• Volume 20,Issue 9,2011 Table of Contents
    Select All
    Display Type: |
    • >系统建设
    • System Integration Architecture and Enterprise Case Study in the Cloud Computing and SOA Context

      2011, 20(9):1-6.

      Abstract (1845) HTML (0) PDF 829.94 K (3160) Comment (0) Favorites

      Abstract:Starting from the discussion on the deployment and logic structure of cloud computing, this paper analyzes the integration challenges that cloud computing are facing. Further, this paper proposes a solution to the challenge through integrating SOA into cloud computing. An analysis of enterprise case is also performed to describe in detail how an enterprise, by the convergence of SOA and cloud computing, has been building its system integration architecture.

    • Association Knowledge Discovery System for Bio-Chemical Enterprises

      2011, 20(9):7-11.

      Abstract (1917) HTML (0) PDF 761.08 K (2886) Comment (0) Favorites

      Abstract:Data Mining is a process of discovering knowledge or rules from available dataset. It is possible to make optimized production environment based on association rules mined from production data through association rule mining system. During the production process of Bio-chemical enterprises, it is expected that the environment such as temperature, water condition and raw material supply are appropriate to obtain best production output. However, due to the complexity of production, it is not easy to acquire the optimized condition. This paper therefore tries to design and develop a knowledge discovery software program intending to provide such tools. The paper also analyzes index segmentation and association rule mining from rare transactions from large dataset based on relative supporting value, which is illustrated in detail. The developed system was tested and verified in practice, which proves that the system can be applied in Bio-chemical production data analysis.

    • Material Flow Simulation System in Assembly Process of Equipment Industries

      2011, 20(9):12-16.

      Abstract (1569) HTML (0) PDF 762.02 K (3083) Comment (0) Favorites

      Abstract:The characteristics of assembly process in equipment industries are analyzed, which are discrete manufacture, complex production, complex supply chain, much customized production than traditional manufacture enterprise. The material flow model of assembly process is proposed based on discrete event simulation. This paper studies the restriction condition and correlation of material flow in assembly process, and designs the material flow simulation system of equipment industries. The simulation model is applied to the numeric analysis of an equipment manufacture enterprise. The important complication of material flow is analyzed, and the advice of material flow process optimization is given.

    • Digital Speech Recognition System Based on HTK

      2011, 20(9):17-21.

      Abstract (1831) HTML (0) PDF 655.97 K (5190) Comment (0) Favorites

      Abstract:Digital speech recognition is an extremely important branch of speech recognition. Its application in real life is used more and more widely. HTK is a C language-based toolkit developed by CUED mainly used for speech signal reorganization, speech synthesis, character reorganization, DNA compositor and so on. From HTK's general principles and software architecture, this paper designs a digital speech recognition system based on HTK, and verifies its recognition efficiency. Then by changing the identification unit and MFCC dimension, and by increasing the number of gaussian mixture components, it considers effects of different factors on the performance of the system. Finally, through the comparing test, it verifies the right combination of the identification unit and the number of gaussian mixture components, and also proves that MFCC dimension can enhance the system's correct rate.

    • Fetal ECG Extracting System Based on ICA

      2011, 20(9):22-26.

      Abstract (1499) HTML (0) PDF 971.75 K (3504) Comment (0) Favorites

      Abstract:In this paper, the design and implementation of a fetal electrocardiogram (ECG) extraction system based on surface electrode placing on maternal abdominal region is introduced. The system consists of an acquisition circuit and ECG analysis software. The hardware module includes eight channels ECG amplifiers (extensible), analog filter and A/D circuit. The software module contains multi-channel data acquisition and access control, digital filter, Independent Component Analysis (ICA) algorithm and real-time display of I/O waveform, etc. The clinical data and actual simulation data prove that this system can effectively extract fetal ECG from maternal ECG, and both the modules are able to satisfy the design requirements. The experiments demonstrate that the fetal ECG system introduced in this paper has high clinical value; further, it testifies the feasibility of ICA algorithms applied to fetal ECG extraction. In the end, it explains the advantages of this system over the relevant systems, and proposse updating direction and application prospects of the system.

    • Barefoot Trace Biological Characteristics Identifying System

      2011, 20(9):27-30.

      Abstract (1576) HTML (0) PDF 1015.35 K (2103) Comment (0) Favorites

      Abstract:In recent years, the scene of the crime is extremely complex. The barefoot crime frequency increases greatly and that gives great pressure on criminal investigation and detection. So, barefoot plane trace biological morphological characteristics identification also becomes the hotspot of criminal investigation recognition technology. The barefoot recognition belongs to biological form and biometric technology research. Its task is the identification through the image preprocessing, ecological form segmentation, object transform, biological morphogram and structure analysis, biological feature extraction, biological form and characteristic comparison match and so on a series of operations. This paper introduces barefoot recognition system structure, sysem model, biological shape classification and biological morphological characteristics database key content. It has great value of reference for baretfoot recognition system modeling and development.

    • UCON-Based Wireless Reading DRM System

      2011, 20(9):31-34,77.

      Abstract (1431) HTML (0) PDF 1.03 M (2859) Comment (0) Favorites

      Abstract:Current DRM technology of Wireless Reading System in network environment cannot effectively give the dynamic authorization and decision. To solve the problem, this paper presents a Mobile Wireless Reading DRM system based on Usage Control model, explaining the system model and the core technology. Experimental results show that the system can dynamically authorize users with good availability.

    • Distributed Weighing System Based on RS485 Bus and TCP/IP Network

      2011, 20(9):35-38.

      Abstract (1599) HTML (0) PDF 846.24 K (3520) Comment (0) Favorites

      Abstract:In order to solve the problems that the domestic weighing equipment is low in automation and difficult to manage, a set of weighing systems is designed. In this weighing system, the lower machine, being AT89S51, uses the RS485 bus transmission pressure signal to realize primaryslaver multi-computer communication. The upper machine, being PC, uses the TCP/IP Network Protocol to transmit the received data to central server. To guarantee the safety of data transmission, it adopts DES algorithm to encrypt and decrypt the data. Finally, in the development environment of MyEclipse6.5, it develops a weighing information management system with Java language based on C/S mode.

    • SMS Dispatch System Model Based on Virtual Multi-Port

      2011, 20(9):39-42,11.

      Abstract (1539) HTML (0) PDF 833.13 K (2848) Comment (0) Favorites

      Abstract:Dedicated to the dispatch of SMS based on the virtual multi-port, this paper puts forward on the SMS Dispatch System Model with dynamic load balancing strategy based on the queuing model. It extracts the system application model on the basis of the overall system architecture, then analyzes and demonstrates the model with the knowledge of Queuing Theory. It brings in dynamic load balancing and multi-thread scheduling strategy. Through the theory and practice, we conclude that the system model can ensure the high concurrency, real-time and load balance of SMS application.

    • Semi-Physical Simulation Platform for AFS

      2011, 20(9):43-47.

      Abstract (1885) HTML (0) PDF 960.35 K (3648) Comment (0) Favorites

      Abstract:To provide a platform for control algorithm of AFS(Adaptive Front-Lighting System), a semi-physical simulation platform for AFS based on vehicle driving simulator is presented. On the simulation platform, the signal of gear, throttle pedal, clutch pedal, brake pedal and steering wheel of vehicle driving simulator is sampled by PC, and with which the vehicle dynamics model is introduced to simulate the vehicle behavior. Then, the angle of the car front light should be rotated and calculated with the AFS control model, and is later sent to the motor driving model. Next, the actual turning angle of front light is returned to PC. The experiments show that with the semi-physical simulation platform, many parameters can be recorded and displayed, and it helps to make experiment observation and data analysis. It provides a convenient testing platform for control algorithm of AFS.

    • >研究开发
    • Specifying Executable Probability Design of Real-Time Task in Resource-Sharing Network with ASM

      2011, 20(9):48-53,16.

      Abstract (1488) HTML (0) PDF 1.05 M (2819) Comment (0) Favorites

      Abstract:Based on a formal method called Abstract State Machine (ASM), this paper describes an admission control mechanism of real-time task in resource-sharing network. In the meantime, the paper also proposes an ASM-based design model for executable probability of real-time task, and shows the methods and steps to analyze this design model based on Spec Explorer. The paper argues that the work will not only do good to further verification for the design method, but also to more refinements for admission control of real-time task. And the ASM model also provides an example for the realization of other control mechanisms designed.

    • Optimization of Construction Time-cost Management in Fuzzy Network Planning

      2011, 20(9):54-58.

      Abstract (1691) HTML (0) PDF 698.35 K (2772) Comment (0) Favorites

      Abstract:Estimating the time of projects in the engineering project management involves some sort of imprecision. Traditional network planning methods cannot solve problems of uncertainty. Based on fuzzy set theory, an analysis of the uncertainty is made in this paper. Triangular fuzzy number is introduced to the project duration analysis, and subjectd degree function of dutation is given. An optimal construction time-cost trade-off method integrating fuzzy theory and genetic algorithms (GAs) is proposed in this paper. A fuzzy model for optimizing the fuzzy network on time-cost is established. Experimental results indicate that the method of fuzzy network planning of time-cost optimization of a certain degree of flexibility and adaptability.

    • Ajax Application Model in the Electronice Government

      2011, 20(9):59-62.

      Abstract (1536) HTML (0) PDF 651.02 K (2890) Comment (0) Favorites

      Abstract:This paper presents the implementation of e-government base on Web rich client example of the government offices administration project. It analyses the system client's needs. According to these needs, it achieves the specific function modules on the client with Ajax application model, and gets the application of these common model, then sums up in a different application requirements on the best way to Ajax mode.

    • Virtual Simulation of Hydraulic Support

      2011, 20(9):63-67.

      Abstract (1500) HTML (0) PDF 857.58 K (3054) Comment (0) Favorites

      Abstract:Taking the ZY2600/07/14 mode two leg hydraulic powered shield supports as the engineering object,based on the concentrated load and surface load exerting on the roof ,the outer load tests are carried.The load and application region is determined by the stents design parameter.Based on the 14 real pressure values ,the pressure distribution function and modal file which contains surface load information are respectively produced by Matlab software and ANSYS software.The virtual sample model that the height of work is at 1100mm is built in ADMAS and ANSYS in order to achieve both forms of the laod tests.The results of research indicate that the outer loading method using surface load is feasible and has a great importantance in both theory aspect and practical aspect,because the load case of the hydraulic support can be reflected actually.

    • Structure Learning of BN Based on Improved Genetic Algorithm

      2011, 20(9):68-72.

      Abstract (1511) HTML (0) PDF 789.29 K (4273) Comment (0) Favorites

      Abstract:An improved genetic algorithm (IGA) is proposed in this paper for structure learning of Bayesian Network (BN). Compared with the traditional GA, two new operators named optimized mutation and illegal figure modification are proposed in the improved GA, which aim to solve the BN structure learning problem. The two new operators can simultaneously maintain the diversity and correctness of BN structure learning as well as the algorithm convergence speed of searching the global optimal network structure. In simulation, compared with the traditional algorithms such as K2 algorithm, GS/GES algorithms, normal GA, PSO, etc., the proposed GA shows better performance in global searching and convergence speed.

    • Improved Quantum Genetic Algorithm for Fuzzy Due Date for Parallel Machines

      2011, 20(9):73-77.

      Abstract (1566) HTML (0) PDF 825.57 K (2761) Comment (0) Favorites

      Abstract:Based on the combination of evolutionary theory and quantum theory, this paper proposes an improved quantum genetic algorithm (IQGA) to solve fuzzy due date scheduling problem on parallel machines. It updates the quantum gates with quantum phase comparison method to speed up the search for efficiency; using inverted decoding operation to expand the population size. The simulation results show that the proposed quantum genetic algorithm for fuzzy Due Date on Parallel Machines with better search capabilities.

    • Document Clustering Method Based on NMFSC

      2011, 20(9):78-81,156.

      Abstract (1901) HTML (0) PDF 761.40 K (3159) Comment (0) Favorites

      Abstract:Through analyzing the characteristics of the text, a novel text clustering approach based on Non-negative Matrix Factorization with sparseness constraint (NMFSC) is presented. The method uses NMFSC decomposing word-text matrix to reduce the dimension of the feature space, and better controls sparsity with sparseness constraint, and then further refines clusters by using the similarity of documents in clusters. Compared with text clustering method based on k-means and text clustering method based on NMF, the results of experiment show that the method has high value of the normalized mutual information, thus it has good clustering performance.

    • Implementation of FPGA Based on Median Filtering Algorithms Filter

      2011, 20(9):82-85,72.

      Abstract (1755) HTML (0) PDF 843.41 K (3853) Comment (0) Favorites

      Abstract:Through the analysis of the mathematical model of 3*3 template based on FPGA platform, this paper uses VHDL hardware description language to design and implement median filtering algorithm. In the design, through improved algorithms and optimizing the structure, the rational use of hardware resources is made, with the internal parallelism in the algorithm effectively used. At the same time, the pipelining uses structural optimization algorithm and improves the processing speed.

    • Analysis of Network Behavior Based on Two-Tier Structure Clustering

      2011, 20(9):86-89.

      Abstract (1431) HTML (0) PDF 674.44 K (2829) Comment (0) Favorites

      Abstract:First, this paper puts forward an algorithm of two-level aggregate, which can be applied to the analysis of flow data collected from a remote on-line monitoring system. Then, with the result of the algorithm we can get the characteristics of students' network behavior, which will have a substantial influence on advancing the construction of campus network.

    • Anomaly Detection on the Use of Log

      2011, 20(9):90-94.

      Abstract (1734) HTML (0) PDF 682.83 K (3987) Comment (0) Favorites

      Abstract:The use of log analysis of the outlier was proposed, on the log data preprocessing to establish the appropriate mining size, with depicting a normal mode. The improved method can be used for the large-scale anomalous detection of data sets, reducing the false alarm rate, while greatly improving the detection rate to achieve the desired time efficiency. The system can be with the regular analysis of the user logs, to automatically find the suspect from the log, in a timely manner to prevent or deal with the illegal operation, in order to make the detection system more intelligent, accurate and efficient.

    • Chinese Pronunciation Quality Evaluation System Based on ARM and Linux

      2011, 20(9):95-97,94.

      Abstract (1545) HTML (0) PDF 1.36 M (2817) Comment (0) Favorites

      Abstract:In view of the current situation and demands of the Chinese test, this paper made a thorough study of the pronunciation evaluation system based on the ARM-Linux, and put forward a design of Chinese pronunciation quality evaluation system based on the embedded technology. S3C2410X and UDA1341TS are used as the main part of the system. Through the research of speech characteristic comparison, the design easily realized the transplant of Chinese test system from PC to embedded system.

    • Robot Path Planning Based on Ant Colony Optimization and Particle Swarm Optimization

      2011, 20(9):98-102.

      Abstract (1909) HTML (0) PDF 849.52 K (2853) Comment (0) Favorites

      Abstract:A novel path planning approach based on particle swarm optimization (PSO) and ant colony optimization (ACO) algorithm is presented aiming at mobile robots in complex environment. Firstly the algorithm makes use of the method of environment modeling of particle swarm to quickly plan a initial path from the starting point to the goal point of the path. Then pheromone is distributed based on the paths generated before. At last, an improved ant colony optimization is used to find the eventually best path. The simulation shows that this method can greatly reduce the searching time, especially in complex environment.

    • Software Reliability Growth Model with Variable Fault Detection Rate

      2011, 20(9):103-106.

      Abstract (1490) HTML (0) PDF 680.44 K (2862) Comment (0) Favorites

      Abstract:It is proved that SRGM based on NHPP type of G-O model doesn't need to consider imperfect debugging and new mistakes during the debugging process. A new type of SRGM comes out which does not only consider the software developer's familiarity with software system, but also consider the diminishing mistakes developing system. This SRGM has considered the fault detection rate changing with the time changing. Moreover, the test result by using the public reported data shows that the goodness of fit is better than that of other models of G-O model.

    • Multi-Objective Matching Track in Different Scene

      2011, 20(9):107-111,173.

      Abstract (1459) HTML (0) PDF 885.04 K (2878) Comment (0) Favorites

      Abstract:According to the continuous tracking of multi-camera to multi-objective under the broad condition for different scene, this paper proposes a matching algorithm based on characteristics of the pure goal of robust adaptive SIFT (Scale Invariant Feature Transform). This method establishes a CamShift (Continuously Adaptive Mean Shift) tracking device for each pure goal which withdraws from the video image. It uses adaptive criterion space factor to get detail characteristic of goal. It uses the bilateral matching strategy based on BBF (Best Bin First) to elimination the error matching points. When the quantity of the goal key points is too few to satisfy the calculation the precise key point position of computation three dimensional quadratic function, it designs the adaptive criterion Harris vertex examination law to supplement the new spot. The experiment of continuous tracking outdoor vehicles in different settings indicates that this algorithm timeliness is good and its adaptive ability is strong. Compared with other algorithms, this algorithm consumes less match time, but is high in tracking precision.

    • Scheduling Algorithm for Public Bicycle System

      2011, 20(9):112-116.

      Abstract (1493) HTML (0) PDF 868.23 K (3580) Comment (0) Favorites

      Abstract:For the public bicycle system static vehicle scheduling problem, this paper proposes a public bicycle scheduling model with the target of transportation costs at least. It proposes an algorithm with simulated annealing algorithm integrated into genetic algorithm and it enhances the global search capability and efficiency. The example result shows that the optimized route with a reduction of 50%. It shows that the genetic simulated annealing algorithm has a good robustness and convergence and it is better for solving vehicle scheduling problem.

    • Wireless Sensor Networks Node Location Technology

      2011, 20(9):117-121.

      Abstract (1448) HTML (0) PDF 712.89 K (3013) Comment (0) Favorites

      Abstract:This paper presents a thorough discussion about the location technology of the sensor network that was analyzed in some aspects such as the basic principle of the localization, classification of location algorithms, the existing location algorithms, and performance evaluation criteria of the algorithms in detail. We have compared the performance of some classic algorithms, such as centroid localization algorithm, DV-Hop algorithm, convex programming localization algorithm and APIT algorithm etc. Analysis results show that the application of various algorithms in different environments have shown great differences in the performance. None of the algorithms is optimal. We should select the appropriate algorithm based on performance indicators of most interest. At last, this paper proposes the problems to be solved and the research direction of the wireless sensor network node location technology.

    • EPA Communication Protocol Stack Based on μclinux

      2011, 20(9):122-126.

      Abstract (1340) HTML (0) PDF 1.14 M (2841) Comment (0) Favorites

      Abstract:EPA Standard is a system specification that was proposed by China to improve industrial ethernet real-time communication performance. On the basis of introduction of the communications protocol model, the modular design of the application layer and the communications scheduling entity of the communications protocol is described, and the task of the protocol stack is divided in detailed. In the design process, the hard real-time and memory utilization of the μclinux system are key consideration. The test results show that the communication protocol stack can work properly and it achieves better results.

    • Accident Database Early Warning Based on BP Neural Network

      2011, 20(9):127-130,106.

      Abstract (1662) HTML (0) PDF 754.27 K (2997) Comment (0) Favorites

      Abstract:In order to achieve the purpose of accident early warning, this paper presents a new method: establish the vehicle accident databases, and combine it with BP neural network technology. First, construct a suitable BP neural network. Second, use the accident feature information to train the BP neural network, then the trained BP neural network can determine the possibility of this specific car accident. At last, send the vehicle information into the trained BP neural network, and it can predict the possibility of this specific car accident. In this paper, the author simulates this method by Matlab7.0.1. Simulation results show that the method is feasible and effective.

    • Secure DV-Hop Algorithm Against Malicious Beacon Nodes

      2011, 20(9):131-134.

      Abstract (1375) HTML (0) PDF 789.96 K (2732) Comment (0) Favorites

      Abstract:The beacon nodes play a key role in the process of unknown nodes' localization in wireless sensor networks' localization algorithms. However, the security of beacon nodes is often overlooked. A secure and optimal DV-Hop localization algorithm is proposed against malicious beacon nodes which send false location information in this paper. The proposed algorithm isolates malicious beacon nodes by the scheme of beacon-distance constraint and overcomes negative factor which is caused by the decline of beacon nodes' ratio and remaining malicious beacon nodes by the scheme of multi-correction balance. It improves the correction and security performance of localization algorithm.

    • Fiber Optic Distributed Temperature Measurement System Based on DSP

      2011, 20(9):135-138.

      Abstract (1468) HTML (0) PDF 750.73 K (2959) Comment (0) Favorites

      Abstract:Distributed fiber optic temperature measurement system has the characteristics of intrinsic safety, strong anti-electromagnetic interference capability, fast multi-points measurement and positioning, easy to install and so on. This paper introduces a distributed temperature measurement system based on DSP. Because the Raman scattering signal including temperature information is completely submerged in noise. We pick up an improved threshold function and threshold selection method to denoise the Raman scattering signal. Simulation results show that the improved wavelet denoising threshold function can effectively improve the noise reduction effect, improve the accuracy of the distributed fiber optic temperature measurement system, and simplify the system structure.

    • Robust Adaptive Controller for Robot Manipulator Based on Desired Trajectory Compensation

      2011, 20(9):139-143.

      Abstract (1674) HTML (0) PDF 822.97 K (2561) Comment (0) Favorites

      Abstract:A robust adaptive controller with guaranteed transient performance under a desired compensation adaptation law is developed for trajectory tracking control of robot manipulator in the presence of parametric uncertainties and external disturbances. With some modifications to the conventional adaptation law, a new control law is redesigned by combining the design methodologies of adaptive control and sliding mode control. The adaptive scheme has best computationally efficient for real-time calculating of the regressor, and compensate nonlinear friction and external disturbances via thought of variable structure. The global asymptotic stability is validated by Lyapunov direct method. Because the adaptation law is robust to uncertainty, the parameter is not contaminated with noise, simulation results show the estimated parameters are converged and the good robust and accuracy are obtained.

    • Intelligent Circuit Breaker Monitoring System Based on DeviceNet

      2011, 20(9):144-148.

      Abstract (1651) HTML (0) PDF 1.12 M (4076) Comment (0) Favorites

      Abstract:This paper designed and implemented the intelligent circuit breaker monitoring system based on DeviceNet. DeviceNet FieldBus protocol converter of this monitoring system can pass parameters of intelligent circuit breaker like opening state, closing state, current value, etc to DeviceNet FieldBus, monitoring software received the data real-time by using SST_DN3_PCI_1, and processing the data accordingly. Test results prove that DeviceNet FieldBus protocol converter fully meets the DeviceNet specifications, and minitoring system can make circuit breaker “remote control, remote adjustment, remote telemetry, remote motion”. The experiment is successful.

    • >实用案例
    • Information Management System for Grid Environment Protection

      2011, 20(9):149-152,116.

      Abstract (1796) HTML (0) PDF 796.98 K (3682) Comment (0) Favorites

      Abstract:Environmental protection information management and electromagnetic environment parameter prediction analysis system is developed to manage a large mount of relevant information of transmission project and provide theoretical basis for the power of decision-maker, managers, designer, scientific research personnel. The constructing and realizing of management system and using matlab tools for building electromagnetic environmental parameter prediction model are described in details, through the system integration complete the development of the system of information management and prediction analysis model, then support the decision-making of Grid environment protection. Finally, Matlab Neural Network(NN) toolbox could be called by C#.NET successfully,forecast analysis is achieved for the audible noise of transmission line.

    • Electronic Map Based on MapInfo and MapX

      2011, 20(9):153-156.

      Abstract (2059) HTML (0) PDF 618.58 K (3681) Comment (0) Favorites

      Abstract:With the development and perfection of GIS (Geographical Information System), its developing tools have been getting riper day by day. Complying with this trend, MapInfo Company has developed MapInfo and MapX control, which can realize the design of complicated GIS system. The paper is based on Guilin planning maps. Firstly, we use MapInfo 9.5 to structure map data and build Geoset file through Geoset Manager. Then, we carry out the secondary development to MapX control under Visual Studio 2008 programming environment and by C# programming language. Finally, the electronic map of Guilin is implemented.

    • Wireless Control System for Camera Base on ARM and Single-Chip Microcomputer

      2011, 20(9):157-160.

      Abstract (1736) HTML (0) PDF 865.98 K (3534) Comment (0) Favorites

      Abstract:This article introduces a wireless control system for the camera. The upper computer of the system is S3C2440 ARM. With the Bluetooth Serial Port data is transmitted from upper computer to the Single-Chip computer. The CSR BC417/143BQN is the core of the Bluetooth wireless Serial port module. Square wave is generated to control the camera after the Single-Chip microcomputer received the data, the scheme has been achieved with hardware, and it has been proved good to control the camera through test. The method described in this article has some reference value to other wireless control system.

    • Wireless Granary Temperature and Humidity Monitoring System

      2011, 20(9):161-164,89.

      Abstract (1608) HTML (0) PDF 923.34 K (3654) Comment (0) Favorites

      Abstract:The design of a wireless temperature, humidity collecting device, the device through the integration of temperature and humidity sensors SHT11 granary and other places on the temperature and humidity for the collection, and then the data will be collected in accordance with a certain degree of agreement sent through the wireless module, the receiving party to receive unpack the data to calculate the temperature, humidity and the value displayed on the LCD screen. AT89C2051 launch system for the core parts, including temperature, humidity collection, wireless transmitters. AT89S52 for receiving a portion of the core of the wireless receiver, combined with liquid crystal display, through appropriate software and hardware to deal with anti-jamming design of practical, small-scale collection of wireless temperature and humidity system.

    • Blade Server Fan Control and its Implementation

      2011, 20(9):165-169.

      Abstract (1827) HTML (0) PDF 769.63 K (3876) Comment (0) Favorites

      Abstract:A highly stable and reliable blade server cooling system based on MPC8245 + FPGA fan controlled system is introduced, and threshold-based fan speed control strategy is used. In the proposed control strategy only when the temperature reaches a preset threshold would the fan speed convert between temperature rise curve and the temperature drop curve, non-stationary noises caused by the frequently fan speed modification to which the temperature fluctuation led, have been greatly reduced. The reliable, precise fan speed control method is implanted using improved reset circuit and PWM control circuit. The result of various tests and trials show that the blade server fan control system can control the fan speed precisely.

    • Study and Implement of WebGIS Based on Component

      2011, 20(9):170-173.

      Abstract (1511) HTML (0) PDF 678.06 K (2844) Comment (0) Favorites

      Abstract:It's a trend and research hotspot of WebGIS to have a closer combination of Internet technology and GIS technology. After analyzing and comparing the WebGIS development technique, a realization technology based on ActiveX component is proposed, which is in order to take advantage of the Microsoft's COM/DCOM and construct a more efficient, flexible WebGIS system structure model. And put forward the system model of such WebGIS , finally, an application example adopt ArcIMS based on ActiveX technology is introduced, which confirms the feasibility.

    • Simulation and Demonstration System for Certain Weapon

      2011, 20(9):174-177.

      Abstract (1359) HTML (0) PDF 970.28 K (2666) Comment (0) Favorites

      Abstract:In order to enhance the training efficiency of certain weapon, with the multimedia and database technology, the simulation and teaching software system of certain weapon is developed in the VC++ developing environment. The function design and implementing methods are proposed. The multimedia learning function, equipment simulation training function, and examination-microcomputer judging function are combined to realize the network virtual training system oriented to weapon technological preparation process. Results show that this system is stable and good enough to meet the real needs.

    • Power Rewards System Based on Data Fusion

      2011, 20(9):178-181,138.

      Abstract (1641) HTML (0) PDF 1.30 M (2671) Comment (0) Favorites

      Abstract:A power rewards system based on data fusion is proposed in this paper. In this system, a grey dynamic model is used to compensate the missing data by building a GM(1,1) forecast model. And a method of clustering fusion for multi-sensors data is introduced to improve the objectivity of data fusion, the method defines the Euclidean distance matrix and determines the orders of sensor fusion according to the minimum distance clustering. The standard value of the unit electricity consumption is obtained on the basis of data fusion, then the power consumption rewards model is used to give rewards or punishment to the corporation workshops. The application results indicate that the system is effective and reliable.

    • Ultra-Low-Power Design and Implementation of the Intelligent Terminal Product in Pipe Network

      2011, 20(9):182-184,251.

      Abstract (1455) HTML (0) PDF 1.46 M (2792) Comment (0) Favorites

      Abstract:Because of the issue which power consumption constraints the product working life is growing increasingly, low power topics has been concerned extremely. How to control the system and module's static power, dynamic power, peak power and other parameters strictly is particularly important. With the intelligent information management terminal product in pipe network as the platform, considering the system structure, power topology, chip selection, product work environment and overall details, this paper gets an exciting test result: the system sleep current is as low as 9.0561uA, the work current is as low as 22.670mA, then the battery life can be over 3 years. All of this provides strong support in the ultra-low-power research and implementation for intelligent terminal product.

    • Design and Implementation of an Adult Amblyopia Treatment Software Based on Spatial Interactions

      2011, 20(9):185-188.

      Abstract (1905) HTML (0) PDF 663.07 K (3932) Comment (0) Favorites

      Abstract:In China, for various reasons, many children amblyopia amblyopia due to delayed medical treatment for the best time, resulting in a large number of adult patients with amblyopia. There are great difficulties for their life and work. We design a training software based on visual spatial interactions so as to achieve the aim of improving the contrast sensitivity and visual acuity of adult amblyope. The software's primary modules based on matlab and the corresponding programming tools. In the training process in order to adjust the parameters and automatic input the parameters, text data format used to exchange data with the program. Through the clinical practice, it is showed that the software has a good stability. We analyze the amblyopia patients who use the software for one month, found that contrast sensitivity and visual acuity has a corresponding improvement in the level. It is showed that the software for the treatment of adults with amblyopia at this stage is significant.

    • >应用技术
    • Research and Implementation of Enterprise Network Based on IPv4 & IPv6

      2011, 20(9):189-192.

      Abstract (1842) HTML (0) PDF 900.28 K (3458) Comment (0) Favorites

      Abstract:IPv6 is the core of the next generation network. All the enterprise network will transit to IPv6 within a few years. We will describe the technologies and principles which transits from IPv4 to IPv6 in this article. And we will put forward the new ideas and implementation methods which achieves IPv4 / IPv6 dual stack network in the enterprise. Finally, the test proved that the proposal is feasible and maximize the investment of the enterprise.

    • Vertical Search Engine System Based on Nutch

      2011, 20(9):193-196,47.

      Abstract (1625) HTML (0) PDF 1.22 M (3821) Comment (0) Favorites

      Abstract:Due to the low accuracy in current general search engines, and the poor search effectiveness of lower logistics in major domestic ports, the paper designs a port logistics Nutch-based vertical search engine system which achieves fast query and logistics information sharing. The system uses a theme based on vector space model identification algorithm and the relevance of the algorithm is improved by adding identification mechanism and the importance of metadata tags that contain the keywords of the weighting. Adding “tunnel handling” mechanism to deal with separation issues topic page, and modify the source code to sort search results to make it more responsive to the requirements of vertical search engines.

    • Application of IPTV STB Based on XML Parser

      2011, 20(9):197-199.

      Abstract (1604) HTML (0) PDF 574.99 K (2893) Comment (0) Favorites

      Abstract:According to the actual needs, we design a XML parser based on Linux Embedded system. The design process is analyzed in detail and the program based on C Language is given in this paper. The feasibility and effectiveness are proved by actual test. Now, this XML parser has already been applied to IPTV STB successfully.

    • Prediction Model of Bayesian Classification Algorithm Applied to Control Sintering Temperature in Rotary Kiln

      2011, 20(9):200-203.

      Abstract (1403) HTML (0) PDF 618.42 K (2992) Comment (0) Favorites

      Abstract:The sintering temperature in rotary kiln is usually hard to be stable because of complex industrial environment. In this paper, we present a prediction model based on Bayesian classification algorithm to predict the trend of the amount of feed coal for controlling the sintering temperature in rotary kiln. To avoid the influence of attribute independence assumption of Bayesian classification algorithm, the FastICA algorithm used to find the independent components of the working condition data set in rotary kiln. Then we use AdaBoost algorithm to find a best classifier. The final simulation results show that the model has better control performance.

    • A Watermarking Scheme for Remote Sensing Image Based on DFT and Watermarking Segmentation

      2011, 20(9):204-206,255.

      Abstract (1787) HTML (0) PDF 821.74 K (3404) Comment (0) Favorites

      Abstract:This paper proposes a digital watermarking algorithm for remote sensing image based on DFT and watermarking segmentation. At first, it normalizes the host remote sensing image and determines an invariant centroid, then selects a square area around the invariant centroid for watermark embedding. Next, it generates a pseudo-random sequence as digital watermarking, and divides it into two parts. And finally it applies DFT to the selected region and embeds watermark into DFT phase and amplitude components of the selected square area of the host remote sensing image. Experiments have shown the algorithm's good robustness against JPEG compression, filtering, noise attacking, and it is also robust against geometric attacks as rotation, scaling, moving etc.

    • A Meanshift-Based Moving Object Tracking System and Its Implementation on Blackfin

      2011, 20(9):207-209,169.

      Abstract (1581) HTML (0) PDF 705.01 K (2990) Comment (0) Favorites

      Abstract:In this paper, a real-time moving object tracking system of high-speed image sampling and processing with Blackfin DSP as the core component is presented. An algorithm of object-tracking based on Meanshift is implemented. At 1ast, the experimental results under a complicate background are also shown. It is proved to be a reliable, effective and high rea1-time.

    • Parametric Design Method of Dimensional Tolerance Based on SolidWorks

      2011, 20(9):210-213.

      Abstract (2004) HTML (0) PDF 754.69 K (5581) Comment (0) Favorites

      Abstract:In order to make fast response to market requirement, the technology of parameterization is more and more widely applied to the design and development of product. Currently the technology of parameterization based on 3D CAD systems mainly concerns about design of basic dimension, and seldom about dimensional tolerance. But dimensional tolerance is an important indicator in design. To solve the problem of parameterization in dimensional tolerance, research on the method of dimensional tolerance information in the expression, extraction and labeling for parametric model of parts, a variant design method with dimensional tolerance is presented in this paper. And integrate between variant design method of dimensional tolerance and variant design method of dimension, part variant design method with dimension and dimensional tolerance is synchronization completed. According to secondary develop the parametric CAD software SolidWorks, a part variant design with dimension and dimensional tolerance plug-ins integrated with based on SolidWorks is developed with VC++. As an example, all methods and development of plug-ins are applied to a case study of shaft, and the feasibility is also verified.

    • >经验交流
    • A Simple and Efficient Algorithm for License Plate Localization

      2011, 20(9):214-217,233.

      Abstract (1457) HTML (0) PDF 801.15 K (4062) Comment (0) Favorites

      Abstract:License plate location is one of the key technologies in license plate recognition system. By preprocessing the license plate image to remove the interference noise, this paper uses the method of interlaced scanning and the mothod of rectangular window searching to location the license plate's top boder, bottom boder, left boder and right boder. So it greatly improves the speed of license plate location. This paper also proposes that the changing of location area can judge the tilt condition of the license plate and gives out a correction mothod of the tilt license plate. The experiments show that this algorithm is simple and efficient.

    • A Simple Effective Extraction Algorithm for the Features of Handwritten Digits

      2011, 20(9):218-221.

      Abstract (2221) HTML (0) PDF 663.86 K (4216) Comment (0) Favorites

      Abstract:A new method to capture the feature vectors of numeric alphabetic based on circles, lr- sides contour and row subsection is proposed by intergating the opinions of Statistic Feature Extraction and Structural Feature Extraction. It uses less feature vectors to keep the substantial information in the topologic structure of a numeric alphabetic, which has a very strong adaptability. In the imitating experiment, first the feature vectors extracted are to be assorted roughly based on the Structural Features (circle) of the numeric alphabetic, and then the other feature vectors is to be recognized and eliminated gradually making use of the AD AdaBoost neural network. The result shows that, this method not only has a faster speed of recognition, but also has a higher ratio of correct recognition.

    • Windows 7 Ergodice PspCidTable to detect hidden Processes

      2011, 20(9):222-225.

      Abstract (1892) HTML (0) PDF 630.23 K (4569) Comment (0) Favorites

      Abstract:PspCidTable preserves all pointer of processes and threads, Ergodicing PspCidTable can enumerate all processes include hidden processes. The paper analyses the structure of windows 7's PspCidTable, expounds the methed to obtain memory address of windows 7's PspCidTable. The algorithm of Ergodicing PspCidTable, finally brings up the step and methed to automatically detect processes. Experiments on windows 7 operation system showed that the algorithm can enumerate all processes with high efficiency, include processes that hooked functions that enumerated processes or directly entered into kernel space changed kernel data to hide self.

    • Design of nRF24l01 Driver under Embedded Linux System

      2011, 20(9):226-229.

      Abstract (2172) HTML (0) PDF 672.00 K (4495) Comment (0) Favorites

      Abstract:This article introduces the parameters and performance of the chip nRF24l01, and designs the driver for the chip under linux system refer to the course and the structure of the char device driver development. Additionally, the article designs and verifies interrupt and polling two ways for receving and sending data to meet the different demands of the real application, and introduces the design methods for the applications based on the driver.

    • Algorithm of "Light Ring" Effect in 3D Games

      2011, 20(9):230-233.

      Abstract (1814) HTML (0) PDF 771.16 K (3751) Comment (0) Favorites

      Abstract:Usually, there are some “light rings” effect which like shadows and close to the ground in 3D games. This paper analyzes the relationship between the “Light Ring” effect and the terrain in 3D game, and hands out an practical algorithm of the effect mentioned above. With this algorithm, the “Light Rings” will follow characters, close to the ground, as the ups and downs of the ground. The algorithm can combine with a variety of game engine, and has been applied successfully in a lot of 3D games.

    • A Fast Selection Method at Large Table of Data in Data Warehouse

      2011, 20(9):234-237,229.

      Abstract (1434) HTML (0) PDF 794.07 K (2732) Comment (0) Favorites

      Abstract:Traditional selecting optimization structures at large table in data warehouse can only either shorten the time of query processing, or reduce the storage and maintenance overhead. It can't achieve a combined effect at the same time. Based on the traditional optimization techniques, this paper proposes a new approach, namely, HP→BIs, by exploiting their similarities of horizontal partitioning and bitmap indexes. Experimental results show that with this approach, we can significantly shorten the time of query processing, reduce the storage and maintenance cost.

    • Design and Realization of Automatic Generation Test Case

      2011, 20(9):238-240,126.

      Abstract (1686) HTML (0) PDF 772.88 K (4176) Comment (0) Favorites

      Abstract:A method of testing case generation based on state transfer is proposed. Extended Finite State Machine is selected as the testing model. Combined with regular expression, this method passes state transfer according to test demand, and gains test case. It has been applied to the software test of control system.

    • Design and Implementation of Automated Testing Tools for Web Form

      2011, 20(9):241-244,177.

      Abstract (2025) HTML (0) PDF 739.15 K (4037) Comment (0) Favorites

      Abstract:Web form testing is a very important part of the testing of web system, which has the features of high repeatability and mechanical. In view of the low efficiency of traditional manual testing and the low reuse rate of “Capture/Playback” script of commercial testing tools, an automated testing tool named AFP (Automated Form Testing) based on the data-driven testing framework is designed in this paper. Compared to other testing tools, AFT has such characteristics as being easy to use and efficient.

    • Method about ResultSet Converted to 2d Array and Application

      2011, 20(9):245-247,199.

      Abstract (1457) HTML (0) PDF 740.99 K (3214) Comment (0) Favorites

      Abstract:To deal with problems like ResultSet object's occupying resources and abnormal handling in the database connection release, this paper puts forward “a method about ResultSet converted to 2d array”. It gives solution to the problem, as well as data structure. It realizes the algorithm and applies it to data exchange cases about logistics information system integration middleware LESB.

    • Methods of Data Processing and High Accurate Detection for Image Detection of Part Sizes

      2011, 20(9):248-251.

      Abstract (1994) HTML (0) PDF 675.97 K (4258) Comment (0) Favorites

      Abstract:For the use of Machine Vision in shaft size detection, this paper propose a method which completes the image distortion correction and system calibration by using commonly used industry standard parts. This method effectively improves the detection accuracy, simplifies the tedious process of calibration of conventional systems. By analyzing the main causes of error in image detection, the formal equation from error equation is established. Image distortion is corrected and calibrated at the same time. The coefficient of normal-type is calculated. This method is not only simple, but also effective to improve the accuracy of the image detection. The experiment proves that detection accuracy can reach 4μm at the resolution of 3450DPI, completely applicable to high-precision detection of shaft.

    • Fault Predication of Multi-Elevator Operating System Based on Neural Network

      2011, 20(9):252-255.

      Abstract (1478) HTML (0) PDF 810.21 K (3196) Comment (0) Favorites

      Abstract:The paper studies how to use RBF neural network which can approximate any nonl-inear functions quickly and has good characteristics of the classification ability for multi-elevator operating system failure prediction, and proposed failure prediction method. The simulation results show that the method is feasible and can be widely used in multi-elevator failure prediction.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063