Proceedings of the 2018 International Conference on Network, Communication, Computer Engineering (NCCE 2018)
201 articles
Proceedings Article
Relationship of Lane Width to Speed for Urban Expressway: A Case Study in Shanghai
Jian Sun, Taoning Li
In order to mitigate traffic congestions caused by the rapidly increased private car ownership in Shanghai, the transportation agencies implemented several strategies, such as narrowed the lane width to create additional lanes. To investigate the relationship of the lane width to speed, two month of...
Proceedings Article
Research on Airport Security Based on Virtual Queuing Theory
Yaxin Liu
Airport screening process takes too long time and people take more attention to this phenomenon and hope it to be solved. In this paper, we propose virtual queuing model in order to minimize the average waiting time, minimum waiting time variance and to ensure the airline's maximum revenue. By establishing...
Proceedings Article
Parameter Calibration of CT System
Yurui Peng
In this paper, we use the known template to calibrate the parameters of the two-dimensional CT system. The calibration of CT system includes three aspects: the location of the center of the system in the square pallet, the distance between the detector units, and the 180 directions of the X-ray used...
Proceedings Article
Study on Bottlenecks in Airport Security Process Based on Simulation
Yaxin Liu
Based on the advanced experience at home and abroad, this paper discusses the bottleneck identification method of airport security inspection process with airport security process as the research object. Firstly, we use MATLAB to establish a simulation model and introduce the number of passenger, the...
Proceedings Article
Research on How to Measure the Success of Smart Growth of a City
Yurui Peng
In this paper, we construct an evaluation metric of sustainable development called ‘Smart Growth Score’ (SGS) combining with the 3E’s and the ten principles of smart growth. This provides a clearer description of how successful a city develops smartly. We build a scoring model called “Smart Growth Score”...
Proceedings Article
Static Routing Algorithm of Nano-satellite Constellation
Yilong Shi, Xiujie Jiang, Ping Zhu, Yufeng Zhang, Meng Liu
According to the work characteristics of Nano-satellite constellation, this paper studies the configuration of it and the static routing algorithm of it. Firstly, the coverage rates of different constellation configuration are given and the constellation configuration with the best coverage is confirmed....
Proceedings Article
Research on Prevention Strategies of General Aviation Flight Accidents Based on Regression Analysis Method
Liang Zhang, Yantao Wang
Flight safety is important for the development of general aviation; this paper first analyzed the main accident types of general aviation, obtained various factors that cause general aviation flight accidents, regression analysis method was used to analyze factors data, prevention strategies of general...
Proceedings Article
Modeling the Evaluation of Human-Vehicle Interaction with Multiple Indices
Pu Li, Chunming Li, Zhiyou Fan
We herein try to improve the human-machine interaction of military vehicles, which need the evaluation model of designing user interface (UI). Current evaluation of UI depended on the measured data of a large number of users, which were time-consuming as well as lacking quantitative evaluation. And there...
Proceedings Article
Building networks with MIMO and OFDM Technology
Chengwei Hu
A multiple input multiple output (MIMO) system provides multiple independent transmission channels, thus, under certain conditions, leading to a channel capacity that increases linearly with the number of antennas. Orthogonal frequency division multiplexing (OFDM) is known as an effective technique for...
Proceedings Article
On Bipolar Possibility Fuzzy Soft Sets
Congcong Meng, Bo Hai, Hailong Yao
The concept of bipolar possibility fuzzy soft sets is proposed and some basic operations on them are defined such as complement, extended union, extended intersection, restricted union, restricted intersection, "AND","OR". Then their properties are investigated . An application of bipolar possibility...
Proceedings Article
Summary of Non-rigid 3D Shape Data Retrieval and Description
Meizhen Liu, Chunmei Duan
Non-rigid 3D shape retrieval and descriptors has become an active and important research topic in content-based 3D object . The aim of this paper is to compare and sythesize the performance of methods for non-rigid 3D shape retrieval and descriptors.This paper reviews the application of non-rigid three-dimensional...
Proceedings Article
Multimodal Image Fusion for Brain Image Based on Nonsubsampled Shearlets Transform
Na Zhang, Peiguang Wang
Multi-modal medical image fusion has been emerging as a new and promising research area due to the increasing demands in clinical application. A novel fusion rule for medical brain image fusion is proposed in this paper based on the Nonsubsampled Shearlets Transform (NSST). The functional image is converted...
Proceedings Article
Asynchronous Data Recognition Research Based on Interval Association Degree
Jing Zhao, Xin Guan, Guidong Sun, Haiqiao Liu
Aiming at the problem that the sequence data can’t be fused with the interval data in the database directly, the sequence-interval asynchronous data recognition algorithm based on interval association degree was proposed. First of all, reduce the dimension of the sequence data, use the maximum and minimum...
Proceedings Article
Research on Auto-Drawing Technology of Orthogonal Network Topological Graph with High Degree Nodes
Zhongyan Liang, Jie Hu, Qiaojin Guo
Automatic network topology drawing technology has been studied by many scholars, including straight-line layout and orthogonal layout. There are lots of toolkits to do this task, such as GraphViz and OGDF (The Open Graph Drawing Framework). However, the automatic layout results for some drawings are...
Proceedings Article
Autonomous Upper and Lower Elevator Security Robot Based on Machine Vision
Haoyang Xu, Zheming Yang, Qiuhong Jia
The security robot realizes the detection of the elevator contour and key by the machine vision algorithm, and realizes the control of the elevator door with the manipulator, so as to realize the independent elevator. On the same floor, it achieves the best path and then cruises through path planning,...
Proceedings Article
Survey of Convolutional Neural Network
Xv Zhang, Chenxi Xv, Ming Shen, Xin He, Wei Du
In recent years, the breakthrough of deep learning in the field of artificial intelligence algorithms has triggered an academic upsurge which attracted more and more researchers. As a multi-layer perceptron, the key to its success lies in the local link and weight-sharing method. On the one hand, it...
Proceedings Article
A Survey of Network Measurement in Software-Defined Networking
Lu Wang, Yan Lu
The huge size of network and diversified business characteristics make network traffic difficult to predict and manage. Network measurement is an effective way which can ensure QoS (Quality of Service) and network optimization. However, due to the differences in the implementation rules of equipment...
Proceedings Article
Big Data Privacy Protection Model Based on Multi-level Trusted System
Nan Zhang, Zehua Liu, Hongfeng Han
This paper introduces and inherit the multi-level trusted system model that solves the Trojan virus by encrypting the privacy of user data, and achieve the principle: "not to read the high priority hierarchy, not to write the hierarchy with low priority”. Thus ensuring that the low-priority data privacy...
Proceedings Article
Multi-Step Wind Speed Forecasting Using Signal Decomposing Algorithms, Bat Optimization Algorithm and Least Squares Support Vector Machine
Zhou Li, Chunxiang Li
Accurate forecasting of short term wind speed has been widely applied in the disaster early warning of civil engineering. Considering the characteristics of non-stationary and nonlinear of wind speed, the actual wind speed time series need to be decomposed first and then predicted. In this paper, a set...
Proceedings Article
Research and Implementation of Blockchain Warehouse Receipt Trading Platform Based on BFT
Jianfeng Li, Zhihong Zhang, Yuehan Zhang
For the problems of excessive centralization in information flowing, low performance in business extension, and being difficult to guard against the risk of the bill market in the traditional warehouse receipt trading system, this paper proposes a warehouse receipt trading platform based on block chain...
Proceedings Article
Study on Road Condition Recognition Method Based on Convolutional Neural Network
Feng Jiang, Ning Wei, Yan Zhou, Hengjun Niu
In recent years, frequent traffic accidents, traffic accidents captured countless people's lives, so the road safety problem attracts more and more attention of common people. This paper studies the problem of automatic recognition of road condition, the purpose is to improve the traffic information...
Proceedings Article
Mathematical Derivation and Analysis of Success Probability of Bitcoin Attack
Yingyu Pan
By using block chain technology, bitcoin has realized a real de centralization and point to point digital currency system, which effectively solved the problems of "double payment" and "curbing inflation". Bitcoin has the value and function of money, therefore, in practical application, we need to consider...
Proceedings Article
ETL Transformation Function Modeling Approach Based on Model Transformation
Yu Zhou, Yue Zhang
ETL is Extract-Transform-Load, which cleans, transforms, and integrates data according to uniform rules. At present, most of the methods for constructing ETL transformation function adopt a graphical representation method and lack precise semantic representation, which cause the computer to not automatically...
Proceedings Article
Semi-Transparent Checkerboard Calibration Method for KINECT’s Color and Depth Camera
Zhengyang Wu, Wenzhe Zhu, Qing Zhu
This article describes a method for manually calibrating KINECT color and depth cameras using a semi-transparent checkerboard, and at the same time, the two images can be modeled by 3D projection. A detailed comparison of the resulting images and data is given for the specific experimental procedure...
Proceedings Article
Continuous speech recognition model based on CTC Technology
Yumeng Wang, Jianmin Zhao
In end to end speech recognition,the linguistic knowledge such as pronunciation 1exicon is not essential??,and therefore the performance of the ASR systems based on CTC is weaker than that of the baseline.Aiming at this problem,a strategy combining the existing linguistic knowledge and the acoustic modeling...
Proceedings Article
Research on the Construction of Unstructured Data Center Based on Cloud Storage in Universities??"??"Taking Shaanxi Normal University as a Case
Qi Xu
In view of the large number of scattered and unstructured data problems in the process of comprehensive informatization in higher education, the article proposes to build a cloud storage platform to provide users with private cloud storage with high capacity and high reliability, and to exert aggregate...
Proceedings Article
Application of adaboost algorithm and immune algorithm in telecommunication fraud detection
Bing Wu, Mengtao Li, Chunlai Zhou
Fraud detection is one of the biggest challenges facing the telecommunication industry now and in the future,The fight against fraud and anti-fraud has also reached a new stage. Finding a time-sensitive fraud detection method is an important way for operators to solve this problem. In this article, To...
Proceedings Article
Recommender System for Books in University Library with Implicit Data
Guang Liu, Xu Zhao
Recommender system is a very important tool to help customers make choices more easily in a large variety of offered products. However, it is difficult to make directly use of the recommender system to provide suggestion for the traditional books in a library because of the shortage of the explicit feedback,...
Proceedings Article
Auto-Scaling Web Application in Docker Based on Gray Prediction
Shuangyan Wu, Dong Zhang, Bingheng Yan, Feng Guo, Dongpu Sheng
The on-demand use and the elastic scaling feature of cloud computing make more and more companies deploy web applications on cloud platforms. True elasticity and cost-effectiveness in the pay-per-use cloud business model, however, have not yet been achieved. To address this challenge, we propose an algorithm...
Proceedings Article
A Review of Visual tracking Technology based on Infrared Image
Shijie Ren, Xiaogang Yang, Naixin Qi
Visual tracking is a hot topic in the field of computer vision, this paper firstly describes the classification and application of visual tracking, and highlights the advantages of object tracking based on infrared image by simple comparison. Combined with the research of this technology, tracking technology...
Proceedings Article
Overview of Reverberation Chamber
Ting An, Guizhou Lv, Zhuangzhi Han, Zhiyong Liu
This paper introduces the basic concept and basic structure of the Reverberation Chamber, as well as its development process. Present situation of the theoretical research and application research on Reverberation Chamber are also introduced. It is emphasized that the Reverberation Chamber has inherent...
Proceedings Article
The Solution and Simulation of Air-to-air Missile Launch Envelope Based on Cooperative Air Combat of Manned/Unmanned Formation
Yinghao Li, Rong Fan
Considering the new air combat scenario involving manned/unmanned aerial vehicle cooperative combat formation, a simulation of air-to-air missile launch envelope based on cooperative air combat of manned/unmanned formation is built to resolve the new problem of cooperative air combat. Based on the mechanism...
Proceedings Article
Comparative Research on Automatic Classification Algorithms Based on Chinese Medical Literature
Kai An, Yunqiu Zhang, Xiaoyang Wang, Zhe Jiang, Chenglong Wang, Xiang Zhu
With the development of electronic periodicals, it is unavoidable that there are some classification management problems. But currently the classification management of papers basically majors in manual classification. Based on Chinese medical literature, this essay compares and analyzes these automatic...
Proceedings Article
Application of Improved Fireworks Algorithm Optimized SVM in Intrusion Detection
He Li, Xiang Ji, Jingmei Li
In order to further improve the effectiveness and accuracy of intrusion detection and avoid the security risks brought by network attacks, this paper proposes an intrusion detection strategy based on improved fireworks algorithms??"TFWA-SVM. This algorithm first optimizes the fireworks algorithm, constrains...
Proceedings Article
Research on the Factors of Frequent Itemset Mining Based on Dynamic Hashing
Hanyu Hu, Yunli Chen
In order to improve the efficiency of association rules mining frequent itemsets, some people proposed using hashing techniques to mine association rules, it can greatly improve the time and space efficiency of frequent item sets. the space-time efficiency of the classical Apriori algorithm and the use...
Proceedings Article
Self-healing Model Construction and Simulation of Power SDH Transmission Network
Yang Wang, Qiusheng Yu, Yidan Ren, Jianhua Cui, Lei Liu
With the rapid development of Synchronous Digital Hierarchy (SDH) technology, it has been more and more widely used in power communication networks. The power communication network has high requirements on the reliability of data transmission, and the self-healing ring has the advantages of automatic...
Proceedings Article
Research on Influence Maximization Based on Microblog Network
Yuxin Zhou, Yufeng Liu, Huanhuan Zhi
Influence maximization is an important research focus in our social network. It mainly aims at searching the most influential user node quickly and accurately in the social network. Most studies are based on the quantity of the influenced parties rather than the influence propagation scope in traditional...
Proceedings Article
A Greedy Optimization Algorithm Based on QoS in UAV Cluster Network
Wei Fu, Xinli Zhou
Due to the strong mobility of nodes, the possibility and randomness of network holes were increasing in UAV network, and the limited energy-carrying capacity of nodes leads to the limitation of cruising ability. The general geographic assistant routing protocols often failed to satisfy demand in the...
Proceedings Article
Record 579.5 km Unrepeatered 2.5Gb/s Transmission with a Span Loss of 96.8 dB by Coherent Receiving Technology
Jian Xu, Ming Li, Shujuan Sun, Han Long, Liyan Huang, Min Xiang, Qing Luo, Guoliang He
In this work we experimentally demonstrate record 579.5km commercial unrepeatered 2.5G transmission, with the first application of 2.5Gb/s polarization multiplexed quadrature phase shift keyed (PM-QPSK) format combined with a coherent receiver. Such ultra-long haul is enabled by use of Forward Error...
Proceedings Article
The Study of Mixed Storage Scheme of Private Cloud Platform Based on Ceph
Zuoyang Qu, Chenhui Xie, Chengliang Liu
Ceph is a unique unified system that supports object storage, block storage, and file storage with the characteristic of high available, manageable, and free. To build a distributed storage system based on Ceph in a private cloud environment with a high level of data privacy, it can support object storage,...
Proceedings Article
Research and application of active noise control system in vehicle
Fuchen Ding, Mingjiang Wang, Xing Wu
With the improvement of living standard, riding comfort has become an important indicator of choosing a car, but the noise in the car is the key factor affecting the ride comfort. The traditional passive noise reduction technology has a good inhibitory effect on high frequency noise, but the effect of...
Proceedings Article
Fast Affine Projection Algorithms for Simplified Structure of Multichannel Active Noise Control
Jiaming Liu, Binwen Fan, Fuchen Ding
This article focuses on the application of AP algorithms in active noise control systems. The active noise control system is a real-time tracking noise signal, which is then cancelled with an opposite signal to achieve noise reduction. Therefore, the active noise control system requires high real-time...
Proceedings Article
An Improved Hybrid Active Noise Control System
Xing Wu, Jiaming Liu, Binwen Fan
In order to achieve a good noise reduction effect in a closed space, an active noise control system was built. Hybrid control systems have faster convergence and better stability than feedforward control systems and feedback control systems. We will study feedforward, feedback and hybrid control systems....
Proceedings Article
Combining Radiomics and CNNs to Classify Benign and Malignant GIST
Tianqi Zhuo, Xin Li, Hong Zhou
This paper studies the classification of gastrointestinal stromal tumor (GIST) with machine learning and radiomics methods. The highlight of the paper is that combining features extracted from computed tomography (CT) images by radiomics and convolutional neural networks (CNNs) are used in classification...
Proceedings Article
Research and Optimization of Multichannel Wide Dynamic Compression Algorithm in Hearing Aids
Hu Chen, Mingjiang Wang, Mengyan Li, Sixue Xiang
This paper proposes a non-equal width multi-channel loudness compensation algorithm for digital hearing aids. This method achieves a non-equal width multi-channel loudness compensation scheme based on the sensitivity of the human ear to the frequency and the perception of sound intensity. First, the...
Proceedings Article
Mobile Intelligent Terminal Based on SD Card Trusted Module Credibility Enhancement and Application Mode Research
Fei Wang, Jie Qiang, Xinlai Dang
Based on the security threats faced by mobile intelligent terminals in the Internet of Things, this paper proposes a trusted enhancement framework for Android mobile intelligent terminals based on the SD card trusted module. A trustworthy computing environment including Trusted Security Management Center...
Proceedings Article
Design of the key Structure of Convolutional Neural Network Reconfigurable Accelerator Based on ASIC
Hongli Pan, Mingjiang Wang, Jingqun Li
In this paper, we propose a reconfigurable architecture that supports various convolutional neural networks (CNNs) such as GoogLeNet and AlexNet. The proposed architecture mainly includes 24 parallel PEs (processing engines) for image data convolution processing, each engine containing 9x4 MAC (multiplier-accumulator)...
Proceedings Article
Realization of Music Fountain Control system based on single Chip Microcomputer
Biqing Li, Zhao Li, Suping Jiang
With the development of society, people's living standards improve, on the side of entertainment have become increasingly demanding, musical fountain as a highly ornamental recreational facilities, increasing the public's favorite subject. According to the current development of musical fountain, this...
Proceedings Article
An Automatic Construction Approach for Sentiment Dictionary Based on Weibo Emoticons
Xiaohong Hao, Yifan Jia, Qun Gu
Different from common texts, microblog texts have large amount of emotions and net-words. Its words and sentences expression are more colloquial and network popular, so traditional sentiment dictionary does not suit for the context of modern microblog short texts. This article puts forward an approach...
Proceedings Article
Fuzzy Soft Set Multi-Attribute Decision Making Method Based on TOPSIS with Improved Entropy Weight
Yangfan Liu, Xiaohua Liu
In the process of fuzzy soft set multi-attribute decision making, and It is difficult to determine the weight of the attribute parameters which results in low efficiency of decision making. Therefore, a new method of determining the entropy weight which is calculated by the notion of the importance degree...
Proceedings Article
Study on Anti - Multiple Access Interference in Satellite Communication of GNSS Ground Station
Siyuan Liang
In the global navigation satellite system (GNSS), communication between ground monitoring stations and master control stations can be easily disturbed by the multi-access interference (MAI). This paper proposes a Kalan filtering multiuser detector method to anti MAI that can improve receiver bit error...
Proceedings Article
A Cross Ratio Invariability-based RANSAC Registration Method
Jian Liu, Wenjun Wu
To improve registration performance of machine vision under complex environment, an improved RANSAC rapid point cloud registration algorithm is presented upon the principle of cross ratio invariability for internal feature points of a registered target. By analyzing the model of a registered target,...
Proceedings Article
Development of College Newspaper Management System Based on Mobile Devices
Yuyou He, Tiejun Feng
In order to adapt to the huge impact and influence brought by the mobile networks as well as the Internet to the university newspaper, it is imperative to implement an intelligent, digitalized school newspaper management system. Based on mobile devices, the hierarchical structure of the program was designed...
Proceedings Article
Design and Research on the Test of Internal Network Penetration Test
Lei Wang
According to the increasingly serious network security problems, a complete set of internal network penetration testing method is proposed for the Windows operating system, and the key resources of the intranet are taken as the center, and a concrete solution to the protection is put forward. Finally,...
Proceedings Article
Energy Optimization Based on Big Data
Huan Li, Zhe Xu, Xiangjiang Wu
In this paper, a model is established to research the energy profile in the four states. The mainly work is the analysis on energy profile. After deleting the redundant data in the given table and supplying the missing data, we divide energy into several categories. Then, we take the sustainable energy...
Proceedings Article
Action Recognition Based on Weight BOVW
Taizhe Tan, Chuhong Li
To improve the accuracy and robustness of human action recognition, a kind of human action recognition algorithm based on the weighing bad-of-word model was put forward. The features extracted from video sequences through existing algorithms contained HOG feature, HOF feature, and MBH feature, and relevant...
Proceedings Article
Research on Credibility of Agricultural Information Based on Information Source
Yuyi Zhang, Yayao Zuo
Nowadays, there is a huge amount of webpage information on the Internet, which quality is uneven, and the Internet is full of all kinds of information that is hard to distinguish. In order to solve the credibility problem of agricultural web information, this paper proposes a model to establish the relationship...
Proceedings Article
Research on urban intelligent growth--taking Karamay and Wellington as examples
Zhedong Hu
The growth of urban intelligence relies on the deep integration of economic prosperity, environmental sustainability and social equity, so the establishment of a rational urban intelligence evaluation model has far-reaching impact on the development of a city. This paper evaluates the development of...
Proceedings Article
Bidirectional LSTM-CRF Model and POS for Article Title Summarization
Xiaofeng Cai, Zhifeng Hao
In this paper, we propose a method based on Bidirectional LSTM-CRF for article title summarization. And for the summary generated by the model is not compliant with the grammar rules problem, we use POS (Part of Speech) to revise the generated summary. In order to verity our method, we conducted an experiment...
Proceedings Article
Research on Handwriting Recognition Algorithm Based on Convolution Neural Network
Pengfei Hu, Hao Tang
Since Geoffrey Hinton first proposed the concept of deep learning in 2006, which in Reducing the dimensionality of data with neural networks, deep learning has been the continuous concern of the researchers. Deep learning uses a multi-layer neural network to simulate the multi-layer abstract learning...
Proceedings Article
A Mixed Resonating Modes Filter with Enhanced Stopband Performance
Liu He, Xingjian Zhong, Dexin Qu
In this paper, a filter of order five with enhanced stopband performance using mixed mode resonators is designed. Using different resonating mode resonators is to obtain different harmonic frequencies so that harmonics of the designed filter could be suppressed while keeping the same dominant frequency...
Proceedings Article
Physical Computing Resource Scheduling on Distributed Stream Processing System
Kailin Tang
Recently, distributed stream computing has emerged as a popular model for real-time data stream analytics. This paper focuses on computing resources scheduling of distributed stream processing. To adapt to the fluctuation of data stream, distributed stream processing system must elastically provision...
Proceedings Article
3D Hand Trajectory Recognition with H-ELM
Jingjing Gao, Yinwei Zhan
In this paper, we present a method to extract features of dynamic gestures and use the Hierarchical Extreme Learning Machine (H-ELM) for gesture recognition. We use a Kinect sensor to record the motion of the three joint points of palm, wrist and elbow. The relation among the three trajectories is extracted...
Proceedings Article
Chinese Short Text Summary Generation Model Combining Global and Local Information
Guanqin Chen
Short text comprehension summary generation is currently a hot issue. In this paper, we improve the attention mechanism under the framework of encoder-decoder and proposes a comprehensible short text abstract generation model that integrates the global and local semantic information. The model consists...
Proceedings Article
Fast Deformation Part Model with CNN for Face Detection
Canzhang Guo, Yinwei Zhan
This paper proposes a fast deformation part model (DPM) with neural network (FDPDPM) for face detection. It can make fully use of the advantage of high level feature and classifier with spatial location information. In fact, this paper uses a truncated the variant of VVGNET and a pyramid of multi-scale...
Proceedings Article
Chinese Short Text Summary Generation Model Integrating Multi-Level Semantic Information
Guanqin Chen
Short text information is less, and short text comprehension abstract generation is currently a hot and difficult issue. We proposed an understanding-based short text summary generation model that combines multi-level semantic information. We improved the structure of encoder in the framework of encoder-decoder...
Proceedings Article
The Restoration of Style Chinese Characters Based on Deep Learning
Da Lv, Yijun Liu
For the image inpainting using incomplete Chinese characters proposed a new method for Chinese characters repair, the first use of U-Net type network structure combining the training method of generating against network design a style Chinese characters converter, and then repair the missing content...
Proceedings Article
A Fast FFT-Based Iterative Algorithm for Image Deblurring With Anti-Reflective Boundary Conditions
Xun Chen, Qi Zhu
In this paper we consider the image deploring problem with space invariant PSFs under anti-reflecting boundary conditions. Under the assumption that PSFs are strongly symmetric and boundary values of image are homogeneous, the image deploring problem is transformed to the circular DE convolution problem...
Proceedings Article
The Technology and Implementation of Automatic Identification of Sensors Based on Semantic IoT
Dufang Fan, Xiushan Zhang, Jian Huang
With the development of semantic Internet of Things, there are many smart applications and services springing up in different domains. However, the gap between semantic representations and various sensor data formats used in IoT devices raises doubts and challenges for us. This paper aims to convert...
Proceedings Article
Image Retrieval Based On ResNet and KSH
Jinyun Lu
Hashing have has been successfully applied to different methods regarding a wide range of problems. It is fairly very effective for large-scale image retrieval in reducing the processing time. Although a number of hashing methods have been developed in recent years. Most of them the methods are based...
Proceedings Article
Exploration of the Forecast of Interbank Borrowing Rate Based on Artificial Intelligence
Ming Lu, Ning Yao, Xinxi Lu
In order to ensure the stability in financial markets and the position in international financial market game of China, this paper uses the method of artificial intelligence to research and forecast the interbank interest rates of banking industry, which is from the time dimension of the day wave. According...
Proceedings Article
HID Architecture and Design in Embedded USB Host System
Xin Li, Junchen You, Xinyi Zhou, Rentai Chen, Ci Tang
Universal Serial Bus (USB) is a personal computer interconnection protocol, developed to make the connection of peripheral devices to a computer easier and more efficient. USB has become the dominant standard for plug-and-play connections between personal computers and peripherals. USB connectivity has...
Proceedings Article
Study on Sparsity of Recommender System in University Library
Xu Zhao, Guang Liu
Due to the lack of readers’ rating data, university library recommender system is facing the problem of sparsity of data. This study proposes a general logarithmic transformation model which can convert the reader’s implicit feedback data to the rating, thus alleviating the sparsity to a certain extent....
Proceedings Article
Research on the Image Segmentation based on Improved Region Extractions
Yi Zhang, Xiuting Yang
Image segmentation is one of the classic methods of image signal processing. It is widely used in the scientific research, biomedical engineering, military guidance and so on. Based on the region extraction, this paper introduces three typical image segmentation methods: region growth algorithm, watershed...
Proceedings Article
Study on College Attendance Platform Based on Bluetooth Technology and Android Platform
Jie Xiong
To improve the efficiency of classroom attendance check, a college attendance platform based on Bluetooth technology and Android platform is put forward to quickly check the attendance at classroom by scanning the Bluetooth address of students’ mobile phones. The teacher may check the attendance manually...
Proceedings Article
Research on Modeling of Equipment Support Data Requirements Based on Activities
Jian Wang, Ping Gu
According to the characteristics of equipment support activities, this paper puts forward the idea of equipment support data requirements modeling, which is "activity-oriented and process-oriented". Firstly, the relationship between equipment support tasks, functions and activities is analyzed. Based...
Proceedings Article
Anti-Occlusion Tracking Method Based on Kernel Correlation Filter
Weichuang Jiang, Fuxing Zhang
In the real scene, the target itself and the background will be unpredictable changes, such as the occlusion and other factors will bring greater challenges to the object tracking. In this paper, we proposed a method that handle the occlusion based on Kernel Correlation Filters (KCFFR, KCF with forward...
Proceedings Article
Detection of Glue Spray on Bottom of Vehicle Based on Machine Vision
Dongyang Liu, Jindong Zhang, Xiaofeng Zhang, Xiaoyu Ma, Yuxin Kou
With the continuous development of machine vision, intelligent detection of bottom spray glue has gradually become a reality. In this paper, we proposed an algorithm of detection the glue spray on bottom of vehicle based on machine vision. By sampling and detecting the spray interest area, the algorithm...
Proceedings Article
Research on Text Classification Based on Improved TF-IDF Algorithm
Huilong Fan, Yongbin Qin
In solving the problem of feature weight calculation for automatic text classification, we use the most widely used TF-IDF algorithm. Although the algorithm is widely used, there is a problem that the feature categories have different weights when calculating the weights. This paper proposes an improved...
Proceedings Article
The vehicle audio encryption system based on scrambling thought
Peibin Wu, Jindong Zhang, Yang Liu, Dongqi Han, Yiding Sun
In this paper, the vehicle audio encryption system based on scrambling thought and applied to vehicle-mounted media is proposed. The pseudo random number is generated each time it is encrypted, and it is substituted into the Fibonacci transform to generate a key with variable length. The audio data is...
Proceedings Article
A Fetal Heart Sound Signal De-Noising Approach Based on VMD and JADE Algorithm
Zhiwei Nie
A de-nosing approach is needed to eliminate the maternal heart sound and internal noise in the acquired fetal heart sound signal, but blind separation algorithm, as a conventional approach, does not perform well in the de-noising of fetal heart sound. Hence, a new fetal heart sound de-noising approach...
Proceedings Article
Research on Plant Classification Based on Convolutional Neural Network
Zhe Wei
Reviewing the shortcomings of plant classification methods in recent years. The advantages of convolutional neural networks in image classification are briefly described. In order to classify plants simply and efficiently, a plant recognition method based on convolutional neural network was proposed....
Proceedings Article
Research on Image Network Retrieval Application Based on Swarm Optimization Algorithm
Qingpeng Nie
The traditional image retrieval adopts a text-based method, which requires a lot of manual annotation of the images in the image library and matches according to the keywords when searching. Already not suitable for the modern image network retrieval, this paper proposes a network model based on the...
Proceedings Article
Live Video Streaming Authentication for Vehicle Multimedia based on Merkle Tree
Dongqi Han, Jindong Zhang, Yang Liu, Peibin Wu, Yiding Sun
Merkle tree has been widely applied in the field of P2P transmission. In this paper, an efficient authentication scheme is proposed in the integrity check module for vehicle live video streaming system by optimizing the construction and verification of the Merkle tree. It can create and check nodes at...
Proceedings Article
An Improved Pricing of Taking Photos and Making Money Model Based on SVM and Clustering
Yujie Ren
The aim of this study is to improve the imbalance pricing problems of Self-service package platform based on mobile Internet. The primary emphasis in this paper is on improving the completion of the to-do task. Based on the pricing established by factor analysis and regression equation, the author adopts...
Proceedings Article
Mobile Monitoring System for Gas Sampling Based on Zigbee, 4G and Web GIS
Zhanying Zhang, Congcong Du, Yang Liu, Lixia Han
For the realization of the real-time collection, upload, visualization and intelligent management of air quality data, mobile management system of gas sampling was designed based on the technologies including Web GIS, ZigBee wireless sensor network, the 4G (4th generation) communication system and so...
Proceedings Article
Mail Scheme Log Processing Based on ELK
Bu Yun
With the continuous development of Internet technology, how to deal with and analyze a large number of data has become a hot spot. The mail system generates a large number of logs every day, and the traditional technology is not efficient in handling huge log data and is unable to make use of the information...
Proceedings Article
Design and Implementation of Private Owner Code Region in Memory Protection Unit
Bo Qian, Weiping Jing, Bin Jiang
Embedded systems often use a number of multitasking operations and controls, these systems must have a mechanism to ensure the implementation of the current task, so that it has no effect on other tasks, that is, to prevent the system's resources and tasks are accessed illegally. There are usually two...
Proceedings Article
Derivation and Development of Noise Channel Information Transmission Capacity
Yutong Li
In this paper, we derive one of Shannon's theorems, the maximum capacity theorem of noisy channels :. The derivation of noisy continuous channel capacity is based on the derivation of discrete channels and most of the conclusions are a limit discretization of the corresponding theorems of discrete channels....
Proceedings Article
Auto Image Classification Based on Convolution Neural Network
Yong Wang, Dongdong Shen, Ying Wang
Aiming at the low accuracy of vehicle image retrieval algorithm based on deep learning, an improved vehicle image classification retrieval model based on convolutional neural network is proposed. According to the complexity of the car image, using convolution neural network to extract the image features...
Proceedings Article
A Classification Diagnosis of Liver Medical Data Based on Various Artificial Neural Networks
Yong Qi, Haozhe Liu, Wentian Zhang, Qiaosheng Zhu, Zhijian Zhao
This paper presents a method for the identification and classification of medical data of hepatic pathological changes by using SVM FNN and KNN. The liver lesion classifier is a neural network model trained by experts’ hand-divided samples and cross-validated to optimize the results. It can achieve better...
Proceedings Article
Convolutional Neural Network for Retrieval of Supervised Footwear Images
Yong Wang, Dongdong Shen, Ying Wang
With the progress of science, the traditional image retrieval technology no longer applies in terms of accuracy and retrieval speed. The emergence of big data and GPU has laid a solid foundation for the development of deep learning. However, the emergence of big data also means that the data is noisy...
Proceedings Article
A Classification Diagnosis of Cervical Cancer Medical Data Based on Various Artificial Neural Networks
Yong Qi, Zhijian Zhao, Lizeqing Zhang, Haozhe Liu, Kai Lei
This paper mainly proposed to identify and classify the medical data of cervical cancer using neural network models such as SVM, FNN, KNN and so on. The computer recognition algorithm can overcome the deficiency that artificial identification tends to be affected by cognitive ability, subjective experience...
Proceedings Article
Improvement and Implementation of Feature Weighting Algorithm TF-IDF in Text Classification
Weisi Dai
Based on the introduction of the traditional feature weighting algorithm TF-IDF, based on the phenomenon that the eigenvalue extraction is not effective when the text to be classified is not uniform, an improved TF-IDF algorithm is proposed in this paper, which considers the uneven text distribution...
Proceedings Article
Chaos Encryption Algorithm Based on Kent Mapping and AES Combination
Yong Wang, Shuo Chen, Ying Wang
Aiming at the application of a class of image encryption algorithm based on chaotic system, a chaotic image encryption algorithm based on Kent mapping and AES (Advanced Encryption Standard) encryption algorithm is proposed. Firstly, an initial condition is defined and a parameter related to plaintext...
Proceedings Article
Multi-hop Attenuation of HF Radio
Xin Qiao
High frequency (HF) propagation can achieve long distance, low cost communications and it is one of the most important communication methods. The focus of this research is to develop an appropriate mathematical model for HF radio waves to communicate efficiently over various surface of the earth. First...
Proceedings Article
Study on the Credibility Based on the Features of Agricultural Information
Yuyi Zhang, Yayao Zuo, Xiaobang Chen
This paper based on agricultural information with timeliness, regional and other complex factors, proposed a method based on the features of agricultural webpage information to classify the credibility of agricultural webpage information. By constructing the model of the relationship between the features...
Proceedings Article
An Improved HBase Load Balancing Algorithm
Wei Xin
This article briefly introduced the origin and development of distributed database, HBase in detail the load balancing problem and the original load balancing algorithm. The original load balancing algorithm considers only the space usage load of each node in the cluster, does not consider the hot spot...
Proceedings Article
Research of Website Community Identification Based on Node2vec
Yang Xiao, Jun Liu
In recent years, the world has witnessed massive growth in the field of information technology and intelligent device, giving rise to exponentially expansion of internet websites in terms of quantity as well as complexity. Meanwhile, the public has also enlarged demand for characteristic analysis of...
Proceedings Article
Hopfield Neural Network and AES Combined with Hyperchaos Image Encryption Algorithm
Yong Wang, Shuo Chen, Ying Wang
By analyzing the current image encryption algorithm based on a class of artificial neural network in recent years, this paper proposes a new hyperchaotic image encryption algorithm based on 4D of Hopfield-type neural network and AES(Advanced Encryption Standard) encryption algorithm, First, defines four...