Heihe, China

Time filter

Source Type

Su D.,Heihe University
Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science) | Year: 2014

In this paper, a novel feature extraction algorithm in Shearlet domain is proposed. Neighborhood Discriminant Nearest Feature Line Analysis (NDNFLA) is a powerful tool for feature extraction. To enrich the research of NDNFLA, we design a approach to perform NDNFLA in Shearlet domain. The experimental results demonstrates the efficiency of the proposed algorithm. © Springer International Publishing Switzerland 2014.

Jiao Q.,Heihe University
Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science) | Year: 2014

In this paper, a novel feature extraction algorithm in Curvelet domain is proposed. Slant Discriminant Analysis (SDA) is a powerful matrix-based approach for feature extraction. The proposed algorithm aims to extract the most discriminant features of the samples in Curvelet Domain. Compared with several classical algorithms, the efficiency of the proposed algorithm is confirmed by the experimental results. © Springer International Publishing Switzerland 2014.

Luo X.,Heihe University
Lecture Notes in Electrical Engineering | Year: 2014

The method of Homey far is improved in this paper and the membership parameters optimized algorithm of fuzzy inference control model based on genetic algorithm is also proposed. It is actually the optimization of membership function parameters of antecedent and consequent in fuzzy controller. Ourmethod makes regular fuzzy division with the triangle membership function, which ensures the accordance and completeness of inference system. The optimization parameters needed our method when dealt with the problem of fuzzy division for one-dimension m fuzzy sets. © Springer-Verlag Berlin Heidelberg 2014.

Zhang D.C.,Heihe University
Advanced Materials Research | Year: 2014

Information education is using to improve information literacy and creative thinking skills talents. Cultivation is able to recognize self-information and it can be retrieved.Using the integrated assessment capability information can improve efficient of Basketball Competition. This article will discusses how to use modern information evaluation system to improve basketball education. © (2014) Trans Tech Publications, Switzerland.

Ping L.,Heihe University
Proceedings - 2014 5th International Conference on Intelligent Systems Design and Engineering Applications, ISDEA 2014 | Year: 2014

The real-time acquisition and transmission system of agricultural drought data is researched. With the real time acquisition and analysis of agricultural drought data, it can effectively and accurately predict and analyze the agricultural drought data and provide scientific decision-making of water supply and drainage engineering. It has great significance in increasing agricultural production and to promoting agricultural production. Based on Internet of things technology, the networking sensing layer is distributed in the agricultural infrastructures, real-time data acquisition is realized, the network transmission layer is used to transmit the agricultural drought data, the scientific decision-making of water supply and drainage is realized in the decision layer based on expert system, the scientific decision-making of water supply and drainage is realized. The design scheme of agricultural drought data acquisition and transmission system is proposed based on Internet of Things. The infrared detector 512X10 is designed, the amplification of the input matching circuit are used in circuit design with low noise, for filtering and de-noising processing is realized in the FPGA for the agricultural drought data acquisition. Simulation result shows that the system acquisition and transmission performance is perfect, and it has prospective application value in the agricultural drought data acquisition and analysis. © 2014 IEEE.

Gao X.,Heihe University
International Journal of Simulation: Systems, Science and Technology | Year: 2016

Infectious diseases (plague) are often popular around the world, such as cholera, smallpox, AIDS, SARS, H1N1 virus. Setting up the mathematical model of infectious disease, analyzing its regularity, and preventing its spread are a daunting task. This paper which only discusses the mathematical model of infectious diseases will spread the general laws. Firstly this paper introduces the reader to how to use ordinary mathematical model of differential equations which is established, so that readers are familiar with some simple mathematical model and the modeling steps of ordinary differential equations. Then the paper discusses research theme and application of ordinary differential equation model in the research of infectious diseases. In the course of the study, the first step will make the crowd be divided into three categories, including S (susceptible), I (infection), R (removed); the second step according to specific groups is to establish the mathematical model of the propagation of infectious diseases, and analyze the specific of all kinds of groups. The third step will make the model be applied to the actual, and analysis of propagation of a flow of H1N1, rationality and validity to infectious disease model validation. Through writing of this article, propagation process can make people better understand and master the infectious disease, so that improve all the infectious disease awareness and prevention awareness, and provide a theoretical basis for the control of infectious diseases. © 2016, UK Simulation Society. All rights reserved.

Fan Y.B.,Heihe University
Advanced Materials Research | Year: 2014

There are two main risks in aging society. First, macroeconomic stall caused by labor shortages. Second, the basic pension insurance fund income over expenditure, causing social instability. Now there is not research about risk assessment. Russia and China have different social system, based on catastrophe series method to create aging risk evaluation system. This paper valuates the aging risk from the impact of the economic system and the social systems. This method combines the quantitative indicators and qualitative indicators, and it doesn't need to determine the index weight. Finally China and Russia have been at the severe aging risk. © (2014) Trans Tech Publications, Switzerland.

Xia K.L.,Heihe University
Applied Mechanics and Materials | Year: 2014

The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference. © (2014) Trans Tech Publications, Switzerland.

Xin M.,Heihe University
Proceedings - 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2015 | Year: 2015

Internet of things has be broadly applied for home, industry, and many other applications. For these applications, secure information transmission becomes a critical issue to ensure the system safety. Hybrid encryption technique is a new cryptographic paradigm and it can be applied to the Internet of Things. It provides the benefit of the symmetric key and asymmetric key performance. It enables strong security and low computational complexity. In this paper, we proposed a mixed encryption algorithm to provide information integrity, confidentiality, non-repudiation on the data transmission for Internet of Things. We demonstrate the security efficiency with the comparison with traditional encryption algorithms. © 2015 IEEE.

Zhou S.-H.,Heihe University
International Journal of Advancements in Computing Technology | Year: 2012

The paper proposed a remote interactive Three-dimensional network of teaching resources exchange platform systems based on cloud technology that are able to changing ways of learning, improving the quality of talent cultivation, also construction resource over the network, further deepening the teaching reformation, promote the application of modern information technology in teaching. The system using a Blade Server System supported by database systems, PC and handheld terminal for Windows operating systems, enabling the sharing of high quality teaching resources. Also proposed using terminal resources interactively that are able to enhance the practicality of the course greatly.

Loading Heihe University collaborators
Loading Heihe University collaborators