HU Su-Zhen , JIANG Li-Jun , LI Zhe-Lin , TAN Jun
2014, 23(12):1-8.
Abstract:Autostereoscopic display technique currently is in development stage. And it mainly is used in the commercial market and entertainment industry, so it is not used on a larger scale. From a technical point of view, free stereoscopic display can be divided into light barrier technology, cylindrical lens technology and point light source technology etc. Autostereoscopic display's biggest advantage is to get rid of the shackles of glasses. But there are many deficiencies in the resolution, visual angle and visual distance. This paper introduced the stereoscopic display technology and the advantages and disadvantages of various types of stereoscopic display technology in existence and the basic principle of stereo display. And it also introduced several freestereoscopic display technology and its implementation.
2014, 23(12):9-14.
Abstract:Audit information platform is the important work platform of enterprise internal audit implementation. The platform applications directly affect the quality of audit work, thereby affecting the auditing supervision and corporate governance effectiveness. In this paper, through the practice of audit information platform in a state owned commercial bank, this paper summarizes the current platform existence the insufficiency and the flaw and tries to put forward ideas of short-term system optimization. At the same time, based on long-term, this paper analyzes the deep reasons which restrict the development of audit information platform. We try to analyze the trend of the future platform, in order to provide some reference for the long-term planning of the platform.
2014, 23(12):15-21.
Abstract:Active measurement is a common method for the network measurement. The implementation process of most active measurement tool can be divided into three parts: sending, receiving and processing packets. In this paper, we study the current active detection method of network performance in those three aspects and summarize the common procedure of the active measurement. A kind of development kit is designed to quickly implement various active measurement tool based on libnet and winpcap. The implementation of the active measurement tool is simplified by encapsulating all kinds of the operation required in the active measurement procedure and providing unified programming interface in the new design. As the experimental results suggest, the active measurement development kit is able to realize various function of the active measurement tool and greatly reduce the code compared with existing tool, and the efficiency is highly improved.
ZHAO Xue-Ru , ZHANG Yao-Nan , ZHANG Ai-Fen , ZHANG Yang , MIN Yu-Fang , XUE Ya-Min
2014, 23(12):22-28.
Abstract:The public is not only the biggest beneficiary of popular science, but the main target for network popular science diffusion. With the rapid development and spread of network popular science, however, there are some drawbacks. In this paper, cold and arid regions unique resources were applied to build a sharing platform for science. The platform has a resource management layer, platform management layer, application layer and user experience layer structure, which can support a variety of ways science communication, science resources and integrated. The stable and scalable platform is to achieve science resources building and exchanging and complete science topics self-construction and Sciences Culture Communication forming a science topic has 21 Cold and Arid Regions network science sky.
XU Long-Long , LI Ying , HU Bo
2014, 23(12):29-35.
Abstract:With the rapid development and popularization of smart terminals and mobile Internet, the construction of mobile enterprise information technology has been put on the agenda. However, mobile enterprise information technology is in its initial stage with vague moduledefinition and disorganized technical standards, still waiting to be formed with integral solution. According to the various characteristics of mobile enterprise information technology, this paper gives analysis and suggestion in terms of development, release and maintenance of mobile enterprise application, and puts forward an whole enterprise mobile information architecture with a base of hybrid mobile application development technology and a core of enterprise mobile application store. So far, a platformbased on the architecture has built lots of enterprise mobile applications and supported their security, popularization, standardization.
2014, 23(12):36-41.
Abstract:How to use existing knowledge to promote knowledge communication among team members is critical for a team to complete tasks and improve its core competitiveness. This study builds a model of team knowledge system based on related theories of CAS (Complex Adaptive System) from knowledge management perspective. The model includes attributes, actions and interaction rules of individual agent. The system environment, inputs and outputs are also defined in this study. Then based on the main ideas of computational experiments, this study analyzes a case that how external control influences team performance and verifies the feasibility of computational experiments of team knowledge systems. The managerial implications are discussed at last.
MA Jun , SHI Hui , PEI Wen-Bin , WANG Fu-Li
2014, 23(12):42-46.
Abstract:With the development of the computer and network technology, the growing demands for the huge data storage and the high-performance data access make the storage systembasedon network becoming a research hotspot, especially the research of I/O subsystem about network server system. The research about distributed file system as a key part in the network server system is meaningful. Currently open source community provides several DFS(distributed file system) projects, such as KFS, moosefs, FastDFS, TFS, GFS. Most of projects support only API or storage gateway on Linux system, but not giving support API or storage gateway on Windows system. This study introduces the designing frameworks and the thinking process aboutstorage gateway on Windows system, and then gives a specific example program based on HDFS—dfsclient.
CAO Jian-Ming , HUI Fei , MU Ke-Nan , GUO Lan-Ying
2014, 23(12):47-52.
Abstract:With the continuous development of digital information technology, the monitoring system has become the important application in the field of various industries. With the development of wireless technology such as WiFi, it is able to realize the wireless transmission of video data, because of its unique convenience it will replace the traditional cable monitoring system. Image mosaicing is a popular image processing technology, which means spicing two or more images with overlapped area into a seamless high-resolution image. This paper combines the advantage of WiFi wireless technology with the advantage of image splicing technology. It proposes the distributed monitoring scene mosaics system based on WiFi. This system makes multiple clients can transmit the collected images through WiFi network to the server, the server process the transmitted image by using SIFT algorithm and RANSAC algorithm to complete mosaicing. Finally, we achieve wide scene monitoring. The experimental results show that the system can effectively realize monitoring scene mosaicing.
XU Long-Long , LI Ying , BAI Jing
2014, 23(12):53-59.
Abstract:In order to satisfy the deficiency of the existing hybrid development framework in terms of convenience and performance, this paper proposed a new hybrid development framework. With the cross-platform features of HTML5, packing mechanism, multi-window management mechanism, and native plugin development technology, this paper implemented the hybrid development framework. The hybrid development framework brought convenience and enhanced the development efficiency. What's more, the unique Widget application management mechanim and window management mechanim in the engine improved the performance of hybrid applications as well as users' experience. The enterprise mobile solutions indicated that the framework had good commercial value, which was ease to use and had good performance.
ZHU Zuo-Jia , BI Jian-Tao , WANG Xing-Xing , GONG Yue-Jian , OUYANG Wen-Sen
2014, 23(12):60-66.
Abstract:As the focus of the natural process of carbon emissions data content information management system construction, the natural process of carbon emissions research data WebGIS system construction has become the object of study. The WebGIS system uses Silverlight as the client platform and uses the ArcGIS Server as the system GIS Server. It is combined with WCF RIA Service, ArcGIS API for Silverlight and other WebGIS technologies. We designed the system frame structure and the spatial database and gave out the spatial data and non-spatial data organization and its web access strategy. It achieved the non-spatial data network dynamic query, retrieval, statistics and analysis. It has functions of displaying the spatial data web maps, analyzing spatial data and making the matic map, etc. In the process of system building, we focused on the analysis of key technologies, involved WebGIS and the specific implementation of solutions. Studies had shown that building a WebGIS system based on the Silverlight technology and ArcGIS Server platform, not only can solve the release and management of geospatial data, develop the system function fast and efficiently, but also can meet the requirements of high interactivity and response time, and improve the performance of WebGIS system.
LI Meng-Hua , XIONG Xian-Ming , ZHAO Guo-Ru
2014, 23(12):67-71.
Abstract:Falls are the leading reason for accidental death among people at age over 65. In order to provide the real-time fall alarm and rescue service for the elderly, especially the one who live alone, in this paper we propose a GPS/GPRS-based remote monitoring terminal for fall detection. It uses sensors which combine three-axis accelerometer and three-axis gyroscope. The terminal is intended to monitor human motions and can recognize events of fall in real time. Falls are recognized using a dedicated algorithm. Once a fall has been detected, the terminal transmits alarm information together with location information to the remote monitoring center through GPRS. In order to avoid false or missed alarms, the terminal also supports manual mode of operation and buttons to send or cancel an alarm. The test results showed that the monitoring terminal can accurately distinguish between normal human activities, condition of fall event and generate alarm when the thresholds of resultant acceleration and resultant angular velocity are, respectively, 5m/s2, 25 m/s2 and 2 rad/s. The terminal has demonstrated good location accuracy and communication efficiency.
2014, 23(12):72-76.
Abstract:A software system for test and exercise is developed based on Android mobile phone. The system consists of a client-end application running on Android mobile phone and a set of server-end service applications. The system components include database server, WEB server, wireless network and Android front-end. The client Android system of intelligent mobile phone with front-end processing and calculating ability can access the server through the network to the server, upload the test results or download new test papers. The content of this paper covers the overall system structure design and application, gives some design code. Practice shows that the system realizes the whenever and wherever learning, which wins a good reputation among users, and achieves the expected goal.
GE Hui , WANG Cheng-Jin , YANG Jian-Xu , ZHANG Geng-Sheng , WANG Jin-Li
2014, 23(12):77-81.
Abstract:Based on the NARI RT21 platform, intelligent integrated monitor and management system with video surveillance, condition monitoring, fire control, access control, environmental monitoring and other centralized subsystems was researched and developed. This intelligent system circled around substation plane graph and primary equipment wiring diagram that had device management at their heart, and achieved intelligent linkage, information sharing, and play a role of supporting decision-making. This system helped the control center kept abreast of substation equipment operational status to provide technical support for shortening accident processing time, which can reduce the monitoring, operation and maintenance workload of staff.
LIAO Da-Qiang , ZHENG Hai-Qing
2014, 23(12):82-87.
Abstract:The traditional evaluation methods rely on simulation environment to simulate real network traffic status quo, the proposed intrusion detection system is based on OpenFlow's assessment. The system is software-defined networking technology (OpenFlow) evaluation model based on the intrusion detection.We discussed the framework, setting methods, and specific work of this model in details. Our work designed an evaluation system based on this model, which uses a flexible network OpenFlow control structures for the evaluation of the true IDS controlled network environment, and provides the necessary intrusion detection and attack the real network traffic data. Finally, the evaluation system was used to test the simulation model. The experimental results show that compared to the traditional methods, the proposed OpenFlow intrusion detection model based on the evaluation can assess the effectiveness and accuracy of better performance.
2014, 23(12):88-93.
Abstract:The deep development of information-integration of ship security changes the need of ship security platform. The integration of ship security equipment and security system becomes a problem urgently to be solved in ship safety construction. In view of this, this paper proposes the design of integrated architecture of ship security platform based on SOA. EJB components will be used to develop the system and WSDL will be applied to describe the architecture integration interface. Added that each process of service designs is using the clustering algorithm, it aims to achieve an integrated architecture of ship security platform based on SOA, and also shows the algorithm implementation of service integration of ship safety management platform. The research proves that it can realize a seamless integration of ship safety equipment and other ship safety information system in digital ship. It effectively solved the problem that ship security platform information resources cannot be shared each other, and can be applied in the weapon platform ship information security system practically.
2014, 23(12):94-100.
Abstract:In the smart city environment, a wide variety of data are collected from sensors and devices to achieve value-added services. In this paper, we especially focus on data taken from smart houses in the smart city, and propose a platform, called Scallop4SC, that stores and processes the large-scale house data. The house data is classified into log data or configuration data. Since the amount of the log is extremely large, we introduce the Hadoop/MapReduce with a multi-node cluster. On top of this, we use HBase key-value store to manage heterogeneous log data in a schemaless manner. On the other hand, to manage the configuration data, we choose MySQL to process various queries to the house data efficiently. We propose practical data models of the log data and the configuration data on HBase and MySQL, respectively. Then we show how Scallop4SC works as an efficient data platform for smart city services. We conduct an experimental evaluation to calculate device-wise energy consumption, using actual house log recorded for one year in our smart house. Based on the result, we discuss the applicability of Scallop4SC to city-scale data processing.
YUAN Hui-Xian , LIU Guang-Zhong
2014, 23(12):101-104.
Abstract:Considering the characteristic of high energy consumption of nodes and efficiency network transmission problem in large-scale three-dimensional underwater acoustic sensor networks, this paper proposes an algorithm for underwater acoustic communication sensor network routing based on the node location and LEACH algorithm, which takes the method of positioning, clustering, waking up and arranging. First of all, it gathers the location information of nodes, and makes underwater nodes into different clusters through clustering methods, wakes up the nodes we need and sleep the others. In the data communication process it is needed that waking up cluster unit timely and making sure the cluster nodes need to be waked up in time, making them in the active state, and sleeping the nodes we don't needed to save energy. We choose the best node to transmit information in the cluster. Simulation results show that the algorithm can improve the overall lifetime.
WANG Yan-Nian , MA Li-Na , LIU Cheng-Tao
2014, 23(12):105-108.
Abstract:The optimized deviation-deviation rate algorithm is applied in the electro-hydraulic servo control system. It brings difficulties to the design of the control method, because of the complexity of the influence factor in electro-hydraulic position servo control system, and the system itself has many nonlinear elements which makes it difficult to describe all of the features with precise mathematical model. Aiming at these problems, an optimized deviation-deviation rate algorithm is putted forward on the basis of the analysis of the structure and characteristics of electro-hydraulic servo control system, and achieved good control effect in various simulation experiment.
2014, 23(12):109-114.
Abstract:Wireless sensor network (WSN) is made of a large number of sensors, which power is limited. The energy management is a hot issue. Owing to the relevance of time and space between sensors, we allow some sensor nodes to be alive and some sensor nodes can be turned off. Mobile sink is powered by gasoline, thus the mobile distance is limited. Therefore, we propose CMSLM (Constrained mobile of sink lifetime maximum) algorithm. Firstly, we select as little as possible mobile sinks under the condition of limited mobile distance for mobile sink. Secondly, we construct balanced tree by the maximum flow, to maximize the WSN lifetime. The experiment simulation shows that the number of dead sensors of CMSLM algorithm is less than SRP-MS.
2014, 23(12):115-119.
Abstract:Aiming to such the problems that sparse data and poor calculation of score similarity result in low quality of recommendation, a collaborative filtering recommendation algorithm based on distribution of user interest density is proposed in the paper. After calculating the similarity of items, classification and entropy are calculated to get finally similarity between two items. Parzen window estimation is applied to get user interest density distribution in total item space. Finally user's attribute similarity and relative entropy are used to determine nearest neighbour user set. Experimental result shows that the algorithm effectively raises recommendation quality of spare data while avoiding error of filling data.
2014, 23(12):120-124.
Abstract:In program trading, trading strategy is determined by forecasting the tendency of prices in the future, based on calculating historical data according to the trading model. This paper proposes a linear regression trading model. It discusses the principle of the model, algorithm implementation and efficiency in running. Finally, an optimal algorithm for linear regression in Program-trading system is obtained which is competent in a real-time calculation for plenty of historical data. The algorithm's time complexity is least.
2014, 23(12):125-130.
Abstract:Mixed attributes data clustering is a research hotspot in recent years. For mixed attributes data clustering algorithm, it requires handling numeric attributes and categorical attributes simultaneously. However many algorithms have not very good balance with numeric and categorical attributes, and the cluster results are not satisfied. For mixed attributes data set, a new clustering ensemble algorithm based on intersection is proposed. It processes the numeric attributes with a new relative density clustering algorithm, and processes the categorical attributes with a clustering algorithm based on information entropy. Then it fuses these two cluster members with a cluster fusion algorithm based on intersection. Finally, it gets the clustering results. It is validated by taking an experiment on UCI data set Zoo, and compared with the existing k-prototypes algorithm and EM algorithm. The experiment result shows that the new algorithm has higher flexibility and accuracy. The influence of the intersection element ratioand to the result is also discussed.
2014, 23(12):131-135.
Abstract:Aiming at solving the problem of the lifetime and the energy efficiency in wireless sensor networks, we proposed a distributed load-balanced uneven clustering algorithm named DLUC. The algorithm adopted ring-based model and data transmission from one ring to the neighbor to finish multi-hop communication between cluster heads. It sets distance threshold in different rings to build unequal size of clusters. DLUC can effectively avoid the "hot spots" problem. In the stage of a multi-hop routing tree conformation, we considered the energy and the distance of relay cluster head nodes. Simulation results indicate that compared with LEACH and EEUC, DLUC balances the consumption better and prolongs the lifetime of networks effectively.
YANG Ge , MO Qing-Qing , HUANG Jing
2014, 23(12):136-141.
Abstract:Adaptive Resonance Theory (ART) neural network is analyzed in this paper. A character recognizer is designed and implemented based on the standard ART1 network, aiming at the shortcomings of the standard ART1 network, which concludes the unstablity of network learning and the over sensitiveness to the input sample sequence. This paper gives a method to improve the implementation in C 2 kind of identifier. Experimental validation of these two character recognizer can identify the different character. The improvement method based on standard ART1 network has better stability.
JI Cheng , CHEN Xiang-Lan , LI Xi
2014, 23(12):142-148.
Abstract:This paper studies the memory access characteristics of Linux kernel module, and then suggests a static approach to detect memory access errors when running the code inside kernel module. Through simulation of instructions inside kernel module and comparison between access request and record of memory region, our suggested method is able to find a variety of memory access errors, such as overflow, accessing arbitrary address, invalid pointer, which are the most common threats. At last, based on ARM Processor platform, we give an implementation of our method for detecting errors induced by kernel module, and the experiment result shows it can efficiently work as we expect.
JI Feng , QIAN Shuang-Qin , WAN Yi
2014, 23(12):149-153.
Abstract:The study on the traffic has been carried on aiming at the emergency events. The decision model of the adaptive vehicle was built based on the ABM technology. Acceleration algorithm of the following behavior was introduced with the driving model of the vehicle Agent. The vehicle queue length and the quantity relation between the vehicle Agents were obtained by analyzing the cases experimentally on the open source platform Swarm, which provided reliable data basis for establishing the effective emergency traffic preparedness.
YANG Qiong-Qiong , KONG Bin , ZHU Yong-Jun
2014, 23(12):154-159.
Abstract:In this paper we present a kind of auxiliary line access method based on image approach to help humanoid robots driving a car in a complicated unknown environments. According to road image taken during driving robot , a point was picked as the next point of the robot driving. According to the location of this point, calculate turning radius. On the steering wheel angle and the turning radius curve fitting, steering wheel angle calculated; According to the Angle of information and draw the vehicle auxiliary line on the image. This algorithm simulated on matlab environment, experimental results show that this method can obtain more accurate auxiliary lines as a reference when the vehicle driving, and bring great convenience to assist the robot successfully driving the vehicle.
GAO Fei , YUAN Xiao-Yang , YAN Jian-Jun , CHEN De-Shun , XIAO Gang
2014, 23(12):160-164.
Abstract:A camera calibration method for micro-image measuring system is presented. Firstly the micro image of known size microscopic scale is obtained. Followed by pre-processing and edge detection, ruler lines can be cut out from the image. Then based on Hough lines, the longer ruler lines can be identified. So the calibration factor can be calculated by the physical distance and the corresponding pixel distance of the lines. The calibration objects are existing microscopic scales, so this method is easily applied. The experimental results show that calibration precision is high.
2014, 23(12):165-169.
Abstract:Routing protocol plays a very important role in underwater acoustic sensor networks. Based on the traditional TEEN protocol, a new routing protocol named HCM-TEEN(Hierarchical Cluster-communication Model on TEEN) has been put forward. The improved algorithm sets a new threshold function on the basis of the process of cluster candidate and the cluster elimination, and then introduces a Hierarchical Cluster-communication model in the period of data transmission to optimize the routing process. The experiment by the Matlab proved that HCM-TEEN performed better than the traditional algorithm on the network lifetime and the network average residual energy.
2014, 23(12):170-175.
Abstract:As mobile payment has become increasingly popular recently, some phishing malwares on mobile devices try to steal users' sensitive information through forging a user interface similar to the targeted application, which cannot be detected by existing anti-phishing techniques. We propose a new similarity-based anti-phishing approach to detect phishing malware on Android. With the perceptual image hash technology, it compares the similarity of captured screen images between the suspicious application and the targeted application. If the similarity exceeds a threshold, the suspicious application is determined to be malicious. The experiment proves that the approach is effective to detect phishing malware on Android.
2014, 23(12):176-181.
Abstract:Human ear recognition is one of the most important branches in biometrical recognition and artificial intelligence fields. In this paper, considering the unique texture feature of human ear image, the spatial pyramid visual bag-of-words model was adopted. It transforms the relatively low-level local descriptors of human ear images into global features to preserve the high-level semantic meanings. The support vector machine classifier is utilized to perform the training and recognition task. Experimental results demonstrate that the adopted model could achieve a better accuracy, as an extension and exploration in human ear recognition methods.
2014, 23(12):182-186.
Abstract:Analyzing the shortcoming of traditional load forecast method, a method of load forecast based on data mining is put forward. Using the decision tree algorithm to make load forecasting, abnormal load data is found among the load forecasting results. This paper relies on association rules algorithm to modify the abnormal load, so that the load forecasting results will be more accurate.
ZHANG Xiao-Feng , ZHONG Yi-Bo , LI Qing-Chen , CHEN Guo-Ding
2014, 23(12):187-190.
Abstract:In this paper, a tracking algorithm called "ratio method" is introduced for intelligent vehicle competition electromagnetic group. The conventional tracking algorithms including "difference method" and "normalization method" have problems. For instance, there are extreme points in the function of deviation value and deviation distance, what is worse, the relation between them will change into negative correlation outside two extreme points. To solve this problem, the ratio method changes the electromotive force values into the ratio of the difference and the sum of respective square root electromotive force values. It turns out this tracking algorithm could remove the extreme points, besides the relation between electric potential difference and deviation distance maintains positive correlation within the entire value range, so as to eliminate misjudgment. After experimental verification, the results using this tracking algorithm are more effective than other conventional tracking algorithms. This paper solves a practical problem appearing in intelligent vehicle competition
2014, 23(12):191-196.
Abstract:With the rapid development of Internet, Web log user behavior analysis has become one of research hotspots in the field of Internet technology. Session identification is the key step in the Web log user behavior analysis. Accurate session identification is the foundation of effective user behavior analysis. IIS Web log analysis is presented in this paper on the basis of a session identification method based on known URL. The experimental results show that this method can effectively identify the user's real conversation.
2014, 23(12):197-201.
Abstract:Hierarchical IPv4 networks put forward higher requirements for the quality of service. This paper analyzes the advantages, disadvantages and the application environment of the traditional QoS architecture based on business according to the second layer and the third layer of the OSI reference model. Then a QoS algorithm integrated differentiated service model with integrated service model is designed to enhance the QoS of a hierarchical network. The simulation results prove that the model can improve the network's QoS in many aspects such as packet loss rate, transmission delay, delay jitter and network throughput.
DING Yong , WANG Yun , LI Cong
2014, 23(12):202-205.
Abstract:Mining frequent episodes on the event sequences is one of the hot areas of data mining. In this paper, support based on non-overlapped occurrence is definited. We propose an algorithm called NONEPI++ for mining frequent episodes, which firstly generate candidate episodes by join episodes, then generate frequent episodes by pre-pruning and timestamp calculating. The algorithm can improve the efficiency of mining episodes. Experiments show that NONEPI++ algorithm can effectively mine frequent episodes.
XU Nan-Shan , LI Hao , LU Gang
2014, 23(12):206-212.
Abstract:When studying the sampling methods on online social networks, samples collected by acceptance-rejection method are usually used as the "ground truth" to estimate the pros and cons of other sampling methods. The acceptance rate of the original acceptance-rejection method slumps dramatically since OSN sites updated their user ID from 32bit to 64bit. According to the characteristics of online social networks and taking Sina Weibo for example, we analyzed the distribution of user IDs in Sina Weibo, and proposed an improved acceptance-rejection method called UNI64. In this method, the user ID space is divided into valid intervals and vacant intervals by analyzing the distribution of valid sample IDs and utilizing cluster method. The sampling method generates candidate IDs only in valid intervals, so that the acceptance rate could be effectively improved even in a sparse-distributed user ID space.
2014, 23(12):213-216.
Abstract:In order to build loosely coupled and scalable distributed community management system, a layered architecture of community management system based on SOA is presented. To achieve the layered architecture, the lightweight Java EE framework is applied in SOA technology architecture to build a SSH-based SOA architecture, then the work processes of the architecture is introduced, and the architecture is applied to the design of community management systems.
LIN Yong-Liang , HU Jian-Ping , WU Shu-Lin
2014, 23(12):217-220.
Abstract:The scientific projects management system is proposed to alleviate stress of the scientific research managers. It is designed after a study of the needs of X city's scientific projects management. It is developed in Visual Studio 2010 by C# language, and combined with many web technologies (such as SQL Sever online research databases, LINQ and Office etc.). So the users can use it on Internet to achieve scientific projects' declaration, opening, prequalification, acceptance, award and statistics. Through the practical application in X city, the system runs safe and stable.
NIU Guo-Feng , ZHANG Ming-Xin , ZHU Miao-Miao
2014, 23(12):221-224.
Abstract:Based on the display principle of dot matrix LCD module without Chinese word stock, we display Chinese characters using Renesas 78K0R/KG3 16bit microcontroller and the modulus software of Chinese characters, considering the characteristics of 128*64 LCD modules.
LIN Jia-Zhen , YANG Fan , TU Hong-Bing , WANG Yun-Fu
2014, 23(12):225-228.
Abstract:With the promotion of information construction of enterprise business process, the management of core business process has become an important foundation to further improve the information level. The performance of workflow system determines how efficiently the business process flows to some extent. In this paper, quantitative relationship between performance index and database scale is sought out by quantitatively analyzing the performance of workflow system to put forward key factors and pointcuts of technology for performance optimization. On this basis, performance optimization scenarios of workflow are studied based on database mechanism in this paper and a simple effective algorithm is proposed. As a result, filing mechanism is implemented so that the ultimate goal of workflow system performance optimization can be achieved.
2014, 23(12):229-232.
Abstract:In order to improve the energy balance of wireless sensors network, we present a Leach-based routing protocol using Optimized Energy Welfare (OEW) called Leach-OEW. The concept of OEW is raised based on the optimized social welfare. The OEW is applied to the election of the cluster heads in the Leach routing protocol of wireless sensors networks to achieve energy balance as well as energy efficiency. The simulation results show that the improved Leach protocol balances the energy consumption of sensor nodes, prolongs the life time of network compared with the Leach and PARPEW protocol.
2014, 23(12):233-236.
Abstract:The new driver architecture VxBus was integrated in VxWorks operation system after the release of VxWorks 6.2. VxBus dirver architecture was modularized with minimal BSP support. This paper analyzes the work mode of VxBus driver architecture. We designed and implemented a type of ARINC429 interface driver based on VxBus. The implement of vxWorks driver based on VxBus has a high degree of reliability and expansibility.
SONG Fu-Gang , WEI Guang-Bo , GUAN Wen-Qiang , ZHANG Wei-Fen
2014, 23(12):237-240.
Abstract:Aiming at the special requriement of the mobile hing-capacity storage device's safety in the special field, based on SSX20-D security chip, we designed the security model with three levels: data storage security protection, usb flash disk key parameter protection and usb flash disk using management. The security chip uses many security mechanisms, including data encryption, usb flash disk parameter protection, encryption key protection, password-hardware using control, and the usb flash disk anti-attack ability. The mechanism expended the Key's safety to the hing-capacity storage chip. Especially it designed three-level key-protection method which can solve the safety weakness of the key parameter protection. We are using SM1, SHA-256 and self-defined function to make sure absolute security of the key.
2014, 23(12):241-244.
Abstract:This article uses attack tree model to analysis the RFID-based production line system security issues; gives the corresponding security policy according to the questions described by the attack tree mode model. Directional Faraday net is used to solve the problem of the safety of the RFID reader. The HASH chain is used to solve the problem of the RFID information security. Mutual authentication system based on digital signatures is used to solve the communication security issues. An overall information security management system is established to solve the whole security issues of the production line.
2014, 23(12):245-248.
Abstract:Android is an open platform. It has very rich applications. This paper combines Android platform and telephone to study and design an application of making and receiving calls on the Android platform to make it has the function of telephone dialing. Android platform and telephone are connected by the control circuit with analog switches CD4052. The telephone dial-up function in Android system can be implemented by writing a driver in Linux kernel, generating dynamic libraries in JNI and HAL and creating application in the application layer. After testing, the design of the dial-up application can successfully dial the number.
2014, 23(12):249-252.
Abstract:When facing with multiple Web services with the same or similar functionality, QoS (quality of service) has become an important criterion for users to select the appropriate Web services. We present a QoS model, the QoS attributes are divided into exact numeric type, interval numeric and Triangular fuzzy numeric. We propose a kind of multi-attribute group decision-making model based on TOPSIS (echnique for order preference by similarity to an ideal solution) to select Web services, which considers weights of multiple decision makers and weights of the QoS preference in the decision process. The example proves that the method is feasible.