17-Storey Building Fold Blasting Demolition and Safety Technology

17-Storey Building Fold Blasting Demolition and Safety Technology

2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA 2013) Hong Kong, China 16 - 18 January 2013 Pages 1-806 IEEE Catalog Number: CFP1380K-PRT ISBN: 978-1-4673-4893-5 1/2 2013 Third International Conference on Intelligent System Design and Engineering Applications ISDEA 2013 Table of Contents Preface......................................................................................................................................................................xxxi Conference Committees......................................................................................................................................xxxii Reviewers...............................................................................................................................................................xxxiv 2013 Third International Conference on Intelligent System Design and Engineering Applications 17-storey Building Fold Blasting Demolition and Safety Technology ..........................................................................1 Xu Shunxiang and Chen Dezhi 3D Shape Reconstruction from Range Measurements of ISAR .....................................................................................5 Jing Sun, She Shang, and Jiadong Xu A Case Study on Testing and Performance Evaluation of Electric Motorcycles to Discuss the Environmental Impact of Urban Area in Macao .....................................................................................9 Tam Lam Mou, Wog Pak Kin, Wong Hang Cheong, Lao Hangyuan, and Xie Zhengchao A Clustering Algorithm Based on the Text Feature Matrix of Domain-Ontology .......................................................13 Gong Guangming, Jiang Yanhui, Wang Wei, and Zhou Shuangwen A Code Generation Toolkit for C++ Web Services Development ...............................................................................17 Xiangye Ji, Jun Han, and Yongwang Zhao A Coevolution Algorithm in the Image Recognition System .......................................................................................22 Tan Jianhao, Zhang Jing, Song Caixia, and Wang Ya A Collaborative Intelligent Hypermedia Model Based on Advanced Petri Nets .........................................................26 Yu Zhang A Count Based Algorithm for Redundant Reader Elimination in RFID Application System ..........................................................................................................................................................................30 Shuyuan Pan and Zhiying Yang A Cultivation Technique of Direct Seeding Rice Adapted to Cold Soaked Mud Field in the Mountains Southwest Hubei ...............................................................................................................................34 Min Xu, Peng-Fei Li, Yan-Xia Zhang, Fei-Yue Huang, Zhi-Hua Yuan, Wen-Jing He, and Xiao-Jiao Xiang A Data Mining Mode of Broadcasting and Television Decision Support System .......................................................36 Fulian Yin, Jianping Chai, and Yao Qin v A Decentralized Information Flow Model for SaaS Applications Security .................................................................40 Liu Tingting and Zhao Yong A Demonstration of Karst Water in Central-Hebei Rift Basin as Water Supply Source .............................................44 Wang Lin, Gan Hong, Wang Shan, and Zhang Hongda A Designing and Research of Future Classroom Learning Support System Based on Cloud Computing Technology ................................................................................................................................50 Wang Zhouxiu, Hu Ting, Xu Yafeng, and Feng Nengshan A Fair Hash Chain-based On-line Application Services Granting Scheme for Computing Environment .........................................................................................................................................54 Chia-Chen Lin, Chia-Chi Wu, and Chin-Chen Chang A Fast and Effective Kernel-Based K-Means Clustering Algorithm ...........................................................................58 Kong Dexi and Kong Rui A Framework of Service Invocation in the Novel DSS Based on Humanware Service ..............................................62 Yang Jie, Zhou Xianzhong, Sheng Yin, and Mao Ke A Frequent Itemsets Mining Algorithm Based on Matrix in Sliding Window over Data Streams .........................................................................................................................................................................66 Fan Guidan and Yin Shaohong A Harmonic Current Forecasting Method for Microgrid HAPF Based on the EMD-SVR Theory ..................................................................................................................................................70 Li Shengqing, Zeng Huanyue, Xu Wenxiang, and Li Weizhou A High Performance Frequency Offset Estimation Method for OFDM ......................................................................73 Donghua Zhang, Lianrui Yu, Peng Zhou, Qiuyuan Huang, and Wei Chen A Human-computer Interaction-based Neighborhood Search Heuristic for Disruption Management .................................................................................................................................................................77 Gui Jingsong and Yang Chunxia A Localization Algorithm for Mobile Wireless Sensor Networks ...............................................................................81 Haiping Zhu, Xiaoyong Zhong, Qianhong Yu, and Yunlong Wan A Location-inventory Model with Echelon Stock Policy for Four-echelon Supply Chain Network Design .................................................................................................................................................86 Shui Wenbing A Log Based Approach to Make Digital Forensics Easier on Cloud Computing ........................................................91 Ting Sang A Method for Customer Demands Groups Segmentation in Product Design Based on Fuzzy Clustering and Trigonometric Functions ......................................................................................................95 Hua Ertian, Lü Huanhuan, Chen Daqiang, and Fei Yulian A Method for Fish Diseases Diagnosis Based on Rough Set and FCM Clustering Algorithm ......................................................................................................................................................................99 Xu Miao-Jun, Zhang Jian-Ke, and Li Hui A Method for Noise Removal of LIDAR Point Clouds .............................................................................................104 Huang Zuowei, Huang Yuanjiang, and Huang Jie vi A Method of Adjusting Visible-light Camera Oriented to Embedded Structures ......................................................108 Xu Yue and Sang Nong A Method of SNS Topic Models Extraction Based on Self-Adaptively LDA Modeling ..........................................112 Fei Lu, Beijun Shen, Jiuchuan Lin, and Hanlong Zhang A New Fast Single-Image Defog Algorithm ..............................................................................................................116 Sun Wei and Han Long A New Integrated Boundary Switch Controller based on IEC 61850 ........................................................................120 Shi Yanhua and Wu Jianwen A New Localization Algorithm of Mobile Phone for Outdoor Emergency Rescue ...................................................124 Xin Ma, Quan-Yi Huang, and Xue-Ming Shu A New Retrieval Method Based on YUV Clour Information for Digital Libraries ...................................................128 He Lei A New Vehicle Safety Space Model Based on Driving Intention ..............................................................................131 Jin Maojing A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems ...................................................................135 Liu Guanxiu, Ye Suqi, and Huang Xinli A Novel Controller for Parallel Operation of Inverters Based on Active Disturbance Rejection Control Technique ......................................................................................................................................140 Xiao Qianghui, Liu Junming, and Li Yanlin A Novel Method of Wavelet Threshold Shrinkage Based on Genetic Algorithm and Sample Entropy ....................................................................................................................................................144 Yan Xingwei, Lu Dawei, Yang Afeng, Zhang Jun, and Du Chun A Novel NAND Flash FTL for Mass Data Storage Devices Based on Hybrid Address Translation ..................................................................................................................................................................150 Xie Qiyou, Liu Qiang, Nie Hongshan, Sun Zhaolin, Zhou Li, and Song Rui A Possibilistic Data Association Based Algorithm for Multi-target Tracking ...........................................................158 Liang Hao A Preliminary Study on the Characteristics of Phosphorus Leaching in Different Soils ...........................................163 Qiu Yaqun, Peng Peiqin, Yu Pu, Gao Xia, Gao Tiejun, Gan Guojuan, and Hou Hongbo A Reduction Algorithm Based on Rough Set and Information Granulation Theory for Multi-radar Data ....................................................................................................................................................168

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    27 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us