• Volume 22,Issue 4,2013 Table of Contents
    Select All
    Display Type: |
    • Study of Interoperability of UPnP and IGRS

      2013, 22(4):1-5.

      Abstract (1873) HTML (0) PDF 830.64 K (2694) Comment (0) Favorites

      Abstract:The UPnP and IGRS are the two main protocols to connect seamlessly in the field of digital devices. Because the formats of the description of device and its services by these two protocols are different, devices which base on different protocols can not be identified and linked directly. In view of this situation, this paper analyses the difference between the two main protocols from the level of internal mechanisms and explains the feasibility of interoperability which bases on different protocol, so this makes the resource sharing of information equipments and collaboration services possible. This paper provides theoretical support for the interoperability of the IGRS and UPnP devices.

    • Expert Analysis System for Performance Test

      2013, 22(4):6-9.

      Abstract (1598) HTML (0) PDF 731.23 K (2721) Comment (0) Favorites

      Abstract:To reduce difficulties of performance analysis and improve performance test quality, the expert analysis system for performance test is researched. The performance analysis objects and methods are first summarized. By the analysis of manual method and knowledge prototype, a structured representation method is studied. Based on these studies, the structure of expert analysis system is simply designed.

    • Comparison of Multi-Sensor Information Fusion Algorithms Based on Target Recognition

      2013, 22(4):10-13,5.

      Abstract (1857) HTML (0) PDF 1015.02 K (4433) Comment (0) Favorites

      Abstract:In recent years, the technology of multi-sensor information fusion obtains amounts of researches and rapid development in the realm of target recognition. The basic theory and its systematic structure are introduced. The multi-sensor information fusion algorithms of target recognition are expounded and compared thoroughly in this paper. Finally the trend in this field are given.

    • Classification and Research of LLE Method

      2013, 22(4):14-17,50.

      Abstract (3825) HTML (0) PDF 1.05 M (3712) Comment (0) Favorites

      Abstract:For classification of low-dimensional data is very common, but not for the classification of high-dimensional data, mainly because of too high dimension. In particular, for the uneven distribution of the sample set, the traditional locally linear embedding(LLE) algorithm is vulnerable to the impact of the number of nearest neighbor points, In order to overcome this problem, this paper improves locally linear embedding algorithm by changing the distance. Through the experiments indicates that the improved distance locally linear embedding algorithm can make the original sample set distribute evenly as far as possible, thereby reducing the influence of selection of the number of nearest neighbor points on locally linear embedding, on the premise of ensuring accurate classification, to achieve the purpose of effectively shorten the time.

    • Public Sentiment Monitoring System for Microblog Based on Hadoop

      2013, 22(4):18-22,9.

      Abstract (2088) HTML (0) PDF 1.39 M (5311) Comment (0) Favorites

      Abstract:With the rapid development of online social networks, such as social networking services, microblog, online community, etc., a real two-way communication and new media age has been gradually forming. Everyone can create their own content and spread out quickly through online social networks. According to incomplete statistics, Sina microblog generates over 1000 new microblogs per second and the daily incremental size of data is 5TB. Thus, massive data has brought severe challenge to public opinion monitoring. This article will introduce a microblog public opinion monitoring system based on the Hadoop. It can mine and analyze large scale collected data, realize detection and tracking of hot topics, perform social network analysis on the microblog and visualize the analysis result. The proposed system will provide automated, systematic, and scientific information support for party and government organizations, enterprises and other units and organizations to detect sensitive information timely, grasp the hot points and the trend of public opinion and deal with the crisis of public opinion.

    • Live-line Work Robot Control System

      2013, 22(4):23-26.

      Abstract (1627) HTML (0) PDF 3.46 M (2400) Comment (0) Favorites

      Abstract:The Hot-line Work Robot is a safe, reliable, live working equipment developed for distribution live line work. System compositions of Robot and hardware and software implementation of the motion control system are introduced in detail. Finally, the paper introduces the system's position servo control and force position control in particular, and compares two control methods of position tracking through the MATLAB simulation. Simulation curve proves that hybrid control method of force and position is better than position control.

    • Dimensional Modeling of the Migrant Workers Medical Data Analysis System

      2013, 22(4):27-31.

      Abstract (1390) HTML (0) PDF 927.81 K (2906) Comment (0) Favorites

      Abstract:The Migrant Workers Medical Data Analysis System aims at analyzing medical care data of migrant workers based on data warehouse and OLAP technology, in order to assist decision making for government. Data modeling is one of the most important steps of building data warehouse. Therefore, this paper designed a multi-dimensional model for the system based on dimensional modeling theory, and provided the elementary design of data mining analysis.

    • RFID Model for the Internet of Vehicles

      2013, 22(4):32-35.

      Abstract (2226) HTML (0) PDF 732.32 K (2620) Comment (0) Favorites

      Abstract:RFID model is one of foundational and core models in Internet of vehicles simulation. Previous traffic simulation models can't meet with the demand for Internet of vehicles such as Wireless communication and cooperative interaction, and lack of RFID model. This paper presented a reader model and a electronic tag model of RFID system based on the agent principle, including their agent structure and implementation. Based on automaton theory, an automaton for different data frame format of different communication protocols was given to unify the heterogeneous data processing during the communication of reader, tag and computer. As an example of the model application and verification, it developed a simulation system of reader locating of RFID traffic data collection with VC++ 2010. The result indicates that RFID models approximate physical RFID device better, and build the foundation for Internet of vehicles simulation system development.

    • Configuration Management Platform of Wireless Mesh AP Based on B/S

      2013, 22(4):36-39.

      Abstract (1418) HTML (0) PDF 709.95 K (3155) Comment (0) Favorites

      Abstract:To configure and manage the wireless network simply and efficient, a Mesh AP platform is designed which is based on B/S. First, a Web server is built on JA76PF0. Then, Web server and CGI application interact, and HTTPD process handles client data. The result is that remote management of the wireless mesh AP is realized, which promotes the wireless mesh network development.

    • Study and Implementation of IEEE1588 Clock Synchronization System Based on LM3S9B96

      2013, 22(4):40-44,68.

      Abstract (1517) HTML (0) PDF 1.30 M (4261) Comment (0) Favorites

      Abstract:With distributed systems widely used in manufacturing and real-time control of industrial, medical, power, etc. The demand for clock synchronization system becomes urgent. Traditional synchronous mode, such as GPS, NTP, etc., due to the reasons of cost or synchronization accuracy is difficult to meet the demand for industrial applications. Hardware-assisted IEEE1588 clock synchronization technology can greatly reduce the synchronization error. It is the effective way to achieve high-precision synchronization, and lower overall costs. The functional structure of physical layer chip LM3S9B96 and the basic synchronous principle for IEEE1588 protocol are analyzed in this paper. Realized the IEEE1588 clock synchronization module based on LM3S9B96. Testing and validation in LAN, its synchronization accuracy can be achieved nanoseconds.

    • Environmental Monitoring System for Wild Heritage Conservation Based on Z-Stack

      2013, 22(4):45-50.

      Abstract (1460) HTML (0) PDF 1.25 M (2951) Comment (0) Favorites

      Abstract:Aimed at the special requirements of the wild heritage conservation, an environmental monitoring system based on Z-Stack is proposed. The design of sensor nodes, gateway, and the system management software are discussed in detail. Compared with traditional monitoring system, the proposed system is low cost, flexible, dynamic monitor in network, and convenient for function expansion.

    • Planning and Programming Information Management Platform Based on Three-Tier B/S Architecture

      2013, 22(4):51-54,78.

      Abstract (1843) HTML (0) PDF 1.24 M (2844) Comment (0) Favorites

      Abstract:The scientification and informatization evolution of power grid planning and programming management put forward higher requirements to the flexibility, efficiency and security of the system's design structure. Because of this, this paper proposed the development method of planning and programming information management platform for national grid based on three-tier B/S architecture. On the basis of analysising the three-tier B/S architecture's features, three layers consist of client representation layer, application logic layer and data layer of the system were designed and implemented with the SoTower tools. The rich client technology was used to develop client side of the system. WebLogic and Oracle were used as the application server and database server respectively. The final system has functional integrity, and high grade performance. This system has tested running in pilot(experimental) units now, and got a good application effect.

    • Intelligent Weather Station Based on Dual-Core Embedded System and ALN Algorithm

      2013, 22(4):55-59.

      Abstract (1405) HTML (0) PDF 1.08 M (2955) Comment (0) Favorites

      Abstract:Meteorological data is now used widely in modern industrial controlling and energy area. These data concludes not only real-time data, but also includes prediction meteorology data. In this paper, a new kind of intelligent weather station forecasting system based on OMAP-L138 ARM and DSP is presented. This system uses ALN algorithm to realize its prediction function. Through this system, prediction models can be trained by historical data of more than three months, and forecasting results can be obtained by entering real-time meteorological data into the trained models.

    • Library Private Cloud

      2013, 22(4):60-63.

      Abstract (1531) HTML (0) PDF 661.92 K (2784) Comment (0) Favorites

      Abstract:This article describes the architecture of library private cloud, and introduces the functions and implementations about the Hyper-V virtual infrastructure platform, the SCVMM and VMMSSP. Then it describes the deployment, management and maintenance of business management systems and information services platform based on the architecture of the library private cloud platform. Finally, the author summarizes the library private cloud platform, and give some suggestions for later research.

    • User Driven Composition Web Service Selection Algorithm

      2013, 22(4):64-68.

      Abstract (1710) HTML (0) PDF 943.62 K (2497) Comment (0) Favorites

      Abstract:The composition service selection based on quality of service (QoS) is still challenging because the difficulty of obtaining user's requirements and the complex and uncertain environment make decision making hard. Firstly, a user weight model closer to user's expression habit to obtain the user's weight is presented. And then a novel composition Web service selection algorithm (CWSSA) based analytic hierarchy process (AHP) and technique for order preference by similarity to an ideal solution (TOPSIS) is presented to solve the problem of optimal service selection in the complex and uncertain environment t for the first time. It can convert user's pair-wise comparison matrix of QoS attributes to user weight and take QoS information with interval number into consideration. Other contributions of the paper include a user weight model, a QoS model with interval number and strategy for aggregating QoS. Finally, the benefits and effectiveness of our approach are demonstrated.

    • Encoding Scheme Selecting Algorithm of Character Two-Dimensional Barcode

      2013, 22(4):69-73,87.

      Abstract (1347) HTML (0) PDF 1.27 M (3569) Comment (0) Favorites

      Abstract:The character two-dimensional barcode is encoded through selecting different schemes for specific character set. The various schemes are selected in order to achieve the highest encoding efficiency. In this paper, we first study the international standard “look-ahead test” algorithm in Data Matrix 2D code, and find it has its limit.We cannot apply the characters two-dimensional code scheme selection immediately. So, based on the international standard “look-ahead test” algorithm in Data Matrix 2D code, the principle of multistage decision and the method of mixed character count are used to archieve a kind of look-ahead algorithm for character two-dimensional barcode. We apply it to the characters two-dimensional code scheme selection. The experiments show that the look-ahead test algorithm is a good solution to solve the characters two-dimensional barcode scheme selection problem.

    • Efficient Routing of Wireless Sensor Network based on Dynamic Cognitive PSO

      2013, 22(4):74-78.

      Abstract (1588) HTML (0) PDF 900.11 K (2565) Comment (0) Favorites

      Abstract:This article researches the problem of efficient energy saving in wireless sensor network routing. The nodes in wireless sensor network need primary energy such as battery to supply energy. But it is impossible to provide extra energy supplement in many adverse circumstances. The traditional route protocol of wireless sensor network mainly focuses on the quality of network or energy solving. Some nodes may die when the good quality network works too long. On the contrary, the quality of the network can not be guaranteed if the energy saving has been considered only. Thus this paper proposes a method of high usage route of wireless sensor network based on dynamic epistemic PSO. And a dynamic epistemic PSO algorithm is introduced in searching the route of sensor nodes after the analyzing of the structure of the wireless network, which can realize the real-time monitoring of the current energy state of nodes and the information of route and then achieve the effective balanced state of the routes. The simulation experiments show that through this method, the updated energy consumption of wireless network is reduced efficiently, the death date of nodes is also reduced and the performance of network is improved obviously.

    • Technology About Double Encryption Key of Database Security Based on AES Encryption Algorithm

      2013, 22(4):79-82.

      Abstract (3678) HTML (0) PDF 663.44 K (3892) Comment (0) Favorites

      Abstract:To ensure the security of the generation and storage of encryption key, this system proposes one new double encryption-key mechanism for database encryption, in which the AES encryption is used to get work key from transform of the main key, without setting work key firstly. In order to further ensure the security of database encryption key and to improve the encryption key generation rate, the construction of AES algorithm key matrix is analyzed and improved. The key expansion algorithm called ‘one-way' design strategy is introduced to reduce the correlation between each wheel key, which will help to provide a more effective guarantee for the security of database.

    • Model and Algorithm of the Field Intelligent Scheduling for Power Supply Enterprise

      2013, 22(4):83-87.

      Abstract (1564) HTML (0) PDF 790.28 K (3826) Comment (0) Favorites

      Abstract:The field scheduling is always a difficult point of power grid operation. How to carry out the management and allocation of human resource effectively is the foundation of power grid corps scheduled tasks to be completed timely and efficiently. This paper introduces a kind of automatic human resource distribution model and computing system based on artificial intelligence: We draw from the Job-shop theory; combine with genetic algorithm to carry out human resource scheduling to achieve the optimization target of the maximum completion time is the shortest and the delayed loss minimum. Finally, through the example analysis to prove the feasibility of the model and algorithm.

    • Three-Dimensional Garment Simulation Technology Based on Interactive Suture Setting

      2013, 22(4):88-91.

      Abstract (1448) HTML (0) PDF 897.35 K (3402) Comment (0) Favorites

      Abstract:Nowadays, the technology of three-dimensional virtual fitting has been gradually deepened both at home and abroad. But there are few result on the setting of garment stitching, which is one of the key processes in simulation. The three-dimensional effect is produced by suturing two-dimensional garments. Accurate and convenient suture set method is one of the important steps to achieve a good simulation effect. Based on the research of current three-dimensional virtual fitting technology, this dissertation proposed a new method to set stitching information and realized the interactive suture setting process. After importing two-dimensional garment files, it can set the corresponding stitched edges through interactive steps, and save these information as files. In fitting process, the system can import these files, according which the system can apply force to the corresponding vertexes. This method can provide accurate stitching information, the garment can deform gradually under the external force and internal force, and the system can realize virtual try-on at last.

    • K-Means Clustering Algorithm and Artificial Fish Swarm Algorithm Applied in Image Segmentation Technology

      2013, 22(4):92-94,103.

      Abstract (1326) HTML (0) PDF 987.44 K (2975) Comment (0) Favorites

      Abstract:The paper presents an artificial fish swarm algorithm based on K-Means clustering. The algorithm uses the feature of having artificial fish swarm algorithm's strong robustness and being not easy to fall into local optimum value, and hence dynamically determines the number of clusters and center, overcoming the defects of K-Means clustering initial point selected unstable. The image segmentation is processed based on the fusion of two algorithms. The test proves the algorithm is ideal.

    • Customer Satisfaction PLS Path Model Algorithm Implement Based on Multi-Thread

      2013, 22(4):95-99.

      Abstract (1447) HTML (0) PDF 761.02 K (3251) Comment (0) Favorites

      Abstract:While computing Customer Satisfaction Model, structural equation model is always used to solve the influ- ence of complicated multi-dimensional. Partial Least Squares (PLS), used in computing of structural equation model, works effectively with the problem that a large amount of latent variables cannot be sampling directly. In the process of model analysis, the PLS path model builds up the relationship between latent variables and manifest variables, and enhances the intuitive and generality of model. In order to improve the efficiency of PLS, we parallelize the computational process to get more efficiency. This article mainly talks about the PLS path model based on customer satisfaction model and the distributed algorithm based on Java multi-thread. It is proved on multi-core computer that PLS path model implementing on multi-thread can obvious improve speed of computing.

    • Latency Pretreatment Technology to Improve the Accuracy of IP Network Coordinate Systems

      2013, 22(4):100-103.

      Abstract (1102) HTML (0) PDF 759.16 K (2853) Comment (0) Favorites

      Abstract:In the actual network, network delay jitter even with a long tail, not only causes coordinates oscillation, but also seriously affects the stability of IP network coordinate system and accuracy of time delay prediction, so it is necessary to preprocess the measured time delay to avoid the performance of IP network coordinate system affected by “distortion delay”. This paper introduces and analyses the characteristics of the existing delay preprocessing algorithms of Δ-filter and MP-filter, then puts forward another delay filter algorithm called RPE-filter. Comparing experiment shows that RPE-filter can not only filter the time delay polluted by random delay, but also can smooth fluctuation of the delay curve, even more can real-time reflect the changes of network topology, and the most important is that its absolute error accumulation is obviously less than Δ-filter and MP-filter.

    • Multipath Ant Colony Optimization Adaptive Routing Protocol in Mobile-WSN Based on Clustering

      2013, 22(4):104-107.

      Abstract (1219) HTML (0) PDF 793.21 K (2475) Comment (0) Favorites

      Abstract:To save energy costs and extend the life span of the wireless sensor networks. In this paper, ant colony algorithm, proposed the idea of an optimized ant colony algorithm in wireless sensor networks, and campared with EEABR algorithm in wireless sensor networks, the network survivability status. The experimental results show that the use of improved ant colony algorithm for network optimization can be achieved in order to extend the network life span.

    • Optimization and Application of H.264 Intra Prediction Algorithm

      2013, 22(4):108-112.

      Abstract (1234) HTML (0) PDF 933.98 K (2560) Comment (0) Favorites

      Abstract:Existing video compression methods, mostly in order to video compression and reduce the compression time, using the complexity and high cost of hardware circuit. According to the intra prediction algorithm for accuracy and efficiency, we used H.264 intra prediction algorithm and optimized design it, design the hardware circuit on this basis, after the combination of the JPEG image compression algorithm to compress the video further. The method to simplify the hardware circuit, reduce coding time, the purpose of data transmission rate and reliability. The tests show that in this study has achieve the above objectives and wish a relatively low-cost market advantage, and a good development prospects in the field of wireless video surveillance.

    • Eye Location Based on Variance Filter and Independent Component Analysis

      2013, 22(4):113-115.

      Abstract (1182) HTML (0) PDF 584.71 K (2407) Comment (0) Favorites

      Abstract:A new algorithm for eye location is presented. In this method, the probable eyes candidate regions are localized rapidly by using the combination of the variance filter and the independent analysis (ICA) method. The method depends on higher-order statistics of the training images decorrelated by basis vectors. Compared with principal component analysis (PCA) and traditional method of independent component analysis, the method does better in the eye identification. The results of experiments show that the proposed method has the detection rate of 97.3%, and is more efficient and robust to the variable postures and illuminations.

    • Trajectory Control of Spatial Intersected Curves

      2013, 22(4):116-120.

      Abstract (1561) HTML (0) PDF 802.93 K (2730) Comment (0) Favorites

      Abstract:The trajectory control of spatial intersected curve has great complexity and particularity. To solve this problem, a new trajectory interpolation algorithm of spatial intersected curve is proposed in this paper. Through building the mathematical model of the curve, a direct interpolation and speed control algorithm is developed in a non-cartesian coordinate system with linear axis and rotation axis. The simulation results show that the algorithm has high trajectory precision and speed stability with well application prospects.

    • Apriori Algorithm of Association Rules in Data Mining

      2013, 22(4):121-124.

      Abstract (1238) HTML (0) PDF 766.42 K (3018) Comment (0) Favorites

      Abstract:In this paper, study of the association rules algorithm, aiming at the bottleneck problem of Apriori algorithm an improved algorithm is proposed. The algorithm on the basis of building a vector matrix, only need to scan a transaction database by optimizing the connections and pruning to improve the operating efficiency of the algorithm. Research and experiments show that the improved algorithm in a large-scale transaction database than Apriori algorithm has obvious advantages.

    • Transformer Fault Diagnosis Method Based on IPSO-BP Neural Network

      2013, 22(4):125-128.

      Abstract (1229) HTML (0) PDF 736.89 K (2529) Comment (0) Favorites

      Abstract:Standard particle swarm optimization (PSO) algorithm just takes simple linear attenuation way to update the inertia weight, so it can not get the global optimum value. In order to solve this problem, in the paper, an improved particle swarm optimization (IPSO) algorithm is proposed, which is combined with the error back propagation neural network (BPNN), then a new transformer fault diagnosis method based on IPSO-BPNN is presented. The method gets the number of times for which the individual particle is continuously selected as the optimal point, which is taken as an adaptive variable and is used to adaptively adjust the inertia weight along with the particle's performance classification, so as to balance the local and global search capabilities. A large number of simulation shows that the algorithm is better than the BPNN and PSO-BPNN based transformer fault diagnosis system, and it can get a higher correct rate of transformer fault diagnosis.

    • Dynamic and Adaptive Middleware Model in Ubiquitous Computing

      2013, 22(4):129-133.

      Abstract (1319) HTML (0) PDF 713.31 K (2568) Comment (0) Favorites

      Abstract:In order to improve development efficiency of pervasive computing system, an OSGI-based framework middleware for pervasive computing is designed. The middleware is implemented under the OSGI framework. The mobile manager is designed to manage the mobility of user and service, and context manager is used to manage context and support context-aware application. The middleware has realized interoperation among the heterogeneous ubiquitous devices by applying standard interface technologies. Results of experiment show that middleware is feasible, and satisfies the characteristics and requirements of the pervasive computing environment very well.

    • Human Detection Algorithm in Complex Background

      2013, 22(4):134-137,120.

      Abstract (1787) HTML (0) PDF 1.15 M (3368) Comment (0) Favorites

      Abstract:Human detection under static background may be not suitable to video surveillance which is of complex background, low resolution, small target and noise jamming. All these polytropes and possible occlusion that pose new challenges for us to recognize human after motion detection in single image. For this reason, this article design and implement an human detection algorithm using integral histogram instead of HOG under complex background based on HOG human detection algorithm. Then the cascade SVM is adopted in my experiment to train the sample. Experiment showed that the algorithm has higher precision and faster speed than other algorithm under video surveillance with complex background.

    • A Novel Probabilistic Similarity Search Method for Uncertain Time-Series

      2013, 22(4):138-141,124.

      Abstract (1268) HTML (0) PDF 1.08 M (3198) Comment (0) Favorites

      Abstract:The traditional data management, data representation, storage and indexing, querying, mining and all other technical can not be directly applied to the similarity search of time series data with uncertainty. Our work study for other theories and technologies, the uncertainty of time-series data for the complexity of the structure, and for the first time we give the formal definition of probability nearest neighbor search over uncertain time series database; the PLA dimensionality reduction over time series of uncertainty. After conversion to the PLA space, we propose three lemmas to accelerate the search efficiency; based on three lemmas the appropriate searching algorithm PKNNS is also given. A serials of experiments are also made to test the effectiveness and efficiency of algorithm PKNNS.

    • Software Implementation of Indirect Inverse Sub-structure Dynamic Analysis Based on MATLAB

      2013, 22(4):142-146.

      Abstract (1650) HTML (0) PDF 807.01 K (2690) Comment (0) Favorites

      Abstract:Inverse sub-structure dynamic analysis of structural dynamics is a technical theory and analysis method recently developed, but it requires large amounts of data for analysis and calculation. In order to analysis efficiently, here comes the development of a indirect inverse sub-structure dynamic quality detection software. Calculated based on the the indirect inverse sub-structure theory, based on the indirect inverse sub the discretization packaging coupled dynamic stiffness structural analysis calculation method and mode shapes combined method. Using Matlab graphical user interface (GUI), data importing, processing, mapping and other operations can be easily implemented, while the use of Matlab powerful matrix computing power to quickly calculate the required results for professionals to analyze.

    • Parallel Processing Algorithm of Tissue Motion Visualization for Ultrasound Imaging on Fermi

      2013, 22(4):147-152.

      Abstract (1325) HTML (0) PDF 1.00 M (2497) Comment (0) Favorites

      Abstract:On the clinical ultrasound real-time imaging system, tissue motion will be the important diagnostic information for doctors, such as cardiac motion analysis. In this paper, one motion visualization method based on line integral convolution (LIC) is studied. This method could show the vector field information about both direction and intensity. However because of the massive computation involved in this filter technique, especially in streamline tracking, it has been the bottleneck for the clinical real-time imaging system. In this paper, a new parallel algorithm of motion visualization based on Fermi GPU (graphics processing unit) is presented. Test results not only show the output of graphics processing unit (GPU) is definitely the same as the one of CPU, but also demonstrate the obvious speedup using GPU, that is, it can be 237 times faster than the CPU implementation with the long LIC filter (L=7) for the image size (260×260).

    • Edge Based Image Retrieval Approach Combining Color Feature and Shape Feature

      2013, 22(4):153-156,133.

      Abstract (1249) HTML (0) PDF 1.25 M (2379) Comment (0) Favorites

      Abstract:Wavelet transform has good local characteristics and multi-scale characteristic, it can multi-scale edge approximation, this makes it wide range of applications in image singularity detection and feature extraction. In this paper color edge extracted by using dyadic wavelet transform modulus maxima,and then using annular color histogram express image color features, using wavelet modulus maxima annular histogram express shape feature. Finally, the similarity between color images is computed by using a combined feature index based on the above two histogram. experimental results show that the approach has a good retrieval performance, and strong robustness to the image illumination change and geometry change.

    • Risk Assessment of Network System Integration Based on Multi-level Fuzzy Entropy Weight

      2013, 22(4):157-160.

      Abstract (1486) HTML (0) PDF 626.72 K (2331) Comment (0) Favorites

      Abstract:Generally, the integration of the network involves not only the technical aspects, but also the organization structure, the management and human factors,etc. Therefore, the integration is of great risk. Having considering this, this paper, based on the analysis of the risk characteristics of network systems integration and the senior experiences, established the risk index system of Network System Integration. Taking the network integration project of someone power enterprise in Beijing as an example, the article detailed the risk assessment model which is based on the multi-level Fuzzy and put forward some reasonable advice for team building according to the risk level so as to provide guidance for the successful completion of the project.

    • New Monitoring Platform for SFP Optical Transceiver Module Based on FPGA

      2013, 22(4):161-163,146.

      Abstract (1621) HTML (0) PDF 1.02 M (4474) Comment (0) Favorites

      Abstract:As the core device in optical communication, optical transceiver module has been widely used in all kinds of system. And digital diagnosis is an effective method to monitor the parameters of optical transceiver module. This paper presents an SFP monitoring platform based on FPGA and monitor the temperature, power supply, bias current, transmit power and receive power of optical transceiver module by using the dual port RAM. This platform effectively improves the stability of the system, and has a great value.

    • Modeling and Simulation in Logistics Systems Based on Hierarchy Coloured Petri Net

      2013, 22(4):164-168,160.

      Abstract (1360) HTML (0) PDF 1.20 M (2952) Comment (0) Favorites

      Abstract:In order to reduce the complexity of modeling the logistics systems, the tools of HCPN is used. The usage of hierarchy and substitude transition is introduced in this article. We made the quantify and qualitative analysis by the Simulation Performance Report and Message Sequence Chart which get by the monitor of CPN. The monitor not only observe the tokens of place but also the occur frequency of transitons. Not only the correct of the model is guarantied and the good fundament of modularization and hierarchy design for the material flow simulation software architecture is formed.

    • Human Gait Acquisition and Handling Based on Image Processing

      2013, 22(4):169-173.

      Abstract (1628) HTML (0) PDF 1.37 M (3279) Comment (0) Favorites

      Abstract:In order to obtain gait features of human foot in normal walking process. This paper presents a fast and effective system for gait features acquisition. Feature points were attached to the specific parts of human lower limbs and a video camera was used to acquire images of a walking process. In addition, axis values of feature points can be acquired by image binarization processing. At the same time, foot trajectory of fixed center of mass and gait speed were abstracted based on the least square method (LSM). Finally, the gait of lower limb rehabilitation robot was planned according to the gait features, abstracting the gait trajectory of rehabilitation robot ,Moreover, gait speed of different ages were analyzed. Experiments results show that the system is feasible and stable, which provides a powerful data basis and authentication methods for the analysis of movement and control of lower limb rehabilitation robot.

    • Communication Method Based on Multi-process Among Areas

      2013, 22(4):174-177.

      Abstract (1465) HTML (0) PDF 838.04 K (2645) Comment (0) Favorites

      Abstract:Under the hierarchical condition, the disconnection between backbone areas and non-backbone areas can cause the communication problem among areas. To this problem, multi-process is proposed. The proposed method is realized in network equipments to communicate among areas, which is used in a practical program. The results show that the method can improve the stability and reliability of network.

    • Design and Implementation of Tile Map Plugin Based on World Wind

      2013, 22(4):178-181.

      Abstract (1823) HTML (0) PDF 938.44 K (3677) Comment (0) Favorites

      Abstract:According to extension mechanism of the World Wind plugin, this paper studies some of knowledge and technology about displaying tile map, such as the tile map coordinates projection, the plug-in loaded, the download process of the tiles and the local file cache and memory cache etc., and finally achieves the the tile map plugin, and puts forward a number of methods to optimize the tile map.

    • A Short Wave Communication Scheme Based on USB Key

      2013, 22(4):182-185.

      Abstract (1230) HTML (0) PDF 722.13 K (2354) Comment (0) Favorites

      Abstract:Aiming at the narrow-band characteristic of the short wave network, an identity authentication scheme is designed based on USB Key and PIN code. The scheme adopts the challenge/response mechanism, takes the thought of five authentication factors in 3G authentication scheme for reference, and improves the generation mechanism of five authentication factors by using HMAC algorithm. The scheme reduces the data cost in the process of the authentication, meets the bandwidth requirements of the short wave network, and has high security.

    • Application of Voice-Based Speaker Identification System and Command Recognition Algorithm

      2013, 22(4):186-189.

      Abstract (1554) HTML (0) PDF 653.79 K (2742) Comment (0) Favorites

      Abstract:For satisfying the voice-based communication requirements of intelligent robotics, based on the DM-B200 robot, the speaker identification system and command recognition system are designed. In order to improve the correct recognition rate of speaker identification, the vector quantization method is used. And the dynamic time warping algorithm is used to speed the command recognition process. The application results showed the designed systems obtained more than 96% correct recognition rate and are easy to be extended to the real production.

    • Improved Method of Self-Adaptive Localization

      2013, 22(4):190-194.

      Abstract (1515) HTML (0) PDF 1013.27 K (2468) Comment (0) Favorites

      Abstract:It shows obviously that the technology of wireless sensor networks will go-ahead very quickly and its applications will be wider and wider in the coming future. The research as described in this dissertation is of significance in both theoretical and application areas. An improved self-adaptive localization method for indoor dynamic environment is proposed. In the improved method, firstly the location errors of beacon nodes are obtained by initial position based on self-amended environment path loss exponent, secondly the coordinates of the blind nodes are calculated by the location errors of beacon nodes which used as the weights of the weighted node centroid algorithm, and coordinates compensation. Finally the improved method is validated on the WSN platform from NI Company. The results of validation present that the positioning accuracy and stability of the improved method are more than these of the classic method.

    • Design of Serial A/D Converter Module Based on FPGA

      2013, 22(4):195-198.

      Abstract (1484) HTML (0) PDF 794.43 K (2729) Comment (0) Favorites

      Abstract:It uses the Xilinx Company Spartan-3E series of XC3S250ETQG144 processor based on FPGA to A/D conversion chip TLC549 driven sampling and later actual voltage value of reading. By use of Verilog language, the whole module design is under the environment of ISE with less complex logic, compact modular design,high speed A/D conversion and sequential control. The portability is strong. And then, we use ISE compile, synthesize and simulation,for the follow-up A/D conversion work provises experimental basis. Experimental results show that the design reliability is high, which can satisfy the A/D conversion of high precision, real-time, anti-jamming requirements.

    • Personalized Ranking in Enterprise Search Engine

      2013, 22(4):199-203.

      Abstract (1269) HTML (0) PDF 785.75 K (2947) Comment (0) Favorites

      Abstract:Traditional search engine is retrieval-oriented rather than user-oriented, in view of this weakness, the paper introduces the idea of personalized service to the enterprise search engine ranking. The user interest modeling technology which is the core of personalized service was researched in the paper. We apply the user interest model to query expansion and ranking and designed the personalized ranking method for the enterprise search engine. So the engine can display different result of the same retrieval for different users. We apply the personalized ranking to enterprise search engine in oilfield enterprise search and the tests show that, the research not only can effectively enhances the retrieval accuracy of the enterprise search engine and satisfies the user's personalized retrieval demand, but also has good adaptability.

    • New Rural Cooperative Medical Information Management Platform for Design Construction Scheme

      2013, 22(4):204-207.

      Abstract (1363) HTML (0) PDF 1.19 M (2680) Comment (0) Favorites

      Abstract:Objective: The new rural cooperative medical work truly attain the people's trust of people project, Ensure the long-term stable and healthy development of new rural cooperative medical work. Method: Through the municipal medical information management platform for design construction scheme, Briefly describes the overall design of the system and the overall logical platform architecture; Data center construction; analysis of the functional module; safety system .Results: the plan of municipal medical information management platform for design and construction of universal guiding significance. Conclusion: it makes rural information construction work strive for further improvement.

    • Commercial Full Motion Flight Simulator Qualification Test Software Development

      2013, 22(4):208-210,194.

      Abstract (1643) HTML (0) PDF 993.03 K (4650) Comment (0) Favorites

      Abstract:For evaluating performance of the flight simulator according to the new qualification standard, and submit the Qualification Test Guide(QTG) report, the paper does research into Qualification Test software development of the flight simulator; Firstly introduces the standards of the flight simulator performance evaluation; Secondly introduces the structure of Qualification Test software system, the general design of the software and the detailed design of the main module; At last, makes the software tested and verified through a test data of a certain type flight simulator, it shows that the software realized the basic functions, and it can meet the practical application requirements.

    • Parallel Access Virtual Seismic Data File

      2013, 22(4):211-215.

      Abstract (1333) HTML (0) PDF 719.00 K (2365) Comment (0) Favorites

      Abstract:In connection with the problems that the massive data file of petroleum exploration industry is too large and unstructured, poor efficiency and consuming disk while data combining, Virtual seismic data file what is a logically complete seismic data file consist of many complete seismic data files by the description of metadata was put forward, it improves the efficiency of seismic data mergence. And according to the seismic data parallel access model, we access the seismic data files.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063