• Volume 22,Issue 9,2013 Table of Contents
    Select All
    Display Type: |
    • >Survey
    • Research Progress of Indoor Location Technology and System

      2013, 22(9):1-5.

      Abstract (1755) HTML (0) PDF 1016.69 K (5952) Comment (0) Favorites

      Abstract:Indoor location technologies is the hot research topic recently. This paper studies the current various indoor location technologies including AGPS, Infrared, Ultrasonic, UWB, WaveLAN, RFID and Computer visual. It analyzes their working mechanism, locating accuracy suitability and their advantages and disadvantages. The accuracy of Infrared and Ultrasonic is cm scale, location system based RFID technology which uses RSSI method rapidly developed recently, and the accuracy of combination HF RFID and LF RFID is reached 1m level.

    • A Survey on ZigBee Network Technology Research

      2013, 22(9):6-11.

      Abstract (1897) HTML (0) PDF 939.16 K (3876) Comment (0) Favorites

      Abstract:ZigBee is a short-range, low-power, and low-rate wireless communication for mobile electronic devices. Which is widely used in many areas, such as intelligent transport, environment monitoring and so on. Nowadays it has become a research and applied hotsphotspot. This paper analyzes and synthesizes ZigBee network topology, routing method and interconnect technology based on ZigBee gateway. At last it proposes the Zigbee technical problem that needed to be solved and future research directions.

    • Automatic Generation of Deformed Animation

      2013, 22(9):12-17.

      Abstract (1374) HTML (0) PDF 962.26 K (1948) Comment (0) Favorites

      Abstract:The whole life-cycle automatic animation technique is that making the story written in some limited natural language to be a 3D animation cartoon automatically. We use this technique in automatic generation of mobile phones animation system. As an importimportant part of automatic generation of mobile phones animation system, the deforming system can make the animation more vivid by deforming the objects in the animation. It was made up of qualitative layer and quantitative layer, which we will introduce in this article.

    • A NAT-Based Data Forward Method for LVS

      2013, 22(9):18-24,35.

      Abstract (1403) HTML (0) PDF 1.88 M (2508) Comment (0) Favorites

      Abstract:This paper studies the working principle of Linux Virtual Server (LVS), and analyzes its data forward process. To make LVS deployable in the environment of multiple VLANs (Virtual Local Area Network), this paper designs and implements a data forward method naming Double-NAT based on Network Address Translation(NAT). The Double-NAT method organizes the connection hash table in double-direction hash bucket, and uses system allocated port to distinguish data flow of IN and OUT direction, thus data in multiple VLANs can be forwarded via network address translation. Test results show that Double-NAT data forward method makes LVS work well in multiple VLANs environment with easy configuration and good performance.

    • 3-D Visualization of Medical Images Based on WebGL

      2013, 22(9):25-30.

      Abstract (1572) HTML (0) PDF 1.05 M (3884) Comment (0) Favorites

      Abstract:Medical images are usually big data and manipulated by large-scale hardware and complex software platform. With the development of Internet technology, people tends to use more and more online applications instead of heavy-weighted traditional softwares installed locally. Researches on online medical images processing has just started. In this article, a light-weighted solution of 3-D visualization of medical images is presented. Combining of HTML5 features and WebGL technique, web browser can be used as 3-D visulization framework for medical images data of specific formats (such as vtk, nrrd etc), which are produced from the traditional imaging platforms (such as 3D-Slicer).

    • Realization of Pesticide Residue Detection Proficiency Testing Report System

      2013, 22(9):31-35.

      Abstract (1320) HTML (0) PDF 876.83 K (1864) Comment (0) Favorites

      Abstract:Pesticide residue detection proficiency testing program (hereinafter referred to as proficiency testing) is the follow-up supervision and inspection work carried out to maintain the effectiveness of laboratory detection certification of nnational mechanism. According to the present situation of the management of proficiency testing, a simple and practical report system of proficiency testing results program is achieved using ASP.NET + ACCESS three layer frame design technology. Sorts of function module involved the system, and the several key skills applied in the development process are analyzed in the essay. The practice has been proved that the report system can improve the efficiency of proficiency testing work.

    • An Opened-Intelligent Parking Lot and Design of Parking Space Control System

      2013, 22(9):36-41.

      Abstract (1410) HTML (0) PDF 1.37 M (2516) Comment (0) Favorites

      Abstract:We present a kind of intelligent parking lot which is open style in this paper. We called it Opened-Intelligent Parking. It is a technological solution of management which is based on the combining of the geomagnetic sensor and Wireless Sensor Network technology. The Opened-Intelligent Parking lot's basic unit is the designing of the parking space's control unit. It can detect cars automatically as well as the purpose of leaving with the geomagnetic sensor. The Opened-Intelligent Parking uses Wireless Sensor Network technology to sending messages to manage the system of the whole Opened-Intelligent Parking.

    • Mobile Library Based on the Rexsee Platform

      2013, 22(9):42-45,11.

      Abstract (1413) HTML (0) PDF 1.75 M (2149) Comment (0) Favorites

      Abstract:Mobile library, as an extension and supplement of digital library, has been paid close attention by library community at home and abroad. This paper firstly introduced Android development platform named Rexsee, and then designed and implemented a mobile library system has good compatibility and usability. The system has innovatively taken advantage of Rexsee development platform and used HTML, CSS and Javascript to implement mobile applications quickly. It can give access to both the browser user and the Android client user, improve system performance and user experiences.

    • Fine-Grained Access Control System by VPD

      2013, 22(9):46-49.

      Abstract (1579) HTML (0) PDF 856.93 K (2326) Comment (0) Favorites

      Abstract:In order to solve the increasingly serious web database security and adapt flexible demand of enterprise information management system, analysis current access control scheme and study the virtual database technology, coming up a fine-grained access control model based row data, design the database control system, implementation and deployment by used Oracle virtual private database, the scheme need not modify the original application system and improve the system security and flexibility.

    • An Implementation of Linux Cluster Real-Time Monitoring System

      2013, 22(9):50-53.

      Abstract (1392) HTML (0) PDF 942.43 K (2937) Comment (0) Favorites

      Abstract:With the rapid development of cloud computing, Linux cluster is used widely with the advantages of low cost and good scalability. This paper presents a method of design and implementation of Linux cluster monitor. Some information, such as the CPU and memory usage, are collected from /proc virtual file system on every node at regular intervals. After being filtered, these information are sent to monitor server via socket. The overall design scheme of monitor is first described in the paper. It is composed by information management server process, which is run on the management node and collecting processes, which are run on every node. Then their design framework and key techniques are introduced.The collector is composed by three modules that is information collection, information processing and information transmission. These modules are realized by three threads. The thread pool technology is used by information management server, which receives the transfer request sent by collector. Proved by practice, this system can well satisfy the real-time monitoring of Linux cluster performance.

    • An Automation Image Steganalysis Platform

      2013, 22(9):54-59.

      Abstract (1445) HTML (0) PDF 1.14 M (2188) Comment (0) Favorites

      Abstract:Nowadays, image steganalysis is of the existence of manual program coding operation time-consuming, complicate and error-prone, feature selection single-blind, results analysis means single. To solve these problems, this paper use MATLAB development tools to design one operation platform. It can automatically achieve the image steganalysis process, which saved time and energy for the researchers to collect various algorithms, reduced operational errors and the operation time caused by manual coding. Combining Manual and automated feature selections with chart information, we can not only increase means of feature selection and experimental result analysis, but also improve overall steganalysis progress.

    • Design and Realization of Web Crawlwer Based on Web Minning

      2013, 22(9):60-63.

      Abstract (1363) HTML (0) PDF 757.65 K (3923) Comment (0) Favorites

      Abstract:The diffeences between web-minning and data-mining were introduced in this paper firstly, then the necessity of Web crawler during web-minning and the development of modern web-minning technology were analysed. Based on the deep understanding of the principle and its function of Web crawler, a minning model popular in modern website was put forward, and a web crawler was designed by the use of this model. Tested by several examples, this kind of crawler can get more diversified pagedata efficiently.

    • Smart Home Monitoring System Based on NI WSN

      2013, 22(9):64-69.

      Abstract (1227) HTML (0) PDF 1.22 M (2012) Comment (0) Favorites

      Abstract:In order to be fast, accurate monitoring some parameters of household environment, constructed a kind of smart home monitoring system based on the wireless sensor network. The system consists of multi-sensors to collect temperature and humidity, smoke, steal affection environmental data, the data through the NI WSN nodes by wireless way sent to the PC, PC using LabVIEW software programming the processing of data judgment and control, has obtained the good human-computer interaction interface, including detailed introduction of system software design flow. The smart home monitoring system has the characteristics of the wireless sensor network (WSN), low power consumption, good real-time, easy to expand, remote monitoring, etc. It will enjoy a promising market and can be applied widely in the field of smart home.

    • Practice and Teaching System for 3D Virtual Hotel Management

      2013, 22(9):70-74.

      Abstract (1468) HTML (0) PDF 887.31 K (2473) Comment (0) Favorites

      Abstract:In order to solve the problem of high cost and single way to practice or test for the students majoring in hotel management, a 3D virtual hotel management system for students course practice and examination is built by using technologies of 3ds Max、Virtual Reality-Platform and J2EE. The flow path and realization techniques are deeply analyzed about room service. The virtual reality of hotel scene and the management of course information are discussed in detail. Through this system, students can complete the course practice and test as in the real world. Meanwhile, teachers can instruct and test students online.

    • Remote Sound Card and Graphics Card Virtualization Based on KVM

      2013, 22(9):75-80.

      Abstract (1993) HTML (0) PDF 1.20 M (3469) Comment (0) Favorites

      Abstract:A remote device virtualization design project based on Kernel-based Virtual Machine (KVM) is proposed according to the demand of sharing home multimedia device. The project first implements remote device virtualization using the technology of QEMU device emulation. And then we describe the detailed implementation of the sound card and graphics card and optimize them. At last we analyze the performance through experiments. Our design only needs to add a remote device virtualization in the virtual device layer in user mode which is flexible and reliable without modifying the operating system.

    • A Solution of Data-Level Security Access Control

      2013, 22(9):81-85,74.

      Abstract (1270) HTML (0) PDF 1.59 M (3520) Comment (0) Favorites

      Abstract:To protect sensitive data in Web applications from unauthorized access, a data access strategy consisting of user set and data access authority is proposed, which is based on traditional role based access control model. The data access strategy is related to function. After parsing the original business SQL, row-level-rules are applied to filter the data records in row level, and column-level-rules are applied to mask the corresponding attributes of the data records. A data security access control framework is designed. Finally, this strategy is implemented in the Agricultural Products Supply Chain Management System of Xinfadi, and the validity and effectiveness of the presented strategy is demonstrated.

    • Virtual Museum Information Visualization System Based on Unity3D

      2013, 22(9):86-90,59.

      Abstract (1690) HTML (0) PDF 1.50 M (3878) Comment (0) Favorites

      Abstract:Information visualization can help us deepen the understanding of the relationship between massive complicated data and information, the three-dimensional technology has brought new ideas to the field of information visualization. Based on the visual requirements of browsing three-dimensional exhibition hall of virtual museum of Hangzhou arts and crafts museum and browsing knowledge information of collections, an information visualization system of collection was designed and implemented in this paper. The system based on Unity3D development platform, designed and implemented the corresponding 3D visual components according to the collection information visual requirements of Hangzhou arts and crafts museum, implemented the functional requirements of high-speed and convenient browsing three-dimensional visual information of the museum through Web3D client technology.

    • Computer Application of Ontology Theory in Petroleum Exploration and Development of a Knowledge Management System

      2013, 22(9):91-96.

      Abstract (1154) HTML (0) PDF 1.12 M (2237) Comment (0) Favorites

      Abstract:Ontology combined with the development of computer technology in all fields initiated the research of construction and application for so-called "domain ontology". This article starts with the basic concept of computer ontology theory, then gives the oil exploration and development of knowledge management system framework design, and provides a construction method of oil exploration and development domain ontology based on a multi-level business process, and divides the oil exploration and development domain into multistage business activity levels, and takes oil extraction engineering as example and discusses the corresponding knowledge base construction method.

    • Development of Database Auditing Subsystem with Active Defense

      2013, 22(9):97-101.

      Abstract (1238) HTML (0) PDF 846.73 K (2085) Comment (0) Favorites

      Abstract:According to the shortcomings of database audit technical, Put forward a method of designing a real time and security risk capacity database audit subsystem based on database sessions. The system records the user's operation behavior, hand the illegal invasion behavior actively, adding the active prevention ability of the audit system, it can advance the "post audit analysis" to "after the timely processing ". The system proved effective in improving the security of databases, protect business and user information.

    • Detection and Recovery for Copy-Move Forgery in Homologous Video

      2013, 22(9):102-110.

      Abstract (1498) HTML (0) PDF 1.40 M (2396) Comment (0) Favorites

      Abstract:With regard to the copy-move forgery of video frame sequence, this paper proposes a algorithm for video detection and recovery base on the correlation of the contents between frames. Firstly, the video frames are translated into a series of consecutive image frames, and by blocking the frame to extract eight dimensional feature vectors. With Euclidean distance computed the correlation between frames, a deviation matrix is import in the algorithm to reduce the false alarm rate. A threshold value is used to localize the modifications to a frame level and recover the original video. Experimental results show that this method can effectively detect the copy-move forgery of video frame sequence and video restoration.

    • A Hybrid Particle Swarm Optimization Algorithm for Multi-objective Permutation Flow Shop Scheduling Problem

      2013, 22(9):111-118,110.

      Abstract (1408) HTML (0) PDF 2.58 M (3101) Comment (0) Favorites

      Abstract:This paper proposes a hybrid particle swarm optimization algorithm for the minimization of makespan and total flowtime in permutation flow shop scheduling problems, which combines particle swarm optimization algorithm with variable neighborhood search algorithm. The initial population is generated by the NEH constructive heuristic to enhance the quality of the initial solutions. A heuristic rule called the ranked order value (ROV) borrowed from the random key representation is developed, which apply the continuous particle swarm optimization algorithm to all classes of sequencing problems. The strategy of constructing external data set based on combining strong predominance ranking and crowding distance ranking was introduced. The global best solution was updated based on the strategy of combining Sigma method and roulette method. VNS was applied to enhance the local search for the pareto solutions. Finally, the proposed algorithm is tested on a set of standard instances taken from the literature provided by Taillard and compared with SPEA2. The computation results validate the effectiveness of the proposed algorithm.

    • Study on the Key Based on Iris Feature for Barracks Information Encryption

      2013, 22(9):119-122.

      Abstract (1121) HTML (0) PDF 1.09 M (2109) Comment (0) Favorites

      Abstract:In the military logistics informatization construction, barracks service information is an important part.To solve severe situation of information security in barracks informatization and the safe hidden trouble from traditional encryption methods. a kind of information encryption algorithm based on the iris feature key is put forward, 375 iris codes is extracted from the human iris, then the encryption key used for the barracks information is extracted from iris codes. the experimental results shows that the security of the encrypted information is improved.

    • A Revocable KP-ABE Scheme

      2013, 22(9):123-128.

      Abstract (3085) HTML (0) PDF 1.03 M (3372) Comment (0) Favorites

      Abstract:This paper proposes a Key Policy Attribute-Based Encryption (KP-ABE) scheme supporting user's private key revocation under the direct revocation model, without affecting the public key and any user's private key, so the cost of the revocation is small. Based on the access tree, the construction of our scheme is simpler than the construction proposed by Attrapadung which is based on linear Secret Sharing Schemes(LSSS). Its security can be reduced to the q-Bilinear Diffie-Hellman Exponent (q-BDHE) assumption under the standard model.

    • A Scheduling Algorithm Based on Peer-to-Peer Mode in Virtual Computing

      2013, 22(9):129-135.

      Abstract (1315) HTML (0) PDF 1.23 M (2383) Comment (0) Favorites

      Abstract:Scheduling algorithm was always a hot topic in virtual computing environment.In order to elimanate system bottleneck and balance load dynamicly. A distributed scheduling algorithm based on weighted random and feedback mechanisms was proposed in this paper. At first the chosen distributed scheduling host chose resources by needs and made static quantification,and then sorted them;Secondly the algorithm chose resources from which sorted by weight randomly, And then it acquired corresponding dynamic information to make load filterate and sort the left. At last it achieved the self-adaptivity to system load through feedback mechanisms. The experiment shows that the algorithm has avoided the system bottleneck effectively and has achieved balanced load as well as self-adaptability to it.

    • Optimization of Data Encryption Based on a Key

      2013, 22(9):136-138.

      Abstract (1432) HTML (0) PDF 793.70 K (2064) Comment (0) Favorites

      Abstract:This paper introduces some research about DES algorithm, analyzes the encryption principle of DES algorithm and implementation process, through content analysis, introduces the improvement of DES algorithm, improved scheme through the analysis of the encryption process it and several, puts forward an improved thought his is a key encryption scheme, a reference through this scheme optimization for DES algorithm.

    • Algorithm of Two-dimensional Triggered Collision Detection Based on VR

      2013, 22(9):139-143.

      Abstract (1222) HTML (0) PDF 1014.50 K (2016) Comment (0) Favorites

      Abstract:Virtual reality technology is often used in virtual scene to set the movement range of a certain role, where collision detection algorithm between objects has been a crucial technology. Common algorithm based on graphics and image is effective and widely used but is incapable of event handling, unefficient and occupies too many system resources. Therefore, an efficient algorithm for two-dimensional array collision detection is introduced to meet the needs of high efficiency and less precise collision detection.

    • An Improved Geographic Location Louting Strategy Method in Urban Environment

      2013, 22(9):144-148.

      Abstract (1129) HTML (0) PDF 1.02 M (2306) Comment (0) Favorites

      Abstract:To tackle the problems of applying GPSR routing protocol in urban scenarios, an improved protocol is proposed. The protocol detects the status information of vehicle node network transmission load and traveling direction, and these factors will be considered in new routing forwarding. The new protocol chooses the path of small transmission delay and strong robustness to forward data, what effectively improves the route transmission efficiency in the urban environment. NS2 simulation results show that the improved routing protocol performs well.

    • Extended Dynamic Logic Programs and Its Application in Product Personalized Recommendation

      2013, 22(9):149-153.

      Abstract (1157) HTML (0) PDF 926.08 K (2112) Comment (0) Favorites

      Abstract:Dynamic logic program is an extension of answer set program for processing knowledge base updated problems, but it cannot describe and deal with knowledge base with preferences updated problems. Therefore, this paper proposes an extended dynamic logic programming language which is based on the dynamic logic program, extending the head of the rule to the form of ordered disjunctive and its optimal answer set semantics is also obtained. The new logic program has more powerful expressiveness and reasoning ability to describe and handle knowledge base with preferences updated problems;however, it does not increase the computational complexity. Applying the method mentioned above to the existing product recommendation system, so that users can get the recommended information with personalized features, to achieve the purpose of the personalized recommendation. Finally the example discusses the extension of dynamic logic program in the application of products personalized recommendation.

    • Data Paging Based on the Ajax Technology in ASP.NET

      2013, 22(9):154-159.

      Abstract (1136) HTML (0) PDF 1.16 M (2396) Comment (0) Favorites

      Abstract:A large amount of data is often browsed in the Web application system, so the problem of data paging is bound to occur in the process of system development. ASP.NET offers many data paging approaches, but technically all using the synchronous transmission mode. Using this way to extract data causes the user waiting longer and heavier burden on the server. Based on the analysis of traditional data paging solution, through an example of browsing and querying student information, this paper introduces in detail implementation of data paging based on the Ajax technology in ASP.NET. The conclusion is that data paging based on the Ajax technology using asynchronous data transmission, when paging through updating local data, without reloading the whole page, greatly reduces the users' waiting time, lightens the burden of the server,and improves data query efficiency.

    • Order Picking Optimization of High Rack in Logistics Center

      2013, 22(9):160-163,135.

      Abstract (1419) HTML (0) PDF 1.55 M (2684) Comment (0) Favorites

      Abstract:For satisfying the demand of picking task scheduling, according to the optimization's features of the order-picking path in the book logistics center, the artificial fish-school swarm is used to solve the mathematical model. Through analyzing the characteristics of two models based on time-shortest and distance-shortest, it is put forward that the optimal solution of picking time can be sifted once again making use of the constraint condition of the shortest path to realize the second optimization, and this thinking is proved. The result is not only verified that the artificial fish-school swarm optimizing books-picking path is effective, but also proved that select the path that is distanceshortest from on the time-shortest solution.

    • An Adaptive Global Mapping Approach for Color to Grayscale Image Conversion

      2013, 22(9):164-167,171.

      Abstract (3649) HTML (0) PDF 1.68 M (3106) Comment (0) Favorites

      Abstract:This paper studies the color to grayscale image conversion algorithms based on global mapping using linear combination of RGB color components. According to the statistical information of the color pixels in the different color components, the combination weights of different components are automatically generated to mapping color to grayscale. In combination with the subjective and objective image quality standards, we present an adaptive global mapping algorithm. Experimental results show that the new algorithm can perform as good as traditional color to grayscale algorithm on the majority of test images, but can outperform the traditional algorithm in case of dominant colors appears in the original image, and significantly improve the visual effect of the gray-scale image.

    • A Kind of Canny Edge Detection Operator Based on Color Difference

      2013, 22(9):168-171.

      Abstract (1324) HTML (0) PDF 1.26 M (2304) Comment (0) Favorites

      Abstract:In order to detect the edge of color image more clearly and accurately, this paper presents an improved Canny edge detection method, that Canny operator based on color difference is used to calculate the color difference and color directions of color image by converting color image from RGB color space to theL*a*b*space of uniform color. The edge detection results of line and curve road color image prove the effectiveness of the improved operator.

    • An Algorithm of Congestion Control on Improving Fairness of HSTCP

      2013, 22(9):172-175.

      Abstract (1498) HTML (0) PDF 939.21 K (2091) Comment (0) Favorites

      Abstract:Standard TCP can not make full use of network bandwidth in the condition of high-speed and long distance. High-speed TCP has been proposed to solve this problem, but has severe RTT unfairness. Though analyzing and simulating, an algorithm based on congestion control is put forward to improve the fairness by adding fair factor. Simulation experiments show that the modified algorithm can reduce the unfairness of different RTT effectively.

    • A New Method for Edge Extraction of Intravascular Ultrasound Images

      2013, 22(9):176-179,153.

      Abstract (1514) HTML (0) PDF 1.71 M (2398) Comment (0) Favorites

      Abstract:The intima and adventitia edge detection of vascular wall is a key step in Intravascular Ultrasound(IVUS) processing. An accurate selection of initial contour would be significant for edge extraction based on active contour model. This paper puts forward a new method for extracting the edge of vascular wall. At first, adaptive threshold segmentation is used to reduce the complexity of the IVUS original images,then find the initial contour line of the vascular wall with Marr edge detection. Finally, an improved GVF-snake model is used to make the initial contour line converge to the true edge of vascular wall accurately. The experimental results confirm the validity of the new method.

    • Metacognitive Model-based Intelligent Gaussian Mixture Background Modeling

      2013, 22(9):180-184,159.

      Abstract (1191) HTML (0) PDF 1.68 M (2046) Comment (0) Favorites

      Abstract:Traditional Gaussian Mixture Model (GMM) can’t adapt quickly to the sudden changes in the dynamic scene. A Metacognitive Model-based Intelligent Gaussian Mixture background modeling method is proposed. For each pixel, decision making must pass the three elements which are called as Metacognitive Monitoring (MM) element, Metacognitive Cognitive Knowledge (MCK) element and Metacognitive Experience (ME) element. MM element monitors the modeling scheme, stimulates to get ME element, and extracts cognitive knowledge from MCK element. MCK element is composed of the background models cognized ever. ME element is composed of the experiences from success or failure matching. In the complex scene, the proposed method can intelligently cognize background, quickly adapt to the sudden changes of backgrounds cognized ever and describe real background more accurately.

    • Multi-object Tracking Based on Omni-Directional Vision Sensor

      2013, 22(9):185-190.

      Abstract (1462) HTML (0) PDF 1.17 M (3030) Comment (0) Favorites

      Abstract:To rapidly and accurately detect and track multiple objects, this paper presents a method of multiple objects detection and tracking based on Omni-directional images. Firstly, getting 360-degree Omni-directional images by Omni-directional Vision Sensor in real time, which is an effective way to solve the problem of the multiple video source correlation. Secondly, the MHoEI algorithm that is created by combining Motion History Images algorithm with Motion Energy Images algorithm can efficiently detect and track multiple objects in this paper. Finally,the matching algorithm based on object oriented technology is proposed through fusing many properties of objects,which was used to identify different objects. The algorithm better solves the problem of data association of different properties. Experiment results show that the method in this paper can better track objects in complex background. The system has robustness, lightly computational load, high efficiency features.

    • Algorithm of Crack Image Enhancement Based Wavelet Transform and Fuzzy Theory

      2013, 22(9):191-194,190.

      Abstract (1567) HTML (0) PDF 1.56 M (2867) Comment (0) Favorites

      Abstract:Focused on the limitation of traditional image enhancement algorithm, proposed an image enhancement algorithm based on wavelet transform and fuzzy set theory. Firstly, wavelet transform is used to decompose the original image.Secondly, a new membership function of fuzzy was defined and the low frequency coefficient was enhanced by fuzzy enhancement transformation. the high frequency coefficients of different directions was enhanced by wavelet threshold de-noising.Finally, the inverse wavelet transform was applied to restructure image. All algorithms are realized in Matlab. It's can enhance the image effectively and improve image visual effect. The experimental results demonstrate that the algorithm is feasible and effective.

    • A Routing Protocol Based on the Location of Grid (RPLG)

      2013, 22(9):195-198.

      Abstract (1504) HTML (0) PDF 914.75 K (2000) Comment (0) Favorites

      Abstract:In order to extend the network lifetime in wireless sensor network, A Routing Protocol Based On The Location Of Grid In WSN(RPLG) was presented. Whole network is divided into some virtual grids and sensor nodes in each gird form a cluster respectively. The cluster head was chosen by the node's location in gird and residual energy. In order to save network energy, cluster members can adjust cluster size according to local information. Simulation results show the proposed routing protocol effectively balances the energy consumption for sensor nodes in wireless sensor networks and significantly prolongs wireless sensor networks lifetime.

    • Flow Field Computer Simulation of Dynamic Hydrocyclone Based on Fluent Software

      2013, 22(9):199-202.

      Abstract (1762) HTML (0) PDF 959.13 K (3501) Comment (0) Favorites

      Abstract:Fluent is a commercial CFD software.The flow field, heat transfer, combustion and chemical reaction can all be simulated by Fluent.In view of the complexity of dynamic hydrocyclone flow field, as an example, the Total type dynamic hydrocyclone separator was simulated. The physical model was simplified and established by Gambit software, and simulated through the fluent software by computer. The velocity field is obtained under cylindrical coordinate system, the tangential velocity, axial velocity and radial velocity of three velocity components cloud image. Through the study found that, the flow field of dynamic hydrocyclone was simulated and the complex flow problems can be solved by the fluent software. The simulation results can provide reliable basis to the process design and performance optimization for dynamic hydrocyclone, and also, it can save development cost, shorten the design cycle.

    • Computer Animated Techniques and Methods

      2013, 22(9):203-205.

      Abstract (1247) HTML (0) PDF 748.96 K (2212) Comment (0) Favorites

      Abstract:In the computer animation processing process, campaign object action of smooth and store of space is pair contradictions body, for address the contradictions, used has will campaign object of local part from overall in the separation out, and by actual features requirements respectively for programming processing, articles in the by discussion of technology and method in helicopter flight experimental in the are has application, completed has object of built die, and displayed and in keyboard or mouse control for corresponding of operation. Experiment first a helicopter using 3DMAX picture for pretreatment, the helicopter into the propeller blades and tail blades and fuselage on three parts, in the form of graphic blocks are stored separately in the 3DS file. Then use Visual c together with open source graphics API OpenGL(Application Programming Interface Open Graphics Library short in writing as OpenGL below), such as pan, zoom, and rotate functions programming helicopters taking off and landing, helicopter blades(propeller) rotate and texture, using OpenGL support double buffering technique to achieve the smooth operation of the animation. Experiments have shown that technical feasibility, methods, processing can be run in many objects, such as running in the car, body and wheels split and separately to similar treatment.

    • Parameters Optimization for Cooperative Spectrum Sensing in Wireless Regional Area Network

      2013, 22(9):206-209.

      Abstract (1361) HTML (0) PDF 1.07 M (1998) Comment (0) Favorites

      Abstract:In Wireless Regional Area Network, considering the actual licensed channel usage and weighting the channel utilization efficiency and system resources efficiency, a parameters optimization algorithm in cognitive radio is proposed. Simulation shows that the proposed algorithm can figure out the optimal sensing parameters for each licensed channel and maximize the sensing efficiency. Analyzed the channel utilization efficiency and selectivity of system resource utilization efficiency weighted affect cognitive efficiency. Moreover, the transmission duration can be improved significantly, if the anti-interference threshold of the system is large enough.

    • Cell Phone Camera Image Tampering Detection Based on Pattern Noise

      2013, 22(9):210-213.

      Abstract (1219) HTML (0) PDF 1.16 M (2172) Comment (0) Favorites

      Abstract:Sensor pattern noise has been proved to be an inherent fingerprint of digital cameras. Since the main component of it is independent of the environment, it is stable and widely exists in all sensor-based cameras. Therefore, it has been widely used in forgery detection of digital images. However, the sensor pattern noise is vulnerable and easily to be copied from one camera to another. To solve this problem, we first study the two tampering methods which based on sensor pattern noise, then set a determined threshold to realize forgery detection. Meanwhile, in order to settle the problems such as great calculation and high complexity of the algorithm among the correlation detection of sensor pattern noise, this paper introduces a method based on clustered pattern noise and improves the tamper detection efficiency in a large extent.

    • Recognition of Bird Species in Nine Turns Stream Wetland

      2013, 22(9):214-217.

      Abstract (1645) HTML (0) PDF 1.09 M (2534) Comment (0) Favorites

      Abstract:From March 2006 to Decembe2008, sample and line transect methods were used to investigate bird diversity in Nine Turns Stream wetland in Fujian Province, A total of 65 species were recorded. With the rapid development of digital graphic recognition technology, in recent years, more attention is given to the subject of animal and plant species identification which has become a popular researching field. The article mainly discusses about the method to apply graphic analyzing technology for bird identification research in the case of aquatic bird protection in the marsh of Nine Turns Stream. It also put forward a set of classification case with SVM Decision Tree for protesting information through deep analysis and study on bird color graph in terms of shape, color and texture. Moreover, the appearance of the case contributes to the effective recognition and classification of birds in species Nine Turns Stream wetland,and then provides the scientific basis for bird biodiversity research and conservation.

    • WSN Data Fusion Based on Cluster in Mine Gas Monitoring Application

      2013, 22(9):218-222.

      Abstract (1207) HTML (0) PDF 1.07 M (1889) Comment (0) Favorites

      Abstract:To monitor mine gas better, extract the abnormal gas data rapidly and eliminate the normal data redundancy, this paper proposes a WSN data fusion based on cluster method. It used the way of minimizing the total energy consumption that all nodes are devided into clusters best, nodes in each cluster determined the cluster head through the election of cluster head probability, the cluster nodes judged the data collected whether to be abnomal or not through the two thresholds and sent it to the monitoring stations for staffs to decide. The simulation results show that this method prolongs the wireless sensor network lifetime, the mine gas is monitored effectively.

    • A Novel Detection Method for Low Voltage Arcing Fault

      2013, 22(9):223-226,222.

      Abstract (1573) HTML (0) PDF 1.84 M (3582) Comment (0) Favorites

      Abstract:Current of arcing fault in the low-voltage distribution lines is decomposed by dyadic wavelet transform in this paper, and each scale high-frequency coefficients of wavelet transform of the current waveform are gotten. Compared with the load normal starting and running state, the high-frequency coefficients have obvious characteristic when the arcing fault occurs. Effectively, the characteristic can be applied to the arcing fault detector. Based on the method, current is collected online and analysed by LabVIEW and MATLAB software platform. The result of experiment shows that the method can accurately identify the arc fault on low-voltage distribution lines.

    • Objective Evaluation Method of Association Rule Interestingness

      2013, 22(9):227-229.

      Abstract (1351) HTML (0) PDF 777.30 K (3470) Comment (0) Favorites

      Abstract:Current main guidelines is to measure and generate Association rules take into account support and confidence threshold, and only in the practical application of this guideline to mining is insufficient, this is mainly because the associated rule evaluation criterion is not reasonable. This article for the associated rule evaluation conducted an in-depth study, analyzed the "support-confidence" schema limitations, presenting an interest based on correlation degree of evaluation indicators PS formula, based on its mathematical properties that has its advantages and disadvantages, laid the theoretical foundation for improvement of evaluation system of Mining Association rules.

    • MIMO Radar Detection Performance Analysis in Clutter and Noisy Environments

      2013, 22(9):230-233,101.

      Abstract (1453) HTML (0) PDF 1.60 M (2356) Comment (0) Favorites

      Abstract:MIMO radar has obvious advantage of the target detection performance compared with the traditional radar by using space diversity and waveform diversity technology, and becomes a research hot spot of future radar. In this paper, author gives the MIMO radar detection model based on the condition of clutter and noise, and deduces the theoretical formula of the detection performance. Its detection performance is compared with phased array radar under the multiple pulse accumulation conditions. The simulation result shows that when the SNR more than 10 dB, MIMO radar has obvious advantages.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063