Wang M.,University of Science and Technology of China |
Kang D.,Haikou College of Economics
Proceedings - 2015 11th International Conference on Computational Intelligence and Security, CIS 2015 | Year: 2015
It has analysed the related technology of promoting Instructional Micro Video correlation in the paper, and proposed the semantic representation of Instructional micro video. Based on the characteristics of Instructional micro video, it has put forward the semantic representation of instructional micro video from the perspective of ontology metadata. At last, a case has been designed to state how to apply the ontology metadata for the Instructional Micro Video semantic representation in order to promote the correlation. © 2015 IEEE.
Yang B.,Haikou College of Economics
Industrial, Mechanical and Manufacturing Science - Proceedings of the 2014 International Conference on Industrial, Mechanical and Manufacturing Science, ICIMMS 2014 | Year: 2015
With the development of technology of construction engineering, natural diseases have warned the construction industry that the anti-seismic design must be applied to the construction engineering to ensure the construction quality. In the work, the anti-seismic design technique is used to solve the problems of the modern construction engineering in order to realize the high quality standard of construction engineering. In addition, the corresponding measurement and suggestion are proposed based on the anti-seismic maintenance and management of construction engineering. © 2015 Taylor & Francis Group, London.
Li J.,Haikou College of Economics
Proceedings - 2015 International Conference on Intelligent Transportation, Big Data and Smart City, ICITBS 2015 | Year: 2015
This paper studies the improvement and implementation of access control method under ABAC model in detail. By further analysis of encyption principle and algorithm implementation process, and contrast on mainstream ABE algorithms, it selects CP-ABE as access control algorithm for security and performance, to be used in ABAC access control model under cloud computing environment. We improve the algorithm and optimize the system to reduce the computation during access control process. So it can well integrate with ABAC model to protect the privancy of information resource. The tests show the improved scheme has rapid speed in encryption/decryption with ABAC model, and needs smaller storage space, which is also a better encryption mechanism for cloud environment. © 2016 IEEE.
Gao D.,Haikou College of Economics |
Wang R.,Guangxi Teachers Education University
Proceedings - 9th International Conference on Computational Intelligence and Security, CIS 2013 | Year: 2013
Based on the Lyapunov stability theory and free-weighting matrix approach, a class of systems with distributed delays is researched, and a new stability criterion is derived in terms of linear matrix inequality(LMI).Finally, a simulation example is given to illustrate the validity of the method. © 2013 IEEE.
Fan D.-F.,Haikou College of Economics
Open Cybernetics and Systemics Journal | Year: 2015
In the traditional teaching mode, teachers in order to establish the authority of the classroom, usually in front of the students showed severe image, this will enable students to have a psychological fear, this relationship will caused the gap between teachers and students and influence between teachers and students in the normal communication and students' healthy growth of teachers. We want to change the normal teacher-student interaction mode, so that teachers and students can be generated between the two-way communication, so that students in the physical and mental health development, learning in a happy environment. This paper expounds the concept of teacher-student interaction, according to the characteristics of physical education teachers and students, and puts forward the Countermeasures of the communication between teachers and students. © 2015 Di-feng Fan.