Guangdong Police College

Guangzhou, China

Guangdong Police College

Guangzhou, China
Time filter
Source Type

Zhou Y.,Guangdong Police College | Yang X.,Guangdong Police College
Proceedings - 12th International Conference on Computational Intelligence and Security, CIS 2016 | Year: 2016

Smart antennas are widely used for wireless communications due to their ability to increase the coverage and capacity of communication systems. Adaptive algorithm is one of the core technologies of smart antenna. Adaptive beamforming can receive signal from a certain direction by adjusting the array weight vector to enhance the desired signal and suppress the interference and noise. This paper proposes a new adaptive beamforming algorithm by analyzing and improving an algorithm based on projection of gradient vector. We apply this algorithm to a Uniform Linear Array (ULA) and its improved structure to compare its performance with that of the conventional Least Mean Square (LMS) algorithm. Simulation results show the effectiveness of the new algorithm. © 2016 IEEE.

Mou L.,Guangdong Police College | Yang M.,Guangdong Police College
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics | Year: 2017

Precise location of striation in the image is a key technology to realize automatic examination and comparison for criminal striation tool mark. At present, the edge detection methods are often applied to extract lines from tool mark. However, the edge detection methods are sensitive to image noise, and easily produce false edges. The realistic striations are difficult to be located precisely and extracted by using edge detection methods for tool mark. The precise location approach of striation by integrating image context and second derivative edge fusion was proposed in the article. Firstly, the comparison line was defined based on the method of artificial identification. The second derivative of image was computed along comparison line. The ridge and groove regions of striation mark were calculated by utilizing rules fusion for derivative values according to the properties of second derivative edge. Then, the ridge and groove regions were optimized and normalized, false striations in the deep grooves were deleted as well, based on the experience of artificial identification. Lastly, the significant points among ridge regions were computed by integrating image context and the striations were located precisely. On the basis of striation locating precisely, the registration of experimental samples was performed using registration vectors such as ridges with second derivative maximal absolute values, ridges with maximal gray scale, deepest grooves, as well as distances among them. The experimental results show that the approach presented in the paper can locate the striations and make image registration precisely and fast. Higher rate of registration can be reached especially for striation marks produced by tools with prominent individual features on the work side. Obviously, the proposed method is helpful to establish automatic comparison system for striation tool mark. © 2017, Beijing China Science Journal Publishing Co. Ltd. All right reserved.

Liao G.,Guangdong Police College | Chen W.,Guangdong University of Technology | Wu Y.,Guangdong University of Technology
Chinese Control Conference, CCC | Year: 2016

Facial features are complex data sets including both personal features and common features. Gender recognition based on facial features is a study on common features of facial features, and has already been a research focus nowadays for its wide applications. Referring to achievements of facial measurement, we used the depth gradient and the distance of facial features based on two-dimensional and three-dimensional information of human face as feature inputs, and trained the gender recognition model utilizing the random forest algorithm. We tested it on public facial database and small-scale independently collected 3D facial database, and the result of the experiment was satisfactory. Besides, the performance of the algorithm under the circumstances of feature missing was also valued in this paper. © 2016 TCCT.

Peng J.X.,Guangdong Police College | Zhou Y.J.,Guangdong Police College
Applied Mechanics and Materials | Year: 2014

manufacturing e-commerce systems are considered as the backbone of the manufacturing industry in China, Vulnerabilities in web applications continue to be the most frequently discovered security problem. This article illustrates a trusted operating systems how to provide a flexible solution to the problem of application for e-commerce. Then analyzes the manufacturing actualities of small and medium-scale corporations and puts forward the industrial product quality long-distance testing and pre-evaluating expert system based on network. © 2014 Trans Tech Publications, Switzerland.

Zou T.-F.,Changsha University of Science and Technology | Zhang Y.-G.,Guangdong Police College
Zhendong yu Chongji/Journal of Vibration and Shock | Year: 2013

More and more accidents are simulated by accident reconstruction software, so the uncertainty problem of reconstruction results by using accident simulation data draws more and more attention. The upper and lower bound method, finite difference method and response surface method, which can be used in evaluating uncertainty of reconstruction results were introduced. And then the simulation time consumption needed for each method was analyzed. The feasibility of these methods was proved through three numerical examples, and the strength and weakness of each method were summarized. It is concluded that the response surface method is of the most adaptability. Finally, a method for analyzing the large-scale uncertainty problem in accident reconstruction was proposed. Conclusions obtained can be used to guide research on evaluating the uncertainty of reconstruction results.

Zhang Y.,Guangdong Police College | Zou T.,Changsha University of Science and Technology
Proceedings - 2016 8th International Conference on Measuring Technology and Mechatronics Automation, ICMTMA 2016 | Year: 2016

In order to gain experience and lesson from accidents in a better way, basic steps of accident reconstruction and simulation method is put forward and an analytic method of road segment traffic safety is discussed. This method firstly establishes a road model of accident scene, then establishes an accident participant model (people, vehicle, road block, etc.), then conducts repeated simulations to ensure that simulation results can explain all measured traces on accident scene, and then based on effective simulation of the accident, continue to conduct simulations by changing conditions like people, vehicle, road, etc. In order to study traffic safety of this road segment. Finally, demonstrate steps of this method through a real accident case. The result shows that the analytic method for traffic safety of road segment based on accident reconstruction can intuitively analyze traffic safety problems of road segment on which the accident occurs. © 2016 IEEE.

Jiehui O.,Guangdong Police College
2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012 - Proceedings | Year: 2012

With the development of information technology, digital information resources has become increasingly obvious trend, digital information resource has become the key strategic resource of development of human society, especially since the new century, informatization construction effect is distinct. In the worldwide network environment, digital research environment for learning provides more flexible, more convenient, and more capacious platform for the development of building and running for scientific research team. In order to clarify the effect of scientific research team, to grasp the scientific research team of the future development of the basic situation, it is important for universitise to draw on the advantages and avoid disadvantages to the use of new technology in construction of new period. © 2012 IEEE.

Peng J.X.,Guangdong Police College
Advanced Materials Research | Year: 2014

The setting-up of risk programming model under ASP platform makes the dynamic alliance prevent, control various kinds of risks with the minimum cost. On the basis of discerning various kinds of risks to the dynamic alliance, the risk evaluation model with the immune Genetic algorithm was set up. This paper studies the vertical search engine in manufacturing resource based on Nutch, for the first time introduces the Nutch to the search engine.The urls of Fetchlist come from the associator enterprise in Chinese Machine Commerce Net. © (2014) Trans Tech Publications, Switzerland.

Zhou Y.,Guangdong Police College | Liu W.,Guangdong Police College
2nd International Conference on Information Science and Engineering, ICISE2010 - Proceedings | Year: 2010

Image retrieval method in discrete cosine transform (DCT) compressed domain, which based on the color feature of diagonal sub-image by extracting the dominant color information from DCT domain directly, is studied in this paper, the simulation shows the effectiveness of the proposed method. © 2010 IEEE.

Song Q.,Guangdong Police College
Forensic Science International | Year: 2015

Chemical etching technique is widely used for restoration of obliterated engraved marks on steel surface in the field of public security. The consumed thickness of steel surface during restoration process is considered as a major criterion for evaluating the efficiency of the chemical etching reagent. The thinner the consumed thickness, the higher the restoration efficiency. According to chemical principles, maintaining the continuous oxidative capabilities of etching reagents and increasing the kinetic rate difference of the reaction between the engraved and non-engraved area with the chemical etching reagent can effectively reduce the consumed steel thickness. The study employed steel surface from the engine case of motorcycle and the car frame of automobile. The chemical etching reagents are composed of nitric acid as the oxidizer, hydrofluoric acid as the coordination agent and mixed with glacial acetic acid or acetone as the solvents. Based on the performance evaluation of three different etching reagents, the one composed of HNO3, HF and acetone gave the best result. © 2015 Elsevier Ireland Ltd.

Loading Guangdong Police College collaborators
Loading Guangdong Police College collaborators