Share / Export Citation / Email / Print / Text size:

International Journal of Advanced Network, Monitoring and Controls

Xi'an Technological University

Subject: Computer Science , Software Engineering


eISSN: 2470-8038



Quadrotor Formation Control Method Based on Graph and Consistency Theory
Advanced Dynamic Autonomous Knowledge Learning Method for Distance Learning

VOLUME 3 , ISSUE 3 (Oct 2018) - List of articles

Exponential Synchronization for Fractional-order Time-delayed Memristive Neural Networks

Ding Dawei/ Zhang Yaqin/ Wang Nian

Abstract Considering the fact that the exponential synchronization of neural networks has been widely used in theoretical research and practical application of many scientific fields, and there are a few researches about the exponential synchronization of fractional-order memristor-based neural networks (FMNN). This paper concentrates on the FMNN with time-varying delays and investigates its exponential synchronization. A simple linear error feedback controller is applied to compel the response (..)

DOI: 10.21307/ijanmc-2019-001

Application of K-means Algorithm in Geological Disaster Monitoring System

Wang Jianguo/ Xue Linyao

Abstract The K-means algorithm is considered to be the most important unsupervised machine learning method in clustering, which can divide all the data into k subclasses that are very different from each other. As K-means algorithm is simple and efficient, it is applied to data mining, knowledge discovery and other fields. This paper proposes CMU-kmeans algorithm with improved UPGMA algorithm and Canopy algorithm. The experimental results is that the algorithm can not only get the number k of th(..)

DOI: 10.21307/ijanmc-2019-002

Research on Multi - Resonant LCL Harmonic Suppression Strategy

Jingwen Chen/ Xin Zhou/ Hongshe Dang

Abstract Aiming at the resonance problem in the process of grid connection of LCL filter microgrid inverter, a multi-resonance LCL harmonic suppression strategy is proposed. On the basis of analyzing the principle and establishing the mathematical model in detail, the realization process of the multi-resonance constant power compound control strategy is studied emphatically. Through the simulation, the validity of the control strategy is verified, The results show that the scheme stabilizes the (..)

DOI: 10.21307/ijanmc-2019-003

Searchable Re-encryption Cloud Storage Method Based on Markov Chain

Wang Hui/ Wang Zhong Sheng/ Li Jinguang

Abstract Cloud storage is an emerging paradigm that offers on-demand, flexible, and elastic computational and storage services for the terminal users. When the large amount of data increases dramatically, the storage efficiency of the system would be decreased seriously. In this paper a new method of SReCSM(Searchable Re-encryption Cloud Storage Method) based on Markov chain is proposed. It predicts periodically by using the steady Markov strategy in stages and easy to select the optimal storage(..)

DOI: 10.21307/ijanmc-2019-004

Design and Analysis of Thermoplastic Metal Detector RC Car with Wireless Charging

Haifa El-Sadi/ Matthew R. Cole/ Aaron M. Denis/ Derek Fernandes/ Alberto Benhamu-Chocron

Abstract The RC Car industry is a growing industry that will always be a past time for the older generation. This research is focused on a specific type of RC Car which is a Metal Detecting one. Metal Detectors have been developed for many years. Through research there aren’t many metal detecting RC Cars on the market. Currently it’s extremely limited in range and depth of detection. The goal of this research is to improve, build and test a new RC-metal detector technology. A thermoplastic-ABS u(..)

DOI: 10.21307/ijanmc-2019-005

A New Method of Improving the Traditional Traffic Identification and Accuracy

Wang Zhongsheng/ Gao Jiaqiong

Abstract As the traffic generated by the increasing number of applications on the Internet is becoming more and more complex, how to improve the quality of service and security of the network is also increasingly important. This paper studies the application of Support Vector Machine (SVM) in traffic identification to classify network traffic. Through data collection and feature generation methods and network traffic feature screening methods, SVM is used as a classifier by using the generalizat(..)

DOI: 10.21307/ijanmc-2019-006

Multi Antenna Precoding Algorithm Based on M Spread Spectrum

Sun Ruihua/ Bai Junying/ An Yongli

Abstract MIMO multi antenna technology can increase the capacity and channel utilization of the communication system without increasing the bandwidth, and become the key technology in the new generation of mobile communication system. However, each channel has its own channel parameters, so in the process of signal transmission, the influence of channel parameters should be considered. When the signal is received, it needs to be restored, which leads to the complexity of the receiving signal. Th(..)

DOI: 10.21307/ijanmc-2019-007

Readings of Portable UV Spectrum Analyzer Data Based on Raspberry Pi

Xu Shuping/ Huang Mengyao/ Xu Pei

Abstract Most of the spectrometer has the advantages of large volume, inconvenient carrying, slow data reading, long development cycle and high cost. In view of this situation, this paper presents a raspberry based portable spectrum analyzer. The general structure, working principle and data reading principle of the portable ultraviolet spectrum analyzer system based on raspberry faction are introduced in detail. And the raspberry sent a brief introduction, and finally introduced the raspberry p(..)

DOI: 10.21307/ijanmc-2019-008

A CEP Privacy Security Access Control Framework Based on Event Attribute Detecting Tree

Bo Hong/ Xin Jing

Abstract Complex event processing (CEP) technology is a study focus in the data flow processing area, while privacy security protection is the key problem that needs to be solved. In order to prevent illegal users from acquiring any information via registered event patterns, this paper discusses the CEP privacy security access control object in depth, formally defines four types of event attribute operators including completely read, partially read, access denied and quantity statistics, present(..)

DOI: 10.21307/ijanmc-2019-009

The New Method of Sea-sky Line Detection Based on Mathematical Morphology

Zhang Wenqi/ Bai Wanmin/ Yu Jun/ Gao Shouyi

Abstract To solve the problem of low accuracy and robustness of sea-sky line detection, this paper presents a method of sea- sky line detection based on the mathematical morphology. Firstly, the mathematical morphology closed-open operation is used to filter and denoise the sea-sky image. Then the Canny operator is used to obtain the sea-sky boundary of the image, Then mathematical morphological operation is used to remove some disturbing points. Finally, the sea-sky line is detected by Hough tr(..)

DOI: 10.21307/ijanmc-2019-010

Cheap and Simple Slip Sensor Based on the Optical Sensor

Feibi Liu

Abstract The purpose of this project is to manufacture a cheap and simple slip sensor. The slip sensor is based on the optical sensor. The experiment divides into two parts, how to build sensor and how to test the features of the sensor. The slip sensor could be divided into three parts, cover, optical sensor and adaptor board, which will connect to the suitable resistors circuit to obtain the large gain. During the test, the participant applies the static state way to measure the relationship b(..)

DOI: 10.21307/ijanmc-2019-011

Research and Improvement of Apriori Algorithm Based on Hadoop

Gao Pengfei/ Wang Jianguo/ Liu Pengcheng

Abstract Association rules can forcefully get a horizontal relation in the big data, the Apriori algorithm is one of the most significant association rules. Traditional mining based on parallel Apriori algorithms needs much more time in data IO with the increasing size of large transaction database. This paper improves the Apriori algorithm from compressing transactions, reducing the number of scans and simplifying candidate set generation. And then the improved algorithm is parallelized on the (..)

DOI: 10.21307/ijanmc-2019-012

A Study of Intelligent Reading Model

Yu Jun/ Hu Zhiyi/ Kang Qinyu/ Li Zhonghua

Abstract In order to solve the problem of how to find out the required information quickly from a large number of reading texts, this paper constructs an intelligent reading model. The model adopts the principle of "the minority obeys the majority". The results of the classifier trained by the three algorithms, those are decision tree, Bagging and Gauss Bayes algorithm, are filtered to build an intelligent reading model. Based on the experimental results, the objective evaluation results of the (..)

DOI: 10.21307/ijanmc-2019-013

No Record Found..
Page Actions