic characteristic parameters from multiple physiological...
Proceedings Article
SVM and wavelet analysis method for hydraulic pump fault of rock drilling
Jian-hua Liu, Wen-bin Ma
In order to looking for the fault of rock drilling hydraulic pump, the data of pressure and flow can be collected, from which wavelet analysis was used to find characters of the fault. So a new rock drilling pump fault diagnostic model by SVM was based on the energy value of the data deal with wavelet...
Proceedings Article
Discussion on reaction mechanism of enoxacine-terbium complex
Weiwei Bian
In the buffer solution of pH=5.80, bilirubin can remarkably reduce the fluorescence intensity of the enoxacine - terbium (Tb3+) complex at =545nm and the reduced fluorescence intensity of Tb3+ ion is in proportion to the concentration of bilirubin. The influential factors were investigated. The reducement...
Proceedings Article
The Design of Facial expression recognition system based on the LabVIEW and MATLAB mixed programming
Ju Wang, C. Hong Mei, Chunyan Nie
It has a very important role that emotion to coordinate the relationship between people in the numerous and complicated social life. Expression is the most important characteristics of emotion, it is indispensable means of information communication and emotional communication in interpersonal communication....
Proceedings Article
SOC Estimation Based Combined Model For Vehicle Batteries
Dongyuan Gu, Xiaojie Fu, Dongyong Yang, Jin Lu
Batteries play an essential role in electric vehicles, In order to achieve an optimum operation of systems with batteries it is necessary to estimate accurate of the state of charge (SOC). In this paper a combined model for SOC estimation in Vehicle Batteries, based on extended Kalman filter (EKF) is...
Proceedings Article
Research on Maximum Power Point Tracking Method for Grid-Connected Photovoltaic Power Generation System
Ying Zhang, Junhai Jiang
Aiming at the solar photovoltaic characteristics and the lower transformation efficiency problem in grid-connected photovoltaic power generation, a maximum power point tracking (MPPT) algorithm is put forward. According to the changes of amplitude and frequency of power-grid voltage, the proposed algorithm...
Proceedings Article
The Design of Low Pass Filter with Active Filter based on Complex Surroundings
Changhai Li, Su Ye, Song Sun, Yuantao Yu
Because of the effects of the wind-noise, sound-noise, strong electromagnetic interfere, sensor itself, and the magnified circuit etc. at the survey spot, the received transducer signals often include noise signals of multi-frequency disturbance. Under serious circumstances, such noise signals would...
Proceedings Article
Semi-blind Channel Estimation for MIMO-OFDM Systems Based on Received Signal Reconstruction
Weijia Cui, You Zhou
Blind channel estimation for MIMO-OFDM systems was discussed, and a subspace based blind channel estimation algorithm by re-constructing the received signal and its simplified one were proposed. The algorithm changed the channel matrix of the transfer function into a block Toeplitz high matrix exploiting...
Proceedings Article
The Analysis and Research of Gear Surface Machining
Rong Zhang
Through the analysis of the surface of the gear machining program, describes the characteristics and applications of various processing methods, the view of the article describes have a guiding role in the design and processing gears.
Proceedings Article
Private Cloud based Solution for the Implementation of a Virtual and Personal Learning Environment
Jimin Gao
Online learning is a learning way to use online education platform for learners. It could let the learners start learning at anytime from anywhere by removing the traditional education's time and space limit. As the online learning style becomes more and more popular, its main base environment has gradually...
Proceedings Article
Expert S-plane Control of Underwater Vehicle
Chunmeng Jiang, Lei Wan, Yushan Sun
Study of motion control of underwater vehicle is deeply undertaken here. S-plane control is verified to be effective and validity in the control of UVs, but there are still problems in steady precision and parameter adjustments. To obtain higher steady precision, intelligent integral method is brought...
Proceedings Article
Study of fiber Bragg grating reflection spectrum signal denoising
Dandan Zhu, Manyi Huang, Meiying Chen, Sibo Xi
Using WDM technology to solve the problem of the reuse addressing the fiber grating sensing network, the system USES a reference grating for temperature compensation, the reference grating was put in the same temperature field as the measuring grating array, but does not suffer the effect of strain,...
Proceedings Article
sampled fiber grating dispersion compensation technology based swarm optimization algorithm
Dandan Zhu, Lin Hu, Haohao Shen, Sibo Xi
Reflective spectrum of sampled grating was analyzed using transfer matrix method. Dispersion compensator was designed by selecting the length of sampled grating, sampled period, sampled rate, chirp coefficient and some kind of appropriate parameters. In multi-channel dispersion compensation simulation...
Proceedings Article
The Simulation Research On The BLDC Stator Resistance Affected By The Temperature Increment
Tiejun Fu, Zhongliang Pan, Liangliang Yang
This paper changed temperature conditions to simulate by finite element software. We can observe the simulation results of the BLDC (brushless director current motor) stator resistance. Then we applied formula to calculate the BLDC stator resistance. At last, measuring the stator resistance of different...
Proceedings Article
Research on Real-time video multiple hops relay transmission in Wireless Ad Hoc Network
Tao Yang, Youfeng Gu
The transmission of real-time video need a stable link and is also very sensitive to delay and packet loss, this is a huge challenge to wireless ad hoc network[1,2,3] which has dynamic network topology and limited bandwidth. In this paper, a method to transmit video streams in multi-hop network is proposed...
Proceedings Article
The Designation of Bio-Inspired Intrusion Detection System Model in Cloud Computing Based on Machine Learning
Yufei Ge, Hong Liang, Lin Chen, Qian Zhang
The paper proposed a new model by applying bio-inspired theory into intrusion detection system in cloud computing. Dendritic Cell algorithm (DCA) based on Danger Theory get involved in the model designation in allusion to the existing problem, high false negative rate, low detection efficiency, low real-time...
Proceedings Article
Online Detecting Method for Transformer Winding Deformation Based on Current Extraction
Ning Zhang, Meng Zhang, Yuan-yuan Zhang, Yong-li Zhu
Transformer winding deformation is common in transformer faults. Offline monitoring is mostly used in diagnosis of winding deformation, which has some limitations. So an online detecting method based on extraction of current is proposed. The method increases the higher harmonic of the current that flows...
Proceedings Article
Research on Collision Detection Algorithm of Tankin Virtual Battlefield
Aobing Guo, Qinzhao Wang, Xiaolong Li
In order to solve the contradiction between real-time and accuracy of collision detection in virtual battlefield, we divided the terrain into three types according to its average curvatureand different matching algorithms were used in different types of terrain. In virtual battlefield, collision detection...
Proceedings Article
Improved Fuzzy Evaluation Model of Military Supply Chain Performance Based on Variable Weight
Heng Zhang, Qiang Lin, Zhi guo Qu, Kun Zhang
According to the characteristics of military supply chain, we design the indicator of performance evaluation based on the key factors of supply chain strategy in this paper. When talking about estimating performance evaluation, in order to materialize the punitive or stimulant request that decision-maker...
Proceedings Article
Optimization of massive data retrieval performance based B-tree index
Lihua Geng
With the rise of the Internet Web 2.0, the paper studies a use of B-tree index technology supported by Oracle 11gin mass data retrieval. B-tree index scanning mode use the index selectivity, histogram etc to select the best execution path to improve query performance. Put forward the solutions to avoid...
Proceedings Article
Circuit design for measure cable breakpoint location range based on AT89C52
Youguo Wei, Fei Hou, Xuezhi Zhang, Xiaokang Tang, Yongshan Ma
the development of electric power and communication technology promotes the apply of cable widely, the trouble of cable become more and more. establish the measure cable breakpoint location range system to locate the breakpoint rapidly, the location of cable breakpoint can be calculated by the interval...
Proceedings Article
Spectrum sensing performance analysis based on primary user probability access/leave model
Song Chen, Shuainan Gu, Ke Li, Peng Dong
In cognitive radio system, secondary user’s self-sensing properties to the spectrum occupy is the start and basis of the whole cognitive process. The classical analysis of self-sensing properties has the hypothesis that the Primary user signal occupies the whole sensing slot. However, in the actual,...
Proceedings Article
Study on the method of test and control system for low speed wind tunnel
Yueming Yang, Kai Luo, Xingrong Bao, Yuankai Li
The wind tunnel test control is the key to the wind tunnel tests. This article Studied 0.75m × 0.75m With backflow wind tunnel measurement and control technology, through the transformation of the wind tunnel motor to improve the stability and uniformity of the airflow and reduce turbulence degree; through...
Proceedings Article
Numerical Investigation of Hypersonic Slip Flow
Kai Luo, Yueming Yang, Hua Liu, Xuewei Xin, Xuewei Liu
Rarefied gas effects have to be considered when doing the research and design of hypersonic flight vehicle in near space, in which accurate prediction of flow field and surface properties such as pressure, shear stress and heat flux are needed. Research on the mechanism of hypersonic slip flow must consist...
Proceedings Article
The Design of Network-based Virtual Laboratory
Yong Li, Guangming Li
Virtual laboratory is a practical teaching assisted instruction with high efficiency. This paper analyzes the characteristics, classification of virtual laboratory and the design of virtual instrument. It discusses the construction and system structure of network-based virtual laboratory. This paper...
Proceedings Article
Dynamic characteristics of a spur gear transmission system for a wind turbine
Xin Zhao, Changzheng Chen, Jie Liu, Lei Zhang
A nonlinear dynamic model of a spur gear transmission system is developed with consideration of gear mesh stiffness, backlash, internal and external excitation. Lagrange equation is used which is derived for the vibration of the drive system differential equations. Time process diagram, frequency spectrum...
Proceedings Article
A new practical teaching system to cultivate application-oriented innovative talents majoring in materials science and engineering
C.Q. Zhang, L. Shi, Q.L. Sun, K.G. Liu
Materials and the related manufacturing industry involve every area of the economy, and the corresponding talent demand ranks in the forefront of all industry professionals. However, the defects of current talent training mode and curriculum system limit the quality of talent training. In this paper,...
Proceedings Article
PID and Neural network decoupling control system for special shape pipe automatic welding machine
Wen-bin Ma, Jian-hua Liu
In order to solve special shape pipe automatic welding problem,a new decoupling control system has been introduced,which is constructed on PID and RBF neural network.Input data is from non-contact displacement sensor and angle sensor,and output data has been used to control servo motor which always used...
Proceedings Article
Research on Evaluation Model of Equipment Support Logistics plans in Wartime Based on Topsis
Fan Yang, Zhanbiao Zhao, Tianyuan Jiang, Yucai Dong
Evaluation of equipment `support distribution `plan in wartime scientifically and accurately is crucial to improve the efficiency of distribution and meet the demand of war timely. In this paper Topsis is adopted to conduct comprehensive evaluation of the equipment support distribution plan at war time....
Proceedings Article
Program Design for the dynamic detection of servo system based on Keil Mu Vision3
Youguo Wei, Xuezhi Zhang, Xiaokang Tang, Cun Xie, Yongshan Ma
As the device in general inspection maintenance, can only carry on the system static parameter measurement, and dynamic performance of the system only can be judged by qualitative observation. In this paper, we adopt modular design scheme and the method based on synchronous sampling and real-time data...
Proceedings Article
Ground penetrating radar in crack detection to the forward research
Yi Lin, Zhengping Liu
The ground fissure is hidden hazards of ground deformation.Survey work to crackisthe basicofcontrol measures. Geological radar detection as an emerging technology has advantages of rapid, continuity and visibility; according to a practical example of the detection mechanism of landslide cracks, summed...
Proceedings Article
Research on The Dynamic Characteristics of Relaxed Static Stability Control Aircraft
Jicheng Zhang, Duo Wang, Kai Luo, Yueming Yang
In this paper we analysis aircraft dynamic characteristic on relaxed static stabillity control from the concept of active control technology point of view, and calculate the dynamic characteristic of longitudinal. Through calculation, further reseaerch on the influencing of relaxed static stability on...
Proceedings Article
Application Research of PulsON@ 410 UWB Module on Accurate Locating in Substations
Wei-wei Miao, Shi-dong Liu, Wei Li
Based on the analysis of problems encountered by PulsON@ 410 RCM modules when used in substation accurate locating, such as automatic discovery of beacons, a self-organizing protocol is put forward to support the creation, maintenance of beacons network. Also solutions from different aspects are presented...
Proceedings Article
Development of an engineering simulator for armored vehicle
Tang Fang
This paper illustrates the main features and structure of the armored vehicle engineering simulator (AVES). Considering high cost and long cycle development problem of the traditional armored vehicle design, the AVES has been developed for purposes to test rationality of design, to investigate different...
Proceedings Article
Unmanned Aerial Vehicle (UVA) Bionic Wing Design and Performance Analysis
Hua Xin, Qin Shuo, Kai Luo, Weihong Liang
Key problems in view of the urgent long-endurance uav, the research of the application of bionics to no one wing design. With the wings of a certain unmanned aerial vehicle as the research object, is good at gliding gull for bionic prototype. Design imitation airfoil seagull flat wings and wing tip winglet...
Proceedings Article
Method of estimating the state of charge of a battery electric vehicle based on RS-SVM
Guocheng Niu, Bongmei Hu, Jing Bai
Charging, discharge, maintenance and energy management technology for electric vehicle power battery is relatively backward, An advanced and reasonable method is presented for battery state of charge( SOC ), used simple rough set attribute ,simplified battery charging related parameters, the simplified...
Proceedings Article
The Research of Order Prediction Model for Textile Machinery Manufacturing Enterprise Based on Customer Demand
Xixing Li, Shunsheng Guo, Lei Wang, Zhen Li
With the development of information technology, textile machinery manufacturing enterprises (TMME) are facing the new situation of “Two Integration”, in order to better responding to market customer demand (CD), the order prediction is becoming more and more important. The background of product model...
Proceedings Article
Silicon detector for the Saline Soil Degree in ETM Image
Tao Chi, Bingchun Li
A silicon photoconductor apparatus having improved efficiency in infrared radiation detection by sandblasting the reflective surface of the apparatus and thereby creating a near-infinite number of reflecting angles and a corresponding multiplication of quantum energy yield. This article describes its...
Proceedings Article
Research on Personalized Recommendation Algorithm for Internet User to Browse News
Chunsheng Li, Shuchao Feng, Wenqian Shang
At present, the mode analysis methods for Internet User to browse news have three main kinds: that is, association analysis, clustering analysis and the mode of sequence analysis. This paper mainly focuses on the personalized news recommendation for Internet user. We combine the membership functions...
Proceedings Article
Research of Terrain Aided navigation system
Xiaoxu Chen, Chunguang Wang, Xin Wang, Ming Ming, Deming Wang
Terrain aided navigation system is called the fourth generation of navigation system, this paper analyzes some key technologies of terrain aided navigation system and analyzes the factors that affect the terrain aided navigation system positioning accuracy, proposing solutions to improve the positioning...
Proceedings Article
The Research of Gas Detection Based on data Fusion
Haiqun Wang, Dongyun Liu
Aiming at indoor harmful gas pollution of residents, a real-time online monitoring system is designed based on the detecting and control of harmful gases. The lower computer system make the STM32F103 microcontroller as the core, PC as the monitoring center, combining the technology of multi-sensor data...
Proceedings Article
Research and Implementation of Content-management Based on FEDORA
Yongchang Wang, Ligu Zhu
The surge of information leads the creation of non-structured data increasingly, so content-management has been one of hot topics for IT industry to research. This paper discusses the use of FEDORA in content-management by analyzing the digital object model in FEDORA. We implement a content-management...
Proceedings Article
Key exchange protocol based on the private key
Tong Yi, Minyong Shi, Wenqian Shang
At present, most existing key exchange protocols for three-party (3pake) are easily attacked by server key disclosure, dictionary attack and so on. This paper analyses the weakness of the previous work , and presents a key exchange for three-party based on the private key .This method can resist common...
Proceedings Article
Data Discretization Process Of Health Management System
Xiaokang Tang, Xuezhi Zhang, Qiong Zou, Cun Xie
The algorithm of attribute reduction based on discernibility matrix is advanced. The advanced algorithm uses the dependence of decision attribute to condition attribute as heuristic information. The advanced algorithm can debase the complexity of discernibility matrix constructing effectively. The value...
Proceedings Article
A Method Based On Face Verification
Xuezhi Zhang, Cun Xie, Xiaokang Tang, Qiong Zou, Chunyu Shao
Recent year, the method based on face verification has been one of the most vibrant study aspect in face verification field. The problem of face verification can be defined: imputing the picture or video, identifying or validating by using face database. “video-video” face verification means inputting...
Proceedings Article
A Healthy Aging Real-Time Monitoring System Based on Data Mining
Songtao Shang, Minyong Shi, Wenqian Shang
Aging population is serious problems now in China. Many aging people have only one child, their children have many works to do every day. The only children have little time to care for their parents’ health and daily life. This paper introduces a real-time monitoring system which can collect the vital...
Proceedings Article
Research on the Solar Distributed PV's Impacts on the Voltage of Distribution Network
Yongsen Wei, Li Li, Yan Liu
The photovoltaic power is gaining momentum and developing fastest among the distributed power generation technologies. The distributed photovoltaic power is connected to the distribution grid through the inverter. And it is stochastic and different from the traditional power plants. So it is necessary...
Proceedings Article
Research on the Evaluation System of Economic Development Environment Based on the Factor Analysis Method
Nan-nan Zhang
Coordinated environment of economic development will provide power for economic development. Otherwise, it would counteract the development of economy. Aiming at this problem, using the factor analysis method and taking Chinese city for example, this article selects the 18 indexes of 36 cities throughout...
Proceedings Article
Financial Security Evaluation in Power Production Industry Based on BP Neural Network Optimized by Genetic Algorithm
Jiao Lin, Yao Shuo, Jiao Di
In recent years, power production industry investment and financing security issues have become increasingly prominent in China,which has brought serious financial security challenges to our country’s power production industry. Therefore, to evaluate the financial security is of vital significance.This...
Proceedings Article
A New Project Management Performance Evaluation Method based on BP Neural Network
Wanyin Du
The traditional project management performance evaluation method mainly used single linear analysis, which is simple. But it can not reflect the complex non-linear relationship between the evaluations. Thus, a back propagation neural network model applied in project management performance was constructed,...
Proceedings Article
Research on the Company Financial Crisis Prediction Model based on Support Vector Machine
Weiping Zhong
For comparing the prediction accuracy of company financial crisis prediction models, the support vector machine model was introduced in this paper to predict that whether there exists financial crisis in a company or not. Through the acquisition of a large number of samples for training and testing,...
Proceedings Article
Research on the Effective Supply Strategy of Natural Gas based on Factor Analysis Method
Guang-jing He, Rong-ge Xiao, Yu-heng Zhang
As China's economic growth and social development, energy demand is increasing. As an efficient and clean energy, natural gas is widely used in various fields such as industry and agriculture. However, the contradiction between demand increase of natural gas and limited resources has become increasingly...
Proceedings Article
Prediction and Influencing Factors Analysis of Natural Gas Consumption in China Based on SPSS
Guang-jing He, Rong-ge Xiao, Shuai Liang
Natural gas is the third largest energy pillar in the world, the best energy that all countries are scrambling to develop. Five main influencing factors of natural gas consumption are analyzed by collecting relevant information, including GDP, the gross industrial output value, the increased value of...
Proceedings Article
Research on the University Network Information Security Risk Management Model Based on the Fuzzy Sets
Cai-qiao Huo, Li-zhuang Meng, Kai Chen
Due to the evolution and widespread about the Internet, organizations are easier to attack on the information technology systems. These are caused by data loss and change and those insecurity impact resistant services and business’ running. Then, we use a way that is the management of the information...
Proceedings Article
Application of Improved BP Neural Network Algorithm in Hydrocarbon Identification of Salinity Mud Invasion Reservoirs
Lixiang Feng, Wang Dan, Rongchao Cheng
Saline solution mud has been extensively used in many oil and gas fields. Its salinity property leads to the difficulty in identifying hydrocarbon using conventional wire logging information due to the lower reservoir resistivity resulted from saltwater invasion. Gas logging and geochemical logging directly...
Proceedings Article
Study on the Method for Comprehensive Evaluation of Complex System Maintainability
Ming-hua Yang, Guo-gang Wang, Xiao-ping Han, Tao Liang
In order to assess the maintainability of weapon system on the system-level more scientifically and accurate, the concept of “Influence degree” is introduced into this study under the consideration of the relational degree between the influence of components on system and assessment indicators. By combining...
Proceedings Article
The research based on private cloud computing information interaction model
Meng Zhang, Zheng Liang, Zhen Li
The author analyses the current problems of campus network, make a research about the construction of university campus network, through the resource integration of campus network, and then introduce a information interaction model based on private cloud computing information interaction model, which...
Proceedings Article
Constructing Virtual Network Attack and Defense Platform Based on OpenStack
Longying Lian, Yuan Zhang, Hongtao Zhang, Shunji Zhang
With the rapid development of Internet, network security issues have become great issues related to national security and stability. In this context, researchers and students in universities require one for scientific research and experimental teaching of network attack and defense platform. This paper...
Proceedings Article
Design of Multi-channel MAC Mechanism for WIA-PA
Jianming Liu, Lili Xu
WIA-PA is an industrial wireless networking protocol standard used in process automation. One mechanism based on the WIA-PA multi-channel MAC has been proposed to solve industry wireless sensing questions in network channel disturbance and medium turning on conflict. The mechanism mainly includes the...
Proceedings Article
Research on MEMS Cantilever Beam Used as Switch in Thermal Mass Flow Meter
Pengyu Wang
In order to reduce power consumption of thermal mass flow meter and prolong its working life as long as possible, we suppose that a MEMS cantilever beam could be used as switch in thermal mass flow meter. First, we discussed working principle of cantilever beam to confirm the feasibility as switch in...
Proceedings Article
The Data Analysis of the Subway Noise Signal Based on MATLAB
Qian Xiao
As subway noise affected psychological, physiological and normal life of passengers and people along the track seriously, it becomes an important indicator of urban construction. In this paper, subway noise is analyzed by MATLAB for its efficient data analysis capabilities. The measured data is taken...
Proceedings Article
Multi-Kernel Partial Least Squares Regression based on Adaptive Genetic Algorithm
Shaowei Liu, Jian Tang, Dong Yan
Kernel learning has been a focus of machine learning domain recently. Kernel partial least squares (KPLS) algorithm can construct nonlinear model using extract latent variables from the input and output data space simultaneously. However, generalization performance of KPLS model relies mostly on kernel...
Proceedings Article
Retrieval of Clothing Images Based on Color Feature
Yatong Wang, Wenlong Fu, Yongbin Wang, Xianglin Huang
With the rapid development of e-commerce apparel, clothing online shopping is becoming an increasingly popular way of shopping. At present, text features are often used as search terms. Users need a retrieval tool to realize the clothing information search function efficiently. The content-based image...
Proceedings Article
Research on Resource Management of Phased-Array Radar in Target Tracking
Qing Sun, Qin Zhang, Jianfeng Tao
Scheduling of phased-array radar resource is an urgent problem of its tracking and control. In this paper, optimization control model of phased-array radar has been analyzed and the resource management of a certain type of radar in target tracking has been developed, which will provide theory reference...
Proceedings Article
Research on Data Mining Model in the Internet of Things
Yan Chen, Ai-xia Han, Cai-hua Zhang
The Internet of things combines aspects and technologies that come from several kinds of approaches. So the Internet of things is a new paradigm. When the computing, pervasive computing, and the relevant technologies are more closely interdependent to each other and the world of Internet of things form...
Proceedings Article
Research on the Synergy Management Mechanism of the Project Contract Using Management Based on the Multi-sided Matching Decision Method
Gang Du, Ping Du
Synergy management in project aims to maximizing the all parties’ interests the owner, which parties including the construction unit, contractors, suppliers, government. It is the management core, in order to maximize their interests we try to carry out the new management mode of the integration. Synergy...
Proceedings Article
Research on Evaluation of Enterprise Performance Based on BP Neural Network Improved by Levenberg-marquardt Algorithm
Wanyin Du
BP neural network is a multilayer feedforward network for training according to the error back-propagation algorithm , its main advantage is the strong non-linear mapping ability , but the training of BP neural network is easy to fall into local minima, and slow convergence speed. In this paper, through...
Proceedings Article
Enterprise Credit Evaluation Model Based on Genetic Algorithm Optimization BP Neural Network
Yu-jing Zhang, Qian Li, Zhi-wang Jiang, Hong-xia Zhang
Credit is very important for the enterprise, analysis of a comprehensive evaluation of enterprise credit, can enhance the risk control ability of enterprise credit, improve enterprise credit rating.The paper establishes BP neural network credit evaluation model based on genetic algorithm GA optimization...
Proceedings Article
Forecasting Model of Supply Chain Management Based on Neural Network
HongJing Liu
Neural network technology has been successfully applied in many business areas. This paper systematic summarizes the applications of neural network technology in supply chain management, which include three areas: optimization , forecasting and decision support. Then, the BP neural network is used to...
Proceedings Article
Camera Radiance Correction In Lightning Imaging Experiment
Cun Xie, Xuezhi Zhang, Xiaokang Tang, Qiong Zou, Chunyu Shao
The camera radiance correction methods was designed and implemented to improve the pixel optical response features and eliminate the difference of the optical response. Otherwise the camera space correction and distortion correction method was designed and implemented to ensure the seamless splicing...
Proceedings Article
The Design and Application of Water Jet Propulsion Boat
Weibo Song, Junhai Jiang, Shuping Zhao, Kaiyan Zhu, Qihua Wang
With the continuous application of science and technology in the ship fields, the new technologies of ship have a rapid development. The water jet propulsion boat technology also has continuous update. Therefore, the technology of water jet propulsion is a hot area of research. This paper mainly designs...
Proceedings Article
Study of the Best Checkpoint Interval in the Distributed Simulation System Based on Virtualization Technology
Yu Ge, Yunfei Yang, Chengwen Zhu, Miao Song, Xiaoyan Cai, Yan Zheng
In order to keep the system’s transfer, every once in a while, it was needed to grab a snapshot for the VM of all the nodes which were in the process of the distributed simulation system. It is very important to set the reasonable checkpoint interval for optimizing the system’s average utilization rate....
Proceedings Article
Combination Method of Evidence Grouping
Rong Li Chen, Xi Bin Wang
The theory of Evidence reasoning is an important method for processing uncertain information, in order to improve the accuracy of evidence fusion and to reduce the amount of operation, and ensure that combining results are still reasonable and effective when it happens to information conflicting, so...
Proceedings Article
Research on the Database based on GRID Technologies
Hua-shuai Zhang, Xiao-wan Yang
Grid technology is widely used in recently. It has solved the real sharing of resources, making each node of unified command and using of resources. The information grid is on the basis of computational grid, using data mining. Information fusion, search engine technology and building are advantageous...
Proceedings Article
Nonlinear Controller Design of the Inverted Pendulum System based on Extended State Observer
Limin Du, Fucheng Cao
Inverted pendulum system is a kind of widely used physical model. In this paper, we present a nonlinear control scheme of single inverted pendulum system based on extended state observer. First, we establish the dynamic equations of inverted pendulum under a generic horizontal force and then linearize...
Proceedings Article
Formation and Statistical Properties on Name Networks
Lei Zhang, Yong Hu, Jianxiang Cao
In this paper, we investigate name network based on complex network theory. We study statistical properties of the network and find that name network show some important characteristics: not only small word effect, scale-free and the power-law distribution, but also disassortative mixing. The origin...
Proceedings Article
The Problems in Cloud Computing Security and Its Solutions
Li-na Zang, Yan-juan Zheng, Zhi-qiang He
Cloud computing is a new computing model, in which large-scale Internet computing resources are effective integrated and computing resources ate provide as a service to users. Cloud computing effectively separates the virtual services from the actual resources. With the Promotion of cloud computing applications...
Proceedings Article
Analysis of the Big Data based on MapReduce
Zi-de Tian
Big Data are becoming a popular technology focus both in science and in industry and motivate technology shift to data centric architecture and operational models. Big Data is bringing a positive change in the decision making process of various business organizations.In this paper, MapReduce big data...