Share / Export Citation / Email / Print / Text size:

International Journal of Advanced Network, Monitoring and Controls

Xi'an Technological University

Subject: Computer Science , Software Engineering


eISSN: 2470-8038



Quadrotor Formation Control Method Based on Graph and Consistency Theory
Advanced Dynamic Autonomous Knowledge Learning Method for Distance Learning



Volume / Issue / page

Trending Articles

VOLUME 3 , ISSUE 2 (May 2018) - List of articles

Earthquake Damage Predicting System of Songyuan Based on GIS

Su Zhenjiang/ Huang Meng/ Xie Shaohui/ Zhang Dian/ Wang Zhe

With the rapid development of cities, the research on urban seismic damage prediction should have a breakthrough based on the modern technology. The paper takes Songyuan of Jilin Province as the research object, and creates a spatial database by field data and Baidu maps. We simulate the earthquake by using the seismic intensity algorithm of the point source and the line source, use the spatial analysis method of PHP+GIS to simulate the influence at different earthquake levels on the urban build(..)

DOI: 10.21307/ijanmc-2018-029

Research on Vehicle Detection Method Based on Background Modeling

Zhichao Lian/ Zhongsheng Wang

This paper mainly studies the background difference method in the field of intelligent traffic, proposes a background modeling method base on frame difference, and compares it with the statistical average background model and Gaussian distribution background modeling method. vehicle contour obtained by the morphological method. Finally, experiments were carried out on 4 normal road traffic surveillance videos, the effective detection rate used in this paper reaches 93.75%, which has a certain de(..)

DOI: 10.21307/ijanmc-2018-047

Levenberg-Marquardt Method Based Iterative Square Root Cubature Kalman Filter and its Applications to Maneuvering Re-entry Target Tracking

Mu Jing/ Wang Changyuan

Levenberg-Marquardt (abbr.L-M) method based iterative square root cubature Kalman filter (abbr. ISRCKFLM) inherits the numerical stability of square root Cubature Kalman filter and effectively suppresses the influence of the larger initial estimation error and the nonlinearity of the measurement equation on the state estimation in the nonlinear state estimation due to obtaining the optimal state and variance estimates using the latest measurement through L-M method. We apply the ISRCKFLM algorit(..)

DOI: 10.21307/ijanmc-2018-027

Research on Comprehensive Training Platform for Software Engineering Based on Android

Pan Chunhua/ Sun Yan/ Zan Fengbiao

With respect to the training program of software engineering specialty, this paper puts forward the comprehensive training platform of Chinese character dictation competition based on Android, and clarifies the purpose and main contents of the comprehensive training platform. Based on the hardware and software facilities of the campus, the C / S model training platform, the use of Android integrated training platform to achieve the Chinese character writing, clearing, timing and other functions,(..)

DOI: 10.21307/ijanmc-2018-031

Research of Email Classification based on Deep Neural Network

Wang Yawen/ Yu Fan/ Wei Yanxi

The effective distinction between normal email and spam, so as to maximize the possible of filtering spam has become a research hotspot currently. Naive bayes algorithm is a kind of frequently-used email classification and it is a statistical-based classification algorithm. It assumes that the attributes are independent of each other when given the target value. This hypothesis is apparently impossible in the email classification, so the accuracy of email classification based on naive bayes algo(..)

DOI: 10.21307/ijanmc-2018-038

The Remote Control System Based on the Virtual Reality

Su Xiaohui/ Dong Qiyu/ Huang Mengyao/ Xu Shuping

Aiming at the issues of random delay and delay uncertainty of the control information network, a kind of network remote closed-loop control structure based on virtual reality simulation is proposed. The method in accordance with the idea of open-loop system to achieve closed-loop control make the influence of network latency excluded real-time little closed-loop control system of controlled object value and no effect on the characteristics of the controlled object. Simulation results show that t(..)

DOI: 10.21307/ijanmc-2018-030

Research on the Construction of Sports Resources Information Platform Based on Big Data

Wang Shuangming/ Shi Jianwei/ Fu Shiqiu/ Xu Wanlin

The rapid development of communication technology such as big data makes the integration and application of sports resource information become the key of sports informatization construction. The construction of sports resources information big data platform is of great significance to the integration of sports resources and the sharing of sports resources. The subject explores the related theory of sports resources, studies the present situation of the application of sports resources, constructs(..)

DOI: 10.21307/ijanmc-2018-036

Advanced Dynamic Autonomous Knowledge Learning Method for Distance Learning

Yanfang Fu/ Xing Li/ Xueyao Feng/ Jing Ma

As the manufacturing of vast amount of information transmits at an unprecedented rate, traditional learning is no way to meet the needs of open learning and lifelong learning, how can distance learning be used to help us study become a problem to think about. Distance learning requires improvement of interactivity and initiative to achieve their aptitude. Using a variety of formats data, learners master the initiative in the learning process, it is not easy to lead to deviation from the learning(..)

DOI: 10.21307/ijanmc-2018-042

Semantic Analysis of the Wa Tautology in Subordinate Clauses with Minimal Independence Degree

Liu Yu/ Zhao Junhuai

Japanese boasts a great variety of tautological expressions, by which these tautologies fall into three categories indicated by particles, namely, ハ (pronounced wa), ガ (pronounced ga) and モ (pronounced mo). Some of which carry certain unusual semantic features when these tautologies are employed in clauses. This paper aims at analyzing the ハ (pronounced wa) tautology in subordinate clauses with minimal independence degree, and exploring the semantic properties of this category.

DOI: 10.21307/ijanmc-2018-028

An Improved Algorithm of the Collision Detection Based on OBB

Geng Chaoyang/ Gao Fenli

Collision detection plays a vital role in improving the sense of immersion and realism in virtual environment. The bounding box is the most basic collision detection algorithm, The OBB intersect test tightness and can able to significantly reduce the number of bounding volume. and try to occupy less storage space. Propose a bounding box of direction cylindrical So it can be improved though surrounded objects more close, then improve the efficiency of collision detection.

DOI: 10.21307/ijanmc-2018-033

Research of Distributed Control System for Oilfield Oil Pump Based on PLC and LAN

Shengquan Yang/ Gong Chen

In order to change the current bad situation such as the high cost of manpower, the failure to deal with the fault in time and the low management efficiency, etc. in oilfield oil pump measure and control, this paper puts forward the research and development of oilfield oil pump distributed control system based on PLC and LAN. Firstly this paper describes the operation principle of oil pump equipment and gives its network topology model. Secondly it designs the system macro distributed structure (..)

DOI: 10.21307/ijanmc-2018-040

Quadrotor Formation Control Method Based on Graph and Consistency Theory

Yang Sen/ Xi Leiping

This paper introduces graph and group system consistency theory and puts forward a quadrotor formation control method. The quadrotor is described as a second-order integrator dynamic system, and the relative position deviation of different quadrotors is used to describe formation. According to the communication topology relationship between quadrotors, the formation is modeled by graph theory. The fusion of the pilot-follow and graph theory method is analyzed, and a second-order coherence algori(..)

DOI: 10.21307/ijanmc-2018-032

Research on Digital Holographic 3D Reconstruction Software

Ma Jing/ Fu Yanfang/ Tian Penghui

Digital holography has a wide range of applications in displaying the surface morphology of three-dimensional objects. There have been many studies on the physical methods and implementation methods of digital holography. One of the main problems at present is to design a stable and fast reconfiguration software. This paper analyzes the basic principle of convolution based off-axis digital holographic reconstruction, and presents the process of 3D reconstruction of off-axis digital holography. T(..)

DOI: 10.21307/ijanmc-2018-039

Simulation of Self-similarFlowBased on Fractal Gaussian Noise Method

Li Jie/ Lu Ying/ Tang Junyong

The conventional network traffic flow models are mostly based on Poisson model. With the continuous development of network services, studies found that the actual network traffic has a long-range dependence (LRD) now and in a very long time, which is a kind of self-similarity. In this paper, RMD and Fourier algorithm were adopted to simulate and analyze a self-similar model of FGN. They generated the necessary sequence of self-similar traffic. Then the article uses R/S method to verify H value o(..)

DOI: 10.21307/ijanmc-2018-043

The Monitoring and Wireless Transmission System of PM2.5 in the Scenic

Wang Xiaohui/ Lei Kewei

This Scenic area has large traffic volume and complex environment and some scenic areas need to be protected. So developing an air quality monitoring system is very important. In this paper, the temperature sensor, the PM2.5 sensor and the wireless transmission module were combined by the MCU. It monitors the spot in PM2.5 concentration and the temperature information. When the PM2.5 concentration is higher than the threshold, the wireless transmission module sends the warning signal. So the sys(..)

DOI: 10.21307/ijanmc-2018-035

Research and Implementation of the Key Technology of UAV Aerial Image Transmission

Fan Yijun/ Lai Yufeng

With the maturity of UAV technology, especially the cost of the four rotor unmanned aerial vehicle is decreasing, the unmanned aerial vehicle (UAV) will be a trend in the future. At the same time, because ZigBee has the characteristics of low cost, low speed and short transmission distance, we use ZigBee to achieve the transmission of image files between UAV and ground receiving system computers. This paper introduces the system design and software program module hardware node design, the first (..)

DOI: 10.21307/ijanmc-2018-052

Design and Development of the Mass Image Storage Platform Based on Hadoop

Xiaoqing Zhou/ Jiangjing Gou/ Zhiyong Zhou/ Jiaxiu Sun

With fast development and deep appliance of the Internet, problem of mass image data storage stand out, so the problem of low management efficiency, low storage ability and high cost of traditional storage framework has appeared. The appearance of Hadoop provides a new thought. However, Hadoop itself is not suit for the handle of small files. This paper puts forward a storage framework of mass image files based on Hadoop, and solved the internal storage bottleneck of NameNode when small files ar(..)

DOI: 10.21307/ijanmc-2018-034

Research on Bounding Volume Boxes Collision Detection Algorithm in Virtual Reality Technology

Wan Chao/ Liu Pingping/ Hong Bo

This paper take the development of virtual campus roaming system as an example. Aiming at the defects of the different kinds of bounding boxes collision detection technology, analyzes the advantages of the hybrid hierarchical bounding box collision detection algorithm based on spheres and oriented bounding box, and described the way to construct it. Finally, the algorithm is tested in the VC and Unity3d engine, a good result is obtained.

DOI: 10.21307/ijanmc-2018-041

A Searchable Re-encryption Storage Method in Cloud Environment

Wang Hui/ Hong Bo/ Tang Junyong

Traditional cloud storage systems do not adapt well to different application environment and does not guarantee the integrity and confidentiality of cloud data. In order to solve the problems brought by the hysteretic and density in the cloud storage system,A Searchable Re-encryption Storage Method (SReCSM) is proposed in this paper. The central idea of the SReCSM is to generate a re-encryption key and decrypte while the keyword matched. Simulation results show that SReCSM introduced in this pap(..)

DOI: 10.21307/ijanmc-2018-046

Research on the Application of Political Teaching Under the Network Platform

Pan Yingli

With the advent of the era of network, information technology has penetrated into many fields such as politics, economy, culture and so on. Human’s production mode, life style and learning way have changed greatly. The traditional educational mode has been unable to meet the diverse needs of students. Our educational reform and development are facing unprecedented challenges. The driving point of educational reform is to drive educational modernization with educational information. In this conte(..)

DOI: 10.21307/ijanmc-2018-044

Research on the Key Technology of Survey Measurement Image Based on UAV

Ding Li/ Chong Jiao

With the development of computer technology, especially the emergence of high resolution image sensor, aerial photogrammetry has played an important role in geological survey. Traditional aerial measurements are carried out by manned large aircraft, with a large volume of measured information and a wide range of shots. This method is suitable for large area operation, which is high and expensive for hardware site. UAV air measurement systems are usually used for small area measurements. The UAV (..)

DOI: 10.21307/ijanmc-2018-053

The Establishment and Implementation of Information Network Security Plan

Wang Yuanyuan

This paper explains the idea of information security and discusses the establishment of the security system of information network. By using the information system security engineering method, we will establish and improve the network security plan and disaster recovery plan through strict organization and management, adequate financial support, strong talent support and deep technical guarantee. This paper puts forward the overall strategic goal of the “people-oriented, to prevent the main” net(..)

DOI: 10.21307/ijanmc-2018-050

The Design of QoS Guarantee Strategy Framework for Networked Control System

Yang Weixia/ Xu Fei/ Wang Shaochang

For networked control systems such as packet loss and delay of the basic problems, this article launches the research from the perspective of network scheduling optimization, build the QoS semantic model and service model for networked control, puts forward the multi-level QoS guarantee strategy deployment algorithm and QoS, QoS access algorithm components; On a class of networked control middleware prototype system of network resources to meet of components and component deployment simulation e(..)

DOI: 10.21307/ijanmc-2018-037

Research on Information Service of Home Care in Internet Plus Era

Jie Zhao

In the “Internet plus” era, information technology will be applied to the community home-based care services is a new initiative to create wisdom of the pension industry. With the full use of the Internet and large data, the new model of home care for the elderly needs the active participation of the social organizations (enterprises), and the correct guidance of the government. Strengthening the top-level design of government, establishing the information standard and enhancing the applicabilit(..)

DOI: 10.21307/ijanmc-2018-051

Research on Robust Model for Web Service Selection

Wei Yanxi/ Yu Fan/ Ma Xing/ Yu Haige/ Yang Wenhui

Most existing service quality models use defined Quality of Service parameters for service selection.Since a large number of uncertainties exist, the QoS performance indicators in the runtime of the composite services obtained through the model and method based on the determined QoS will be worse even beyond the range acceptable to the users. Web services can solve this problem and become the most reasonable solution in the current application environment. Web services can solve this problem and(..)

DOI: 10.21307/ijanmc-2018-049

University Library Internet WeChat Public Account Applicated for Student Values Education

Yan Zhao

With the popularization of intelligent mobile phone, mobile phone instant messaging application has achieved rapid development, at the same time, along with the SNS (Social Network Service) development, combined with mobile phone instant messaging and SNS has become an important means of the current Internet environment for people to communicate, in this trend, the university library is constantly looking for every kind of platform the expansion of information service. WeChat is a public platfor(..)

DOI: 10.21307/ijanmc-2018-048

Design and Implementation of Music Recommendation System Based on Hadoop

Zhao Yufeng/ Li Xinwei

In order to solve the problem of information overload of music system under large data background, this paper studies the design scheme of distributed music recommendation system based on Hadoop. The proposed algorithm is based on the MapReduce distributed computing framework, which has high scalability and performance, and can be applied to the calculation and analysis of off-line data efficiently. The music recommendation system designed in this paper also includes client, server interface, da(..)

DOI: 10.21307/ijanmc-2018-045

No Record Found..
Page Actions