Pub Date : 2017-10-01DOI: 10.1109/iccsnt.2017.8343676
Hongli Tai, Huan Zhang, Song Yang
At present, ultrasonic technology is widely used in measurement, automobile, medical, chemical industry, aerospace, machinery, exploration, biology, food and other fields, especially in the detection distance. The reason why autonomous mobile robots can move autonomously is that there is obstacle avoidance or positioning system in the robot system. The robot uses ultrasonic technology in detecting the distance of obstacles. In view of this, this paper introduces a fully integrated high-speed, high-performance hybrid signal processing system MCU, which controls receiver and transceiver ultrasonic range finder. In this paper, the design scheme of software system for ultrasonic range finder is expounded in detail, and the solution for the blind area of ultrasonic is given. Finally, the rangefinder is mounted on the robot for practical testing. The test data show that the Ultrasonic distance measurement finder described in this paper has good ranging performance, and it can meet the requirements of robot rangefinder.
{"title":"Study on software part of ultrasonic ranging system based on variable emission wavelength","authors":"Hongli Tai, Huan Zhang, Song Yang","doi":"10.1109/iccsnt.2017.8343676","DOIUrl":"https://doi.org/10.1109/iccsnt.2017.8343676","url":null,"abstract":"At present, ultrasonic technology is widely used in measurement, automobile, medical, chemical industry, aerospace, machinery, exploration, biology, food and other fields, especially in the detection distance. The reason why autonomous mobile robots can move autonomously is that there is obstacle avoidance or positioning system in the robot system. The robot uses ultrasonic technology in detecting the distance of obstacles. In view of this, this paper introduces a fully integrated high-speed, high-performance hybrid signal processing system MCU, which controls receiver and transceiver ultrasonic range finder. In this paper, the design scheme of software system for ultrasonic range finder is expounded in detail, and the solution for the blind area of ultrasonic is given. Finally, the rangefinder is mounted on the robot for practical testing. The test data show that the Ultrasonic distance measurement finder described in this paper has good ranging performance, and it can meet the requirements of robot rangefinder.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125313275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343727
Zhicheng Liu, Junxing Zhang
In such an era that mobile devices produce ever-increasing amounts of data, Wi-Fi offloading enables mobile users to upload delay-tolerant data over Wi-Fi, which speeds up the upload but comes at constrained mobility and security threats. In this paper, we analyze the threats of data flooding attack in Wi-Fi offloading and propose an improved Wi-Fi offloading architecture to mitigate the impacts of such attack. Different from existing systems which store and forward data to the server, our architecture deploys control server in residential area network for the load balancing of offloading devices. Two experiments illustrate that our work can effectively improve the throughput and reduce the data delay under data flooding attack, compared with the generic architecture in a store-and-forward fashion.
{"title":"OSO: Mitigating data flooding attack in Wi-Fi offloading","authors":"Zhicheng Liu, Junxing Zhang","doi":"10.1109/ICCSNT.2017.8343727","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343727","url":null,"abstract":"In such an era that mobile devices produce ever-increasing amounts of data, Wi-Fi offloading enables mobile users to upload delay-tolerant data over Wi-Fi, which speeds up the upload but comes at constrained mobility and security threats. In this paper, we analyze the threats of data flooding attack in Wi-Fi offloading and propose an improved Wi-Fi offloading architecture to mitigate the impacts of such attack. Different from existing systems which store and forward data to the server, our architecture deploys control server in residential area network for the load balancing of offloading devices. Two experiments illustrate that our work can effectively improve the throughput and reduce the data delay under data flooding attack, compared with the generic architecture in a store-and-forward fashion.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130236607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
At present, the analysis of television ratings gives priority to ordinary sectional analysis which is represented by audience ratings, market share and other indices, and has little analysis of the audience flowing. Additionally, traditional research method of audience flowing has some problems such as high time cost, large storage space, weak reusability and no analysis about overall flow trend or audience clustering. This paper proposes a new scheme on the analysis of audience flowing. It is based on the established lingered channel matrix produced by raw viewing data. From the angle of channels (or programs) and users, this paper adopts the conventional mathematical statistics method and clustering algorithm to reflect audience flowing between different channels and their own viewing behavior in detail. The lingered channel matrix established by the scheme clearly shows the channel that audience linger at every moment, leaving the original viewing data away and avoiding the problem of high cost of time and storage space by repeatedly reading and processing raw data. Moreover, the matrix provides the data base for the subsequent extension research, in order to realize the analysis of TV audience flowing in a deeply vertical level.
{"title":"Analysis of TV audience flow based on the lingered channel matrix","authors":"Fulian Yin, Xuesong Bai, Jianping Chai, Wenwen Zhang","doi":"10.1109/ICCSNT.2017.8343684","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343684","url":null,"abstract":"At present, the analysis of television ratings gives priority to ordinary sectional analysis which is represented by audience ratings, market share and other indices, and has little analysis of the audience flowing. Additionally, traditional research method of audience flowing has some problems such as high time cost, large storage space, weak reusability and no analysis about overall flow trend or audience clustering. This paper proposes a new scheme on the analysis of audience flowing. It is based on the established lingered channel matrix produced by raw viewing data. From the angle of channels (or programs) and users, this paper adopts the conventional mathematical statistics method and clustering algorithm to reflect audience flowing between different channels and their own viewing behavior in detail. The lingered channel matrix established by the scheme clearly shows the channel that audience linger at every moment, leaving the original viewing data away and avoiding the problem of high cost of time and storage space by repeatedly reading and processing raw data. Moreover, the matrix provides the data base for the subsequent extension research, in order to realize the analysis of TV audience flowing in a deeply vertical level.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126671607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343739
Fangfei Hu, Chaoshi Cai, F. Hu, Yanqiong Zhuang
How to improve the quality of transmission and increase the speed of digital signal transmission is the inevitable trend of the research of digital broadcasting. IBOC (In-Band On-Channel) is the best choice of analog broadcasting to digital analog broadcasting simultaneously and to digital broadcasting. The real time dynamic spectrum adjustment technology is introduced into the IBOC broadcasting in this paper, the scheme is based on the dynamic spectrum IBOC scheme. Just according to the current frame and the existing audio quality, with the method of statistical analysis, the digital bandwidth of the current frame is adjusted by improving NMRref reference table, which can be adopted to solve the problem of time-varying interference between digital and analog signal. This algorithm uses the objective evaluation index based on perceptual evaluation of audio quality as the evaluation standard of audio quality and proposes an evaluation system suitable for this IBOC system project, which takes the time-varying noise and the subjective feelings into consideration. Finally, the ability of digital signal transmission will be enhanced, so as to realize real-time dynamic spectrum adjustment in real sense.
{"title":"A modified real time dynamic spectrum adjustment scheme in FM IBOC broadcasting","authors":"Fangfei Hu, Chaoshi Cai, F. Hu, Yanqiong Zhuang","doi":"10.1109/ICCSNT.2017.8343739","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343739","url":null,"abstract":"How to improve the quality of transmission and increase the speed of digital signal transmission is the inevitable trend of the research of digital broadcasting. IBOC (In-Band On-Channel) is the best choice of analog broadcasting to digital analog broadcasting simultaneously and to digital broadcasting. The real time dynamic spectrum adjustment technology is introduced into the IBOC broadcasting in this paper, the scheme is based on the dynamic spectrum IBOC scheme. Just according to the current frame and the existing audio quality, with the method of statistical analysis, the digital bandwidth of the current frame is adjusted by improving NMRref reference table, which can be adopted to solve the problem of time-varying interference between digital and analog signal. This algorithm uses the objective evaluation index based on perceptual evaluation of audio quality as the evaluation standard of audio quality and proposes an evaluation system suitable for this IBOC system project, which takes the time-varying noise and the subjective feelings into consideration. Finally, the ability of digital signal transmission will be enhanced, so as to realize real-time dynamic spectrum adjustment in real sense.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"388 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115301942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343704
Yanan Zhang, Hongyu Wang, Fang Xu
Face detection and facial feature location are two key parts of face recognition system. Usually, these two links are treated as two separate tasks, ignoring the correlation between tasks. In addition, most of the face detection algorithms based on deep convolution neural networks focus only on high-level semantic information of the image, and do not take full advantage of the underlying details of the image. In order to further improve the performance of face detection, we propose a face detection algorithm based on multi task learning and multilayer feature fusion. The proposed method integrates three tasks, namely, face classification, facial feature location, and bounding box regression, into a framework that takes full advantage of the correlation between multiple tasks and performs simultaneous learning over multiple tasks. At the same time, in order to make full use of the low-level details and high-level semantic information of the image, multi layer feature fusion technology is adopted. Finally, we test it on the face detection evaluation database FDDB. Experimental results show that the proposed algorithm has good performance in face detection.
{"title":"Face detection based on multi task learning and multi layer feature fusion","authors":"Yanan Zhang, Hongyu Wang, Fang Xu","doi":"10.1109/ICCSNT.2017.8343704","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343704","url":null,"abstract":"Face detection and facial feature location are two key parts of face recognition system. Usually, these two links are treated as two separate tasks, ignoring the correlation between tasks. In addition, most of the face detection algorithms based on deep convolution neural networks focus only on high-level semantic information of the image, and do not take full advantage of the underlying details of the image. In order to further improve the performance of face detection, we propose a face detection algorithm based on multi task learning and multilayer feature fusion. The proposed method integrates three tasks, namely, face classification, facial feature location, and bounding box regression, into a framework that takes full advantage of the correlation between multiple tasks and performs simultaneous learning over multiple tasks. At the same time, in order to make full use of the low-level details and high-level semantic information of the image, multi layer feature fusion technology is adopted. Finally, we test it on the face detection evaluation database FDDB. Experimental results show that the proposed algorithm has good performance in face detection.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"4 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121230982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343735
Liu Liu, Yukao Yao, Ning Sun, G. Han
The segmentation of coronary lumen is a challenging but important task in clinical application of cardiac computed tomography (CTA). In this paper, a new method is proposed to segment the coronary lumen in a fully automatic manner. This method is based on the directional minimal path and the level-set segmentation in the 2D fused image. The directional minimal path is first used automatically to track the coronary centerlines of the main branches, which provides the center location of the coronary lumen. Then, based on the coronary centerline, the cross-sectional planes are calculated in the 3D CTA images. In order to increase the successful rate of the lumen segmentation, the gray-filtered and vesselness-enhanced images are calculated respectively in the cross-sectional planes and the 3D stacking of the cross-sectional planes. And, the two enhanced images are fused to generate the fused image. Finally, the level-set algorithm is used to segment the coronary lumen in the cross-sectional planes of the fused image. The proposed method is validated by segmenting the lumen of the three main coronary branches. The DICE (Dice coefficients) are 83.2% (RCA), 81.7% (LAD) and 83.5% (LCX), respectively.
{"title":"Fully automated segmentation of coronary lumen based on the directional minimal path and image fusion","authors":"Liu Liu, Yukao Yao, Ning Sun, G. Han","doi":"10.1109/ICCSNT.2017.8343735","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343735","url":null,"abstract":"The segmentation of coronary lumen is a challenging but important task in clinical application of cardiac computed tomography (CTA). In this paper, a new method is proposed to segment the coronary lumen in a fully automatic manner. This method is based on the directional minimal path and the level-set segmentation in the 2D fused image. The directional minimal path is first used automatically to track the coronary centerlines of the main branches, which provides the center location of the coronary lumen. Then, based on the coronary centerline, the cross-sectional planes are calculated in the 3D CTA images. In order to increase the successful rate of the lumen segmentation, the gray-filtered and vesselness-enhanced images are calculated respectively in the cross-sectional planes and the 3D stacking of the cross-sectional planes. And, the two enhanced images are fused to generate the fused image. Finally, the level-set algorithm is used to segment the coronary lumen in the cross-sectional planes of the fused image. The proposed method is validated by segmenting the lumen of the three main coronary branches. The DICE (Dice coefficients) are 83.2% (RCA), 81.7% (LAD) and 83.5% (LCX), respectively.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"84 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122453278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343722
J. Xue, Dongsheng Jing, F. Wang, Peng Xu, Yi Sun, Bin Li
Large receiving end grid has characteristics such as low capacity, poor fault tolerance. In the case of unexpected fault, aiming at the demand of emergency load regulation, a method is proposed here that the load group can quickly participate in the resource control based on logical channel mode. Firstly, the paper analyzes the existing architecture of load regulation, pointing out the limitation of its control process. Then this paper put forward the rapid control structure based on the logical channel mechanism, which further elaborated its concrete realization scheme, including business division, user analysis and control scheme. Finally, the advantages of the proposed method are analyzed and the great effectiveness of the logic channel mode on power emergency response is clarified.
{"title":"Fast load group resources regulation based on logical channel mechanism","authors":"J. Xue, Dongsheng Jing, F. Wang, Peng Xu, Yi Sun, Bin Li","doi":"10.1109/ICCSNT.2017.8343722","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343722","url":null,"abstract":"Large receiving end grid has characteristics such as low capacity, poor fault tolerance. In the case of unexpected fault, aiming at the demand of emergency load regulation, a method is proposed here that the load group can quickly participate in the resource control based on logical channel mode. Firstly, the paper analyzes the existing architecture of load regulation, pointing out the limitation of its control process. Then this paper put forward the rapid control structure based on the logical channel mechanism, which further elaborated its concrete realization scheme, including business division, user analysis and control scheme. Finally, the advantages of the proposed method are analyzed and the great effectiveness of the logic channel mode on power emergency response is clarified.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122710703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343721
Shan Zhu, Shi Xiao
Industrial networks play a very important role in this round of industrial upgrading and transformation, but at the same time, more and more applications appear in industrial production, which need to be supported by industrial networks, especially wireless networks. These different kinds of applications have different Quality of Service (QoS) requirements. The existing wireless communication protocols usually only aim at specific type of applications, and are not suitable for the coexistence of multi-service production environment. In this paper, a new extension protocol is proposed to address the challenge, which is based on PCF model of 802.11 protocols. Simulation results show that the proposed protocol aggregates different systems.
{"title":"A multi-service adaptive wireless communication protocol for industrial networks","authors":"Shan Zhu, Shi Xiao","doi":"10.1109/ICCSNT.2017.8343721","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343721","url":null,"abstract":"Industrial networks play a very important role in this round of industrial upgrading and transformation, but at the same time, more and more applications appear in industrial production, which need to be supported by industrial networks, especially wireless networks. These different kinds of applications have different Quality of Service (QoS) requirements. The existing wireless communication protocols usually only aim at specific type of applications, and are not suitable for the coexistence of multi-service production environment. In this paper, a new extension protocol is proposed to address the challenge, which is based on PCF model of 802.11 protocols. Simulation results show that the proposed protocol aggregates different systems.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128813424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In Vehicular Ad Hoc Network (VANET), due to the openness of wireless medium and the city-wide applied region, wireless communications are vulnerable to malicious multiple jamming attackers. Such jamming attack can seriously disable the preset functions of VANET. Jammer localization method is proposed to eliminate the attacker recently. However, it becomes invalid when there are multiple attackers. To address this issue, we propose a novel method to determine the attacker number and classify the corresponding data set. Our proposed method first uses the moving features of vehicles and spatial features of jammers as basis to divide the data set into several point sets. Then, the method uses the distribution of no-jammed points to group the point sets. And the result is accordingly obtained through this process. The simulation results show that our proposed method is effective and has many advantages compared to the traditional method.
{"title":"Estimating the number of multiple jamming attackers in Vehicular Ad Hoc Network","authors":"Liang Pang, Pengze Guo, Xiao Chen, Jiabin Li, Zhi Xue","doi":"10.1109/ICCSNT.2017.8343720","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343720","url":null,"abstract":"In Vehicular Ad Hoc Network (VANET), due to the openness of wireless medium and the city-wide applied region, wireless communications are vulnerable to malicious multiple jamming attackers. Such jamming attack can seriously disable the preset functions of VANET. Jammer localization method is proposed to eliminate the attacker recently. However, it becomes invalid when there are multiple attackers. To address this issue, we propose a novel method to determine the attacker number and classify the corresponding data set. Our proposed method first uses the moving features of vehicles and spatial features of jammers as basis to divide the data set into several point sets. Then, the method uses the distribution of no-jammed points to group the point sets. And the result is accordingly obtained through this process. The simulation results show that our proposed method is effective and has many advantages compared to the traditional method.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117059776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICCSNT.2017.8343699
Li Yang, Jing Zhou, Jun Shi, Yue-Kao Li
This paper focuses on SCIE research output of computer science from China and its international effect. Choosing the SCI network edition database from 2007 to 2016 as statistical source, SCIE research output issued by Chinese author of computer science is inspected. Having been cleaning and carding data, some key elements of SCIE articles of computer science are analyzed. The paper also draws the outline of general position based on SCIE computer science output from quantitative to qualitative scientific practice, and the development level of computer science is inferred and its future development trend is predicted.
{"title":"Big data analysis for SCIE research output of Chinese computer science","authors":"Li Yang, Jing Zhou, Jun Shi, Yue-Kao Li","doi":"10.1109/ICCSNT.2017.8343699","DOIUrl":"https://doi.org/10.1109/ICCSNT.2017.8343699","url":null,"abstract":"This paper focuses on SCIE research output of computer science from China and its international effect. Choosing the SCI network edition database from 2007 to 2016 as statistical source, SCIE research output issued by Chinese author of computer science is inspected. Having been cleaning and carding data, some key elements of SCIE articles of computer science are analyzed. The paper also draws the outline of general position based on SCIE computer science output from quantitative to qualitative scientific practice, and the development level of computer science is inferred and its future development trend is predicted.","PeriodicalId":163433,"journal":{"name":"2017 6th International Conference on Computer Science and Network Technology (ICCSNT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122089000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}