• Volume 20,Issue 5,2011 Table of Contents
    Select All
    Display Type: |
    • Digital Design of Quayside Container Crane Based on Knowledge Engineering

      2011, 20(5):1-5.

      Abstract (1983) HTML (0) PDF 934.48 K (3132) Comment (0) Favorites

      Abstract:This paper proposes a digital design method of quayside container crane based on expert systems and model base. It builds a design system of quayside container crane based on knowledge engineering. This paper discusses expert systems based on data base and calculation, and discusses structure of model base, standard parts, outsourcing parts selecting. It searches for the most suitable type and size driver model according to the basic design paramete, designs restriction and regulation. After calculation, it looks for type from expert systems, and then gains this type from model base for assembling, then generates design specifications and construction drawings automatically. This design solves the calculation and data sharing during problems during the quayside container crane design with CAD technology. And it realizes that calculation, structural design, process design, product data management integration.

    • Assumption of System Architechure for the Internet of Things Based on BeiDou Satellite System

      2011, 20(5):6-8,46.

      Abstract (1775) HTML (0) PDF 808.77 K (3835) Comment (0) Favorites

      Abstract:Combined the features of the Internet of things, this paper utilizes the communication of cellular mobile communication network and the Chinese BeiDou Satellite System to design a new system architecture of network layer for The Internet of things. This architecture does not only expand the scope of network but also enhances the reliability and economy of whole network system, thus brings more new applications for the field of The Internet of things.

    • Recommendation System Based on Fuzzy Association Rules Mining and Inference

      2011, 20(5):9-13.

      Abstract (1722) HTML (0) PDF 724.41 K (2604) Comment (0) Favorites

      Abstract:In order to provide personalized suggestions for consumers in a more accurate way, Intelligent Recommendation System (IRS) has emerged. This study made a meaningful exploration on its structure and its implementation. By combining the fuzzy clustering, fuzzy association rules mining and fuzzy reasoning, this study designed and implemented an original IRS. It could give more matching suggestions based on the authentic data and the operation of fuzzy clustering, fuzzy associations rules mining, rules filtering, and fuzzy reasoning.

    • Design and Implementation of an IMS Manage P2P Streaming Application Server

      2011, 20(5):14-20.

      Abstract (1664) HTML (0) PDF 1.06 M (3104) Comment (0) Favorites

      Abstract:IMS-based streaming media systems are used in C/S architecture. When numerous users request service simultaneously, the center streaming media server will become the bottleneck of system performance. After referring to ETSI TISPAN IMS-based IPTV architecture, we proposed an IMS manage P2P streaming system architecture, and designed an application server software module structure and P2P distribution tree construction algorithm according to the requirement of introduction P2P. Based on the original C/S architecture streaming application server, we implemented the selection upload node function by extending the centralized management and maintenance of trees P2P module, and verified prototype system in broadcast service. The test result shows that the streaming system can organize UE into P2P streaming media network effectively, and reduce the pressure of the media server and improve system performance.

    • Automatic Control System in Stereo Garage Based on PLC

      2011, 20(5):21-24.

      Abstract (2010) HTML (0) PDF 574.39 K (5898) Comment (0) Favorites

      Abstract:An up-down and translation stereo garage automatic control system is designed. The accurate location control of up-down and translation is realized through PLC technology and motor frequency conversion technology. Real-time monitor, data management and long-distance control for the working site equipment are carried out by the communication between PLC and upper computer through MCGS configuration software technology. The system is very stable, reliable and has strong adaptability and high performance-price-ratio. Therefore, it will have a wide application in the future.

    • FPGA-Based Spread Spectrum Communication System and its Simulation

      2011, 20(5):25-29,59.

      Abstract (1493) HTML (0) PDF 840.11 K (2951) Comment (0) Favorites

      Abstract:Spread spectrum communication is known as a great breakthrough in communications technology. The RF bandwidth used to transmit information is much wider than the information itself. Spread spectrum communication improves the anti-interference ability greatly, reduces power consumption and has become the key technology in modern communication. This paper presents a FPGA-based simulation for digital communication model in QUARTUS 9.0 environment, lays emphasis on designing and implementing the modulator of spread spectrum communication system and verifies the correctness of the modulator by simulation. The modulator is of universality and easy to realize, greatly reducing the development process.

    • Design of Data Exchange Platform Based on SOA

      2011, 20(5):30-33.

      Abstract (1714) HTML (0) PDF 900.22 K (3074) Comment (0) Favorites

      Abstract:To solve the problem of data integration and sharing under the heterogeneous environment of LiaoHe River water environmental management, we propose the overall structure of data exchange platform according to the SOA thought. The platform is composed of data adapter, data exchange engine and service administration module and so on. It introduces the funtional module and the flow of data exchange in the platform. Finally, we design two essential modules: data Adaptation module and transformation module.

    • Network Traffic Management System Based on the Management of Application Priority

      2011, 20(5):34-37.

      Abstract (1568) HTML (0) PDF 860.81 K (3005) Comment (0) Favorites

      Abstract:Based on analyzing the requirement of network bandwidth management function and the procedure of data processing, in this paper, the network diffluent management system, which has the function of application priority management, is developed on the basis of network data processing stages. This system can resolve the problem that the non-critical business data seizes much of network bandwidth resource that should be used by the critical data. As a result, it optimizes effectively network bandwidth resource configuration and improves the quality of services and the management capacity of network.

    • Application of Main Memory Database to Color Ring Back Tone Service

      2011, 20(5):38-41,79.

      Abstract (1736) HTML (0) PDF 839.92 K (2441) Comment (0) Favorites

      Abstract:Because of the I/O bottleneck, the conventional disk resident database (DRDB) system becomes more and more unsuitable for the needs of real-time high-performance applications. Providing much better response time and transaction throughput as compared to DRDB’s, the main memory resident database (MMDB) system has been more and more widely used in telecom field. In this paper, after studying the MMDB technology, we propose a modified database structure in Color Ring Back Tone (CRBT) service, using MMDB in CRBT service for the first time. Test results show that the performance of CRBT application has been efficiently improved by using MMDB and the CPU utilization has been decreased, which means the system’s capacity of users has been enlarged.

    • Holographic Watermarking Scheme Based on DFT Domain Embedding

      2011, 20(5):42-46.

      Abstract (1824) HTML (0) PDF 949.16 K (2898) Comment (0) Favorites

      Abstract:This paper studies the watermarking techniques based on Computer Generated Holography. Given that it is always a contradiction of transparency and robustness, this paper proposes a digital watermarking scheme based on techniques of dithered computer generated holograms and DFT domain embedding in order to improve the watermark’s transparency and keep its good robustness as well. The dithered hologram is first generated from the binary watermark image and the DFT is performed to the original image. Then, each bit of the continued hologram is embedded in magnitude of the DFT domain at the middle frequency. The experiment based on this scheme demonstrates that the watermark is both transparent and robust to common digital image processing.

    • Content-Classification Load Balancing Algorithm in Cluster

      2011, 20(5):47-50,74.

      Abstract (1627) HTML (0) PDF 912.90 K (2647) Comment (0) Favorites

      Abstract:The cluster technology brings a new solution for the WEB service, the key point is load balancing strategy. Based on the existing algorithms, a content-classification load balancing algorithm is proposed. By using content classification, user requests could evenly distribute to the nodes in the cluster, so that each node would get roughly the same amount of various types of requests. To prevent the load skew, a feedback mechanism was introduced, furthermore, the weight of each node interval was adjusted by using an equivalent load-alternant and would multiplicative decrease in critical area. The test shows this algorithm could improve the performance of the cluster system.

    • Object-Oriented Programming Classes of Information Extraction Rules

      2011, 20(5):51-54,149.

      Abstract (1781) HTML (0) PDF 1.33 M (2249) Comment (0) Favorites

      Abstract:In domestic and foreign research, using the computer to understand the program automatically is the focus. This paper, object-oriented program for the research, proposes object-oriented programming classes of information extraction rules. This method can extract the type of information from the program, then, represents these information by class diagrams, thus lays the bais for the computer to understand the program automatically. In this paper, we specify the rules for generating UML class diagrams, which include classes, attributes, operations, objects, relationships, inheritance, associations interfaces and so on. Finally, we introduce an application of the algorithm instance.

    • Collaborative Filtering Algorithm Based on Interest-Class

      2011, 20(5):55-59.

      Abstract (1818) HTML (0) PDF 662.75 K (4794) Comment (0) Favorites

      Abstract:In the modern information network, the personalized recommendation system has become a key part of users in software application. Recommendation algorithms are the core of personalized recommendation systems. Among them, the collaborative filtering is one of the most successful recommendation algorithm in application. However, the traditional collaborative filtering algorithm does not consider user’s multiple interest and measure user’s interest imprecisely, and can’t be applied to recommendation system with kinds of interests. In this paper, a new method of collaborative filtering algorithm based on users’ interest category is proposed using improved fuzzy clustering algorithm to search the nearest neighbors. Finally, the algorithm experiment is given with actual log-data. Results show that the proposed algorithm outperforms the other recommendation ones in efficiency and recommending accuracy.

    • A Reliable Relay Multicast Method Based on Network Coding in Wireless Ad Hoc Networks

      2011, 20(5):60-64,153.

      Abstract (1689) HTML (0) PDF 762.73 K (2663) Comment (0) Favorites

      Abstract:Problems for designing reliable transmission strategy in Ad hoc networks must be considered because the nodes are usually run in battery-operated with limited energy, the higher wireless link reliability failure, etc. This paper presents a reliable relay multicast method based on network coding, this method allows part of the receivers playing the role of the source in the form of relaying, to perform the task of transmission to other receivers with higher link failure. Theoretical analysis and numerical results show that the proposed method is feasible, and to some extent improves the Ad hoc networks for multicast transmission, extends the network lifetime.

    • A New Type of Intrusion Detection Mechanism

      2011, 20(5):65-68,91.

      Abstract (1516) HTML (0) PDF 1.47 M (2452) Comment (0) Favorites

      Abstract:People are paying more attention on Intrusion detection which is an important computer network security technolog. However there are still many unresolved issues in Intrusion Detection, for instance, the rapid speed of network transmission and network high traffic flow lead to real-time and effectiveness detection going down, and can not detect complex and diverse intrusion. We are developing a new intrusion detection mechanism based on cloud computing. This mechanism uses a global view which can make up for the deficiency of traditional intrusion detection, and proved to be great scalable.

    • A Topology Generation Method of Mobile P2P Network

      2011, 20(5):69-74.

      Abstract (1564) HTML (0) PDF 727.66 K (2985) Comment (0) Favorites

      Abstract:P2P technology is the focus direction of current research, with many research institutions and enterprises joining in, who have made remarkable achievements. Due to Constrained by its own characteristics of mobile network, the good technology of some other network is not suitable for mobile P2P network. This paper presents a method of generate P2P topology based on mobile network. We use this method to generate overlay network topology by improved Chord algorithm, and propose a method of process movement of nodes. Experiments show that the method can obviously reduce the average delay of overlay network, significantly improve the network’s search capabilities.

    • Vehicles Shadow Suppression in Visual Traffic Surveillance

      2011, 20(5):75-79.

      Abstract (1718) HTML (0) PDF 870.53 K (4142) Comment (0) Favorites

      Abstract:Aiming at the problem that wrong extraction of vehicles shadow will cause low reliability and will not satisfy the real-time requirement in intelligent transportation system, an improved model based on HSV color space and difference of background is proposed. According to the analysis of the model, value is pushed out. The different values of shadow, vehicles and background can be used to extract shadows from target vehicles, and background subtraction is also used. Experiments on different scenes suggest that high effective detection rate of the proposed method can be reached, and this method is also effective to the reliability and real-time requirement in ITS.

    • Localization Algorithm in Wireless Sensor Networks

      2011, 20(5):80-86.

      Abstract (1828) HTML (0) PDF 830.05 K (2900) Comment (0) Favorites

      Abstract:Wireless sensor networks becomes a new data collection technology of autonomous sensor nodes. The research on localization algorithm in the actual applications has been very hot. In this situation, a number of excellent localization algorithm appeared according to various factors, such as the cost, power and applications areas. As we know, the anchor-based mass algorithm has higher precision while the anchor-free ABC algorithm has lower cost. In order to take advantages of them, a new localization algorithm is presented. It does not only control the precision within endure ranges of ABC algorithm, but also reduces the number of anchors of the mass algorithm. So it can meet the needs of the actual applications. Finally, the attentions of the new localization algorithm is indicated.

    • Speech Emotion Recognition Algorithm Based on SVM

      2011, 20(5):87-91.

      Abstract (1860) HTML (0) PDF 733.89 K (3664) Comment (0) Favorites

      Abstract:In order to improve recognition accuracy of the speech emotion recognition system effectively, a speech emotion recognition algorithm based on SVM is proposed. In the proposed algorithm, some parameters extracted from speech signals, such as: energy, pitch frequency and formant, are used as emotional features. Furthermore, an emotion recognition model is established with SVM method. Simulation environment experiential results reveal that the recognition ratio of the proposed algorithm obtains the relative increasing of 7.06% and 7.21% compared with artificial neural networks such as ACON (All Class in one Network, “one to many”) and OCON (One class in one network, “one to one”) methods. The result of the experiment shows that the speech emotion recognition algorithm based on SVM can improve the performance of the emotion recognition system effectively.

    • Study and Design of Vehicle Calibration Communication Based on XCP Protocol

      2011, 20(5):92-95,86.

      Abstract (1693) HTML (0) PDF 940.16 K (5262) Comment (0) Favorites

      Abstract:As more and more electronic control functions are used in modern vehicle, the amount of information passed between different ECU is also growing. The high speed performance and stability of XCP protocol is very suitable for vehicle development. Its main task is to measure and calibrate ECU internal data in time. We designed a communication based on XCP-on-Can protocol, and compiled XCP driver programmed on the master engine and slave engine with DAQ mode. Successful implementation of the master-slave dialogue proves that the communication between ECU and calibration software is high efficiency and stability with good transplantable character.

    • Multiple Vehicles Tracking Algorithm Applied to Occlusion Issue

      2011, 20(5):96-100,139.

      Abstract (1400) HTML (0) PDF 1003.53 K (2713) Comment (0) Favorites

      Abstract:In the light of the occlusion in the tracking of multiple vehicles, the article puts forward a new multi-object tracking algorithm based on feature correlation matching. The moving area that was extracted in current frame and in previous frame is respectively given different identity “vehicle region” and “temporary region”. The position of vehicles region in current frame can be forecast by using three points extrapolation, the distance between which and temporary region can be calculated and used to match current motion regions and track vehicles. In the meantime, the paper estimates states of vehicles depending on the state factors, and combines them with tracking windows based on segmentation method to solve vehicle tracking problem under occlusion efficiently. Experimental results indicate that the proposed algorithm can trace and forecast the vehicles which hided, and can accurately track object effectively.

    • Highly Portable Light-Weight x86 Emulator

      2011, 20(5):101-104,143.

      Abstract (1968) HTML (0) PDF 724.46 K (3916) Comment (0) Favorites

      Abstract:This paper presents a light-weight x86 emulator PIT (Portable x86 Instruction Translator) which is portable on multiple CPU architecture. “Dynamic binary translation” is a technique that can make instructions of one CPU architecture be capable of running on another CPU architecture. PIT utilizes portable dynamic binary translation technique to emulate Intel x86 instructions on multiple CPU architecture such as x86, PowerPC, ARM and Sparc. Users can load 16-bit or 32-bit user-level executable files of x86 system such as COM, EXE and ELF into PIT, execute them and observe the output. PIT utilizes Transferred Block Dynamic Cache and Condition Code Lazy Computation techniques to accelerate instruction translation. With virtual x86 MMU (Memory Management Unit), emulated instructions can address 4GB memory space in PIT virtual environment. With simple configuration and re-compiling, PIT can be easily ported and run x86 executable files on different CPU architectures.

    • Traffic Detection System Based on OpenCV Technology

      2011, 20(5):105-108,121.

      Abstract (1455) HTML (0) PDF 659.96 K (4112) Comment (0) Favorites

      Abstract:A set of solutions for traffic detection based on video is proposed. The system is developed by using Vistual Studio 2008 with Microsoft's DirectShow video processing library and Intel's OpenCV image processing library. Three experiments under different scenarios show that the accuracy of the vehicle identification can be up to 90%. The system can fluently run on common equipments, meet the real-time demand, and has good adaptability.

    • Transport Management System for Vehicle Underground Coal Mine

      2011, 20(5):109-112.

      Abstract (1338) HTML (0) PDF 954.74 K (3481) Comment (0) Favorites

      Abstract:Aimed at the problem of managing numerous mobile vehicles and the difficulty of communication between drivers and dispatchers underground coal mine, a new transport management system based on RFID for vehicle underground coal mine is proposed, which implements the vehicle positioning, remote control of switches and communication with drivers. The design of structure and database, the function realization of vehicle positioning and wireless communication of data, voice are presented in this paper. The system with friendly interface and stable operation can guarantee the secure and efficient running of vehicle, and consequently improve the mine productivity.

    • Design and Implement of Communication Status Automatic Test of Digital Campus Backbone Network

      2011, 20(5):113-116,226.

      Abstract (1380) HTML (0) PDF 645.09 K (2316) Comment (0) Favorites

      Abstract:To check the connection between a large number of switchings and the optical lines in working order, the network management software based on SNMP protocol is usually checked, or a single test method is used. However, these methods cannot meet the requirements of the operation and management very well. This paper analyzes the features of campus ethernet connection and operation and establishes the singly linked list modal. Finally, it achieves the automatic detection the operation state between the optical line and switch equipment in management vlan regions based on Ping or TraceRt method and makes a comparison with open source MRTG software’s flow.

    • Linux Device Drivers Development Based on FPGA Embedded System

      2011, 20(5):117-121.

      Abstract (1461) HTML (0) PDF 540.48 K (3838) Comment (0) Favorites

      Abstract:Under the PowerPC architecture Linux2.6 operating system based on FPGA embedded system, the platform devices mechanism is used to control the driver of GPIO controller by interrupt. With this mechanism, the GPIO registers its own resources into the kernel, and generally managed by the kernel. In reference to the Linux2.6 kernel source about platform device driver, compiling and testing of the GPIO device driver. The driver has been verificated in the Xilinx company's FPGA development board ML403, and operates stably.

    • Real-time Monitoring System of Voltage Stability Based on Web

      2011, 20(5):122-125.

      Abstract (1775) HTML (0) PDF 711.06 K (2427) Comment (0) Favorites

      Abstract:In order to meet the needs of dispatching and monitoring the voltage stability of power grid in real-time, a monitoring system of voltage stability is designed based on Web. The programming of web in the server system is exploited by C++, Java and so on, while the interface is exploited by the script technique, and the database management system is exploited by SQL server 2000. The data source comes from the EMS(electic management system) text. During the development process using the tools of Myeclipse, according to the need of users, the developmented system can release the voltage stability data in the state of normal or N-1 like the load margin, area margin, the sensitivity of load margin and so on. The example shows that the system designed with the technique of Java and Extjs can improve development efficiency, better the program universality and satisfy the demands of real-time monitoring and analyse voltage stability.

    • Design and Research of Real-Time Process Data OPC Server for the Control of Complex Industrial

      2011, 20(5):126-129.

      Abstract (1284) HTML (0) PDF 774.95 K (3095) Comment (0) Favorites

      Abstract:Aiming at the requirements that the advanced control software for the complex industrial process control, this paper studies the real-time processing strategy of OPC Server and completes the OPC Server software design of high real-time and reusability. This reflects the thought that software engineering pursues, i.e., the structural design and software reuse ideas.

    • Application of Genetic Algorithms to the Forest Fire Warning Network

      2011, 20(5):130-134.

      Abstract (1292) HTML (0) PDF 615.43 K (2335) Comment (0) Favorites

      Abstract:The genetic algorithm was improved and applied to the optimization design of wireless sensor network, according to the actual environment of forest to establish an appropriate mathematical model, and on this basis the fitness function and the sensor network strategy was given. When anomalies occur, this algorithm can accurately and timely issue alerts and position information. For the genetic algorithm is easy to enter the errors of the local optimal solution, the simulated annealing operator join in the genetic algorithm, also based on the past, selected Crossover probability and Genetic probability of improperly, brought a significant impact to the optimization results, in this paper, in the optimization process dynamically adjust the crossover probability and mutation probability. MATLAB simulation results show that the improved genetic algorithm improved Algorithm optimization speed, overcome the local convergence of the errors, optimized Wireless sensor networks energy to achieve the longest life cycle of the network.

    • RF CPU Card Charge-Control System Based on MFRC523 Chip

      2011, 20(5):135-139.

      Abstract (1670) HTML (0) PDF 774.50 K (3875) Comment (0) Favorites

      Abstract:Aiming at requirements for the development of smart meters, the application of RF CPU card charge-control system based on MFRC523 chip in smart meters is introduced in this paper. The principles of the charge control system and its structure are briefly illustrated, and its characteristics and advantages as well as its software and hardware design are highlighted. It enables the charge-control smart meter to respond faster, more accurate, communicate more stable, and use more convenient, which is highly innovative and practical.

    • Simple Practical Experimental Detecting System for Harmonic Current of APF

      2011, 20(5):140-143.

      Abstract (1540) HTML (0) PDF 611.98 K (2567) Comment (0) Favorites

      Abstract:At present, the validities of many detecting methods for harmonic current of single-phase active power filter (APF) are verified by simulation but without experiments. To solve this problem, a simple practical experimental detecting system for harmonic current of APF is obtained by UA206 A/D data collecting block being joined with computer by PCI port and supply power voltage and load current being regarded as input signals. The system has the characteristics of simple configuration, nice stability, high reliability and easy programmer. Using this system, the experiment of a detecting method for harmonic current based on neural networks is done, and it validates that adopting the system can expediently verify the correctness and detecting performance of the proposed detecting method for harmonic current of APF.

    • Application of Intelligent Analysis Technology for Video to Integrated Security Defence System

      2011, 20(5):144-149.

      Abstract (1774) HTML (0) PDF 929.18 K (3279) Comment (0) Favorites

      Abstract:To meet the rising demands of operational management in the subway integrated monitoring system, this paper, based on the analysis of Digital Video Surveillance System used in the integrated security project of the Shenzhen metro No .1 extend project, analyzes the moment widely-used video analysis system, points out the shortage of the system, and proposes some better improvement strategies. By deeply integrating relative the integrated security project of the Shenzhen metro No .1 extend project equipment into control systems, it makes the video analysis system more intelligent. At the same time, it also improves the accuracy of the supervisory system and controllability to the whole system. This paper describes the design idea, technology selection, system components, system structure and system function of the intelligent video analysis system in detail. In the end, it also explains the developing potential of the intelligent video analysis system.

    • GPS / GLONASS Combination Positioning in LBS

      2011, 20(5):150-153.

      Abstract (1630) HTML (0) PDF 721.79 K (3526) Comment (0) Favorites

      Abstract:This paper studies the coordinate systems and the time conversion relationship between GPS and GLONASS, combined with the observation equation of a single Pseudo-range positioning system. It deduces Pseudo-range observation equation under integrated positioning and its solution, then programming it. Experimental analysis shows that positioning accuracy of GPS / GLONASS integrated system is much better than a single positioning system in the case of poor observing conditions. Applied to LBS System, this system will improve the quality of LBS and promote the development of LBS.

    • Modeling and Analysis of Information Sharing Platform Based on Petri Net for Retailers and Vendors

      2011, 20(5):154-157.

      Abstract (1657) HTML (0) PDF 976.77 K (2532) Comment (0) Favorites

      Abstract:The increasing enterprise competition and rapid changes of market demand make the supply chain businesses’ requirements for sharing the information increasingly urgent. From the perspective of information system, this paper will design corresponding function modules according to retail enterprises’ operating features with Petri nets tool and ultimately form an information sharing platform model for retail enterprises and their suppliers based on Petri nets, hoping to provide retail enterprises some references about information sharing platform construction, especially large enterprises like supermarkets.

    • Application of ECC and SHA to Voice Encryption

      2011, 20(5):158-161.

      Abstract (1950) HTML (0) PDF 616.33 K (2716) Comment (0) Favorites

      Abstract:VoIP has developed into a specialized voice communication technology currently, whose application is wider and wider. But the research shows that the security is the main content considered by the enterprise when VoIP is decided besides the service quality issue. In the real application, the reason that the enterprise doesn't want to deploy VoIP is that the security situation can't reach the application standard. This article studies the secure hash algorithm, discusses its implementation process and carries out the implementation of VC. Real-time voice encryption is completed by using the combination between elliptic curve cryptography and SHA, and the encryption between voice and data.

    • Moving Human Body Fine Detection Based on Self-Adaptive Threshold

      2011, 20(5):162-166.

      Abstract (1647) HTML (0) PDF 801.82 K (2841) Comment (0) Favorites

      Abstract:The existing human body detecting algorithms often have the shortages, such as less precision and less adaptability of environments. In order to improve the detecting results, an optimized algorithm is presented based on the combination of the weight of RGB channel and self-adaptive threshold in sub-area. Firstly, a simply background subtraction is applied to detect the moving human body area cursorily; secondly, the human area is calculated and estimated by its characters, then the two areas are combined to get the final target area. The target area will be divided into several sub-areas with same size, and then the weight of RGB channel and the threshold of each sub-area can be calculated and normalized to the range of [0,255], respectively. By using the calculated threshold and the weight value of target area’s RGB channel, we can do a fine background subtraction to detect the final result. Experiment results show that the precision of our algorithm has improved by 10% as compared with the algorithm based on HIS, and has improved by 40% as compared with the traditional algorithms. It can wholly achieve the requirements of precision and adaptability by actually testing.

    • Research and Implementation of Information Retrieval Based on Meta Search Engine

      2011, 20(5):167-169.

      Abstract (1343) HTML (0) PDF 633.94 K (2387) Comment (0) Favorites

      Abstract:The paper introduces a method of multi-information similarity, based on the analysis of the Chinese Question-Answering System. And then the upcoming module of answer extraction could use the result set of candidacy from information retrieval to satisfy user’s needs by rank of result set. The experiment shows that this method improves accuracy in retrieval of Web pages.

    • Irradiance Caching Algorithm Based on Photon Mapping

      2011, 20(5):170-173.

      Abstract (1604) HTML (0) PDF 652.13 K (3360) Comment (0) Favorites

      Abstract:This paper presents a global illumination method combining two well-known techniques: photon mapping and irradiance caching. The photon mapping method has the advantage of being view independent, irradiance caching can quickly calculate indirect light, but the latter is view-dependent. To compute records covering the entire scene, the irradiance caching method has to be run for many cameras. Our method exploits the advantages of these two methods to achieve fast and accurate calculation of global illumination by computing a refined view-independent irradiance cache from a photon map.

    • Virtual Reality Aided Teleoportation System for Deicing Robot

      2011, 20(5):174-176,166.

      Abstract (1853) HTML (0) PDF 737.22 K (2486) Comment (0) Favorites

      Abstract:A teleoperation syatem based on virtual reality is presented in this paper for transmission line deicing robot. The framework and function structure of the system are given and key techniques of the system are studied. With the help of virtual environment, operators can monitor and operate the robot real-time and dynamic. The completion of the system will provide a lot of experiences and key techniques on creating advanced teleoportation system.

    • University Examination Timetabling Algorithm

      2011, 20(5):177-179.

      Abstract (1588) HTML (0) PDF 680.02 K (3486) Comment (0) Favorites

      Abstract:In this paper, an algorithm based on graph theory and various aspects of optimization strategy is presented. Examination timetabling is an important part of the examination management activities. The results of the examination timetabling have an important influence on the management activities. By the establishment of a static conflict graph, we transtport the timing graph into a graph coloring problem and propose several optimization strategies on the results after analyzing and abstracting on the university's examination room arrangements. The experiment at ShanDong Agricultural University shows that our algorithm is quite effective in solving the complex problem in automatic timetabling.

    • A Personalized Information Recommendation Method Based on Network Bookmark

      2011, 20(5):180-183,173.

      Abstract (1643) HTML (0) PDF 923.51 K (2163) Comment (0) Favorites

      Abstract:For the present Internet information detonation type grew, this paper proposed a kind personalized information recommendation method based on the Web mining. It introduced the personalized recommendation's flow and realizes model, and profits from the complex network the mass organization structure division method. It proposed personalized information recommendation method based on the network bookmark, analyzed in the mass organization based on the cooperation filtration and the mass organization based on “the information bridge” personalized information recommendation. Through the experiment this method is proved to be effective in the individualized information recommendation.

    • ETL Technology Applied in DC of Tobacco Company

      2011, 20(5):184-187.

      Abstract (1415) HTML (0) PDF 642.98 K (3334) Comment (0) Favorites

      Abstract:This article briefly introduces the main functions and main implementation methods of ETL, and proposes a method suitable for a sale subject DC project of a domestic provincial company of tobacco. This method can successfully extract basic data and transaction data from systems of city companies to the data warehouse of the provincial company. It plays an important role in the whole DC project and can give some relative experience to the DC project construction of other industries.

    • Simplification and Reconstruction of Mesh Model in CAE

      2011, 20(5):188-191.

      Abstract (1525) HTML (0) PDF 647.53 K (2841) Comment (0) Favorites

      Abstract:Based on the analysis of CAE used mesh model, this paper puts forward an algorithm of the characteristics of CAE method mesh features. In view of the design details of the CAD model can be ignored in the CAE analysis of the characteristics of CAD models in this paper, a small fillet, chamfer, roller and other non-structural design features, vector-based Facet iterative filtering method was used to identified and removed. Firstly, identify the characteristics of the region, and then non-characteristic area under the patch normal vector adjustment feature regions vertex normal vector and update the coordinates of the feature reconstruction, the final grid which meets the requirements model of CAE.

    • Implementation of Automatical Evaluation for Elementary and Secondary School’s Office Software Teaching

      2011, 20(5):192-195.

      Abstract (1720) HTML (0) PDF 699.14 K (2979) Comment (0) Favorites

      Abstract:The Office operation is one of essential skills of elementary and secondary school Information Technology Course. Using automatical evaluation on Office could help the teachers to reduce the duplication of correct students' work and associate with mistakes, make the progress more objective, accurate and just. Aiming at the reality of elementary and secondary school Information Technology Course for now, this article raises a relative independent method of software system by using Office object model and marco to auto-evaluate the students’ work.

    • Handwriting Input Method Using Camera

      2011, 20(5):196-198.

      Abstract (2018) HTML (0) PDF 562.40 K (3587) Comment (0) Favorites

      Abstract:Handwriting input method has obvious advantage. However, current handwriting input depends on tablet. In this paper, we improve the design idea. We get an image of handwriting font shooting writing process by camera, which could get ready for recognizing character. The advantage of the handwriting input does not depend on tablet and fully use of camera which become universal. The experiments demonstrate the feasibility and usability.

    • Advanced Artificial Fish Swarm Algorithm

      2011, 20(5):199-201.

      Abstract (1470) HTML (0) PDF 550.49 K (3379) Comment (0) Favorites

      Abstract:An advanced artificial fish swarm algorithm is presented. The algorithm improves fish’s preying behavior, following behavior and moving method. It ensures each fish’s preying successfully, to avoid fish swarm’s early-ripe and to enhance global optimizing ability, by setting special preying behavior, restraining congestion degree interval of swarming behavior and altering moving method. It proves the algorithm’s effectiveness and accuracy by experimental simulation at last.

    • Using HMP to Realize the Function of Media Transforming in IMS-MGW

      2011, 20(5):202-205.

      Abstract (1541) HTML (0) PDF 751.36 K (3229) Comment (0) Favorites

      Abstract:The function of IMS-MGW(IP Multimedia Subsystem-Multimedia Gateway) is described briefly. Related knowledge of HMP(Host Multimedia Processing) is introduced. We pay more attention to discuss how to realize the function of Media transforming in IMS-MGW by using diverse channel resources which belong to HMP.

    • Rice Edge Detection Based on Canny Edge Detection Algorithm

      2011, 20(5):206-209,191.

      Abstract (1610) HTML (0) PDF 911.07 K (3757) Comment (0) Favorites

      Abstract:In this paper, an improved canny edge detection algorithm was represented to solve traditional edge detection algorithm in rice edge detection which had low precision and noise sensitive. Firstly, nonlinear diffusion filter was used to wipe of noise efficiently and kept the edge information of the image. Secondly, gradient calculation of pixel diagonal direction was considered in the calculation of neighborhood gradient amplitude which further repressed the impact of noise. Thirdly, using average interclass variance could self-adaptively calculate the double thresholds for different images. The results of the experiment indicate that the improved algorithm not only can be applied to rice image edge detection but also has a better accuracy and precision in the edge detection.

    • Personal Credit Evaluation Model Based on Attribution Selection of GA-CFS

      2011, 20(5):210-213,161.

      Abstract (1798) HTML (0) PDF 719.22 K (3078) Comment (0) Favorites

      Abstract:Attribution selection method could reduce data redundancy and the data dimension degree effectively and efficiently. This paper applies attribution selection of GA-CFS method to personal credit evaluation, and uses by the heuristic "merit" as GA fitness function to optimize personal credit index system through constructing a personal credit evaluation model based on attribution selection of GA-CFS. In addition, we compares with ID3, NB, Logistic, SMO and combination of GA-CFS attribute selection methods and the four classification algorithms in Australian data sets. Experiment results show that this model not only reduces the dimension of personal credit index and the amount of training data but also has higher classification accuracy than the personal credit evaluation model based on single classifier.

    • SPIT Detection Method Based on D-S Evidence Theory

      2011, 20(5):214-218.

      Abstract (1628) HTML (0) PDF 663.73 K (2862) Comment (0) Favorites

      Abstract:To resolve the security problem of SIP, a detection method based on statistics is proposed. This method fuses multiple attributes of user's behavior into modules based on D-S evidence theory, and by such fusion it achieves the complementation of modules and the detection of multiple attacks. It also differentially considers the possibility of attack and legality of user by classifying domains,which improves accuracy of detection. Experiment and analysis results showed the high accuracy of the proposed method, by which the SPIT can be detected efficiently.

    • Data Preprocessing Method Based on Importance of Property for WUM

      2011, 20(5):219-222,247.

      Abstract (1585) HTML (0) PDF 797.53 K (2368) Comment (0) Favorites

      Abstract:To reduce the Web log data scale and discover more recommendable access patterns from data preprocessed, with knowledge based on amount of information, the concept of quantify value of importance of every property in relation to property set was proposed, and used the idea of LRU page replacement algorithm in the operating system, a new data preprocessing method based on importance of property was proposed. The experiments show that the method could delete Web log records which were caused by user short-behavior and have not mining value, and filter out the noise data. Accordingly it can reduce the complexity of log mining effectively.

    • User Identification Algorithm in Web Log Mining

      2011, 20(5):223-226.

      Abstract (2365) HTML (0) PDF 563.45 K (3563) Comment (0) Favorites

      Abstract:The paper introduces some existing user identification algorithms, proposes IASR (IP, Agent, Session and Referrer) user identification algorithm to solve existing problems on user identification. The proposed algorithm overwrite URL in order to track users, efficiently and accurately identifies different users accessing the same proxy, and satisfactorily solves “Multi-User Problem” due to accessing Web via directly inputting URL in browser’s address bar. At last, the paper prospects future development of user identification algorithm.

    • Literacy of Special Bar Code

      2011, 20(5):227-230.

      Abstract (1929) HTML (0) PDF 746.64 K (3027) Comment (0) Favorites

      Abstract:In this paper, useful information on the card side of literacy, to overcome the uneven illumination, camera resolution, and limited, the impact on bar code segmentation and recognition problems, image processing of geometric correction, bilinear interpolation to enlarge, denoising algorithm, and the division of bar code orientation, which determine the positive card information, and improves the barcode recognition accuracy, experiments show that the method and to accurately identify the card’s positive message to the higher recognition rate, has some practical value for future bar code identification to open up a new direction.

    • Implementation of Fast-Reroute in VPLS Networks

      2011, 20(5):231-234.

      Abstract (1430) HTML (0) PDF 587.69 K (3153) Comment (0) Favorites

      Abstract:VPLS network as a new layer 2 VPN technology has huge prospect in large-scale MAN. With the popularity of high-quality services in MAN such as next generation network (NGN) and network TV (IPTV), it demand the increasing reliability in the network. This paper will introduce the basic model of VPLS network and its characteristic. Then an implementation of protecting VPLS network important link or node with the FRR of MPLS traffic engineering are presented to improve the quality of service, reduce the packet dropout. And also the principle of FRR and the process of traffic switching will be introduced in detail. At last, the result of experimentation is provided.

    • Segmentation Algorithm of Pulmonary Capillary

      2011, 20(5):235-237.

      Abstract (2091) HTML (0) PDF 566.12 K (3839) Comment (0) Favorites

      Abstract:In this paper, the division of pulmonary capillary extraction region, according to the lung itself, the gray image information, and capillary own characteristics, such as the gradual change in gray, uneven thickness, the main advantage of region growing method, Laplace second order differential operators and some other image processing algorithms, the more complicated parts of the extraction capillary, this method overcomes the shortcomings of a single algorithm to effectively separate out the shape and direction of major blood vessels, has proved a certain validity and application.

    • Graphic Adjustment Based on DataMatrix Barcode Structural Features

      2011, 20(5):238-239,195.

      Abstract (1656) HTML (0) PDF 810.41 K (2523) Comment (0) Favorites

      Abstract:Bar code appears in the course of the distortion increased the difficulty of identifying bar code, This paper presents a bar code image distortion correction algorithms, using two-dimensional bar code of the structural features can be effectively and quickly determine the location bar code symbols and Locator "L"-type intersection, And only one rotation can be formed the standard bar code graphics, laying the foundation for Identification the precise cuts . The method is simple calculation, and easy to implement and to be good effect.

    • Surface Fitting Improved Algorithm Based on Recursive Interpolation and Approximation

      2011, 20(5):240-242.

      Abstract (1398) HTML (0) PDF 567.23 K (3082) Comment (0) Favorites

      Abstract:The original recursive interpolating subdivision surface algorithm is analyzed. The surface fitting improved algorithm based on recursive interpolation and approximation solved the difficulties caused by some factors such as uneven distribution of known point with original algorithm in the complex surface fitting, improved effectiveness and efficiency of surface fitting.

    • Research and Application of Several Classical Search Algorithms

      2011, 20(5):243-247.

      Abstract (2636) HTML (0) PDF 561.23 K (6061) Comment (0) Favorites

      Abstract:Search technology is one of the basic technology of artificial intelligence. In the various application areas of artificial intelligence, it has been widely used. The search algorithm is the core of search technology, and all of the search algorithm optimization are mainly in the classic search algorithms to improve them. Therefore, the classic study of search algorithms has a very important theoretical value and practical application value. In this paper, several classical search algorithms for research, analysis, conclusion are studied, making knowledge formation a system and facilitating better learning and research. Finally, the article compares several algorithms listing their strengths and weaknesses so that it is easy to select the appropriate algorithm to solve relevant practical problems.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063