English proficiency has shown greater importance after entering the new ear. The professional English teaching in college English education was explored and practiced based on the "Plan for Producing Excellent Engineers". The network technology has provided an opportunity rarely seen in the history of college English education, which helps a great deal in the process of teaching English for specific purposes. The author first stated the current situation of the college English, summarized the theory of English for Specific Purposes and shared the insights into it. The paper aims to improve English proficiency among college students.
{"title":"On English for Specific Purposes in College English Education through Network Technology","authors":"Jing-wei Shu, Qing Zhao","doi":"10.1109/IMCCC.2013.254","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.254","url":null,"abstract":"English proficiency has shown greater importance after entering the new ear. The professional English teaching in college English education was explored and practiced based on the \"Plan for Producing Excellent Engineers\". The network technology has provided an opportunity rarely seen in the history of college English education, which helps a great deal in the process of teaching English for specific purposes. The author first stated the current situation of the college English, summarized the theory of English for Specific Purposes and shared the insights into it. The paper aims to improve English proficiency among college students.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121117561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The system scheme of SMP (space mission planning) based on agent and pervasive computing technology is presented referring to the ideas of pervasive computing. Firstly, it starts with structure analysis of SMP system and a four-layered structure is given. Secondly, a single flying vehicle SMP agent is designed in pervasive computing. After summarized the features of SMP agent, a common SMP agent is studied. Furthure more, multi-agents are studied to fulfil multi-vehicles mission planning. Finally, design issues of main vehicle mission planning agent in mult-vehicle agents are discussed in detail to illustrate the emphases of agent designing. This research will play an important role for the research of pervasive computing and agent design domain.
{"title":"Research on Space Mission Plan Based on Agent and Pervasive Computing Technology","authors":"Ma Ji-feng","doi":"10.1109/IMCCC.2013.156","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.156","url":null,"abstract":"The system scheme of SMP (space mission planning) based on agent and pervasive computing technology is presented referring to the ideas of pervasive computing. Firstly, it starts with structure analysis of SMP system and a four-layered structure is given. Secondly, a single flying vehicle SMP agent is designed in pervasive computing. After summarized the features of SMP agent, a common SMP agent is studied. Furthure more, multi-agents are studied to fulfil multi-vehicles mission planning. Finally, design issues of main vehicle mission planning agent in mult-vehicle agents are discussed in detail to illustrate the emphases of agent designing. This research will play an important role for the research of pervasive computing and agent design domain.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123539180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Compared with conventional laboratory chemical analysis, ion selective electrode (ISE) is time-saving, low-cost, ease of use and pollution-free. To detect soil nitrate nitrogen content rapidly, a nitrate ion selective electrode could be used. This paper studied characteristics of nitrate ISE. Potentiometric experiments utilizing nitrate ISE to measure sodium nitrate solution were conducted during the study. A linear regression model based on the Nernst equation was built using the least square method. Several groups of potential values were measured at one concentration and then the arithmetic mean of them was calculated. These mean values and their corresponding concentrations were used in LSM to reduce the impact of the relatively poor repeatability of ISE and reduce nitrate concentration prediction errors. The feasibility of the modeling method was verified using prediction errors as an index. In this study, extra data points except the calibration points were used to test the prediction error. Except several singular points, the relative error of this model was from 1.3% to 13.67% (absolute value). Compared with calibration each time, this modeling method can be used to determinate the nitrate concentration if ISE will be calibrated after using for a certain number of times.
{"title":"Measurement Experiment and Mathematical Model of Nitrate Ion Selective Electrode","authors":"Zhikai Chang, Ying Zhu, Li Zhang, S. Du","doi":"10.1109/IMCCC.2013.18","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.18","url":null,"abstract":"Compared with conventional laboratory chemical analysis, ion selective electrode (ISE) is time-saving, low-cost, ease of use and pollution-free. To detect soil nitrate nitrogen content rapidly, a nitrate ion selective electrode could be used. This paper studied characteristics of nitrate ISE. Potentiometric experiments utilizing nitrate ISE to measure sodium nitrate solution were conducted during the study. A linear regression model based on the Nernst equation was built using the least square method. Several groups of potential values were measured at one concentration and then the arithmetic mean of them was calculated. These mean values and their corresponding concentrations were used in LSM to reduce the impact of the relatively poor repeatability of ISE and reduce nitrate concentration prediction errors. The feasibility of the modeling method was verified using prediction errors as an index. In this study, extra data points except the calibration points were used to test the prediction error. Except several singular points, the relative error of this model was from 1.3% to 13.67% (absolute value). Compared with calibration each time, this modeling method can be used to determinate the nitrate concentration if ISE will be calibrated after using for a certain number of times.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123556237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Audio segmentation is a vital preprocessing step in several audio processing applications. An effective multi-stage real-time audio segmentation method based on time-frequency energy analysis is proposed in this paper. An energy distribution model for different frequency bands is built on Mel frequency domain. In the roughly segmentation stage, the starting or finishing points are estimated based on time domain energy. The frequency domain energy of audio and silence have different characteristics on the energy distribution model. Then, in the exactly segmentation stage, the endpoints are detected based on frequency domain energy. And the strategy of the initialization and dynamic adjustment of the thresholds are described. Experimental results show that this method achieves 3.6% and 7.0% reduction in false alarm rate and missed detection rate compared to GLR-BIC, and 7.7% and 11.5% reduction in false alarm rate and missed detection rate compared to double threshold method. We statistic the audio recognition accuracy of the sentences during 1s~6s and 6s~10s is higher. And the percentage of the sentences segmented by this method is 98% in these durations more than other two methods.
{"title":"An Effective Real-Time Audio Segmentation Method Based on Time-Frequency Energy Analysis","authors":"Chang Gao, Haifeng Li, Lin Ma, Wei Zhang","doi":"10.1109/IMCCC.2013.222","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.222","url":null,"abstract":"Audio segmentation is a vital preprocessing step in several audio processing applications. An effective multi-stage real-time audio segmentation method based on time-frequency energy analysis is proposed in this paper. An energy distribution model for different frequency bands is built on Mel frequency domain. In the roughly segmentation stage, the starting or finishing points are estimated based on time domain energy. The frequency domain energy of audio and silence have different characteristics on the energy distribution model. Then, in the exactly segmentation stage, the endpoints are detected based on frequency domain energy. And the strategy of the initialization and dynamic adjustment of the thresholds are described. Experimental results show that this method achieves 3.6% and 7.0% reduction in false alarm rate and missed detection rate compared to GLR-BIC, and 7.7% and 11.5% reduction in false alarm rate and missed detection rate compared to double threshold method. We statistic the audio recognition accuracy of the sentences during 1s~6s and 6s~10s is higher. And the percentage of the sentences segmented by this method is 98% in these durations more than other two methods.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115988258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Address resolution process' main work is convert IP address to physical address, detecting whether happened address conflicts, performing address reach ability testing, etc. Address resolution protocols (ARP or NDP) are important basic agreements of internet. There have been security problems because the protocol assumes that all nodes are reliable, lead to security problems. This paper reviewed the latest research of address resolution, described the security problems faced by address resolution, made a comparison of existing research methods, analyzed and classification elaborated, proposed a new topic for further study.
{"title":"Review of Address Resolution Process Attacks and Prevention Research","authors":"Song Guangjia, Ji Zhenzhou","doi":"10.1109/IMCCC.2013.221","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.221","url":null,"abstract":"Address resolution process' main work is convert IP address to physical address, detecting whether happened address conflicts, performing address reach ability testing, etc. Address resolution protocols (ARP or NDP) are important basic agreements of internet. There have been security problems because the protocol assumes that all nodes are reliable, lead to security problems. This paper reviewed the latest research of address resolution, described the security problems faced by address resolution, made a comparison of existing research methods, analyzed and classification elaborated, proposed a new topic for further study.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129503961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Laser communication (Lasercom) offer tremendous advantages over RF communication system in bandwidth and security. Laser terminals can be located on aircraft for transmitting a high speed data between aircraft or from an aircraft to ground. Based on advantages of Lasercom, the essentiality of the research was first proposed. Then, a feasible scheme of airborne Lasercom system was put forward, including optical subsystem, ATP subsystem and communication subsystem. Finally, key technologies and solutions of the system were analyzed.
{"title":"Research on Airborne Laser Communication Technology","authors":"Zhao Zhongyi, Tan Zhaosheng, Lian Linli","doi":"10.1109/IMCCC.2013.35","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.35","url":null,"abstract":"Laser communication (Lasercom) offer tremendous advantages over RF communication system in bandwidth and security. Laser terminals can be located on aircraft for transmitting a high speed data between aircraft or from an aircraft to ground. Based on advantages of Lasercom, the essentiality of the research was first proposed. Then, a feasible scheme of airborne Lasercom system was put forward, including optical subsystem, ATP subsystem and communication subsystem. Finally, key technologies and solutions of the system were analyzed.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129712326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bag of words (BoW) model, which was originally used for document processing field, has been introduced to computer vision field recently and used in object recognition successfully. However, in face recognition, the order less collection of local patches in BoW model cannot provide strong distinctive information since the objects (face images) belong to the same category. A new framework for extracting facial features based on BoW model is proposed in this paper, which can maintain holistic spatial information. Experimental results show that the improved method can obtain better face recognition performance on face images of AR database with extreme expressions, variant illuminations, and partial occlusions.
{"title":"Face Recognition Using the Improved Bag of Words Model","authors":"Xiao-Cui Li, Chun-hui Zhao, Yan Cang","doi":"10.1109/IMCCC.2013.172","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.172","url":null,"abstract":"Bag of words (BoW) model, which was originally used for document processing field, has been introduced to computer vision field recently and used in object recognition successfully. However, in face recognition, the order less collection of local patches in BoW model cannot provide strong distinctive information since the objects (face images) belong to the same category. A new framework for extracting facial features based on BoW model is proposed in this paper, which can maintain holistic spatial information. Experimental results show that the improved method can obtain better face recognition performance on face images of AR database with extreme expressions, variant illuminations, and partial occlusions.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129088061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The choice of routing protocols is an important issue in the establishment and design of Ad hoc networks. However, existing routing protocols are based on single traffic source or simple traffic models used in conventional networks like HTTP and video flows. In this paper we focus on choosing routing protocols for network with a composite traffic model that is closer to the real situation. This paper compares two common mobile ad hoc network (MANET) routing protocols, i.e., AODV and TORA in terms of both traffic delay and traffic deliver rate, in networks with different node mobility. Simulation results manifest that TORA outperforms AODV in the traffic deliver rate in all the scenarios. The best traffic deliver rate of TORA is 73.9% in static network. When the nodes in network are static, TORA excels AODV in traffic delay. However, when the nodes move, the traffic delay of AODV improves from 42.60s to 4.56s and is lower than that of TORA.
{"title":"MANET Routing Protocols Comparison for Composite Traffic Network","authors":"An Ran, Qu Jinxin, Sha Xuejun","doi":"10.1109/IMCCC.2013.303","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.303","url":null,"abstract":"The choice of routing protocols is an important issue in the establishment and design of Ad hoc networks. However, existing routing protocols are based on single traffic source or simple traffic models used in conventional networks like HTTP and video flows. In this paper we focus on choosing routing protocols for network with a composite traffic model that is closer to the real situation. This paper compares two common mobile ad hoc network (MANET) routing protocols, i.e., AODV and TORA in terms of both traffic delay and traffic deliver rate, in networks with different node mobility. Simulation results manifest that TORA outperforms AODV in the traffic deliver rate in all the scenarios. The best traffic deliver rate of TORA is 73.9% in static network. When the nodes in network are static, TORA excels AODV in traffic delay. However, when the nodes move, the traffic delay of AODV improves from 42.60s to 4.56s and is lower than that of TORA.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126994017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Definite modeling and known invariant parameters (including system parameters and noise statistics) are prerequisites of the well-known extended Kalman filtering (EKF). Naturally the performance of EKF may be degraded due to the fact that the statistics of measurement noise might change in practical situations. For nonlinear systems, an adaptive variational Bayesian extended Kalman filtering (AVBEKF) algorithm is developed in this paper. This algorithm regards both the system state and time-variant measurement noise as random variables to estimate. It provides a scheme that variances of measurement noises are approximated by variational Bayes, and thereafter system states are estimated at standard update step. Simulation results demonstrate that, in the context of a nonlinear model, the performance of the proposed filter is unaffected by the time-variant noise and AVBEKF is capable of tracking measurement noise as well.
{"title":"Adaptive Variational Bayesian Extended Kalman Filtering for Nonlinear Systems","authors":"Dingjie Xu, Chen Shen, F. Shen","doi":"10.1109/IMCCC.2013.346","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.346","url":null,"abstract":"Definite modeling and known invariant parameters (including system parameters and noise statistics) are prerequisites of the well-known extended Kalman filtering (EKF). Naturally the performance of EKF may be degraded due to the fact that the statistics of measurement noise might change in practical situations. For nonlinear systems, an adaptive variational Bayesian extended Kalman filtering (AVBEKF) algorithm is developed in this paper. This algorithm regards both the system state and time-variant measurement noise as random variables to estimate. It provides a scheme that variances of measurement noises are approximated by variational Bayes, and thereafter system states are estimated at standard update step. Simulation results demonstrate that, in the context of a nonlinear model, the performance of the proposed filter is unaffected by the time-variant noise and AVBEKF is capable of tracking measurement noise as well.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130676905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An adaptive acquisition threshold algorithm based on mean energy (MEAT) was proposed. Conditional probability of acquisition decision variable in MEAT was analyzed under the two hypotheses of synchronization and non-synchronization, and its false alarm probability and detection probability were deduced. Then simulation on Direct-Sequence Spread-Spectrum (DSSS) system using MEAT was made whose result shows the Constant False Alarm Rate (CFAR) characteristic of MEAT and the improvement of detection probability of MEAT relative to traditional fixed threshold algorithm.
{"title":"Adaptive Acquisition Threshold Algorithm Based on Mean Energy","authors":"Han Yu, Jia Guozhu","doi":"10.1109/IMCCC.2013.141","DOIUrl":"https://doi.org/10.1109/IMCCC.2013.141","url":null,"abstract":"An adaptive acquisition threshold algorithm based on mean energy (MEAT) was proposed. Conditional probability of acquisition decision variable in MEAT was analyzed under the two hypotheses of synchronization and non-synchronization, and its false alarm probability and detection probability were deduced. Then simulation on Direct-Sequence Spread-Spectrum (DSSS) system using MEAT was made whose result shows the Constant False Alarm Rate (CFAR) characteristic of MEAT and the improvement of detection probability of MEAT relative to traditional fixed threshold algorithm.","PeriodicalId":360796,"journal":{"name":"2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121360122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}