scispace - formally typeset
Search or ask a question

Showing papers presented at "International Conference on Measuring Technology and Mechatronics Automation in 2015"


Proceedings ArticleDOI
13 Jun 2015
TL;DR: This paper puts forward a dynamic flow table design algorithm which does not only effectively avoid excessive number of flow tables, and better solve the defect that flow table matching range is too wide, experiments show that the algorithm has good feasibility and higher traffic scheduling performance of network.
Abstract: Server load balancing based on SDN compared with the traditional load balancing method, can effectively improve the performance of the server load balancing, and reduce the complexity of implementation. Open flow is south interface protocol of SDN switch. The core of server load balancing based on SDN is dynamic building Open flow flow tables. This paper puts forward a dynamic flow table design algorithm which based on "single flow table" and "group flow table" combination, "Single flow table" can accurately monitor traffic of each client, "Group flow table" can effectively category client hosts. This algorithm does not only effectively avoid excessive number of flow tables, and better solve the defect that flow table matching range is too wide, experiments show that the algorithm has good feasibility and higher traffic scheduling performance of network.

44 citations


Proceedings ArticleDOI
13 Jun 2015
TL;DR: The framework of the new platform middleware layer of the unified Internet of Things operation management system framework uses the cloud computing technology, which greatly improves the operating efficiency of the Internet of things.
Abstract: Importance and development advantage of the Internet of Things industry chain is discussed. The basic ideas and methods of the combination of cloud computing and the Internet of things are described. Combined with cloud computing, the unified Internet of Things operation management system framework is established. The framework of the new platform middleware layer uses the cloud computing technology, which greatly improves the operating efficiency of the Internet of things. Based on the framework, Internet of Things business operations platform construction scheme is proposed, it can be used as reference of the construction of the Internet of things platform design.

29 citations


Proceedings ArticleDOI
13 Jun 2015
TL;DR: The network security technologies are introduced mainly in detail, including authentication, data encryption technology, firewall technology, intrusion detection system (IDS), antivirus technology and virtual private network (VPN).
Abstract: The rapid development of computer network system brings both a great convenience and new security threats for users. Network security problem generally includes network system security and data security. Specifically, it refers to the reliability of network system, confidentiality, integrity and availability of data information in the system. Network security problem exists through all the layers of the computer network, and the network security objective is to maintain the confidentiality, authenticity, integrity, dependability, availability and audit-ability of the network. This paper introduces the network security technologies mainly in detail, including authentication, data encryption technology, firewall technology, intrusion detection system (IDS), antivirus technology and virtual private network (VPN). Network security problem is related to every network user, so we should put a high value upon network security, try to prevent hostile attacks and ensure the network security.

21 citations


Proceedings ArticleDOI
13 Jun 2015
TL;DR: Through analysis and study on the system's characteristics optimizing strategy of the Hadoop Platform, the paper provides TLI(Task Locality Improvement) Scheduler, a scheduler that is optimized for task locality and the performance is improved.
Abstract: As the Hadoop Platform is being more extensively applied on Big Date Processing, Distributed Computing, Cloud Computing etc., the greater performance of it is required. This paper focuses on the insufficient thought for task locality of the default FIFO Scheduler by the Hadoop Platform. And through analysis and study on the system's characteristics optimizing strategy of the Hadoop Platform, the paper provides TLI(Task Locality Improvement) Scheduler. According to the probability's threshold level of the task locality, the jobs shall be set a processed to several job queues. As above the threshold level, the FIFO Scheduler shall be adopted, conversely, the TLI Scheduler shall be applied. For the scheduling tasks, they will be locally executed immediately as the local node is idle, Or they will be executed until the local node is idle. Therefore, the task locality is optimized and the performance is improved. The experiment proofs the task locality improved to 98.0% and the time performance improved 10.9%.

13 citations


Proceedings ArticleDOI
13 Jun 2015
TL;DR: Preliminary results indicated that electrical stimulation on the upper limb skin for tactile feedback is a promising means to provide a replacement of sensory information to the individual wearing a prosthetic limb, which is of great importance for improving task performance.
Abstract: Prosthetic limbs with sensory feedback can make amputees feel the prosthetics as a part of their own body. Feedback systems relying on electro tactile cutaneous stimulation could create sensory patterns similar to those in a natural sensation. In this study, we are investigating the perceptual attributes of electrical stimulation in a region of upper limb skin that might serve as a candidate site for electro tactile stimulation. Preliminary results indicated that electrical stimulation on the upper limb skin for tactile feedback is a promising means to provide a replacement of sensory information to the individual wearing a prosthetic limb, which is of great importance for improving task performance. Stimulation patterns should also be considered not only to produce appropriate sensation but also to evoke effective motor function.

11 citations


Proceedings ArticleDOI
13 Jun 2015
TL;DR: In this paper, the authors mainly analyzed the characteristics of the virtual reality technology and its application in the combination with the sports training, and finally they researched on the necessity of introducing the computer VR technology into the college sports training and its future trend in development, in order to improve the technical content, and the effectiveness of college sport training.
Abstract: At present, to introduce the computer virtual reality technology into the college sports training has become a trend of PE teaching and sports training in every college. Especially the multimedia technology, it makes the college sports virtual training become more realistic. Based on the virtual reality technology as the research object, here mainly analyzes the characteristics of the virtual reality technology and its application in the combination with the sports training. And finally, it researches on the necessity of introducing the computer virtual reality technology into the college sports training and its future trend in development, in order to improve the technical content, and the effectiveness of college sports training.

9 citations


Proceedings ArticleDOI
13 Jun 2015
TL;DR: The execution efficiency of the optimized parallel heap sort algorithm of this paper is improved significantly compared with the traditional serial heapsort algorithm on the experimental computer and the efficiency gap between the two algorithms will be intensified prominently with the increasing data quantity.
Abstract: With the popularity of multi-core and many-core platform, multi-core-oriented parallel programming and optimization has become a research hotspot in computer field. However, the vast majority of programmers are still continuing the traditional serial programming habits. Meanwhile, the mainstream algorithms are still in serial. Therefore, how to parallelize the serial programs effectively and write the multi-core programs efficiently is becoming an urgent problem in the field of multi-core programming. In this paper, the optimization of the heap sort algorithm has been achieved adopting the parallel technology based on openMP. Firstly, based on the hypercube model, the heap data to be sorted are divided into n (n is the computer thread amount) blocks called sub-heap which will be sorted respectively. Thus, the scale of the problem is decomposed into 1/n, secondly, the sorted sub-heaps will be merged using merge sort algorithm, finally, the parallel optimized heap sort algorithm is compared to the traditional heap sort algorithm. When the data quantity comes up to ten million bytes, the execution efficiency of the optimized parallel heap sort algorithm of this paper is improved significantly compared with the traditional serial heap sort algorithm on the experimental computer. Furthermore, the efficiency gap between the two algorithms will be intensified prominently with the increasing data quantity.

8 citations


Proceedings ArticleDOI
13 Jun 2015
TL;DR: A Smart Shopping System based on NFC Technology is proposed, which includes technical support of mobile applications, and users will be able to conduct a series of actions like product searching, pre-ordering and online payment on the mobile app.
Abstract: The fusion of online and offline trading has become a significant pivot point of the Internet Era. Under the existing operation structure of supermarkets, this article aims to propose a Smart Shopping System based on NFC Technology. This system includes technical support of mobile applications, and users will be able to conduct a series of actions like product searching, pre-ordering and online payment on the mobile app. With NFC users can even pay the bills without credit card which would simplify the purchasing process. This article also proposed a corresponding management platform aiming to optimize the service and administration of the supermarket, which fits the emerging trend of O2O business mode.

8 citations


Proceedings ArticleDOI
13 Jun 2015
TL;DR: The design and development process of the intelligent tour guide system based on android mobile terminal, which meets the personalized needs of tourists is elaborate.
Abstract: In recent years, the rapid development of smart phone and mobile internet technology has provided good platform and opportunity for electronic guide application. The appearance of intelligent tour guide system not only makes up the deficiency of traditional tour guide service, but also meets the personalized needs of tourists. In this paper, we mainly elaborate the design and development process of the intelligent tour guide system based on android mobile terminal.

8 citations


Proceedings ArticleDOI
13 Jun 2015
TL;DR: The main innovations of this paper lie in the following aspects: a high inertia weight is used to find new searching space, and inertia weight decreases in terms of paths of different values of particle number after executing the max number of iterations.
Abstract: This paper concentrates on the problem of embedded database query optimization, which is a crucial problem in embedded system design. Firstly, we describe the structure of the embedded database system, in which the database engine is a key module in the database system, and it can ensure the database system correctly and efficiently work. Secondly, the embedded database query optimization algorithm based on an improved particle swarm optimization is given. The main innovations of this paper lie in the following aspects: 1) a high inertia weight is used to find new searching space, 2) inertia weight decreases in terms of paths of different values of particle number, 3) final inertia weight is obtained after executing the max number of iterations. Thirdly, to test the effectiveness of our algorithm, we construct an experimental embedded system platform. Compared with the B+Tree, our proposed algorithm can achieve better performance in both space utilization and time cost.

8 citations


Proceedings ArticleDOI
13 Jun 2015
TL;DR: According to various kinds of attacks in wireless sensor networks, the author made a comprehensive analysis and put forward the design of security architecture of WSN and the corresponding specific defense means.
Abstract: As wireless sensor network (WSN) become an emerging field of application, its security problem has also become a researched focus. This paper introduces the architecture and the application advantages of WSN, and points out its security flaws. According to various kinds of attacks in wireless sensor networks, the author made a comprehensive analysis and put forward the design of security architecture of WSN and the corresponding specific defense means.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: In this article, Fourier transform infrared spectroscopy (FTIR) was used to characterize chitosans and the effect of antibacterial activities was explored by optical density and counting the colony forming unit (CFU).
Abstract: Ten different molecular weights chitosan (range from 5.5×104 Da to 15.5×104 Da) with the same degree of deacetylation (DDA) were obtained by the method of acetic acid hydrolyzing. Chitosans were characterized by Fourier transform infrared spectroscopy (FTIR). The effect of antibacterial activities of chitosans was explored by the methods of optical density and counting the colony forming unit (CFU). The middle molecular weights chitosan (range from 8.8×104 Da to 9.0×104 Da) have higher activities than high molecular weight (15.5×104 Da) and low molecular weight chitosans (5.5×104 Da). All the chitosan at the concentration from 0.005% to 0.01% have better antibacterial activity than at the concentration from 0.001% to 0.002% and from 0.02% to 0.05%. The antimicrobial mechanism was presumed that chitosan bind to the outer member of the spoilage yeast to cause surface of the yeast altering and flocculating.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: Experiments show that the proposed algorithm can effectively enhance the visual effect of ultrasound images and remove noise, and has certain application value and significance.
Abstract: Medical ultrasound image enhancement and denoising has been an important subject of medical image processing. Aiming at the shortcomings of the traditional ultrasonic image enhancement processing algorithm, this paper proposes a kind of ultrasonic image enhancement and denoising algorithm based on wavelet analysis theory and fuzzy theory, first of all for medical ultrasound images logarithmic transform, transform multiplicative noise into additive noise, Then multi-scale wavelet transform, the ultrasonic image to get images of high frequency and low frequency wavelet coefficients, Low frequency coefficient enhanced in the fuzzy domain, the high frequency coefficients of wavelet soft threshold denoising, The last of the enhanced image is obtained by wavelet reconstruction. Experiments show that the proposed algorithm can effectively enhance the visual effect of ultrasound images and remove noise, and has certain application value and significance.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: The theory of digital image pre-processing and segmentation technology, and image processing technology and the division of specific operation is expounded.
Abstract: In the field of digital image, image pre-processing and segmentation technology is one of the main object of study, this also is the current market and users of digital image using the proposed new requirements. To explore a kind of efficient image pre-processing and effective image segmentation technology, the widespread application of digital image is very favorable. This article mainly expounds theory of digital image pre-processing and segmentation technology, and image processing technology and the division of specific operation.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: In this article, a system of credit risk assessment which contains five aspects including 25 indicators is proposed, empirical analysis is carried out and the result shows this model has high accuracy of predication, better reliability and strong assessment ability.
Abstract: As the core link and an important content, credit risk assessment plays vital special role for moderate operation of commercial banks. It is important to work out credit risk assessment model of commercial banks. A system of credit risk assessment which contains five aspects including 25 indicators is proposed. Based on establishment of credit risk assessment model, empirical analysis is carried out. The result shows this model has high accuracy of predication, better reliability and strong assessment ability.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: The distributed intelligent greenhouse computerized control system has been researched and it is composed of center computer and single-chip microprocessor as its control core and intelligent decision-making module.
Abstract: Aimed at the need of fully-automatically control of agricultural control system, the distributed intelligent greenhouse computerized control system has been researched It is composed of center computer and single-chip microprocessor as its control core Based on artificial intelligence and expert system knowledge database, the greenhouse environmental factors are adjusted in time with the help of real-time inspect ion and intelligent decision-making module Furthermore, optimized growing conditions o f crops will be created The whole system is composed of environmental factors inspection module, intelligent decision-making module, data processing module, database management module, irrigation control module The system owns many advantages such as intelligent decision-making, convenient operation Besides, it is easy to extend and update This system has been realized as a product

Proceedings ArticleDOI
Jiajia Yu1, Mei Zuo1
13 Jun 2015
TL;DR: The results of the video test suggest that the proposed algorithm has higher efficiency and accuracy as well as better robustness against illumination condition change and adjacent moving shadow comparing to the traditional approach.
Abstract: A novel algorithm for video-based traffic monitoring of multi-lane road using multiple statistical parameters is proposed to tackle the illumination condition change and adjacent moving shadow problems. This algorithm uses normalized cross correlation (NCC) of the traffic video image as the main detecting feature along with the homogeneity based parameter as the secondary parameter. The traffic flow is calculated based on the decrease-increase variation of the main detecting feature in the observation window. Blocking processing and homogeneity feature are employed to distinguish the shadow and vehicle. The results of the video test suggest that the proposed algorithm has higher efficiency and accuracy as well as better robustness against illumination condition change and adjacent moving shadow comparing to the traditional approach.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: There are lots of traffic accidents on the freeway in Jilin Province, according to the characteristics, combining with qualitative and quantitative analysis, the paper analyzes 2010-2013 traffic accidents data of Chang Yu freeway and identifies 10 accident black spots.
Abstract: There are lots of traffic accidents on the freeway in Jilin Province, according to the characteristics, combining with qualitative and quantitative analysis, the paper analyzes 2010-2013 traffic accidents data of Chang Yu freeway in Jilin Province. Based on analyzing accident black spot using the Quality Control Method, 9 accident black spots in upward direction and 8 accident black spots in downward direction are identified, and the result is reasonable.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: Experimental results showed that denoising method proposed in the paper can effectively eliminate the noise in the image with good edge information protection and visual effect.
Abstract: Wavelet theory has been developed rapidly in recent years, which has increasingly wide application in image denoising. It is very important to select threshold function and threshold in wavelet threshold denoising algorithm. Different selections will affect the denoising effect directly. In the paper, traditional soft and hard threshold functions were further analyzed and studied, advantages of denoising performances in both soft and hard threshold functions were combined for proposing an improved threshold function. Threshold proposed by Donoho was improved according to characteristics of wavelet decomposition layers and noise wavelet coefficient in the paper. Different wavelet basis and decomposition layers were compared in order to optimize simulation results in the paper. Then, appropriate wavelet basis and decomposition layers were selected for experiment. The experimental results showed that denoising method proposed in the paper can effectively eliminate the noise in the image with good edge information protection and visual effect.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: A intelligent intrusion detection model is proposed based on the characteristics of global superiority of genetic algorithm and locality of nerve, the model optimizes the weights of the neural network using genetic algorithm.
Abstract: Aiming at false negative rate and false alart rate which exist generally in the intrusion detection system, a intelligent intrusion detection model is proposed in this paper. Based on the characteristics of global superiority of genetic algorithm and locality of nerve, the model optimizes the weights of the neural network using genetic algorithm. Experiment results show that the intelligent way can improve the efficiency of the intrusion detection.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: It was found that ITS in China has a promising future despite the rapid urbanization and motorization and has made significant progresses in the areas of research and applications.
Abstract: Intelligent Transportation Systems (ITS) have been developed for more than 2 decades in China Furthermore, a new generation Intelligent Transportation Systems should be launched to meet the requirement of improving road network capacity, improving traffic safety, ameliorating the road congestion, and reducing vehicle emission This paper reviews the development of Intelligent Transport Systems in China including its development histories, investment mode and applications Secondly, this paper introduces the current main research areas about ITS in China Finally, the prospect of ITS is described, and the issues and challenges about ITS in China and its proposed solution schemes are also discussed It was found that ITS has made significant progresses in the areas of research and applications ITS in China has a promising future despite the rapid urbanization and motorization

Proceedings ArticleDOI
13 Jun 2015
TL;DR: The experimental results show that the method proposed in this paper can significantly improve the effect of Chinese new word identification.
Abstract: New word identification is one of the difficult problems of Chinese information processing In order to improve the efficiency of new word recognition, this paper proposed a new method to identify new word based on micro-blog message's characteristic First of all, the micro-blog message is segmented by using N-Gram, then we filter the candidate strings to obtain the candidate words, finally we construct an objective function based on characteristics of micro-blog message to identify new word Compared with other new word identification methods, the experimental results show that the method proposed in this paper can significantly improve the effect of Chinese new word identification

Proceedings ArticleDOI
13 Jun 2015
TL;DR: A intrusion detection system based on BP neural network is proposed to solve the problems of the high miss rate and error rate, slow training process and low detection efficiency problems.
Abstract: Based on the research of the traditional intrusion detection technology analysis, statistical model for the formation of the rule base, management and the ability of intrusion detection and so on there are still some deficiencies and defects, due to the actual test result can not meet the requirements. This article is based on the traditional intrusion detection system in the high miss rate and error rate, slow training process and low detection efficiency problems to be solved, this paper proposes a intrusion detection system based on BP neural network.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: Experiments show that improvement program technology not only ensures the message security of the transmission and the security distribution of keys, but also it doesn't reduce the efficiency of encryption and decryption data.
Abstract: According to the security problems that may exist when the users transport the sensitive data on the network, this paper tries to optimize and specify the user's encryption processing for the sensitive data Then we propose a strategy using double encryption technology, and combined with the check of messages technology, to ensure that the users' data transport safe and effective The client generates symmetric key and message digest, and set them add behind the message encrypted transmission together It ensures that the user data be security and integrity It also uses the double encryption technology to encrypt symmetric key once again, which ensures the security of key transmission Experiments show that improvement program technology not only ensures the message security of the transmission and the security distribution of keys, but also it doesn't reduce the efficiency of encryption and decryption data

Proceedings ArticleDOI
Jiajia Yu1, Mei Zuo1
13 Jun 2015
TL;DR: A novel method of traffic flow detection based on multiple statistical parameters, which processes only the image of the observation window, which is preset on each land of the road.
Abstract: This paper proposes a novel method of traffic flow detection based on multiple statistical parameters. This method processes only the image of the observation window, which is preset on each land of the road. The gray value variance of current image and constructed background is employed as the main statistical parameter to detect the vehicle. The texture-based statistical parameter is applied as a supplement to enhance the robust against the moving shadow. The results of surveillance video test demonstrate that this method is efficient, accurate and robust against moving shadow.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: A new design based on FPGA (Field Programmable Gate Array) to overcome the disadvantage of the traditional design such as data acquisition control by the lower computer and processing by the up computer is shown.
Abstract: Ultrasonic signal acquisition and denoising processing are the important parts of nondestructive testing. This paper shows a new design based on FPGA (Field Programmable Gate Array) to overcome the disadvantage of the traditional design such as data acquisition control by the lower computer and processing by the up computer. This design can not only improve the speed of data acquisition but also reduce the random noise efficiently. The whole system is miniaturized by using a single chip to decrease many peripheral instruments and reduce cost and power dissipation.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: By decision tree, partition the steps of data classification refinement, through discussion on linear regression, multiple linear regression and non-linear regression forecast method, to deepen the understanding of the data prediction accuracy evaluation method.
Abstract: The information age needs to master the technique of data mining, the data were analyzed. The classification and prediction through data mining can grasp the basic trend of the development of the unknown data. In this paper, by decision tree, partition the steps of data classification refinement, through discussion on linear regression, multiple linear regression and non-linear regression forecast method, to deepen the understanding of the data prediction accuracy evaluation method, then introduces the classification and prediction of the similarities and differences by classification method.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: A comprehensive overview of coal bed methane (CBM) development in China is presented in this article, including geological conditions, major basins in operating and technologies of exploration and exploitation, which needs to be accelerated to improve the exploration level of CBM.
Abstract: A comprehensive overview of coal bed methane (CBM) development in China is presented in the review, including geological conditions, major basins in operating and technologies of exploration and exploitation. The distribution of CBM in China is widespread, but exploitations are mainly conducted in the three basins of Qinshui, Ordos and Junggar. The experience from major operation basins has revealed the potential for CBM commercial exploitation. Existing problems and required future work has been identified. The development of mechanisms, technologies, methods, equipment, pipelines and policies, in China, needed to be accelerated to improve the exploration level of CBM.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: In this paper, a dedicated workbench is built after selecting sensors of pressure, method of collecting data and electric cylinder and the result shows that the pressure which is provided by electric cylinder is fully in compliance with the requirements.
Abstract: Pressure fluctuation is adopted when exploring the output's stability of the electric cylinder. To study its properties, pressure detection system is modeled and a dedicated workbench is built after selecting sensors of pressure, method of collecting data and electric cylinder. By a series of experiments, pressure data are collected. The signals are low-pass filtered according to the characteristics of mechanical vibration and then analyzed with the FFT method. When the main features of pressure and frequency are obtained, the second round filter is ready. Then the value of load tolerances can be calculated as a quantization parameter to compare with national standard. The result shows that the pressure which is provided by electric cylinder is fully in compliance with the requirements.

Proceedings ArticleDOI
13 Jun 2015
TL;DR: This study used computer-based chromatographic and spectral techniques to isolate and identify nine compounds including fustin, (+) trans-2R, 3R-3', 4', 5, 7-tetrahydroxyflavanonol and 2ß-carboxyl, 3ß-hydroxyl-norlupA (1)-20(29)-en-28-oic acid from Spina Gleditsiae that have anticancer effects.
Abstract: Spina Gleditsiae is the herbal medicine traditionally used in Chinese Medicine for the treatment of human cancers. Though significant progress has been made toward our understanding of the antitumour mechanisms of Spina Gleditsiae, its anticancer chemical information remains unclear. In this study, we used computer-based chromatographic and spectral techniques to isolate and identify nine compounds including fustin(1), (+) trans-2R, 3R-3', 4', 5, 7-tetrahydroxyflavanonol (2), 8-C-glucopyranosyl-3, 4', 7-trihydroxyflavone (3), dihydrokaempferol (4), 5-methoxy-3', 4', 7'-trihydroxydihydroflavonol (5), 5, 3', 4', trimethoxy-7-hydroxydihydroflavonol (6), betulin (7), s-sitosterol (8) and 2s-carboxyl, 3s-hydroxyl-norlupA (1)-20(29)-en-28-oic acid (9) from Spina Gleditsiae. Moreover, their anticancer effects were firstly confirmed on hepatoblastoma HepG2, oesophageal carcinoma EC109 and lung adenocarcinoma A549 cell lines in vitro. Our results provide a theoretical basis for the potential therapeutic use of Spina Gleditsiae in the treatment of malignancies.