ICICTA 2014 Table of Contents

ICICTA 2014 Table of Contents

2014 7th International Conference on Intelligent Computation Technology and Automation ICICTA 2014 Table of Contents Preface.......................................................................................................................................................xxii Organizing Committee............................................................................................................................xxiii Reviewers.................................................................................................................................................xxiv Regular Paper Session: Intelligent Computation and Automation 6M25 Compressor Online State Monitoring System Design ........................................................................1 Yu Wei, Yan Hong-Zhi, and Huang Zhonghua A Genetic Algorithm Using Priority-Based Encoding for Routing and Spectrum Assignment in Elastic Optical Network .........................................................................................................5 Iantian Huang and Bin Li A Kind of Identity Authentication under Cloud Computing Environment ....................................................12 Miao Yingkai and Chen Jia A Kind of Improved AdaBoost Algorithm ....................................................................................................16 Liao Shaowen and Chen Yong A Kind of Malicious Code Detection Scheme Based on Fuzzy Reasoning ................................................19 Guo Gang and Chen Zhongquan A Load Balance Based Routing and Wavelength Assignment Algorithm ...................................................23 Yang Jungang, Niu Junyong, and Tian Xiangyuan A Neural Network Approach to Evaluate Agility of Cloud-Based Virtual Enterprise ...................................................................................................................................................28 Miao Ning, Chen Jun, and Pei Shengli A Novel Company Financial Risk Warning Method Based on BP Neural Network .......................................................................................................................................................32 Wu Shuhui v A Novel Way to Increase the Accuracy of Current-Calculating on Metal Surface Using FDTD Method ......................................................................................................................36 Liu Ying, Pan Qing, Xie Xiaogang, and Che Yaliang A Study on Stress-Strain Testing of Controlled Blasting Demolition of 210m Chimney ......................................................................................................................................................41 Chen Dezhi, Xu Shunxiang, and Li Benwei A Study on Topology in Computer Network ................................................................................................45 Qing Liu and Qiuping Liu Advances in Analytical Technologies of Trace Accelerant in Fire Investigation .........................................49 Hao-Wei Yao, Ying-Yu Li, Hao Shen, and Dong Liang An Architecture for Private Cloud Storage System Based on Block Device ...............................................52 Pan Rui, Li Lin, Guo Zhenghong, Wang Qing, and Lin Meng An Automatic Level Adjustment Device Based on STM32 .........................................................................56 Wang Yao-Hui, Shi Jian-Rong, and Bao Ke-Jin An Easy Method to Get Criterial Values of Frank-Kamenetskii Parameter for Infinite Plane Slab and Infinite Cylinder .................................................................................................60 Quan-Bing Luo, Li Wang, and Dong Liang An Efficient Mathematical Model to Process Data of Smart City ................................................................64 Ye Li An Emission Rate Adaptive Algorithm of Wireless Sensor Networks .........................................................68 Yuan Junying, Cao Huiru, Wang Lin, and Luo Pei An Improved Genetic Algorithm for Intelligent Test Paper Generation .......................................................72 Nie Jun An Improved Nonlinear Fitting Method and Its Application in Function Approximation Based on Particle Swarm Algorithm ...................................................................................76 Xiao Fei, Liu Qiang, Jia Bei, and Wu Zeping An Intelligent E-Commerce Recommendation Algorithm Based on Collaborative Filtering Technology ........................................................................................................80 Yang Xiao Qing Analysis and Application of Consumer Features with Cloud Computing and Data Mining Technology ......................................................................................................................84 Zhang Hai-Jian Analysis and Design of Humanoid Robot Dance ........................................................................................88 Huacben Wang, Jiancyin Lu, and Zhao-Shan Yuan Analysis of Charring Pine Morphology under Different Heating Conditions ...............................................92 Ling Liu Analysis of Critical Design Parameters for Simple-Supported Trough Girder and Arch Composite Railway Bridge ..........................................................................................................96 Pan Xiangwen vi Analysis on Spatial-Temporal Distribution Patten and Change Characteristics of Land Cover in Burma Based on High-Resolution Remote Sensing Image and GIS Technology .................................................................................................................................100 Li Cansong and Niu Lede Research on Optimization and Implementation of BP Neural Network Algorithm ...................................................................................................................................................104 Peng Wen-Yi Application of Hybrid Algorithm in Vehicle Routing Optimization Problem ...............................................108 Chen Yin Application of Magnetic Technology in the Prevention and Treatment of Industrial Waste ....................................................................................................................................113 Xu Feng Based on the Substation 3D Real-Scene High-Voltage Warning Area of the Colliding Detection Algorithm Research .............................................................................................117 Chen Hao, Hu Yapin, Yan Jingyi, Tang Yu, and Li Yang Bi-directional Carving Based on Saliency Map via Absorbing Markov Chain ...........................................121 Zhang Yan and Qi Wenjing Chaotic Time Series Analysis of Seismic Parameter of Moment .............................................................125 Jiang Jiao-Lian, Luo Lin, Zhang Jun, and Huang Hong-Li College Employment Quality Prediction Method Based on BP Neural Network ......................................129 Tao Yong-Hong Communications Technology Professional Vocational Training Base Construction Methods and Practice ..........................................................................................................133 Diao Aijun, Ke Zunyou, and Wang Wei Computer Simulation of the Interaction on Pigment and Paper in Virtual Painting .....................................................................................................................................................137 Xiu-Mei Zhang Design and Development of Enterprise Information Management System Based on Mobile Internet Technology ......................................................................................................141 Fan Yan, Yang Jian-Wen, and Cheng Lin Design and Development of Semantic-Based Search Engine Model ......................................................145 Cai Bo and Li Yang-Mei Design and Development of Tele-Diagnosis System of Medical Image Based on Mobile Terminal ...................................................................................................................................149 Sun Xing-Hua, Zhang Xiao, Guo Xiaoling, and Peng Wei Traffic Pattern Recognition System Design and Development Based on Smart Phones ......................................................................................................................................................154 Yu Ning and Liu-Xiaoxing vii Design and Implementation of Intelligent Building Engineering Information Management System ................................................................................................................................158 Hui Shao and Haijian Fu Design and Implementation of NC Lathe Integrating CAD System Based on Feature Recognition ............................................................................................................................162 Chun-Ling Hao Design and Implementation of the Normalized Comprehensive Alarming System in Guangzhou Fire Department Command Center ......................................................................167 Liang Deng Design and Implementation of Virtual Training Scenario Editing System of Emergency Disposal .............................................................................................................................174 Di-Ping Yuan, Ming-Jun Wu, and Li-Biao Pan Design of Early Warning System of PM2.5 Detection Based on BP Neural .............................................178 Zhao Bing-Chen, Huang Jun-Ying, Zhang Bin, and Zhang Xiao-Jing Development and Implementation of Traffic Pattern Recognition

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    17 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us