Proceedings of the 2016 International Conference on Communications, Information Management and Network Security
90 articles
Proceedings Article
IPv6 Enabled Smart Home Using Arduino
Mahesh Patil, Sumathy Subramaniam, Rajendra Hegadi
Internet of Things (IoT) is a widely emerging technology making our lives smarter with smart applications. One of its applications is smart home where any device or object at home can be made smart and can be controlled via internet or in a local network. All recent projects in smart home are using IPv4...
Proceedings Article
A Summary of the Application and Research of the Command and Control Organization Theory in Emergency Communication Support
Yiwei Ji, Xuejun Ren
In recent years, the emergency communication support has been fully developed. With the progress of the times, the problems of the emergency communication support are constantly changing, and new methods are needed to solve the problems. This paper summarizes the current researches on the problems in...
Proceedings Article
Automation Analytical Model of Familial Malware Based on Communication Features
Yiyang Wang, Shaoming Chen, Chongbin Wu
Up to date, the Internet industry has done a lot of research on malware analysis, which brings in effective malware detection. However, in terms of familial communication feature extraction and detection, a very mature product has yet to be seen. Given this situation, this paper tries to establish an...
Proceedings Article
Logistics Distribution System Based on Internet of Things
Xiaohan Li, Jialiang He
This product that can provide distribution services and improve the utilization rate of freight resources. Its construction goal is to use high-tech means to achieve intelligent logistics as the core, greatly accelerating the circulation speed of the goods in the logistics process, reducing manual operation...
Proceedings Article
An Intelligent Service System for Outdoor Cycling
Huiyan Wang, Jialiang He
This product aims to make sure that the rider concentrate on the road. Therefore, we adopted an intelligent hardware+APP+Data platform. Its unique feature is that low-cost and simple electronic equipment which has the same function, not only flexible system design, but also LED lights as a navigation...
Proceedings Article
Intelligent Charging Query System of Electric Vehicles Based on Internet of Things
Qinshan Han, Jialiang He
The key technologies of Internet of Things includes RFID technology, sensor network and detection technology, intelligent technology, it has been applied in various areas and plays a vital part in normal life. This paper introduces the concept of electric vehicle charging inquiry system, operating mode,...
Proceedings Article
Design of Low Power and High Linearity Gm-C Low Pass Filters
Xiushan Wu, Yanzhi Wang, Qingying Chen, Xingzhou Jiang, Renyuan Tong, Jianqiang Han, Siguang An
This paper presents two kinds fully differential operational transconductance amplifier (OTA) circuit, one is a flipped voltage follower circuit structure (OTA1), the other is a source follow circuit structure (OTA2). The two OTAs' transconductance can all be accurately set by the control voltage. Two...
Proceedings Article
Partial Discharge Signal De-noising Method Based on EMD and High Order PDE
Ganggang Zhao, Fujiang Mo, Hui Chen, Peipei Wang, Mengsu Xu
The voltage level of power system is continuously improved. Partial discharge (PD) test is an important means to detect the insulation performance of high voltage electrical equipment. The electromagnetic environment of the test site is complicated. The extracted PD signal is submerged by noise. In order...
Proceedings Article
Research on Noise FM Jamming Anti Frequency Domain Filtering to GPS M Code Signals
Jinglei Guo, Fangling Zeng, Jiawei Wang
The new generation of GPS signal is added the M code which has a separated spectrum and wider bandwidth, so we use the noise FM jamming to interfere M code. Combined with the receiver frequency domain filtering anti-jamming technology, the effect of the frequency domain filtering of noise FM jamming...
Proceedings Article
A Feature Similarity-Based Multi-Resolution Method for Image Registration
Zhihui Wang, Yuzhu Xie, Yuejiao Fan, Wenbo Xu, Qila Sa, Jinlin Li
We present a method to automatically register images based on feature similarity and image decomposing by multiple wavelet-transform. We use GHM multi-wavelet to decompose the image, then use mean-shift image segmentation algorithm to extract the image feature. We serve the regional features as matching...
Proceedings Article
Modeling the Power Consumption of Multiple Typical Applications Based on Linux
Xiaoying Wang, Kunchang Li, Guojing Zhang, Lei Zhang
Since huge power consumption of large data centers has become a crucial problem recently, power models, especially precise models, turn out to be important for service providers to learn about the application status in order to make wise decisions. In this paper, we focus on the power modeling of typical...
Proceedings Article
Optical Layer Modulation Format Conversion in OFDM-Based Flexible Optical Networks
Hejun Zhu, Liehuang Zhu
In this letter, we proposes and experimentally demonstrates an optical layer modulation format conversion technique from quadrature phase shift keying (QPSK) to 16 quadrature amplitude modulation (QAM) in orthogonal frequency division multiplexing (OFDM)-based flexible optical wavelength division multiplex...
Proceedings Article
The Broken-Point Continuingly-Transferring Design Based on Satellite Network
Jianmin Mei, Guiqiang Ni, Jinsong Jiang, Yingzi Yan, Qing Liu, Junxian Long
High channel bit error rate, long delay and other characteristics of the satellite network, will cause the file in the process of transmission is easy to interrupt or packet loss. In order to improve the efficiency of file transfer, the server sends data once, while multiple earth station clients receive.,...
Proceedings Article
Assessment of Rehabilitative Effects of Motion Sensing Game on Mentally Retarded Children
Hanxue Xu, Zhenjun Li, Xiaowei Chen, Jiahao Wu, Yun Xu
This study explored the rehabilitative effects of motion sensing game("rehabilitative training game system V1.0") on training mentally retarded children. 112 children were chosen as participants in the experimental group from 187 mentally retarded children while the other children in the control group....
Proceedings Article
The Design and Implementation of High Precision and Low Power Wireless Temperature Sensor
Yanping Wang, Hanxi Li, Yuchen Wang, Huan Le
This paper presents a design method of high precision wireless temperature sensor, the sensor consists of 16 high-performance low-power processor MSP430F149, Sub-1G RF transceiver chip SI4432, four-wire positive temperature coefficient temperature sensitive resistor PT100, the high resolution of AD conversion...
Proceedings Article
Low Density Parity Check Coding in OFDM-PON Systems
Chunlei Zhang, Xiao Xiao, Kai Zhao, Xunfa Yang
To meet the demands of different high bandwidth service, OFDM-PON has been considered as one of the candidates for NG-PON2. In this paper, downstream transmission performance based on LDPC-OFDM coding PON system is studied. The simulation results show that employing the LDPC-OFDM coding in PON system...
Proceedings Article
Joint PAPR Reduction Scheme in OFDM-PON Systems
Chunlei Zhang, Kai Zhao, Xunfa Yang
To meet the demands of different high bandwidth service, optical orthogonal frequency-division multiple access-based passive optical network (OFDM-PON) has been considered as one of the candidate for NG-PON2. In this paper, a joint peak-to-average power ration (PAPR) reduction scheme in OFDM-PON system...
Proceedings Article
Body Falling Gesture Recognition Based on SOM and Triaxial Acceleration Information
Hongbo Chen, Qing Gao, Tao Feng, Yu Liu, Xinhua Xiao
In order to improve the performance of fall detection system for the elderly based on triaxial acceleration sensor, and accurately to judge the fall direction of human body, a method was put forward based on self-organizing map neural network (SOM) and the information of triaxial acceleration sensor...
Proceedings Article
Voice Analysis of the "White Peony Tune" of Linxia Huar Based on Acoustics
Yanbing Ding
The paper collected the speech signal of Linxia Huar "White peony tune" which contain mountain singing, cheerful singing and tearful singing with experimental phonetic analysis method. And complete the signal tagging and parameter extraction. In the course of the study, the fundamental frequency and...
Proceedings Article
Design and Simulation of Digital down Converter Based on System Generator
Fengling Zuo, Jietao Diao, Zhaolin Sun, Nan Li
In this paper, the general structure of digital IF receiver is analyzed, based on the platform of system generator, the author design the digital controlled oscillator and a decimation filter model in the MATLAB/Simulink.
Proceedings Article
The Impact Analysis of High Speed Railway on City Accessibility in Henan Province
Kaiguang Zhang, Mingting Ba, Hongling Meng
Accessibility level is an important indicator to measure the perfect degree of traffic network, *-shaped high-speed railway network in Henan province, forming in the next 10 years, will have significant impacts on the accessibility spatial distribution pattern. In the paper, those impact and the evolution...
Proceedings Article
Agent Based Cucumber Plant Climbing Characteristic Simulation
Jing Xu, Teng Miao, Kai Song, Lin Gao, Ying Cui
This paper presents a method to simulate the plant behavioral characteristics based on Agent. The basic structure of plant Agent is introduced and the perception, behavior decision-making ability, motion ability of the plant Agent are given. Based on the plant Agent, climbing growth characteristics of...
Proceedings Article
Anomaly Diagnosis Analysis for Running Meter Based on BP Neural Network
Zhengye Wang, Gangjun Gong, Yafeng Wen
Smart meters is important equipment in the electric information acquisition system, it is the terminal equipment on the user side to realize information collection, energy metering and other functions. However, because of maintenance workload greatly, artificial detection can't meet the need. In this...
Proceedings Article
Construction and Application of the Operational Plan Ontology Model
Fei Long, Xiaozhe Zhao, Xinglin Liu
Aiming at the bottleneck of assistant decision-making system caused by traditional expression method of the operational plan, this paper introduced the ontology technology in the information system field, and analyzed the advantages of the operational plan ontology model. On the basis of the determination...
Proceedings Article
A Study of Behavior Intention of Runners' Virtual Community - The Case of Marathon's World Website
Hsin-Ke Lu, Peng-Chun Lin, Chi-An Li
According to the World Health Organization (2015) statistics, the population of today's global obesity has already doubled since 1980, the number nearly doubled. World Health Organization also estimates that depression, along with cancer and AIDS, will be the three major diseases in the world. It can...
Proceedings Article
Discussion on Safety Planning of Information Campus
Wei Li, Jianfeng Xiong
Aiming factors that affect the information technology campus safety, we design and plan the campus security information application, from the host system security, data security, application level security, application classification system permissions and other aspects, in order to achieve information...
Proceedings Article
A Novel Situation Assessment Model Based on Connection Potential
Yan Wang
Situation assessment is important for the prediction of a complicated problem involving numerous fuzziness and uncertainty factors. A novel assessment model using connection probability and connection potential of set pair was introduced here to predict the transformation tendency and assess the individual...
Proceedings Article
Verification and Detection of a Wireless-Leakage Hardware Trojan Horse with Covert Channels
Yancang Chen, Ying Zhou, Pei Wei, Sai Sui, Yaxin Zhao, Minlei Zhang, Lunguo Xie
Hardware Trojan horses have become a troublesome challenge for security-sensitive integrated circuits. As one important categorization, the carrier of wireless-leakage hardware Trojan horse is radio wave, bypassed protective isolation equipment, such as traditional firewall. Even if no networking, it...
Proceedings Article
Security Middleware Framework of Classified Application System
Yizheng Tao, Xinglan Li, Shan Gao, Gongliang Li
For classified applications need to quickly adapt to the business and security policy change, using middleware technology and framework, abstract classified application system security common public features, put forward the classified application business logic and security logic separation of security...
Proceedings Article
Design and Implementation of a High Performance Network Scanning System for Vxworks Hosts
Minlei Zhang, Yancang Chen, Huan Chen, Yaxin Zhao, Pei Wei, Sai Sui
Host scanning is an important technique for vulnerability mining and penetration testing, which is crucial to analyzing the safety of information system. Through the research into developed scanning systems both at home and abroad, such as Shodan, Zoomeye etc., this essay proposes a design model of a...
Proceedings Article
Design of Bicman Speed Based on C51 Microcontroller
Yang Zhan
This paper designed and produced adevice based on c51 MCU. This device recorded the number of cycles of a Bicman tire in a certain timethough theHall sensor, and then calculated the mileage and speed of the Bicman by the number of cycles. Finally it could display the mileage and speedwith a digital tube....
Proceedings Article
The Study of College English Teaching in Internet Plus Era
Wencao Sun
Internet plus has brought new opportunities and has posed challenges to college English teaching. This paper analyzes the influence of Internet on college English, and introduces new modes of college English teaching and learning in Internet plus era.
Proceedings Article
Smart Tourism via Smart Phone
Pu Liu, Yuan Liu
Smart tourism of Chinese cities try to provide tourists with all services and businesses via smart phones. This article analyzes the relationship between the smart tourism and smart city; explores the architecture of a smart tourism system, the technology application and supporting platform; focuses...
Proceedings Article
Nakagami-K Composite Channel Model in Urban-Rural Conjunction Areas
Xin Hu, Qing Luo, Weinong Wu, Wenjiang Feng
With the speeding construction process of urbanization in china, the areas with the characteristic of typical urban-rural conjunction gradually increase. Since residential areas, factory areas, farmlands are scattered randomly, varied and complex wireless communication environment is formed. Considering...
Proceedings Article
Vulnerability Analysis for Complex Networks under the Shortest Path-Attack Strategies
Yaohui Hao, Jihong Han, Qinghua Cheng, Yongjin Hu
We proposed three shortest path-attack strategies and investigated the vulnerability of three complex model networks under these path-attack strategies. The experimental results indicate that the robustness of random network is the weakest, but small-world network is the strongest under the shortest...
Proceedings Article
Trajectory Prediction Based on the Notion of Time and the Influence of Location of Historical Time Step
Fangxin Liu, Ming He, Yong Liu, Huan Zhou, Qiuli Chen
The development of wireless communication technology, sensor technology and so on, the spatial-temporal data record objects' movement that provide massive information about the activity regularity, due to the close relation between the mobile terminal and human. In this paper, we present a model of predicting...
Proceedings Article
Three-Dimensional Modeling Technology of Virtual Plant in Digital Landscape
Pu Liu, Yuan Liu, Xiaosheng Xu
Three-dimensional modeling is the foundation of graphic expression and virtual reality of digital landscape. This article explores key technologies, methods and applications of three-dimensional modeling of virtual plant in digital landscape; and classifies into manual modeling technology, program generation...
Proceedings Article
Three-Dimensional Target Tracking Based on Velocity Pursuit
Shulin Feng, Bo Yin
This paper deals with a method for pursuer to track a moving target in the three-dimensional space. The method is based on the use of the geometrical rules combined with the kinematics equations of the pursuer and the target. The maneuvers of the target are not a priori known to the pursuer. In this...
Proceedings Article
Doctoral Innovation Ability and Innovation Performance Evaluation Model
Caiyun Sun, Xiaojiang Yang, Jianjun Zhai
"Doctoral Innovation Ability" and "Innovation Performance Evaluation" are two concepts which are closely related but completely different. The research on the nature of the innovation ability and the innovation performance shall be born in mind to establish their evaluation model respectively. The evaluation...
Proceedings Article
Architecture for Personalized Service System of Logistics Business Information
Qi Zhang, Faheng Wu, Xiaogen Su, Jianxin Deng
Logistics business information plays an important role in data-driven logistics operation and optimization. However, with the increase of the collected logistics business information, the cost and time taken to search interested and right information also increase. To address this problem, this paper...
Proceedings Article
A Method of Constructing Virtual Network Based on NFV
Xiaomei Tao, Ming Chen, Xiulei Wang, Guomin Zhang, Qiao Yan
Relying too much on dedicated hardware equipment, resulting in poor flexibility and extensibility of existing communications network, while the new technology application cycle is long, seriously affect the communication operators' interest in deploying. In order to solve these problems, the new network...
Proceedings Article
Research on the Development Technology of Cross Platform Hybrid Mobile Application Based on HTML5
Qiao Yan, Guyu Hu, Guiqiang Ni, Jinsong Jiang, Junxian Long
Because there are many differences in the different operating systems of intelligent equipment, application software adaptation workload will be multiplied. Based on HTML5 cross platform development framework, such as PhoneGap, Sencha Touch, Titanium and AppCan and so on, can easily solve the cross platform...
Proceedings Article
Modeling the Steady State Throughput of SCPS-TP
Feng Liu, Shilong Liu
Space Communication Protocol Specification(SCPS)- Transport Protocol(SCPS-TP) is proposed for space environment, in which TCP/IP protocols do not work very well. In this paper we develop a simple model to analyze the steady state throughput of TP protocol. The throughput model is achieved with an approximate...
Proceedings Article
An Optimized Scheme to Resist Primary User Emulation Attacks
Jie Xiao, Yuebin Chen, Chuanxi Xing, Jiangfeng Yang, Zhenling Yang
The problem of cognitive radio (CR) network security has become an important problem in cognitive radio technology. One of the most common attacks is primary user emulation attacks (PUEA), where some malicious users simulate CR users to prevent them from accessing the vacant frequency. Here, a cooperative...
Proceedings Article
Improved Reputation of Soft Fusion Based on Cooperative Spectrum Sensing Defence SSDF Attacks
Zhenling Yang, Yuebin Chen, Chuanxi Xing, Jiangfeng Yang, Ting Zheng
Aiming at the uncertain factors about behavior of cooperative spectrum sensing technologies, the data fusion center(DFC) receives sensing information from the cognitive user(CU) indiscriminately and make spectrum sensing data falsification(SSDF) attack of a malicious user(MU) using do harm to cooperative...
Proceedings Article
Research on Incremental Updating
Guiqiang Ni, Yingzi Yan, Jinsong Jiang, Jianmin Mei, Zhilong Chen, Junxian Long
Compression and differential technology make the storage and transmission of files more efficient, and has an important role in the field of storage and synchronization. This paper introduces the development of incremental updating technology and the current major incremental updating algorithm. Dividing...
Proceedings Article
Research on Teaching Evaluation Model of Public Security Information Management Course
Liang Hu
Public security information management courses teaching quality monitoring system based on network proposed teaching network management state of mind, realizes the analysis of the data in the classroom teaching activities, formed a "evaluation, evaluation of teaching and evaluation" three assessment...
Proceedings Article
Dynamic Trust Relationship Quantization Model Based on Multiple Attribute Decision
Minsheng Tan, Miao Guo, Ting Xiang, Hui Zhao, Chencheng Wang
Dynamic trust relationship making quantization model based on multiple attribute decision has been researched in this paper. Considering the problem that all information from nodes feedback would be not true or reliable, this paper improves a new rule to calculate the feedback trust and proposes a new...
Proceedings Article
Mobile Game Design Based on Classic Cartoon
Yingfang Zhang, Siyang Lu, Yinglu Tang
Mobile electronic games with the hand-phone as the carrier have gradually become a necessary product for people's leisure and entertainment in twenty-first Century. They have become a new way to inherit the excellent traditional culture of various countries, so the design and development of the game...
Proceedings Article
Application of IOT in the Supply Chain of the Fresh Agricultural Products
Liheng Zhang
With the development of IOT and economic progress, consumers demand has great changes for fresh agricultural products. But traditional agricultural supply chain model exist problems. To achieve Information management fresh produce supply chain, To achieve intelligent production cultivate fresh produce,...
Proceedings Article
Effective Scheme for Global Abnormal Event Detection for Surveillance Video
Fangxu Dong, Dong Hu
An effective algorithm for global abnormal detection from surveillance video is proposed in this paper. The algorithm is based on sparse representation. To deal with the illumination change in video scenes, specific feature extract methods are designed for corresponding illumination conditions. In the...
Proceedings Article
The Space-Time Evolution Rules of Plastic Failure Zone in Surrounding Rock of Stope Roof with Variable Length
Xinfeng Wang, Longqin Li, Jiaqing Wu
In order to study the forming process, development trend and failure pattern of plastic zone in surrounding rock of stope roof with variable length, the analytical formula of the radius plastic zone, tangential stress and radial stress of surrounding rock were derived by using the limit equilibrium theory...
Proceedings Article
Translation Studies in the Frame of Blending
Chunmei Tong
The thesis focuses on the structure and its translation in the frame of conceptual integration, which suggests that the analysis of the ST means de-integrate the schematic structures; translation process is a bi-lateral integration of the ST and TT, both syntactically and schematically.
Proceedings Article
Adjective Roles in Estimating a Product Rating in a Product Review
Patrawadee Tanawongsuwan
This research work explores consumers' sentiments through written product reviews. Given a piece of product review, a person likely can tell how much the reviewer likes or dislikes the associated product. This likeness can translate into a numeric scale. For example, reading a product review, one can...
Proceedings Article
The Study on Lucene Based IETM Information Retrieval
Jiaju Wu, Zhenji Liu, Xinglin Zhu, Rong Yu
With the intensive and large scale application of IETM in equipment integrated support, information retrieval technology becomes one of the most key technologies. This article discusses the full-text search technology and Lucene full-text retrieval engine, and combines them to develop a high-performance...
Proceedings Article
New Data Clustering Algorithm Combined of Ant Colony Algorithm and Improved Fuzzy C-Means Algorithm
Zhiming Zhang, Guobin Wu, Jie Luo
A new clustering algorithm combined of ant colony and improved Fuzzy C-Means (AC-LFCM) was proposed to resolve the shortage of Fuzzy C-Means (FCM) clustering algorithm on the presence of sensitive to initialization, easy to fall into local optimum and neglected the influence of local information of data....
Proceedings Article
Improved MP3 Hiding Algorithm Based on Huffman Coding
Jun Ao, Rui Li, Chunbo Ma
To further increase the hiding capacity of MP3 files, an improved algorithm is proposed in this paper. Compare to previous work, this algorithm searches out additional 10 Huffman codeword pairs which meet the transparence requirements. With the newly found pairs, the hiding capacity is increased and...
Proceedings Article
Implementation of a Parallel Prefix Adder Based on Kogge-Stone Tree
Yancang Chen, Minlei Zhang, Pei Wei, Sai Sui, Yaxin Zhao, Lunguo Xie
Binary adder is an important module for microprocessors. We present a novel structure of binary adder, named Hyper-Parallel Prefix Adder (HPPA) in this paper. The basic idea of HPPA is to divide the addition into two levels, both of which are parallel prefix adder architecture. It can perfectly reduce...
Proceedings Article
Research on Interpolation Method of Random Hopped-Frequency in Synthetic Wideband Imaging
Junqun Liu, Dawei Lu, Jun Zhang
Coherent pulse synthesis is commonly used in radar receiver for random hopped-frequency processing, which key is to make the frequency point of sampling to order and uniform arrangement, and then similar to the step frequency pulse signal for subsequent signal processing. In the view of numerical analysis...
Proceedings Article
Research and Implementation of Plotting Based on MapX TrueType Font Symbol
Yongzhen Qin, Quanxing Miao, Renyuan Hu, Hu Zhao
Plotting on the electronic map be of great importance and widely used. The method to plot regular unit symbol on map with MapX TrueType font symbol is researched, and the way is realized using MapX and Visual C++. It is showed that the method is more effective and has good quality of reality and real-time...
Proceedings Article
An Improved Apriori Preserving Differential Privacy in the Framework of Spark
Zhiqiang Gao, Longjun Zhang, Renyuan Hu, Qingpeng Li, Jihua Yang
Aimed at the problem that traditional methods fail to deal with malicious attacks under arbitrary background knowledge during the process of massive data analysis, an improved Apriori algorithm preserving differential privacy, combining with Laplace mechanism to mine the pattern of sensitive information...
Proceedings Article
Research on the Application of Data Mining Technology in Teaching Effect Analysis
Lei Che
The application of data mining technology in teaching effect analysis is discussed. Firstly, the necessity of teaching effect analysis is introduced. Next, the data mining and multidimensional data analysis technology are expounded, and solutions of teaching effect analysis are proposed. Last but not...
Proceedings Article
A Frequent Itemsets Data Mining Algorithm Based on Differential Privacy
Qingpeng Li, Longjun Zhang, Haoyu Li, Wenjun Sun
Differential privacy is a new privacy protection technology, which defines a strict and strong privacy protection model, by adding noise data distortion to achieve the purpose of privacy protection. Frequent pattern mining is an important field in data mining, and its purpose is to find frequent patterns...
Proceedings Article
An Extracting Method of 2D Property Line for House Property
Yunfei Shi, Lingling Zhang
2D property line is a combined boundary line of geometry and semantics, extraction of which is basis for reconstruction of right volumes (house property). Research on extraction of property boundaries for flat-layer right volumes in the slab-type apartment buildings has been tried in this article. Besides,...
Proceedings Article
A Sound Source Tracking Method of Distributed Microphone Array
Huannan Lin, Yiwen Zhang
Distributed microphone array is composed of multiple spatial random microphone array, and this kind of way avoid the constraints of the topology of traditional microphone array, and it can perform a flexible positioning and application. Based on this, in this paper, we analyze the characteristics of...
Proceedings Article
Privacy Protection Method on Publishing Dynamic Set-Valued Data
Jian Zhang, Yu Yang
After researching many protection methods for releasing sensitive information, we found that differential privacy could provide strong guarantees on it, but it will adding too much noise and spending too much times in releasing dynamic set-valued data. To solve these problems, this paper present a privacy...
Proceedings Article
UAV 3D Mobility Model Based on Density Change Product
Rui Wang, Nan Di, Na Wang, Fangxin Liu, Qiuli Chen
The network performance of UAV airborne is closely relied on the movement of the mobile nodes which is decided by the mobility mode. And the selection of mobility model and its parameters is of great significance to the simulation results. Based on the three-dimensional Gauss Markova mobility model (3D-GMM),...
Proceedings Article
The Application of Design Structure Matrix Optimization Method Based on Genetic Algorithm
Lefeng Sun, Jing An, Hongmiao Yu
Based on the analysis the disadvantage of present research in optimization of Design Structure Matrix (DSM), the paper proposes a new algorithm of optimizing the design structure matrix, which sets up the objective optimization function, designs the way of coding, crossover, mutation based on genetic...
Proceedings Article
Spaced-Based Multi-Sensor Maneuvering Group Targets Refined Tracking Algorithm
Haipeng Wang, Xueyuan Lin, Tiantian Tang, Shuyi Jia
Aiming to solve the refined tracking problem of the maneuvering group targets with the space-based multi-sensor detections, an algorithm named multi-sensor refined tracking algorithm within maneuvering group targets based on patulous generalized S-D assignment (MSRT-MGT-PGSDA) is proposed. In this algorithm,...
Proceedings Article
Research and Application of Collaborative Filtering Algorithm Based on Hadoop
Ailing Duan, Zhixia Xu, Qiongbo Duan
In order to solve the user rating data about data sparseness and traditional similarity calculation method because of its disadvantages of strict match object attributes, combined with the project classification and cloud computing platform is put forward an improved collaborative filtering recommendation...
Proceedings Article
Community Detection in Complex Networks Using Improved Artificial Bee Colony Algorithm
Ziyang Wang, Xiaolin Zhao, Peiyuan Wen, Jingfeng Xue, Changzhen Hu
With more and more various systems in nature and society are proved to be modeled as complex networks, community detection in complex networks as a fundamental problem becomes a hot research topic in a large scale of subjects. Artificial Bee Colony Algorithm (ABC) has high efficiency and does not require...
Proceedings Article
A Novel Two-Stage PCA Algorithm for Object Tracking
Yuanyuan Yang, Dong Hu
In this paper, we propose a two-stage PCA algorithm to deal with the problem of target appearance changes in object tracking. Our method is based on particle filter framework and aims at building up a robust appearance model for the target. In the first-stage, PCA is applied on several templates collected...
Proceedings Article
An Improved Community Detection Algorithm Based on DCT and K-Means
Lin Li, Kefeng Fan, Jiezhong Gong, Hao Peng
Detecting an overlapping and hierarchical community structure can give a significant insight into structural and functional properties in complex networks. In this paper, we propose an improved algorithm to detect communities in the complex network. The proposed algorithm use discrete cosine transform...
Proceedings Article
A Joint PIC/Decoding Algorithm for Convolutionally Coded CDMA Systems
Guoxiong Xu, Feng Ji
This paper mainly explores parallel interference cancellation and decoding (PIC/decoding) algorithm for convolutionally coded DS-CDMA systems. A new joint PIC/decoding scheme is proposed and analylized, respectively. The proposed scheme is numerically simulated, and compared with other PIC/decoding algorithm...
Proceedings Article
Hardware Implementation of Radio Signals Fast Digital Detection and Demodulation Algorithms
Oleg Vyacheslavovich Chernoyarov, Alexey Nikolaevich Glushkov, Vladimir Petrovich Litvinenko, Boris Vasilyevich Matveev, Konstantin Sergeevich Kalashnikov
We are considering the capabilities and the technical features of the fast digital detection and demodulation algorithms for the signals of various modulation formats as they are realized in programmable logic devices. We show that simultaneous multitype signal processing devices can be implemented in...
Proceedings Article
The Application of Big Data Analysis Techniques and Tools in Intelligence Research
Mengru Li, Hong Fu, Ruodan Sun, Che Che
The advent of big data era has brought opportunities and challenges to intelligence research. This paper analyzes the emerging techniques of intelligence research under the big data environment, like data mining, visualization, semantic processing, etc. Meanwhile it also summarizes some new tools, such...
Proceedings Article
On the Second Descent Points for the K-Error Linear Complexity of 2n-Periodic Binary Sequences
Jianqin Zhou, Xifeng Wang, Wanquan Liu
In this paper, a constructive approach for determining CELCS (critical error linear complexity spectrum) for the k-error linear complexity distribution of 2n-periodic binary sequences is developed via the sieve method and Games-Chan algorithm. Accordingly, the second descent point (critical point) distribution...
Proceedings Article
An Enhanced Map-Based Location Service for VANET
Deling Huang, Chang Su, Yusong Yan
Position-based routing is a promising technology for VANET. And location service is the fundamental component for the success of position-based routing. A map-based location service algorithm is proposed in this paper. It uses a predesigned hash function to map a node to a certain location, where location...
Proceedings Article
Research on Text Classification Based on TextRank
Guangming Lu, Yule Xia, Jiamei Wang, Zhenling Yang
Extracting keywords from the result of word segmentation with the improved TextRank algorithm. Use the relative position of the words in the article to calculate the influence of position; the position of the coverage of the words and expressions is extended to the statement of the words and the key...
Proceedings Article
A Disordered Multiple Group Signature Scheme Based on Discrete Logarithm
Hua Huang
Based on the SCR algorithm authentication and signature, the majority can be calculated in the preprocessing phase is completed, the higher the efficiency, safety lies in the difficulty of computing discrete logarithms. Based on this algorithm and the discrete logarithm theory, we designed a multi-disorder...
Proceedings Article
An Improved Cluster Routing Structure of IOT
Zhihui Wang, Ruokun Wu, Qila Sa, Jinlin Li, Yuejiao Fan, Wenbo Xu, Yiqun Zhao
Nowadays, the Internet of things (IOT) is becoming more and more popular. Due to routing protocol easy to extend, hierarchical routing protocol, for example Low Energy Adaptive Clustering Hierarchy (LEACH) is more widely used. In order to lengthen the life of network as long as possible, an improved...
Proceedings Article
Effect of DNA Physical Characteristics to Drosophila Nucleosome Positioning
Zehua Li, Jihua Feng, Xiaowen Zhou, Huazheng Yu, Jing Chen
This thesis has done some research on Drosophila nucleosome positioning in embryonic period, found in nucleosome positioning is related to many factors, such as DNA, CG, DNA content of bending capacity distortion, DNA flip and so on, found that the size of different influencing factors on nucleosome...
Proceedings Article
New Parallel Interference Cancellation for Coded MC-DS-CDMA
Guoxiong Xu, Feng Ji
In this paper, by the application of Turbo principle, a new parallel interference cancellation and decoding (PIC/decoding) algorithm for convolutionally-coded multi-carrier DS-CDMA (MC-DS-CDMA) is proposed. We give a detailed description of the proposed algorithm, and further mathematical analysis is...
Proceedings Article
Factor Analysis on Enterprises Adopting Cloud Computing
Hsin-Pin Fu, Tien-Hsiang Chang, Tsung-Sheng Chang, Li-Chun Liu
To enhance the successful rate of enterprises adopting cloud computing, understanding factors influencing enterprises adopting cloud computing is important. Therefore, this study collects the factors affecting the use of the cloud computing service from literature review to establish a three-layer hierarchy...
Proceedings Article
Ciphertext Query Method Based on Multi-Attribute Keywords
Haoyu Li, Longjun Zhang, Qingpeng Li, Zhiqiang Gao
Following the widespread application of cloud computing, many users outsource local data to cloud server. Users encrypt their data before outsourcing makes the traditional query method failure. Aiming at the problem of slow query speed and low accuracy of ciphertext query, an improved ciphertext query...
Proceedings Article
The Construction of Power Cloud Integrated with Heterogeneous Application Service Systems
Ling Zheng, Jiangang Yao
As the smart grid develops rapidly in China, modern power system has been turning into an information system with massive and heterogeneous data. In this paper, the integration of heterogeneous service software and internet-of-things application platforms has been proposed to build private cloud for...
Proceedings Article
Improved Fully Homomorphic Encryption Algorithm for Cloud Storage
Renyuan Hu, Longjun Zhang, Yongzhen Qin
Fully homomorphic encryption has important applications in cloud storage, the cipher text retrieval and other aspects. In order to get a better fully homomorphic encryption scheme for cloud storage, an improved fully homomorphic encryption (FHE) scheme based on DGHV scheme is proposed by analyzing and...
Proceedings Article
Research on Construction of E-Government Cloud under the Background of Internet Plus
Wei Wang, Bo Liu, Gang Li
Duplication of investment, redundant construction, and the waste of resources has been the outstanding problems of construction of the domestic E-government, as the rapid development and the thorough application of the cloud computing which represent a new generation of information technology, the field...
Proceedings Article
Cloud Data Life Cycle Security Issues and Research of Encryption Technology
Nengneng Li, Yongsheng Zhang, Yueqin Fan, Liang Chang
With the further development of the cloud computing, the security of the cloud computing is becoming increasingly prominent. Based on analyzing the development status of cloud computing, this article will focus on studying the security of cloud computing in data, and discuss the data security problems...
Proceedings Article
Browser Identification Based on Encrypted Traffic
Changjiang Liu, Jiesi Han, Qiang Wei
Network traffic encryption brings security to network communication, however it also brings challenges to network monitoring. As more and more major websites use encryption protocol to protect imformation of visitors, it is a burning issue to identify client when session is encrypted. In this paper,...