Heihe, China

Heihe University

Heihe, China
Time filter
Source Type

Chen Z.,Heihe University
MATEC Web of Conferences | Year: 2017

At present, the sports dance has entered every stage of the people's life, has become the public's favorite sport. Sports dance has been well developed. This article mainly uses the literature material law to carry on the detailed analysis to the sports dance constitution, elaborated in detail the sports dance artistic expression. The composition of sports dance elements; sports dance is a form of dance art show; sports dance through the dance art can be divided into three aspects, namely, form, music, shape of the expressive force. In this paper, the study will be more in-depth excavation of the cultural connotation of sports dance, and promote the development of sports dance can be more comprehensive. In 20s of last century, Chinese Sports Dance Association officially joined the International Sports Dance Association, which also makes our country's sports dance and international exchange more frequent. However, due to China's sports dance sports dance learning time is not long, while learning is influenced by Chinese traditional culture, the sports dance movements are too conservative, there is a very large gap and international enthusiasm, bold and unrestrained, the pursuit of individual sports dance in the dance style, music and performance hand. Sports dance originated from abroad, it is produced in the daily life of people in foreign countries. China's domestic sports dance players in learning dance at the same time, the production and the connotation of dance is not very understanding, therefore, it is difficult to better reflect the emotional expression of sports dance. Although the sports dance is a kind of similar to the competitive projects, but it is also a kind of dance culture, and to constitute a force from the dance art show a detailed study, detailed mining playing officer of sports dance performance further, reducing China's sports dance and international sports dance gap. © The Authors, published by EDP Sciences.

Su D.,Heihe University
Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science) | Year: 2014

In this paper, a novel feature extraction algorithm in Shearlet domain is proposed. Neighborhood Discriminant Nearest Feature Line Analysis (NDNFLA) is a powerful tool for feature extraction. To enrich the research of NDNFLA, we design a approach to perform NDNFLA in Shearlet domain. The experimental results demonstrates the efficiency of the proposed algorithm. © Springer International Publishing Switzerland 2014.

Jiao Q.,Heihe University
Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science) | Year: 2014

In this paper, a novel feature extraction algorithm in Curvelet domain is proposed. Slant Discriminant Analysis (SDA) is a powerful matrix-based approach for feature extraction. The proposed algorithm aims to extract the most discriminant features of the samples in Curvelet Domain. Compared with several classical algorithms, the efficiency of the proposed algorithm is confirmed by the experimental results. © Springer International Publishing Switzerland 2014.

Luo X.,Heihe University
Lecture Notes in Electrical Engineering | Year: 2014

The method of Homey far is improved in this paper and the membership parameters optimized algorithm of fuzzy inference control model based on genetic algorithm is also proposed. It is actually the optimization of membership function parameters of antecedent and consequent in fuzzy controller. Ourmethod makes regular fuzzy division with the triangle membership function, which ensures the accordance and completeness of inference system. The optimization parameters needed our method when dealt with the problem of fuzzy division for one-dimension m fuzzy sets. © Springer-Verlag Berlin Heidelberg 2014.

Zhang D.C.,Heihe University
Advanced Materials Research | Year: 2014

Information education is using to improve information literacy and creative thinking skills talents. Cultivation is able to recognize self-information and it can be retrieved.Using the integrated assessment capability information can improve efficient of Basketball Competition. This article will discusses how to use modern information evaluation system to improve basketball education. © (2014) Trans Tech Publications, Switzerland.

Ping L.,Heihe University
Proceedings - 2014 5th International Conference on Intelligent Systems Design and Engineering Applications, ISDEA 2014 | Year: 2014

The real-time acquisition and transmission system of agricultural drought data is researched. With the real time acquisition and analysis of agricultural drought data, it can effectively and accurately predict and analyze the agricultural drought data and provide scientific decision-making of water supply and drainage engineering. It has great significance in increasing agricultural production and to promoting agricultural production. Based on Internet of things technology, the networking sensing layer is distributed in the agricultural infrastructures, real-time data acquisition is realized, the network transmission layer is used to transmit the agricultural drought data, the scientific decision-making of water supply and drainage is realized in the decision layer based on expert system, the scientific decision-making of water supply and drainage is realized. The design scheme of agricultural drought data acquisition and transmission system is proposed based on Internet of Things. The infrared detector 512X10 is designed, the amplification of the input matching circuit are used in circuit design with low noise, for filtering and de-noising processing is realized in the FPGA for the agricultural drought data acquisition. Simulation result shows that the system acquisition and transmission performance is perfect, and it has prospective application value in the agricultural drought data acquisition and analysis. © 2014 IEEE.

Fan Y.B.,Heihe University
Advanced Materials Research | Year: 2014

There are two main risks in aging society. First, macroeconomic stall caused by labor shortages. Second, the basic pension insurance fund income over expenditure, causing social instability. Now there is not research about risk assessment. Russia and China have different social system, based on catastrophe series method to create aging risk evaluation system. This paper valuates the aging risk from the impact of the economic system and the social systems. This method combines the quantitative indicators and qualitative indicators, and it doesn't need to determine the index weight. Finally China and Russia have been at the severe aging risk. © (2014) Trans Tech Publications, Switzerland.

Xia K.L.,Heihe University
Applied Mechanics and Materials | Year: 2014

The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference. © (2014) Trans Tech Publications, Switzerland.

Xin M.,Heihe University
Proceedings - 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2015 | Year: 2015

Internet of things has be broadly applied for home, industry, and many other applications. For these applications, secure information transmission becomes a critical issue to ensure the system safety. Hybrid encryption technique is a new cryptographic paradigm and it can be applied to the Internet of Things. It provides the benefit of the symmetric key and asymmetric key performance. It enables strong security and low computational complexity. In this paper, we proposed a mixed encryption algorithm to provide information integrity, confidentiality, non-repudiation on the data transmission for Internet of Things. We demonstrate the security efficiency with the comparison with traditional encryption algorithms. © 2015 IEEE.

Zhou S.-H.,Heihe University
International Journal of Advancements in Computing Technology | Year: 2012

The paper proposed a remote interactive Three-dimensional network of teaching resources exchange platform systems based on cloud technology that are able to changing ways of learning, improving the quality of talent cultivation, also construction resource over the network, further deepening the teaching reformation, promote the application of modern information technology in teaching. The system using a Blade Server System supported by database systems, PC and handheld terminal for Windows operating systems, enabling the sharing of high quality teaching resources. Also proposed using terminal resources interactively that are able to enhance the practicality of the course greatly.

Loading Heihe University collaborators
Loading Heihe University collaborators