Shaoxing Vocational and Technical College

Shaoxing, China

Shaoxing Vocational and Technical College

Shaoxing, China

Time filter

Source Type

Cai X.,Shaoxing Vocational and Technical College
2011 International Conference on Electrical and Control Engineering, ICECE 2011 - Proceedings | Year: 2011

Industrial wastewater of a chemical plant is tannery wastewater. Its main components are polymer complex, benzene derivatives and hexavalent chromium. It is organic wastewater which is hard to be degraded and has poor biodegradability. Here we describe a complete technology of wastewater treatment system, automatic control system base on PLC and their commissioning and operation. Practice has proved that the system is stable and reliable and the outlet water quality is also good. © 2011 IEEE.


Jiang B.,Shaoxing Vocational and Technical College
Advanced Materials Research | Year: 2012

In this paper, aerosol samples were collected with Andersen cascade sampler on typical polluted days at residential area in Hangzhou, China. The concentrations of sulfate, nitrate and ammonium in aerosol were analyzed by the ion chromatography. Results showed the concentrations of SO 4 2-, NO 3 - and NH 4 + on polluted days were 21.4, 31.2 and 10.8μg m -3 in fine particles, respectively, and were 1.3-1.7 times higher than on unpolluted days. SO 4 2-, NO 3 - and NH 4 + in fine particles were the main threat of athlete health in the urban area of Yangtze River delta.


Wei W.,Shaoxing Vocational and Technical College
Applied Mechanics and Materials | Year: 2010

The home monitoring system designed in this paper used the combination of a home gateway controller and the ZigBee coordinator, the connection of the ZigBee coordinator and the terminal nodes through wireless mode, to issue the collected real-time data to the Intemet with a web page form, and the dynamic real-time update, so that the intelligent monitoring of the home-based internal environment is achieved. This system overcomes the shortcomings of traditional wired control system, has good currency, high expansibility, and can shorten the intelligent home product development cycle, help to design and develop powerful, cost-effective powerful, cost-effective home products. © (2010) Trans Tech Publications.


Zheng Y.,Shaoxing Vocational and Technical College
Advanced Materials Research | Year: 2012

With the popularization of multi-media and network technology, some Chinese schools are applying the high technology to the class. The author believes that the model of teaching and learning focus on the establishment of multi-media class environment and the after-school autonomous learning system. The utilization reflects the development process of the combination of modern information technology and English teaching. The modern teaching technology, which includes multi-media, network system and various teaching aids, enriched the choice of teaching resources and provided plenty of materials for teaching so as to supply more opportunities for students. The applications of information transition to class, such as multi-media and network technology are increasingly concerned and favored by teachers and students and have becoming one of the best devices for modern education. The author of this paper divide the application of multi-media and network technology to English teaching into two parts according to the experience of teaching practice and the utilization of language lab: the language class environment based on the use of multi-media and the after-school autonomous learning system based on network technology. © (2012) Trans Tech Publications, Switzerland.


Tao W.,Shaoxing University | Qing C.W.,Shaoxing Vocational and Technical College
International Journal of Advancements in Computing Technology | Year: 2011

Three-party password-based authenticated key exchange protocols (3PAKE) is the protocol in which two communication entities, who do not share a password between themselves but only with a server, can authenticate each other and establish a session key through the assistance of an authentication server. All existing 3PAKE need certain encryption systems. In this paper, we propose a hash-based three party strong password authenticated key exchange protocol (called 3SPAKE). The proposed protocol is more efficient in computational cost, in storage cost and in communication cost when compared with previous solution and thus being more suitable to resource-constrained environment.


Wang T.,Shaoxing University | Chen W.,Shaoxing Vocational and Technical College | Wang B.,Harbin Institute of Technology
International Journal on Smart Sensing and Intelligent Systems | Year: 2014

In Bag of Words image presentation model, visual words are generated by unsupervised clustering, which leaves out the spatial relations between words and results in such shorting comings as limited semantic description and weak discrimination. To solve this problem, we propose to substitute visual words by visual phrases in this article. Visual phrases built according to spatial relations between words are semantic distrainable, and they can improve the accuracy of Bag of Words model. Considering the traditional classification method based on Bag of Words model is vulnerable to the background, block and scalar variance of an image, we propose in this article a multiple visual words learning method for image classification, which is based on the concept of visual phrases combined with Multiple Instance Learning. The final classification model is able to show the spatial features of image classes. Experiments performed on standard image testing sets, Caltech 101 and Scene 15, show the satisfying performance of this algorithm.


Chen W.,Shaoxing Vocational and Technical College | Wang T.,Shaoxing University | Wang B.,Harbin Institute of Technology
International Journal on Smart Sensing and Intelligent Systems | Year: 2014

Digital image scrambling is to transform a digital image, to make it unrecognizable and become another chaos images without obvious meaning. If the operator knows the algorithms, he can reconstruct the original image from the chaos image by using the certain algorithms. Image scrambling encryption technology that based on Chaos Theory encrypts the image data stream through using the chaotic signal. It has the advantage like high security, encryption speed, large key space, and good scrambling effect. This paper studies the "extraordinary Key" and "to be trivial key" that are in the chaotic sequences that is caused by Logistic map, thus presents a image chaotic encryption algorithm that is based on hybrid chaotic sequence. Firstly, the algorithm generate hybrid chaotic sequence through the key; then through generates the corresponding offset matrix and permutation matrix the discrete mapping; finally, do the implementation of wavelet transform to the image, do the digital image scrambling encryption in the transform domain. In order to measure the degree of scrambling, we propose a "scrambling degree" concept. Experiments confirmed that the encryption algorithm has good scrambling in nature, and achieved good encryption effect. It confirmed the degree of scrambling encryption can effectively reflect the effect of scrambling encryption of the algorithm.


Chen P.,Shaoxing Vocational and Technical College | Hu W.,Shaoxing Vocational and Technical College
International Journal of Parallel, Emergent and Distributed Systems | Year: 2014

Energy optimisation is one of the important issues in the research of wireless sensor networks (WSNs). In the application of monitoring, a large number of sensors are scattered uniformly to cover a collection of points of interest (PoIs) distributed randomly in the monitored area. Since the energy of battery-powered sensor is limited in WSNs, sensors are scheduled to wake up in a large-scale sensor network application. In this paper, we consider how to reduce the energy consumption and prolong the lifetime of WSNs through wake-up scheduling with probabilistic sensing model in the large-scale application of monitoring. To extend the lifetime of sensor network, we need to balance the energy consumption of sensors so that there will not be too much redundant energy in some sensors before the WSN terminates. The detection probability and false alarm probability are taken into consideration to achieve a better performance and reveal the real sensing process which is characterised in the probabilistic sensing model. Data fusion is also introduced to utilise information of sensors so that a PoI in the monitored area may be covered by multiple sensors collaboratively, which will decrease the number of sensors that cover the monitored region. Based on the probabilistic model and data fusion, minimum weight probabilistic coverage problem is formulated in this paper. We also propose a greedy method and modified genetic algorithm based on the greedy method to address the problem. Simulation experiments are conducted to demonstrate the advantages of our proposed algorithms over existing work. © 2014 © 2013 Taylor & Francis.

Loading Shaoxing Vocational and Technical College collaborators
Loading Shaoxing Vocational and Technical College collaborators