A Smart Phone Identification Method Based on Gesture
Total Page:16
File Type:pdf, Size:1020Kb
3rd Annual International Conference on Information Technology and Applications (ITA 2016) ITM Web of Conferences Volume 7 (2016) Hangzhou, China 29 - 31 July 2016 Editors: Tao Gong Ting Yang Juan Xu ISBN: 978-1-5108-3280-0 Printed from e-media with permission by: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 Some format issues inherent in the e-media version may also appear in this print version. This work is licensed under a Creative Commons Attribution license: http://creativecommons.org/licenses/by/2.0/ You are free to: Share – copy and redistribute the material in any medium or format. Adapt – remix, transform, and build upon the material for any purpose, even commercial. The licensor cannot revoke these freedoms as long as you follow the license terms. Under the following terms: You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. The copyright is retained by the corresponding authors. Printed by Curran Associates, Inc. (2017) For additional information, please contact EDP Sciences – Web of Conferences at the address below. EDP Sciences – Web of Conferences 17, Avenue du Hoggar Parc d'Activité de Courtabœuf BP 112 F-91944 Les Ulis Cedex A France Phone: +33 (0) 1 69 18 75 75 Fax: +33 (0) 1 69 28 84 91 [email protected] Additional copies of this publication are available from: Curran Associates, Inc. 57 Morehouse Lane Red Hook, NY 12571 USA Phone: 845-758-0400 Fax: 845-758-2633 Email: [email protected] Web: www.proceedings.com TABLE OF CONTENTS A SMART PHONE IDENTIFICATION METHOD BASED ON GESTURE .................................................................1 Xu Di, Zhang Quan A NOVEL LOGIC FOR ANALYZING ELECTRONIC PAYMENT PROTOCOLS ....................................................9 Liu Yi, Liu Xing-Tong, Tang Chao-Jing RESEARCH OF THE COMMUNICATION MIDDLEWARE OF THE YACHT SUPERVISION MANAGEMENT SYSTEM BASED ON DDS.................................................................................................................. 14 Wang Yan-Ru, Zhang Yi-Kun, Gu Song-Yuan, Xu Wei-Feng DESIGN AND DEVELOPMENT OF FIRE GRIDDING PLATFORM BASED ON INTERNET OF THINGS ............................................................................................................................................................................... 20 Wei San-Xi, Xiao Jin-Chao, Liu Ji-Hai RESEARCH ON THE EXTRACTION TECHNOLOGY OF HOT-WORDS IN TIBETAN WEBPAGES ........................................................................................................................................................................ 25 Wang Chang-Zhi, Xu Gui-Xian, Wang Hui AN EMPIRICAL STUDY FOR THE MOBILE FOOD TRACE ABILITY: PRIVATE TRACE ABILITY SYSTEM FOR THE WHITE GOURD IN TIANJIN, CHINA ...................................................................... 29 Liu Yu-Chuan, Gao Hong-Mei DESIGN AND IMPLEMENTATION OF HENAN HUINONG CLIENT SYSTEM BASED ON IOS ....................... 34 Li Yan-Ling, Zhang Li, Guo Yu-Feng, Xi Lei, Sun Chang-Xia A METHOD ABOUT THE PROPAGATION OF FAULTS IN NETWORK................................................................ 39 Li Yao-Nan, Wang Shi-Hai DPDK-BASED IMPROVEMENT OF PACKET FORWARDING ................................................................................ 43 Bi Hao, Wang Zhao-Hun A NEW METHOD OF AMBIGUITY RESOLUTION FOR TRIPLE-FREQUENCY GPS PPP................................ 48 Lu Xiao-Feng, Zhang Sheng-Li, Bao Ya-Chuan VULNERABILITY OF COMPLEX NETWORKS UNDER APPROXIMATE LONGEST CHAIN ATTACK STRATEGIES.................................................................................................................................................... 52 Hao Yao-Hui, Song Jia-Liang, Lin Yi, Han Ji-Hong A METHOD FOR DETECTING THE REAL LOCATION OF AGENCY WEBSITE BASED ON SEARCH ENGINE.............................................................................................................................................................. 58 Chou Xiao-Hui, Gan Liang, Li Ai-Ping, He Zhong-He, Yang Feng-Yu THE IRREGULARITY PROPAGATION CHARACTERISTICS OF RADIO SIGNALS FOR WIRELESS SENSOR NETWORK IN FARMLAND...................................................................................................... 62 Zhu Hua-Ji, Wu Hua-Rui, Zhang Li-Hong, Miao Yi-Sheng AN EFFICIENT LATTICE-BASED DISTRIBUTED IBE ............................................................................................. 67 Yin Lu, Zhang Quan, Li Rui-Lin FACE RECOGNITION UNDER VARYING ILLUMINATION USING GREEN’S FUNCTIONBASED BIDIMENSIONAL EMPIRICAL MODE DECOMPOSITION AND GRADIENTFACES............................................................................................................................................................. 74 Yang Zhi-Jun, He Xue, Xiong Wen-Yi, Nie Xiang-Fei RESEARCH ON THE SOLUTION SPACE OF 2-SAT AND MAX-2-SAT .................................................................. 79 Li Bai-Feng, Wei Wei, Liu Chao-Qun MALWARE CLASSIFICATION BASED ON THE BEHAVIOR ANALYSIS AND BACK PROPAGATION NEURAL NETWORK.......................................................................................................................... 84 Pan Zhi-Peng, Feng Chao, Tang Chao-Jing FRACTAL SIGNATURE FEATURE ANALYSIS OF MODIS NDVI TIME SERIES DATA.................................... 89 Dong Shi-Wei, Li Hong, Zhang Wei-Wei TWO DIMENSIONAL HARMONICS RETRIEVAL IN ZERO-MEAN INDEPENDENT MULTIPLICATIVE AND ADDITIVE NOISES.............................................................................................................. 94 Zhang Zheng-Wei, Chen Zhong, Wang Li-Hui ROBUST FACE RECOGNITION VIA GABOR FEATURE AND SPARSE REPRESENTATION .......................... 99 Hao Yu-Juan, Zhang Li-Quan A SIGNAL SELECTION METHOD FOR HETEROGENEOUS POSITIONING SOURCES................................. 108 Yin Lu, Deng Zhong-Liang, Zhu Di, Hu En-Wen COMPARISON RESEARCH ON IOT ORIENTED IMAGE CLASSIFICATION ALGORITHMS....................... 113 Du Ke, Cai Kai-Yu A HYPER SPECTRAL IMAGES CLASSIFICATION METHOD BASED ON MAXIMUM SCATTER DISCRIMINANT ANALYSIS...................................................................................................................... 118 Li Huo-Yuan, Qi Yong-Feng SHIP TARGETS DISCRIMINATION ALGORITHM IN SAR IMAGES BASED ON HU MOMENT FEATURE AND TEXTURE FEATURE......................................................................................................................... 121 Liu Lei, Zhang Yang, Zhang Hai-Bo, Feng Qi, Li Ting-Jun ON THE LASH BAR COUNT ALGORITHM BASED ON IMAGE RECOGNITION ............................................. 125 Chen Pan-Pan, Zhang Wei-Dang, Li Zhong-Rui DOUBLE HEVC COMPRESSION DETECTION WITH THE SAME QPS BASED ON THE PU NUMBERS ......................................................................................................................................................................... 130 Jia Rui-Shi, Li Zhao-Hong, Zhang Zhen-Zhen, Li Dong-Dong WIRELESS NETWORK PENETRATION TESTING AND SECURITY AUDITING.............................................. 134 Wang Shao-Long, Wang Jian, Feng Chao, Pan Zhi-Peng ON STRATEGIES OF PERSONAL INFORMATION PROTECTION IN THE PERSONALIZED INFORMATION SERVICE IN BIG DATA TIMES ..................................................................................................... 139 Zhang Li-ping STATICLY DETECT STACK OVERFLOW VULNERABILITIES WITH TAINT ANALYSIS............................ 144 Xing Zhang, Bin Zhang, Chao Feng, Quan Zhang MEMORY VULNERABILITY DIAGNOSIS FOR BINARY PROGRAM................................................................. 149 Tang Feng-Yi, Feng Chao, Tang Chao-Jing DESIGN ON SECURITY ALARMING SYSTEM OF VEHICLE TERMINAL EQUIPMENT ............................... 152 Fan Tong-Liang, Ye Wen HARDWARE-ASSISTED SYSTEM FOR PROGRAM EXECUTION SECURITY OF SOC .................................. 156 Wang Xiang, Pang Shu-Song, Wang Wei-Ke, Zhao Zong-Min, Zhou Cheng, He Zhan-Hong, Wang Xiao-Cui, Xu Yang RESEARCH ON IMPROVED DV-HOP ALGORITHM AGAINST WORMHOLE ATTACKS IN WSN.................................................................................................................................................................................... 162 Wang Xue-Wen, Hu Feng, Zhai Chun-Xue, Zhang Yuan, Su Xing-Xing, Li Yan, Wu Zhao-Ke, Li Ting-Ting, Deng Zhou-Hu SECMAS: SECURITY ENHANCED MONITORING AND ANALYSIS SYSTEMS FOR WIRELESS SENSOR NETWORKS..................................................................................................................................................... 168 Ding Chao, Yang Li-Jun, Wu Meng ESTIMATING ADS’ CLICK THROUGH RATE WITH RECURRENT NEURAL NETWORK............................ 174 Chen Qiao-Hong, Yu Shi-Min, Guo Zi-Xuan, Jia Yu-Bo TRAFFIC DISTRIBUTION OF IM SERVICES............................................................................................................ 180 Li Rui-Bing, Sun Fang-Fang PARAMETERS IDENTIFICATION OF PHOTOVOLTAIC CELLS BASED ON DIFFERENTIAL EVOLUTION ALGORITHM .......................................................................................................................................... 183 Liao Hui, Qiao Dongkai, Huang Chonglin, Li Shidong DEVS MODELS OF PALLETIZED GROUND STACKING IN STOREYED GRAIN WAREHOUSE ................. 188 Hou Shu-Yi, Liu Yu-Kun, Zhou Xiao-Guang DESIGN OF TROPICAL FLOWERS ENVIRONMENTAL PARAMETERS WIRELESS