Aiming at the designed defects of the traditional wireless network node, a kind of designed scheme of wireless network coordinator based on ZigBee and GPRS technology are proposed. The system uses LPC2119 as the core and uC / OS - II as operating platform. It realizes the establishment and management of ZigBee network, the data communications between ZigBee network and GPRS network. The system can be used for the need of remote monitoring occasions.
针对传统无线网络节点的设计缺陷,提出了一种基于ZigBee和GPRS技术的无线网络协调器设计方案。该系统以LPC2119为核心,uC / OS - II为操作平台。实现了ZigBee网络的建立和管理,ZigBee网络与GPRS网络之间的数据通信。本系统可用于需要远程监控的场合。
{"title":"The Design of Network Coordinator Based on ZigBee and GPRS Technology","authors":"Yujie Zhang, S. Hui","doi":"10.1109/ICCSEE.2012.418","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.418","url":null,"abstract":"Aiming at the designed defects of the traditional wireless network node, a kind of designed scheme of wireless network coordinator based on ZigBee and GPRS technology are proposed. The system uses LPC2119 as the core and uC / OS - II as operating platform. It realizes the establishment and management of ZigBee network, the data communications between ZigBee network and GPRS network. The system can be used for the need of remote monitoring occasions.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129298782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Two typical digital watermark algorithms were introduced in this paper, and did the simulation using MATLAB. In view of their advantages and disadvantages through analysis of the results, propose the digital watermarking algorithm based on discrete cosine transform and discrete wavelet transform. Analyze the application of the multiple digital watermarking in digital copyright protection and the pirate tracing problem. Use the Visual C++ to achieve the digital image copyright protection system both including the watermark embedding and extracting.
{"title":"Research and Implementation on Digital Image Copyright Protection System","authors":"Yujie Zhang, Yuanyuan Zhang","doi":"10.1109/ICCSEE.2012.314","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.314","url":null,"abstract":"Two typical digital watermark algorithms were introduced in this paper, and did the simulation using MATLAB. In view of their advantages and disadvantages through analysis of the results, propose the digital watermarking algorithm based on discrete cosine transform and discrete wavelet transform. Analyze the application of the multiple digital watermarking in digital copyright protection and the pirate tracing problem. Use the Visual C++ to achieve the digital image copyright protection system both including the watermark embedding and extracting.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131073342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Williams Creativity Test B (WCTB) and Adolescent Scientific Creativity Scale (ASCS) were used to measure the creative affective and scientific creativity for 550 middle school students. In these students, 70% of them were selected to be as training samples, and the others to be as testing samples. Gene expression programming (GEP), generalized regression neural network (GRNN) and multivariable linear regression (MLR) were used for modeling and testing. The result showed the fitting error of GEP model was the lowest compared with the errors of GRNN and MLR models.
{"title":"Students Creativity Modeling with Gene Expression Programming","authors":"Jinxin Qian, Jiayuan Yu","doi":"10.1109/ICCSEE.2012.390","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.390","url":null,"abstract":"Williams Creativity Test B (WCTB) and Adolescent Scientific Creativity Scale (ASCS) were used to measure the creative affective and scientific creativity for 550 middle school students. In these students, 70% of them were selected to be as training samples, and the others to be as testing samples. Gene expression programming (GEP), generalized regression neural network (GRNN) and multivariable linear regression (MLR) were used for modeling and testing. The result showed the fitting error of GEP model was the lowest compared with the errors of GRNN and MLR models.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126962952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the variance of fingerprint feature in multi-capturing and the security of fingerprint template, research on secure fingerprint recognition system based on Frobenius norm is given in this paper. Frobenius norm can show the main information in region of interest (ROI). The random mapping results can improve effectively the distinguishment of different users. Compared with the original fingerprint feature being stored in the database, the mapping results can avoid attacking the original fingerprint feature. For the given fingerprint database, the optimal threshold and the optimal size of random mapping matrix can be got. Experiments in FVC2002 show that the proposed recognition system is feasible and effective. Moreover, a satisfactory EER (equal error rate) 0.21% is obtained.
{"title":"Secure Fingerprint Recognition Based on Frobenius Norm","authors":"Weizhou Zhao, Hui Zhang","doi":"10.1109/ICCSEE.2012.372","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.372","url":null,"abstract":"Aiming at the variance of fingerprint feature in multi-capturing and the security of fingerprint template, research on secure fingerprint recognition system based on Frobenius norm is given in this paper. Frobenius norm can show the main information in region of interest (ROI). The random mapping results can improve effectively the distinguishment of different users. Compared with the original fingerprint feature being stored in the database, the mapping results can avoid attacking the original fingerprint feature. For the given fingerprint database, the optimal threshold and the optimal size of random mapping matrix can be got. Experiments in FVC2002 show that the proposed recognition system is feasible and effective. Moreover, a satisfactory EER (equal error rate) 0.21% is obtained.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"11 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127973386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper provides a thorough review of optical voltage sensing techniques developed over the last decades. The performances of each technique are compared. The advantages and limitations are summarized. The voltage sensors are catalogued according to the underlying physical principle in order to point out their advantages and limitations. We also present new research results that may be developed into future voltage sensors. Finally, some existing problems and future research directions in this field are indicated.
{"title":"An Overview of Optical Voltage Sensor","authors":"Lan Bi, Hui Li","doi":"10.1109/ICCSEE.2012.160","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.160","url":null,"abstract":"This paper provides a thorough review of optical voltage sensing techniques developed over the last decades. The performances of each technique are compared. The advantages and limitations are summarized. The voltage sensors are catalogued according to the underlying physical principle in order to point out their advantages and limitations. We also present new research results that may be developed into future voltage sensors. Finally, some existing problems and future research directions in this field are indicated.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129040191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wideband radar with high range resolution can provide a wealth of objective information, but large volumes of data and calculations as a constraint to the problem of Wideband radar signal processing. Sub-band signal processing can decompose high-speed broadband signal to a low-rate narrow-band signals, greatly reducing the complexity of radar signal processing. The modulated filter design is the key of sub-band signal processing. Base on the research of modulated filter banks, M-band modulation filter applied to the sub-band pulse compression, a new optimization algorithm - Lagrange multipliers was presented. This method has higher efficiency, it is able to design filter banks of different lengths and same length.
{"title":"Optimization of Sub-band Pulse System Based on Modulated Filter Banks","authors":"Mei-hong Li","doi":"10.1109/ICCSEE.2012.283","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.283","url":null,"abstract":"Wideband radar with high range resolution can provide a wealth of objective information, but large volumes of data and calculations as a constraint to the problem of Wideband radar signal processing. Sub-band signal processing can decompose high-speed broadband signal to a low-rate narrow-band signals, greatly reducing the complexity of radar signal processing. The modulated filter design is the key of sub-band signal processing. Base on the research of modulated filter banks, M-band modulation filter applied to the sub-band pulse compression, a new optimization algorithm - Lagrange multipliers was presented. This method has higher efficiency, it is able to design filter banks of different lengths and same length.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125340756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Water environment system is a large complicated system, there are some uncertainties in assessing water quality, yet fuzzy mathematics is the mathematical method which processes and researchs the fuzzy phenomenon. Based on the theory of fuzzy mathematics and the standard limited value of the appraisal factor, a membership function expression was established, and a computation based on the actual measured data thereafter. The result shows that the water quality of Qinghe Reservoir watershed is poor and Reservoir entrance, Hong Huadian, Tie Jiagou, Zeng Jiatun and YaoPu are belong to standard, which matches the practical situation of water quality.
{"title":"Study on the Application of Fuzzy Mathematics in Assessing the Water Quality of Qinghe Reservoir","authors":"Liu Feng, Wang Daohan, Feng Sijing, Yao Suzhen","doi":"10.1109/ICCSEE.2012.478","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.478","url":null,"abstract":"Water environment system is a large complicated system, there are some uncertainties in assessing water quality, yet fuzzy mathematics is the mathematical method which processes and researchs the fuzzy phenomenon. Based on the theory of fuzzy mathematics and the standard limited value of the appraisal factor, a membership function expression was established, and a computation based on the actual measured data thereafter. The result shows that the water quality of Qinghe Reservoir watershed is poor and Reservoir entrance, Hong Huadian, Tie Jiagou, Zeng Jiatun and YaoPu are belong to standard, which matches the practical situation of water quality.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126720993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new vehicle recognition approach based on graph spectral theory and neural networks is proposed in this paper. In the approach, image threshold method based on graph spectral theory is used for image preprocessing. And after filter of undetermined regions with rules, regions left are gray-unified. These gray values are input into neural network to recognize vehicle and vehicle types. The experiment proves that this method has high recognition rate and low false rate.
{"title":"A New Vehicle Recognition Approach Based on Graph Spectral Theory and BP Neural Network","authors":"Wang Yu, Li Lei, ShiJian Feng","doi":"10.1109/ICCSEE.2012.116","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.116","url":null,"abstract":"A new vehicle recognition approach based on graph spectral theory and neural networks is proposed in this paper. In the approach, image threshold method based on graph spectral theory is used for image preprocessing. And after filter of undetermined regions with rules, regions left are gray-unified. These gray values are input into neural network to recognize vehicle and vehicle types. The experiment proves that this method has high recognition rate and low false rate.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126220887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet of things (IOT), as a third high tide of information industry, the safety of it has arose wide attention. To improve research and application of safe internet of things, this paper deeply researched the process of IOT's development, key technique, and frame. Based on all these above this paper analyzed safety threatens and primary prevent measure. At last, the impact of IOT to safety grade test was also analyzed, this provided some idea for the safety test of IOF.
{"title":"Impact of Internet of Things on Security Grade Evaluation","authors":"Chenghua Yan, Kun Feng, Zhiming Zhang","doi":"10.1109/ICCSEE.2012.246","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.246","url":null,"abstract":"Internet of things (IOT), as a third high tide of information industry, the safety of it has arose wide attention. To improve research and application of safe internet of things, this paper deeply researched the process of IOT's development, key technique, and frame. Based on all these above this paper analyzed safety threatens and primary prevent measure. At last, the impact of IOT to safety grade test was also analyzed, this provided some idea for the safety test of IOF.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121550932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the popularity and development of the embedded software and Internet in recent years, researches on adaptive software has gradually become a research hotspot through the software industry. Peter Norvig etl., analysed the development of software from the point of programming, and deemed that now it is the period of adaptive programming, and is very optimistic about the adaptive Software.
{"title":"The Analysis and Reflection of Software Adaptability and Its Supported Technical","authors":"Yudong Wang, Xinjun Xia","doi":"10.1109/ICCSEE.2012.507","DOIUrl":"https://doi.org/10.1109/ICCSEE.2012.507","url":null,"abstract":"With the popularity and development of the embedded software and Internet in recent years, researches on adaptive software has gradually become a research hotspot through the software industry. Peter Norvig etl., analysed the development of software from the point of programming, and deemed that now it is the period of adaptive programming, and is very optimistic about the adaptive Software.","PeriodicalId":132465,"journal":{"name":"2012 International Conference on Computer Science and Electronics Engineering","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122451500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}