• Volume 23,Issue 1,2014 Table of Contents
    Select All
    Display Type: |
    • Levels Analysis of Network Attack Traceback

      2014, 23(1):1-7.

      Abstract (1779) HTML (0) PDF 1.01 M (6111) Comment (0) Favorites

      Abstract:In recent years, to efficiently defend network attack, traceback has been proposed to track dwon the source of attack. With the identifiability of traceback, security measure, such as isolation or others, can be carried out to do less harm in network. Because traceback mechanism is a critical part of the defense against network attack, its related technology and research has achieved more and more attention and development. This article describes the levels of traceback, focusing on analysis of issues of each traceback level and the corresponding technical, and tracking process conducted in-depth discussions on the track in order to give a comprehensive description of traceback and to improve the understanding of cyber attacks attribution.

    • Pearl River Delta Innovation Cluster Management Information System

      2014, 23(1):8-13.

      Abstract (1568) HTML (0) PDF 1.52 M (2168) Comment (0) Favorites

      Abstract:Innovation cluster management is still a new subject and it is new to different industries and regions. The project of innovation clusters is to meet the needs of scientific research management information. According to the characteristics of innovation clusters across institutions, cross-regional, cross-sectoral, it uses the information technology and the application of advanced through the portal, unified management platform to establish the integrated management ecosystem with complementary function, exchanges and cooperation. It coordinates the development in innovation cluster, integration and shares advantage of innovation resources, flexible combination and allocation of internal resources of the cluster, and constantly promotes the integration across the interdisciplinary and collaborative development. It can promote innovation cluster management capacity and competitiveness.

    • Assignment Based on Stratified Event Queue

      2014, 23(1):14-18,52.

      Abstract (1586) HTML (0) PDF 1.88 M (2151) Comment (0) Favorites

      Abstract:With the development of ASIC, SoC and FPGA in research and industry, Verilog HDL has been the main method to design the integrate circuit. For the designer miusing the assignments in Verilog HDL, more and more designs have been with some invisible bugs. That the designers fully understand how the assignments are scheduled in the program has been the main method to solve the bugs. This paper is based on the stratified event queue to detail how the assignment works in design, and gives important coding guidelines to infer correct logic and avoid race condition in the design.

    • Social Networking Service Platform Based on Struts2 Technology

      2014, 23(1):19-27.

      Abstract (1709) HTML (0) PDF 1.19 M (2363) Comment (0) Favorites

      Abstract:This paper will put forward a design scheme of social networking service platform based on Struts2 technology. Through the design of use-case model, the application of Struts2 technology based on the design mode of MVC, and the research of use-case implementation algorithms, the design scheme proposed in this paper can make clear logical division to the platform structure and effective separation for three-tier logical structure. It does not only provide a reference example for the design of the networking application platform based on the mainstream framework technology, but also a technical and analytical condition for formulating the business decisions of social networking service platform.

    • Report Management System Generator for Web Application

      2014, 23(1):28-32.

      Abstract (1563) HTML (0) PDF 964.30 K (2131) Comment (0) Favorites

      Abstract:The Report Management System Generator for web application is aimed at designing and generating the report needed by several business systems in the project of "Comprehensive Demonstration of Water Environment Management about LiaoHe River Basin". The article elaborates the basic architecture of Report Management System Generator and introduces the basic thoughts about designing report templates based on Cell-Plugin and the corresponding function library module. Finally, it reasearches the extended module and proposes its algorithms in the Report Generator. Therefore, it could check the circular dependency of Formula and accomplish the data transfer between the Client and Server. The Roport Management System Generator has been initially realized already. This tool can be applied to generate the complicate style of Chinese Report and meet the needs in different industries.

    • Reliability Analysis of RAID Storage System Based on Single Physical Hard Disk

      2014, 23(1):33-37.

      Abstract (1121) HTML (0) PDF 940.70 K (1999) Comment (0) Favorites

      Abstract:As it possesses characteristics such as high concurrency, high scalability, high cost-effectiveness and so on, the RAID system is the current solution is one of the main technology of information system external storage. With the popularity of the applications of the technology as well as the expansion of the system size, its failure increases dramatically, so the research on the reliability of RAID system has become a hot spot. Based on the reliability analysis of RAID system, the reliability mathematical model was derived.

    • Simulating Generation System of Condition Data

      2014, 23(1):38-44.

      Abstract (1641) HTML (0) PDF 1.16 M (3045) Comment (0) Favorites

      Abstract:In order to simulate the condition data of the various equipments in the industry locales and provides a data monitoring method for the monitoring personnel, the requirement for constructing a simulating generation system of the condition data is proposed, and two algorithms of the simulating generation of the condition data are discussed. The simulating generation algorithm of the condition data is extended from the single-model irrelevant pattern to the multi-model relevant pattern. The practical application shows that with the adoption of the simulating generation algorithm of the work condition data provided in the essay, the condition data of the various equipments in the industrial locales can be effectively simulated.

    • Manufacturing Enterprise Management Information System Reconstruction Based on Semantic Information of Business Model

      2014, 23(1):45-48,7.

      Abstract (1291) HTML (0) PDF 1.38 M (1792) Comment (0) Favorites

      Abstract:The status quo of manufacturing enterprise management information system reconstruction technology is reported. The shortcomings of traditional reconstruction technology are analyzed. In order to support business users to reconstruct the information system independently, some new characteristics which information system reconfiguration technology should have are summarized. An information system reconstruction approach based on semantic information of business model is proposed to support business users to reconstruct management information system dynamically through the configuration of enterprise business model. The approach has been successfully applied to an actual process management system.

    • Abnormal Scan Behavior Monitoring System Based on Numerical Analysis

      2014, 23(1):49-52.

      Abstract (1192) HTML (0) PDF 921.98 K (2076) Comment (0) Favorites

      Abstract:This paper introduces an abnormal scan behavior monitoring methods based on numerical analysis. It designs and develops a monitoring system with Netflow network management data, to achieve real-time monitoring for abnormal behaviors such as network worms, IRC Trojan zombie outbreak and spreading of malicious scan by hackers, etc. The system shows significant implement results, and increase network security support service capabilities of ISP.

    • Performance Analysis of Cognitive Cooperative Communication System Based on Multiuser

      2014, 23(1):53-56.

      Abstract (1230) HTML (0) PDF 805.33 K (1943) Comment (0) Favorites

      Abstract:With multiple primary-user coexisting, a new dual-hop cognitive cooperative communication system is proposed and analyzed. In this proposed system, multiuser existed at the destination and the optimal channel coefficient scheme is adopted to improve the system performance. Moreover, the outage probability performance is investigated over Rayleigh fading channels and the exact closed-form expression is derived, then an asymptotic expression at high signal-to-noise for the outage probability is obtained too. Finally, simulation results are presented to verify that the system performance is improved with multiuser condition.

    • Parsing and Converting System for Electrocardiography Data Format

      2014, 23(1):57-61.

      Abstract (1336) HTML (0) PDF 1.11 M (3627) Comment (0) Favorites

      Abstract:Nowadays we have various electrocardiography monitors from different manufactures in the market. Since the data format of one manufacture’s electrocardiography monitor is different from, and not compatible with the other, the way to unified management of electrocardiography data is blocked with so many obstacles. To improve the current situation above, this paper proposes a method, which is parsing of various electrocardiography data and converting from one to another. Thus, the unified management of electrocardiography can be accomplished.

    • Design of Modularized Architecture for Web Application Based on OSGi

      2014, 23(1):62-67.

      Abstract (1378) HTML (0) PDF 997.56 K (2523) Comment (0) Favorites

      Abstract:To deal with the deficiency of modularization and dynamics, this paper proposes an architecture for web application based on OSGi, combined with the popular technologies of web application, such as servlets, JSPs, static documents and request handling, including the technique of integrating web application with OSGi, the change of structure and loading of application. Then it illustrates how to modularize and register web application components including servlets, filters and listeners, how to register, find and compile JSPs, how to register and find static documents. Finally, it discusses the process of dispatching and handling requests. With the architecture, besides continuing to use the existing technologies and frameworks, web application can also have the characteristics of modularization and dynamics.

    • Embedded Internet System Based on WIFI/GPRS

      2014, 23(1):68-72,67.

      Abstract (1358) HTML (0) PDF 1.74 M (2298) Comment (0) Favorites

      Abstract:Aiming to solve the puzzle of the mobile equipment connecting to the Internet, an embedded Internet system, which combines the embedded technology and WIFI/GPRS wireless communication technology and achieves the goals of the far-distance communication and the sink node access network with the help of the WIFI and GPRS module, has been designed. The problems, occurring in the process of the video data communication, have been resolved. Meanwhile, the difficult problem of the investment and maintenance the wireless private network has also been settled.

    • Open Experiment Teaching Management System for Universities

      2014, 23(1):73-77.

      Abstract (1448) HTML (0) PDF 1.25 M (2742) Comment (0) Favorites

      Abstract:The open management of experiment teaching can encourage college students to carry out personalized learning and autonomous learning, and will help students sharpen up their self-study skills and exploration competence. This paper designs and develops an open experiment teaching management system for universities based on ASP.NET, in which the open resource project FrameWork is used as infrastructure. The upper application functions are developed, such as experiment reservation management, experiment course management, laboratory management. The perfect algorithms about reservation time restraints test and dynamic generating of visual experiment table are designed. This system can meet complex requirements from open experiment management, and has high use value.

    • Improved GPS Anti-jam Space-Time Adaptive Algorithm Based on MSNWF

      2014, 23(1):78-85,13.

      Abstract (1348) HTML (0) PDF 2.30 M (2492) Comment (0) Favorites

      Abstract:Traditional space-time adaptive processing (STAP) algorithm does not only have a big computation, but also cannot suppress the multiple narrowband jammer and the narrowband jammer which come from the same direction with the useful signal. To deal with these problems, an improved GPS anti-jam multistage nested Wiener filter (MSNWF) method which combines with multistage IIR lattice notch filter is proposed. The narrow-band jammer can be forecast and suppressed by using IIR lattice notch filter. The amount of computation can be reduced by using the improved MSNWF. The new method which can not only suppress both narrowband and broadband jammer effectively, but also improve the computation speed and SINR.

    • Developing of PV Plants Array Unit Optimization Design Software

      2014, 23(1):86-92,37.

      Abstract (3009) HTML (0) PDF 2.25 M (2467) Comment (0) Favorites

      Abstract:This paper discussed the design and implementation of PV array design software in detail. By the analysis of photovoltaic power generation system design process, it determined the function orientation and the main function of software. The software was designed with the help of the object-oriented design method. Under the environment of Visual c++2010, it was completed. The software has the good man-machine interface and greatly improves the design efficiency.

    • Runway Layout Comparison of Beijing New Airport

      2014, 23(1):93-97.

      Abstract (1196) HTML (0) PDF 866.06 K (2755) Comment (0) Favorites

      Abstract:The Beijing new airport project is developed to satisfy the aviation demand of Beijing area. There are 4 runways in the new airport, as well as two alternative programs in the present period, which are called “3+1” and “4+0” to differentiate. Through macro analysis from airport administration, air traffic control and airlines, the evaluation system for choices of alternative program is established, which includes runway capacity, ground taxing time and delays. Then, the theory runway capacity is estimated. After the analysis of these, this paper builds the separate model based on the Simmod software. The “3+1” program is a better option based on the simulating models and the evaluation system. Besides, the conclusion could give theoretical reference to research for the runway layout comparison of Beijing new airport.

    • Research of Interferometer Based on Cross-correlation Location Method Computer Engineering and Applications

      2014, 23(1):98-102,77.

      Abstract (1173) HTML (0) PDF 1.66 M (2122) Comment (0) Favorites

      Abstract:This paper proposes to process the interference outputs of the Sagnac/Mach-Zehnder interferometer by using time-domain cross-correlation method, which is a distributed optical fiber sensing system, to detect and locate the disturbance. Firstly, it gives the theoretical analysis of Sagnac/Mach-Zehnder interferometer, derives the expression for the interference outputs and uses Bessel function to expanse the expression, demonstrates the two interference outputs of the system meet the time-domain cross-correlation properties. Based on further analysis of the expression of two interference signals, it proposes two time-domain cross-correlation method by the baseband positioning method and differential positioning method to approach the interference signal to determine the disturbance location.

    • Lanchester’s Combat Models Based on Cloud Qualitative Simulation

      2014, 23(1):103-108.

      Abstract (1478) HTML (0) PDF 1.09 M (2621) Comment (0) Favorites

      Abstract:During the past many years, Lanchester’s differential equations have been the norm for computer simulations of combat. However, these methods cannot fully reflect the inherent uncertainty of related variables in modeling. In view of this limitation, we propose a Lanchester’s combat models based on cloud qualitative simulation. This method introduces numeric characteristics and cloud measurement index of the normal cloud to represent the qualitative landmarks, and propagate the cloud measurement index within constraint sets to improve the accuracy of simulation results. Consequently, this method allows for a more accurately representation and interpretation of the uncertainty within related variables in modeling, and expands the scope of warfare application. Especially when the relevant variables of the model cannot or need not be quantified precisely involving with the case of representation of qualitative variables with uncertainty, this method has certain advantages. Finally, the examples of classic historical battles demonstrate that this method is a correct and feasible method.

    • Personalized Recommendation Based on Trust and Preference

      2014, 23(1):109-113.

      Abstract (1410) HTML (0) PDF 932.88 K (2253) Comment (0) Favorites

      Abstract:As the most popular personalized recommendation method, collaborative filtering recommendation has some shortcomings in real application, and the results of recommendation are not accurate enough in some cases. Taking into account the relationship between the trust and similarity of user preferences, we introduce trust into recommendation model, and take dimensional factor indicating user preferences into account, putting forward a recommendation method based on trust and preference. This method is aimed at solving the problem in collaborative filtering method and improving the accuracy of recommendation system. We have demonstrated the effectiveness of this method.

    • Determination of Number of Clusters in K-means and Application in Color Correction of Cell Image

      2014, 23(1):114-118.

      Abstract (1314) HTML (0) PDF 1.03 M (2077) Comment (0) Favorites

      Abstract:To observe the changing rule of clustering center’s value in K-means by the YCbCr color space, against a lot of cell image by Wright Stain, this paper proposed a new method to determine the number of clusters in K-means to get a good result of color correction. Different target of cell image could be firstly gathered in the corresponding class accurately, then by matching between classes, and using histogram specification for adjusting histogram, the results of color correction could at last be achieved. It has been proved by many experiments that this algorithm can greatly improve the accuracy of color correction results, especially the target with closer color features in cell.

    • Non-Local Means Algorithm Combined with High Order Differential

      2014, 23(1):119-123.

      Abstract (1479) HTML (0) PDF 1.55 M (1997) Comment (0) Favorites

      Abstract:Non-local Means algorithm is a very effective and widely studied algorithm, but it cannot maintain the texture and weak edges of image very well. By using the characteristics of high order differential which can reflect the weak boundary and oscillation characteristics of image well, we improve the Non-local Means algorithm. The improved algorithm cannot only remove noise, but also keep more details, textures and weak edge.

    • Five Frame Difference and Edge Detection of Moving Target Detection

      2014, 23(1):124-127.

      Abstract (1218) HTML (0) PDF 870.49 K (2776) Comment (0) Favorites

      Abstract:To improve the traditional three frame difference of moving target detection method in which the hole edge and false edge tend to appear, this paper puts forward a method based on the fusion of five frame difference and edge detection, moving object detection method. The algorithm firstly uses Canny edge detection algorithm of optimized fast extraction of five consecutive images edge image, and then to the edge of the frame of five consecutive image into five frames difference operation. Finally, by threshold segmentation and morphological processing is completed on the extraction of target. The method is simple in calculation and the experimental results show that the algorithm has high accuracy, good connectivity, and can meet the requirements of real-time detection.

    • Extracting Image Information by Bresenham Drawcircle

      2014, 23(1):128-131,27.

      Abstract (1491) HTML (0) PDF 1.24 M (2532) Comment (0) Favorites

      Abstract:During image processing, if the pixels in some region of the image are operated, those pixels to be processed must be extracted. The area including pixels to be processed may be regular, and may also be irregular. As for regular area(for example, polygon, rectangle, circle and ellipse), it can be picked up by classical graphics algorithm; if the area is irregular, it can be converted into regular area by appropriate method. This paper discusses the following problems: the structure of 24-bit true color BMP file; the relationship between pixels in bmp data array and pixels to be showing on screen; extracting pixels, which belong to circle area of image, by Bresenham drawcircle; the visibility of those pixels be extracted.

    • Synchronization for Generalized-OFDMA Uplink

      2014, 23(1):132-135,113.

      Abstract (1144) HTML (0) PDF 1.45 M (1900) Comment (0) Favorites

      Abstract:In order to obtain a better performance of joint estimation frequency offsets (CFOs) and timing errors (TEs) for the uplink transmission of Orthogonal Frequency Division Multiple Access (OFDMA) companied with a generalized carrier assignment scheme, the use of Constant Amplitude Zero Auto Correlation(CAZAC) sequence and increasing the number of training blocks improve the existing algorithm of joint estimation.Although the efficiency of transmission is reduced, the performance of estimation has improved and this sacrifice is worth it. Simulation results show that the performance of improved algorithm of estimation is better than the original algorithm and its application range is more extensive.

    • Index and Query Optimization of Spatial Datadase Engine Based on Oracle

      2014, 23(1):136-139.

      Abstract (1330) HTML (0) PDF 741.21 K (2527) Comment (0) Favorites

      Abstract:This paper explores the creation of Oracle 10g spatial’s spatial index and how to use spatial index to optimize spatial analysis. The spatial query is mainly carried out by relevant spatial operator and spatial function. Using spatial operator and spatial index can realize spatial query optimization.

    • Analysis of IDE Driver and Migration of SATA Driver

      2014, 23(1):140-143,44.

      Abstract (1211) HTML (0) PDF 1.39 M (3495) Comment (0) Favorites

      Abstract:SATA disk is Storage Media that has already been widely used in a multimedia applications currently, while many versions of Linux in Multimedia products that its driver framework does not support SATA drives. By analysing the driver framework in linux and its associated code analysis, this paper provides a way for porting SATA drives in IDE driver framework. Finally to SiI3512 example, the paper describes the porting process of SATA driver. This has a good reference for migration of other similar systems.

    • A New Error-Driven Incremental SVM Learning Algorithm Based on KKT Conditions

      2014, 23(1):144-148.

      Abstract (1432) HTML (0) PDF 945.38 K (2138) Comment (0) Favorites

      Abstract:The transformation between the SV set and non-SV set is analyzed during the process of incremental SVM learning. Considering the initial non-SV set and new samples which will influence the accuracy of classification, it improves the KKT rule and error-driven rule. With these rules the new error-driven incremental SVM learning algorithm based on KKT conditions is proposed. With this algorithm, the useful information of original sample can be preserved as much as possible, the useless information of new samples can be removed accurately without affecting the processing speed. Experimental results show that this new algorithm has a good effect on both optimizing classifier and improving classification performance.

    • A Q-Learning Algorithm for Robot Navigation Based on a New Definition of an Unknown Environment States and Knowledge Heuristic

      2014, 23(1):149-153.

      Abstract (1200) HTML (0) PDF 1.04 M (2221) Comment (0) Favorites

      Abstract:Due to powerful self-learning ability, reinforcement learning has become a research hot spot about robot navigation problems, but the operating efficiency and convergence speed of the algorithm are tried by the the complex unknown environment. A new Q-learning algorithm for robot navigation was proposed in this paper. First, three discrete variables were used to define the space states of the environment, and then two parts of the reward functions were designed, combining the beneficial knowledge for reaching the target to inspire and guide the robot's learning process. The experiment was executed on Simbad simulation platform. The results show that the proposed algorithm is well done in an unknown environment robot navigation task, and has a better convergence speed.

    • Application of Recursive Time-Frequency Reassignment Method to Frequency Hopping Signals Analysis

      2014, 23(1):154-157,123.

      Abstract (1193) HTML (0) PDF 1.52 M (1913) Comment (0) Favorites

      Abstract:To make an analysis and estimate the parameters of frequency-hopping signal, a fast algorithm to realize short time fourier transform is introduced. In order to improve the time-frequency concentration, the proposed algorithm is extended with the method known as time-frequency reassignment. The algorithm reduces complexity of parameter estimation. Finally, the algorithm performance is simulated and analyzed.

    • Analysis and Comparison of Several Clustering Algorithms Based on Campus Card Consumption Data

      2014, 23(1):158-161,183.

      Abstract (1377) HTML (0) PDF 1.26 M (3705) Comment (0) Favorites

      Abstract:With the acceleration of information technology in university management and the demand of university information continues to strengthen, the campus card is widely used in all aspects of student life, and requires data mining analysis for each sector basis for decision making. As one of the most popular data mining technologies, clustering algorithms are widely used for campus card consumption data mining. Howerve, people don’t know which clustering algorithm is the most suitable for campus card data. This paper carries out experiments with multiple widely used clustering algorithms, obtaining the most appropriate data mining clustering algorithm for the data, and analyzes the reason.

    • Efficient SQL Statement Execution Threads

      2014, 23(1):162-165.

      Abstract (1711) HTML (0) PDF 1.09 M (2077) Comment (0) Favorites

      Abstract:During the acquisition, processing and interpretation integrated software platform, there are a large number of SQL statements inevitably executed, while running these SQL statements, SQL statements that do not need to return occupy to a major proportion. This paper designs the SQL statements cache and SQL statements that do not need to return real-time put into this cache, and finally by designing the thread of executing SQL statements, SQL statements in the cache real-time process. This method does not only the separation of business and database operations, but also improves the business efficiency of requests for database operations.

    • Fuzzy Logic Based MPPT Controller for a Stand-Alone Wind Energy Conversion System

      2014, 23(1):166-170,139.

      Abstract (1521) HTML (0) PDF 1.50 M (2146) Comment (0) Favorites

      Abstract:To solve the problem of the tracking speed versus control efficiency trade off problem of the hill climb search(HCS) method, an adaptive variable step search algorithm realized by fuzzy PID is applied. Based on the equivalent circuit analysis of the wind energy conversion system (WECS), a speed-sensorless control scheme has been developed. A 5kW stand alone WECS was analyzed in the Simulink. The results show that the proposed algorithm has better dynamic performance and capture more power than the conventional HCS under constant wind and variable wind.

    • Inside and Outside Website Access Control Based on Code

      2014, 23(1):171-174.

      Abstract (1028) HTML (0) PDF 815.85 K (2428) Comment (0) Favorites

      Abstract:Based on the different needs for inside and outside network access in a certain institution, this paper analyzes the features of several access control methods and their applicable range. Through the study, we finally decide on the code method for writing server-side program to distinguish the access for inside and outside network.

    • Security Strategy Based on the Binding and Update of the Proxy Mobile IPv6

      2014, 23(1):175-178,192.

      Abstract (1299) HTML (0) PDF 1.35 M (2063) Comment (0) Favorites

      Abstract:With the unceasing development of the mobile IPv6 technology, the users have put forward higher requirements for the security of the network. According to the proxy mobile IPv6 binding update process safety issues, this paper improves the return path process, basing on the Return Routability Procedure and the Asymmetric cryptographic technique. It proposes one kind of security mechanism based on the automatic key authentication. The paper analyses the security of the scheme, which can effectively prevent attackers from forging, tampering the messages, denying the mobile host being attacked by a series of problems, such as the denial of service.

    • New Method of Data Protection for Digital Optical Disc

      2014, 23(1):179-183.

      Abstract (1136) HTML (0) PDF 1006.46 K (2370) Comment (0) Favorites

      Abstract:A new file system of data protection for optical disc and its data protection method were proposed. This file system was divided into plaintext section, ciphertext section and parameter section. A producer of file system was suggested to pack plaintext, ciphertext, parameter in one ISO image file. A special reader for accessing ciphertext section was injected into plaintext section. This method bound plaintext, ciphertext and the special reader together, and needn’t any extra software. This file system is compatible with all optical disc devices.

    • Examination-Arrangement System Based on Genetic Algorithm

      2014, 23(1):184-187.

      Abstract (1832) HTML (0) PDF 841.17 K (2322) Comment (0) Favorites

      Abstract:Examination Arrangement is an important work task in higher education management information system. With the increasing number of students, the number of students who participate in the examination and course is also multiplied, the task of manual testing examination arrangement will become very difficult. In this paper, an algorithm using genetic algorithm is proposed. The algorithm achieves fast convergence by optimizing the mutation operation. Even for the complex examination table, it can also obtain a very high success rate and a convergence speed.

    • Migration and Implementation of SimpliciTI Protocol Based on WSN

      2014, 23(1):188-192.

      Abstract (1495) HTML (0) PDF 1.14 M (3309) Comment (0) Favorites

      Abstract:SimpliciTI network protocol, the low power RF protocol aimed at simple and small-scaled RF network is issued by America TI company. It is transplanted to design a wireless sensor network system in Keil MDK 3.8 software development enviroment。 The network system includes acess point and end device. In this system, STM32F103C8 is adopted as the microprocessor, coordinating with its ADF7021 wireless transceiver; the node hardware system is composed. SimpliciTI network protocol and its topological structure are analyzed and the software is designed based on the low power consumption design and carrier sense backoff algorithm. Thus, the network communication system based on SimpliciTI network protocol is implemented, which can be applied in single data collection center where the multiple sensor nodes.

    • Study of Indoor Object Search Robot Based on QR Code Navigation

      2014, 23(1):193-196.

      Abstract (1709) HTML (0) PDF 907.34 K (2367) Comment (0) Favorites

      Abstract:In this paper, a robot based on android phone is presented to search objects in indoor environments, which supports remote control and voice control. This paper introduces the structure of the system, and proposes a navigation method based on artificial landmark. This method applies QR code to guide the robot move to certain area, recognize the target position, then stop near the target by judging whether the size of the target area can reach a threshold, and switch the mode using the finite state machine. Experiments for blob detection and artificial landmark recognition are carried out and the results verify its validity and practicability.

    • Application of Fast Classification Algorithm Based on Fuzzy Kernel Hypersphere to Stock Forecasting

      2014, 23(1):197-201,148.

      Abstract (1569) HTML (0) PDF 1.39 M (2526) Comment (0) Favorites

      Abstract:SVDD classification algorithm based on SVM has defects, such as high calculation complexity property and low accuracy. According to nonlinear and high-noise characteristics of stock data, inspired from the idea of traditional SVDD classification algorithm, the proposed algorithm (FCABFKH) adopts mergence method to find hypersphere sets and maximum membership degree law to construct classifier. By this means, the algorithm can rule out off-group points and hypersphere sets overlap problem. Furthermore, it can avoid complex quadratic programming. Consequently, FCABFKH provides faster rate and higer accuracy. Using the data of listed companies of China A stocks market, experiments are done to test the validity of the method mentioned above. The result indicates that portfolio's return rate using classification method of FCABFKH is higher than the market benchmark.

    • Method for Nuclear Power Plant Data Loading Based on EAM

      2014, 23(1):202-205.

      Abstract (1188) HTML (0) PDF 886.29 K (1902) Comment (0) Favorites

      Abstract:Data, as an important part of enterprise informatization, have always been in the key position in the process of a large enterprise system implementation. In the background of the nuclear power plant EAM project AS product of the implementation, through refactoring data source model, data mapping between models and views, import application development methods etc, this paper uses efficient, accurate and low-cost solution to solve all sorts of problems in the process of data import. This also has guidance value for large companies such AS ERP software data import.

    • Development of Android-Based Handheld Terminal for Wind Turbine

      2014, 23(1):206-209.

      Abstract (1430) HTML (0) PDF 1.04 M (2169) Comment (0) Favorites

      Abstract:An Android-Based handheld terminal for wind turbine is developed for monitoring, maintance and setting of wind turbines. The handheld terminal communicates with the wind turbine’s main control system based on TCP/IP protocol and MODBUS protocol. And the monitoring, maintance and setting of the wind turbine is completed through touch operation in the interactive interface. At the same time, the data of all the wind turbines and users, of which the secret part is encrypted, are stored to the local database. The actual application shows that the Android-Based handheld terminal for wind turbine is feasible, effective and has flexible, portable, economical features.

    • Strategy of SEO Based on Long Tail Keywords

      2014, 23(1):210-213.

      Abstract (1424) HTML (0) PDF 858.79 K (2396) Comment (0) Favorites

      Abstract:Long Tail Keywords is an extension of Search Engine Optimization from The Long Tail. Based on The Long Tail and SEO, combined with research status of Long Tail Keywords, this paper puts forward the strategy of SEO based on Long Tail Keywords, which is scientific and systematic. This strategy can quickly improve the ranking of many long tail keywords and increase site traffic. It is applicable to e-commerce website of many fields.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063