• Volume 23,Issue 6,2014 Table of Contents
    Select All
    Display Type: |
    • Cyber Physical System Security and Related Measures

      2014, 23(6):1-6.

      Abstract (1934) HTML (0) PDF 611.57 K (3043) Comment (0) Favorites

      Abstract:Cyber physical system is facing enormous security challenges because of open and interconnected network and the interaction between cyber components and physical components. There is a description of layered cyber physical system security hierarchy by studying the security objectives and attack model of cyber physical system. Cyber physical system security is mainly to solve the encryption technology, access control strategy and resilience schema, etc. After the introduction of the related research of cyber physical system, gives a depth research about the key technologies of cyber physical system which including access control strategy and privacy data protection.

    • Software Development Model Based on Crowdsourcing

      2014, 23(6):7-10.

      Abstract (1758) HTML (0) PDF 685.75 K (3117) Comment (0) Favorites

      Abstract:With the rapid development of Internet technology, Crowdsourcing becomes a flexible and effective solution. Although it has been widely used in many fields, the application in the field of software development still exists many problems, such as lack of unified standard and development methods, no mature application platform, etc. Aiming at these problems, this paper puts forward a software development platform and a software development method, which can provide a train of thought and reference for the use of crowdsourcing software development to a certain extent.

    • Computer Network “Service + Protocol” Teaching Exploration

      2014, 23(6):11-16.

      Abstract (1813) HTML (0) PDF 782.38 K (2632) Comment (0) Favorites

      Abstract:According to the teaching of computer network protocol, this paper presented a set of practice to theory, practice and theory of comparative teaching methods. In this teaching means, the experiment of practice to theory uses VMware workstation software to build the experimental environment, configures virtual computer, and configures the network services on virtual computer. This means uses Wireshark capture software to crawl the web service protocol packets.Through the analysis of protocol packet, understands the working principle and process of network protocols, and has a further understanding of the principle and configuration of network services. For example in DNS, the work designs "services + protocol" experiment, simulates of recursive queries to DNS domain name resolution. Through the Wireshark grabs DNS data packet, analyses of the organizational structure of the packet and the working process of DNS protocol to enhance the students understanding of the DNS network protocol. Experiments show that this method is suitable for the current experimental status of universities, and suitable for students cognitive law. It promotes the student positive, active, happy learning.

    • Malware Detection in the Strategy to Solve the Problem of Unbalanced Samples

      2014, 23(6):17-21.

      Abstract (1591) HTML (0) PDF 684.74 K (2568) Comment (0) Favorites

      Abstract:Great changes have occurred in people's daily life and routine work due to the widely used internet technology. However, we have to face threaten from the malware. Due to this, detecting malware has received more and more attentions in recent years. Malware samples are hard to obtain. Meanwhile, it needs to cost a lot of resources. So there are less malware samples and malware detection is an imbalance problem. Imbalance problem means that the distributions of various types of training samples are imbalanced. To solve this problem, a suitable over-sampling method is employed via a reasonable increase in samples of a few samples to address imbalances.

    • Carbon Market Simulation System Based on Java

      2014, 23(6):22-27.

      Abstract (1507) HTML (0) PDF 719.63 K (2623) Comment (0) Favorites

      Abstract:A dramatic increase in carbon dioxide emissions leads to a series of environmental problems. As a kind of lower cost economic means to achieve carbon reduction target, carbon emissions trading system is of great significance to the road of China's emissions. In this study, we establish an agent-based carbon market model of steel industry through NetLogo software. This model considers the enterprises' real abatement technologies and decision-makings. We use java language to complete the interface and achieve data transmission with NetLogo. The java program can output simulation results dynamically by using a variety of techniques. In conclusion, we build a multi-functional carbon market simulation system based on java technology.

    • Implementation of Simulation using OMNeT in Power Dispatch Data Network

      2014, 23(6):28-34.

      Abstract (1480) HTML (0) PDF 1.08 M (3016) Comment (0) Favorites

      Abstract:Combining with the characteristics of regional network of power dispatch data network, and according to the technology principle of the virtual private network BGP/MPLS VPN, the ways of implementing Border Gateway Protocol(BGP)and Multiprotocol Label Switching(MPLS)in OMNeT++ were analyzed respectively. A new solution to implement BGP/MPLS VPN for the simulation environment of OMNeT++ was presented which is consistent with the RFC standard for regional power dispatch data network. At last, it gives the measurement of BGP/MPLS VPN simulation in the actual scenario, which proved the feasibility of this solution.

    • Mining Round Link Chain of Quenching Temperature Control

      2014, 23(6):35-41.

      Abstract (1716) HTML (0) PDF 995.28 K (2224) Comment (0) Favorites

      Abstract:Heat treatment of mining round link chainis is the key to the product quality and production efficiency. But because the control method and stability and other reasons, the medium frequency induction heating system used at presentdomestic chain in mining circular heat treatment often do not meet process requirements. The design determines the high quality chain before quenchingthe most reasonable temperature in deep analysis on the quenching process. The non-contact infrared sensor quenching temperature on the chain for real-time detection, integral separation PID algorithm, using PLC as the control core, control of the intermediate frequency power supply control module uses the D/A module, A/D module to collect feedback of the system, and through the touch screen to set the parameters of the system. The final realization of high precisionto is the closed-loop control of quenching process. In view of the complex environment of the industrial site stability analysis of the temperature control system, from the actual results of the system was put into use in intermediate frequency induction heating equipment temperature control accuracy is high and the operation is simple and convenient, friendly man-machine interface, the long-term stable and reliable operation.

    • Using Full Configuration with Daemon through Upper Computer in Dispatch Center

      2014, 23(6):42-47.

      Abstract (1306) HTML (0) PDF 917.88 K (2051) Comment (0) Favorites

      Abstract:Production process control and SCADA systems which based on computer usually handle some complex control process, such as concurrent execution control process, multi-path and multi-condition control process. Based on the current computer and communication technology development level, this paper realizes mixed flow sequential control by provides a method by using full configuration with daemon through upper computer in dispatch center. So that sequential control in lower computer can effectively reduce the shutdown time and operation accidents to achieve much higher reliability, and considerable economic and social benefits.

    • Construction of Geocoding Database Based on Approximate String Matching

      2014, 23(6):48-53.

      Abstract (1672) HTML (0) PDF 711.33 K (2730) Comment (0) Favorites

      Abstract:The geocoding database is important to informatization construction of city. This paper discusses the address standardization, address matching technology and design of address database based on the actual situation of address in Shaoxing. This paper mainly introduces the multiple approximate string matching algorithm in application of the address matching phase. About address standardization, this paper discusses the expression form of standardized address content, including administrative area, main address and subaddress, the hierarchical address data model and input model, the mode of geocoding based on administrative area code, the process and sample of address standardization. Finally, this paper shows the pseudo code of approximate string matching algorithm in the address matching phase.

    • Multiple-tables Query Optimization Technology for Database

      2014, 23(6):54-59.

      Abstract (1557) HTML (0) PDF 757.61 K (2488) Comment (0) Favorites

      Abstract:This paper uses object-oriented programming language C++ as a development language. The work uses ADO database access technologies and socket network communication technology in warehouse management information system design. It uses Shufled Frog Leaping Algorithm on multiple-table query Optimization for relational database. It makes their communications and response time are significantly reduced. The system uses c/s framework with logon rights management, database access, database operations, database query management and function modules such as printing a report. At last, experiment proves system designed makes Query time improved significantly and it accurately complete all kinds of queries management tasks. The system improues the storage management efficiency and makes cost saued, it has a strong practical relevance.

    • Integrated Communication System Based on Personnel Wireless Positioning in Pension Agency

      2014, 23(6):60-64.

      Abstract (1399) HTML (0) PDF 1.47 M (2098) Comment (0) Favorites

      Abstract:With the problems of personnel wireless positioning in pension agency, the paper develops an integrated communication system based on personnel wireless positioning in pension agency, and introduces the design scheme of the system in detail, including the overall scheme, personnel positioning module and communication module. The paper makes an introduction about the principle of personnel positioning and the time threshold algorithm for better effect of positioning, describes the core functions, the hardware and software structure, the extended function of the system. The system implementation and operation effect is also given at last.

    • Real-time Warning System in Intelligent Monitoring

      2014, 23(6):65-68.

      Abstract (1851) HTML (0) PDF 792.44 K (3011) Comment (0) Favorites

      Abstract:Presently, domestic video monitoring systems are applied for video record. It relies on artificial check and analysis and is of low efficiency. In this paper, with the analysis of intelligent equipment, we design a real-time warning system in the intelligent video surveillance. The system adopts the H.264 coding, realizing the separation of transmission and coding, improving the efficiency of coding. With the RTP, RTSP and RTCP protocol, we achieve the transmission and control of video stream. The system in the true sense brings about real-time monitoring of 24 hours a day.

    • Implementation of Uyghur Broadcast News Sensitive-word Spotting System on MATLAB

      2014, 23(6):69-73.

      Abstract (1525) HTML (0) PDF 666.90 K (2348) Comment (0) Favorites

      Abstract:This paper introduces the implementation of sensitive-word spotting system uses MATLAB. This system implements Uyghur broadcast news continues speech Sensitive-word spotting and give the conclusion of the test. After all, this paper gives some advices for this system.

    • Indoor Positioning System Based on BitCloud

      2014, 23(6):74-78.

      Abstract (1650) HTML (0) PDF 1.01 M (2296) Comment (0) Favorites

      Abstract:Base on the application characteristics of BitCloud protocol stack, ATmega128RF microcontroller RF characteristics, ZigBee network structure, filtering algorithms, and position estimation methods, described in detail the main content of indoor positioning systems and the implementation of key technologies. In the position estimation methods proposed smoothing filter, combined with maximum likelihood estimation method to an effective way to estimate the position. Experimental results show that the algorithm is more stable than ordinary RSSI algorithms, and high positioning accuracy.

    • Construction and Identification Algorithm of Signature in Wireless Sensor Networks

      2014, 23(6):79-85.

      Abstract (1283) HTML (0) PDF 786.43 K (1878) Comment (0) Favorites

      Abstract:Interference between the devices becomes the bottleneck of network throughput in wireless sensor network, but wireless interference does not necessarily result in the loss of all the information of the desired signal. Currently, many researchers exploit the interference information to assist with the parallel communication, and the identification of signature is a key point to these works. We apply a distribute construction and identification signature algorithm based on multi-hash policy with the characteristics of signal, which helps to improve the efficiency of wireless communication and increase the ability of signature identification and significantly decrease the time cost of the algorithm. We build a testbed based on USRP + GNU Radio to evaluate the algorithm, and the results show the construction and identification algorithm of signature is valid.

    • Objects Recognition Algorithm for Humanoid Robot Soccer on Playing Filed

      2014, 23(6):86-92.

      Abstract (1830) HTML (0) PDF 766.10 K (2492) Comment (0) Favorites

      Abstract:During the race, the football, goal and two sides of the robot need to be recognized by the vision system of humanoid robot soccer. Considering the rapidity and effectiveness of the algorithm, the ball and the goal are identified by the algorithm based on color information. The possible positions of the ball and the goal are extracted by the color thresholds of the ball and the goal in the picture, then the correct position is determined by the background color or area information. To recognize the two sides of the robot, first the features of the robot should be extracted and then through online real-time supervision learning method a cascade classifier is trained, which is used to identify robots. Result shows that the field objects can be recognized quickly and effectively and the algorithm has better robustness.

    • Method of the Segmentation of Touching Image Based on Watershed Transform

      2014, 23(6):93-97.

      Abstract (1907) HTML (0) PDF 855.03 K (3561) Comment (0) Favorites

      Abstract:In order to realize the touching image segmentation, we used the watershed transform. The first step is the image pre-processing. The main purpose of this step is to transform the original image into a black-white image. The second step is to get the foreground marker using Euclidean distance transform and morphological reconstruction. The third step is to modify the distance transform image using impose minima technology. The last step is the watershed transform. In order to test the new watershed algorithm, we did some experiments using Matlab, and the results show that the watershed algorithm does well and can prevent the over-segmentation.

    • Feedback-Control Based on Short Term Fairness Scheduling Algorithm for Digital Libary

      2014, 23(6):98-104.

      Abstract (1614) HTML (0) PDF 790.82 K (2261) Comment (0) Favorites

      Abstract:In this paper, we have proposed a new packet scheduling algorithm for short term fairness in this article. A feed-back control mechanism is proposed to improve the network packet scheduling algorithm. The weights of each client in the scheduler can be adjusted and controlled online according to the actual amount of service with the feedback mechanism. As a result, the robustness and the adaptability of network scheduling system have been enhanced. The capability of short term fairness has been improved, and each client can obtain a better fair QoS (quality of service) in network systems.

    • Medical Images Fusion Algorithm Based on BEMD

      2014, 23(6):105-110.

      Abstract (1718) HTML (0) PDF 1.09 M (2073) Comment (0) Favorites

      Abstract:Multi-scale and multi-resolution based image fusion is an important fusion method for medical images. The bidimensional empirical mode decomposition (BEMD) method is a new image multi-resolution decomposition approach. A medical image fusion algorithm based on BEMD is presented. Firstly, the two images to be fusined are decomposed into multiple BIMFs components and a residual component by BEMD decomposition. Then, according to the BIMFs and residual components, use different fusion rules for image fusion. Finally, inverse transform each fusioned component of BEMD, the final fusion result is attained. The experimental results show that better fusion result can be attained by using the method, the fusioned image is clearer and more information is contained.

    • Method for Extracting the Center Position of Blue Linear Structured Light in the Complex Background

      2014, 23(6):111-117.

      Abstract (1536) HTML (0) PDF 772.15 K (2670) Comment (0) Favorites

      Abstract:Aiming at extracting the center position of light stripe accurately and efficiently in blue linear structured light measurement system in the complex background, a method which extracts sub-pixel center position of light stripe was proposed. According to the proportion of blue component in RGB and the property of the light stripes' intensity gradient. The method uses adaptive threshold method to obtain the light stripe's gray edge, it applies filter to decrease the error caused by non-normal distribution of strip intensity, and extracts the sub-pixel center position of light stripe by region barycenter, then rejects the error center position of light strip by connected region method. The experiment results proved that the algorithm has higher precision and stability, good noise immunity, robustness.

    • Improved Algorithm for Extracting Periodic Signals

      2014, 23(6):118-123.

      Abstract (1021) HTML (0) PDF 1.65 M (1819) Comment (0) Favorites

      Abstract:The research of extracting periodic signals is of great value in the field such as medicine. A precise estimation for period of target signals with priori knowledge is necessary in such kind of algorithms. But most of algorithms are sensitive to the error from the estimation. The algorithm proposed in the article including steps as follows: first roughly evaluate the extracting matrix with the improved time domain correlation function by evaluating the existing interval of optimizing time delay, use negentropy as the target function with the correlation function given into consideration to ensure the order and optimize it with Newton iterative method. The simulation and the experiment with real ECG data prove that the proposed algorithm can get a better result in the extraction than other algorithms, and show its robustness to the error of time delay.

    • Frequent Itemsets Mining Optimization Methods Based on Aproiri Algorithm

      2014, 23(6):124-129.

      Abstract (1257) HTML (0) PDF 724.94 K (2002) Comment (0) Favorites

      Abstract:To reduce the number of database scanning and reduce the burden of memory further, also to improve the efficiency of mining frequent itemsets better, an Apriori-based optimization algorithm (M-Apriori) is proposed. The method stores frequent itemsets state by constructing the frequent state matrix and store the relationship between the transaction and itemsets by constructing the Boolean matrix. The algorithm scans the database only once and generates the initial frequent state matrix and the Boolean matrix during the initialization phase. On this basis, all frequent itemsets can be found directly without scanning the database repeatedly. Experiments show that M-Apriori algorithm has better performance and efficiency compared with the Apriori algorithm.

    • Improved Background Subtracted Method Based ViBe

      2014, 23(6):130-134.

      Abstract (1188) HTML (0) PDF 712.15 K (2799) Comment (0) Favorites

      Abstract:ViBe background subtracted algorithm deals with pixels based on RGB color space. So when the light suddenly changed, a large of background area will be misclassified as moving foreground. In addition, ViBe algorithm considered a lot of the moving background pixels to be foreground in the scene. To solve these problem, this paper proposed algorithm which combined with (r,g,I) normalized color space. The experimental results show that the improved algorithm can reaches the more robust extraction for foreground at the abrupt changes of light. At the same time, the improved algorithm has a better effect on detecting the moving background pixels in the scene.

    • Fuzzy Neural Network Based on Improved Particle Swarm Algorithms

      2014, 23(6):135-140.

      Abstract (1128) HTML (0) PDF 858.81 K (1947) Comment (0) Favorites

      Abstract:The failure detection of the oil and gas pipeline corrosion involve many characteristics, such as randomness, complex, multiple factors, and non-linear so on, it is difficult to describe by using the precise mathematical model. This paper proposes a failure detection method on pipeline corrosion, which is the Fuzzy neural network, based on Hybrid the improved particle swarm algorithm. It optimizes the convergence of Particle swarm algorithm and accelerates the speed of finding the optimal solution, which is used in the building of the Fuzzy neural network, and in this way, it sets up a pipeline corrosion failure detection model. It obtains a good recognition effect, by using the actual pipeline corrosion failure detection data to diagnostic applications, and the result verify the feasibility and validity of the model and algorithm.

    • Shipping Route Simulation and Estimation Based on Discrete Track Dot Series

      2014, 23(6):141-147.

      Abstract (1544) HTML (0) PDF 1.85 M (2518) Comment (0) Favorites

      Abstract:Recently, the navigation technology achieves fast development and is playing an increasingly important role in areas of trading, military, and scientific research. About the route planning, simulation, monitoring and tracking of ship, more detailed and more comprehensive researches are being done. This paper focuses on the shipping route estimation based on discrete track dots, which is used for shipping route display in the situation map. To estimate a possible and smooth route going through all track dots, we propose a coarse-to-fine method, mainly including three levels. This method uses the experience nautical chart and the global sea and land distribution map, which are easy to get and help to achieve fast route simulation. Extensive experimental results show that the proposed coarse-to-fine shipping route estimation algorithm can fulfill the route simulation task. Meanwhile, the proposed method also can be used for shipping route planning before sailing. However, there are some problems about the proposed algorithm, such as without considering the water-depth condition which may influence the shipping route, but the research will continue.

    • Energy Efficient Time Synchronization Algorithm for WSN

      2014, 23(6):148-152.

      Abstract (1147) HTML (0) PDF 1.16 M (1981) Comment (0) Favorites

      Abstract:This paper studies the wireless sensor network time synchronization technology for sensor networks with limited energy, we proposed an energy efficient time synchronization algorithm EETS (Energy Efficient Time Synchronization). It uses a hierarchical clustering strategy, divides the network into two different subnets, respectively TPSN algorithm and idea of the DMTS algorithm for time synchronization, thereby reducing the complexity of the algorithm, reducing traffic. Simulation results show that, compared with the TPSN algorithm, this algorithm reduced the energy consumption of the network, effectively extended the network life cycle.

    • Test Method of Idle State in Asynchronous BCI Based on Approximate Entropy and CSP

      2014, 23(6):153-157.

      Abstract (1188) HTML (0) PDF 762.76 K (2364) Comment (0) Favorites

      Abstract:To cope with the issue of the idle state detection which is difficult in motor imagery based brain-computer interface, the paper proposes a method that approximate entropy and common spatial pattern(CSP) are combined. On the condition of two-class classification, different kings of features are extracted through approximate entropy in time complexity and CSP in spatial pattern. Then these features are used to make different classifiers which are combined by vote-based classification method to improve the accuracy of judging idle state. By way of this method, the final experimental results of BCI competition shows the true positive rate(TPR) of intentional motor imagery is higher than the threshold method. The result of data processing indicates the effectiveness of the proposed method.

    • Improved Artificial Colony Algorithm in the Application of Two-Dimensional Otsu Image Segmentation

      2014, 23(6):158-163.

      Abstract (1078) HTML (0) PDF 991.84 K (2484) Comment (0) Favorites

      Abstract:In order to segment images exactly and quickly, based on the traditional adjustment of colony algorithm selection strategy and defect honey, a new method based on a improved Artificial Bee Colony algorithm segmenting two dimensional Otsu images is proposed. This method looked on the image threshold value as artificial colony algorithm of the bees. The best threshold is approached in parallel via the division of labor, cooperation and information sharing of employed bees, onlookers and scouts. Effectively solved the problem of the traditional two dimensional Otsu image segmentation calculation defects, long operation time. Experimental results show that the proposed algorithm not only can get the ideal segmentation results, but only improved the segmentation speed.

    • Extraction Method of Line Stripes Center in the Case 3D Vision Measuring System of Structured Light

      2014, 23(6):164-169.

      Abstract (1548) HTML (0) PDF 899.45 K (2455) Comment (0) Favorites

      Abstract:In order to improve the accuracy of case three-dimensional measuring system based on structured light, the extraction method of light stripes center based on Hough transform and least square was proposed. Firstly, the target structured light was segmented by the median filter and threshold segmenting method which uses the difference of R, G and B in color model. Secondly, multiple iterative thinning was used to deal with the green light area and red light area respectively to obtain their skeleton. Thirdly, the points were classified according to the lines which are obtained by Hough transform. Finally, least square was used to fit the points sectionalized and obtain the center line. A series of experiments have been performed to test the proposed method. It is proven that the proposed automatic extraction method is effective and advanced.

    • Improved Particle Swarm Optimization Algorithm Based on Game Model

      2014, 23(6):170-174.

      Abstract (1150) HTML (0) PDF 681.89 K (2325) Comment (0) Favorites

      Abstract:Particle Swarm algorithm as a new evolutionary optimization method can greatly reduce the computational burden of complex, large-scale optimization problems. This article is based on game theory. On the basis of the particle swarm it proposeda non-cooperative game model based on particle swarm optimization algorithm, it wses a game sequence repeated game model. And in repeated games, each game all hope to produce maximum benefits. Nash equilibrium of the corresponding game process. Function through multiple benchmarks, comparing with the performance of the algorithm experimental results show that the algorithm is feasible and effective. The study has important theoretical significance and practical significance onexpand swarm intelligence algorithm.

    • Parallel Lines Adaptive Fitting in Image Measurement

      2014, 23(6):175-178.

      Abstract (1011) HTML (0) PDF 922.17 K (2456) Comment (0) Favorites

      Abstract:For the parallel edge points fitting in image measurement, this paper combines with the least square method to classify parallel edge points fitting through clustering analysis algorithm to eliminate the noise in the edge points image. The traditional algorithm based on image characteristics dividing area artificially to fitting respectively is solved. The result achieves the purpose of automatic image processing by machine.

    • Dynamic Reliability for Software System Based on Monitoring

      2014, 23(6):179-182.

      Abstract (1509) HTML (0) PDF 700.27 K (1691) Comment (0) Favorites

      Abstract:In open environment, the system behaviors are diversified and complicated, but traditional static models are mostly implemented before the deployment. They are based on certain invariance assumptions of the operating environment and user needs. We study on the monitoring of software system to find the differences of software reliability between testing phase and running phase, combining static module-based software reliability model to evaluate the system reliability during the running phase. Gives the risk factors that decrease module reliability and proposes an effective method to reallocate the resources. Through the experimental data, verifying the effectiveness of the proposed method.

    • Multi-class BP Neural Network Classifier Based on the Conditional Log-Likelihood

      2014, 23(6):183-186.

      Abstract (1294) HTML (0) PDF 791.25 K (2155) Comment (0) Favorites

      Abstract:BP neural network classifier has a slowly convergence rate, in order to improve the performance of the classifier, there is an improvement in BP algorithm for the problem. The Conditional Log-Likelihood (CLL) is applied into the supervisory neural network classification for the multi-class selection. By using the decomposability of CLL, calculate the conditional probability of the test samples. In the error back-propagation process, increasing or reducing the corresponding weights by using the conditional probabilities, which can simplify the computation in the process of error feedback. In the paper, we test the convergence speed and accuracy for the improved algorithm in the experiment. It illustrates the effectiveness and the practicality of the algorithm.

    • Fast Detection Algorithm for Structured Lane with the Morphology

      2014, 23(6):187-190.

      Abstract (1143) HTML (0) PDF 793.92 K (2610) Comment (0) Favorites

      Abstract:In order to solve the problem in the structured lane recognition algorithm which includes many constraints and complicated calculation, this paper presents a fast lane detection algorithm based on morphology. Firstly, this work gets pre-process in road image by handled Median filter. Sobel operator is to enhance edge. A characteristic histogram threshold method is adopted to segment images. And region of interest is disposed with the detection results. Secondly, by constructing morphological structure elements with the feature of lane start to extract the lane line. Finally, Hough transform have been fitting with the best line of lane. The contrast experiment shows that algorithm provides a high real-time, less calculation and simple and effective approach to structured lane.

    • Application of Improved Single Neuron Adaptive Control System Based on MCGS

      2014, 23(6):191-195.

      Abstract (1195) HTML (0) PDF 1.08 M (2265) Comment (0) Favorites

      Abstract:To some time-varying, large time delay, nonlinear complex systems in Modern industrial control system, it is difficult for the conventional PID algorithm to set the PID parameters. So that it is more difficult to achieve the desired results. The article realizes the conventional PID algorithm and single neuron adaptive PID algorithm in the linear and nonlinear system control respectively based on the experiment platform of the MCGS. The experimental results show that the single neuron adaptive PID control algorithm in linear system and nonlinear system has better stability and dynamic performance.

    • PIM-SM Based Multicast Security

      2014, 23(6):196-200.

      Abstract (1573) HTML (0) PDF 685.62 K (2595) Comment (0) Favorites

      Abstract:With the rapid development of the network technology, more bandwidth is required. Multicast transmission offers efficient network resource consumption. Multicast security is a hot issue. Multicast security problem hinders the development of multicast technology. This paper discusses the principles of multicast protocol PIM-SM and makes a detailed description of a method to prevent vicious multicast source attacking. The method can improve the reliability of multicast system.

    • Voltage Oriented Control Method and Simulation Research of Static Var Generator

      2014, 23(6):201-205.

      Abstract (1175) HTML (0) PDF 728.87 K (2841) Comment (0) Favorites

      Abstract:In view of the current control method on static reactive power generator SVG reactive compensation defects, put forward a kind of advanced methods of voltage oriented control (VOC). This paper firstly analyzes the principle of work of static var generator SVG voltage type main electric circuit, and then introduces the structure of the control system, and this essay discusses the voltage directional control topology and the process of reactive current and active current decoupling, at last a system simulation is carried out in the MATLAB/Simulink environment. Through the experiment waveform, it is known that the voltage oriented control method was applied to SVG, the system can get good dynamic and static characteristics, the effect of reactive power compensation is very good.

    • Wireless Controller for A Multi-function Nursing Bed Based on Wifi

      2014, 23(6):206-210.

      Abstract (1216) HTML (0) PDF 638.27 K (2053) Comment (0) Favorites

      Abstract:In order to reduce the labor intensity of medical staff and patients's families, and improve the self-care ability of patients. In this paper, a wireless monitoring system for a multi-function nursing bed is developed based on wifi technology. The system is mainly composed of a microcontroller STM32F103VET6, wifi wireless communication module MarveII88W8686 and a handheld terminals which based on android system and support wifi communitions. It has the function of monitoring, controlling and alarm. The system makes use of wifi wireless communitions technology and symmetric eneryption technology to complete the interaction and real-time display.The experimental results show that the system has a high reliability characteristic and low-cost hardware. It can accurate display monitor state, and is suitable for extending and enlarging in health care industry.

    • Extraction and Application of CATIA Model B-Rep Information Oriented to Three-Dimensional Machining Process Planning System

      2014, 23(6):211-214.

      Abstract (1374) HTML (0) PDF 677.79 K (2728) Comment (0) Favorites

      Abstract:Three-Dimensional machining process planning is the important part of the manufacturing industry informationization, of which manufacturing feature recognition is the core technology which is the prerequisites of machining process planning. Its data mainly comes from the basal B-Rep(Boundary Representation) information of three-dimensional model. This paper focuses on the pivotal technic and difficulty of B-Rep information's extraction in CATIA which is commonly used in auto trade, describing how to apply CAA secondary development technology in depth, extract B-Rep information and use it to feature recognition technic of three-dimensional machining process planning system, providing a basis for machining process planning.

    • Monitoring and Control for Android Application in Misusing Users’ Private Information

      2014, 23(6):215-219.

      Abstract (1158) HTML (0) PDF 2.11 M (2322) Comment (0) Favorites

      Abstract:Smartphone applications are frequently incompletely vetted, poorly isolated and installed by users without restraint. Such behavior causes users' private sensitive information leakage. By means of employing dynamic taint analysis technology, our work detects when sensitive data leaves the system via untrusted applications. Meanwhile, according to the need, it uses harmless data to cover the sensitive information, or cuts off the exfiltration communication. Then it can prevent an application to access the data which user wants to keep confidential, achieve real-time monitoring and control for Android applications in misusing the user private information from system level.

    • Application of Component Technology in Embedded System

      2014, 23(6):220-223.

      Abstract (1116) HTML (0) PDF 706.90 K (2215) Comment (0) Favorites

      Abstract:The essential reason application component model cannot be applied in embedded system is proposed. This paper analysis the hierarchical classification, embedded component model. It also analysis the non functional properties of embedded systems, and summes up the support of common embedded component model for these non functional attributes. And then we introduce the design of the component library, component model and the direction of future research.

    • Electrocardiograph Detection System Base on Android

      2014, 23(6):224-227.

      Abstract (1161) HTML (0) PDF 696.47 K (2473) Comment (0) Favorites

      Abstract:This paper introduces an ECG data detection system that using LPC2132 as controller for data acquisition. It uses WiFi for wireless data transmission, uses Android mobile phone as the data processing and graphic display terminal. The system has the advantages of simple structure, stable operation, strong practicability, low cost, and convenient use etc. The experimental results show that this system can detect the ECG data and draw the electrocardiogram accurately.

    • Integration between SOA and Cloud Computing

      2014, 23(6):228-231.

      Abstract (1289) HTML (0) PDF 850.99 K (2112) Comment (0) Favorites

      Abstract:Cloud computing is a new service-oriented computing paradigm. As the inheritance and development of SOA(service oriented architecture), it has become the hot point of cyber research. After introducing the characteristic of SOA and cloud computing, this paper analyses the probability of the cooperation between SOA and cloud computing and present a model of cloud computing architecture based on service oriented architecture. Finally, it shows the feasibility of the architecture through the using of digital library.

    • Application of Fuzzy Logic in Simulation Training System’s AI Design

      2014, 23(6):232-235.

      Abstract (1357) HTML (0) PDF 876.69 K (2056) Comment (0) Favorites

      Abstract:According to the demand of intelligent actors' design in simulation training system, fuzzy inference machine was added to make the actors of system more like those in real world and more flexible. The paper is based on the fuzzy logic theory in the setting of simulation training system. It designs math modeling for a application example and the fuzzy inference machine, expound how to solve problems with fuzzy logic. By the demonstration of the application the sample proves the feasibility of the design.

    • Application of the Decision Tree in the Computer Rank Examination

      2014, 23(6):236-240.

      Abstract (1274) HTML (0) PDF 609.47 K (1944) Comment (0) Favorites

      Abstract:Jiangsu Computer Rank Examination is a examination mechanism formed by Education Department, which gains the attention of universities and students. First, based on data collected from previous students' exeamination, this paper uses Information Gain and ID3 algorithm to construct a decision tree. Then, this paper extracts the classification rules from the decision tree, and discovers these rules of the accuracy and coverage. Finally, this paper predicts the ability of students to pass the exam by these rules. Experiments indicate that the decision tree has accurate prediction, which can dig out the key factors affecting students to pass the grade examination and plays a crucial role in the course teaching.

    • Research on Data Mining in Honeynet

      2014, 23(6):241-245.

      Abstract (1145) HTML (0) PDF 690.22 K (2196) Comment (0) Favorites

      Abstract:Collecting data areone of the aims of Honeynet, But how to analyze these collected data is the keypoint. Data mining is introduced to mark and sort the log module data prayed in Honeynet. And the sorted data were mined regularly with sort algorithm. By means of that, the attack method could be found, and good defense ways for varies attack manners would be deployed,Collecting data is one of the aims of Honeynet.

    • Application in Cost Estimation of Collaborate Filtering

      2014, 23(6):246-249.

      Abstract (1135) HTML (0) PDF 742.24 K (1801) Comment (0) Favorites

      Abstract:Accurate project cost prediction is an important goal for the software engineering community, but there are some defects in the method to estimate software cost. Collaborative Filtering has been developed in information retrieval researchers successfully which recommends items based on other user's reference in historical data set. Cost estimation based on Collaborative Filtering is researched. Because only numerical data can be handled in traditional collaborative filtering technology, and there are non-numeric numeric data in the attributes that describe the project characteristics, so the different strategies are used to normalize for describing the project's properties. And then the mean values are used for the missing contents. Cosine similarity is used to calculate the similarity between projects. Finnally cost is estimated using the weighted sum of the efforts in k-nearest neighbors. The method is applied in an experimental case to evaluate the effort estimation, and the result shows the accuracy of estimation may arrive to 80%.

    • Improved Application of Stepless Speed Control Technology in Seeding Machine

      2014, 23(6):250-254.

      Abstract (1470) HTML (0) PDF 653.69 K (3094) Comment (0) Favorites

      Abstract:In order to avoid wheat sowing instability caused by the land wheel skid, the study puts aside the purely mechanical seeding mode which is driven by traditional wheel. It uses a self-designed and developed double suction seed plate, a semi-open seed container, CVT governor, corresponding accessories of sowing machine and so on. The perfect combination of CVT technology and feedback control technology is applied to the wheat double precision seeder. In this technique, the force of seed shaft is from the power output of the tractor tail. It uses wireless transfer mode of SCM to establish a set of control algorithm between forward speed, wheat sowing quantity and sowing spacing. The seeding shaft speed tracks the forward speed in order to ensure the constant distance when trans-miss the progress status. Prototype tests indicate that the wheat double precision seeder developed by air suction stepless regulation can reach precisely the expected target about the fall for each particle. Meanwhile, it has steady performance, small errors and spacing constant.

    • Measurement While Drilling System Based on STM32F103

      2014, 23(6):255-258.

      Abstract (1178) HTML (0) PDF 776.94 K (2968) Comment (0) Favorites

      Abstract:After careful analysis of the MWD system works, given the specific methods of measurement-while-drilling stance. And use the STM32F103RET7 and LSM303 completed the design of the core circuit. Complete data acquisition and processing work. Finally, the host computer Labview program to achieve real-time display of data. The experiments show that the designed in this paper embedded with measurement while drilling system with high integration and high accuracy.

    • Improve Big Data Query Performance by Applying Distributed Indexing

      2014, 23(6):259-261.

      Abstract (1435) HTML (0) PDF 669.61 K (2604) Comment (0) Favorites

      Abstract:In the field of telecommunications precision marketing and ad-hoc query, there are a lot of random queries scenarios on one or more wide-tables (which have more than 50 fields). In the traditional system (the queries are performed on the database directly), the query response time can be optimized less than a few seconds to tens of seconds when the database records size is under 10 million. When the data size reaches tens of millions, hundreds of millions or even more than one billion records, whatever optimization including changing indexing mechanism are unable to meet the second-level concurrency query requirements. In the new query system, we introduce the Solr distributed index layer to solve these problems. The layer will index the database records firstly and queries will access the Solr index layer and not perform on the database directly, therefore, the performance will be improved highly. After a comparison of the two processing patterns in same environment, for the data of 50 million, 20 per concurrent access query scenario, the traditional accessing queries all are timeout;while the other's queries can be returned within 2 seconds and all are success.

    • Research and Improvement on Document Retrieval Method

      2014, 23(6):262-265.

      Abstract (1163) HTML (0) PDF 829.64 K (1977) Comment (0) Favorites

      Abstract:This paper presents a new retrieval model and method by research and analyzing the commonly used retrieval methods. And it proposes a theoretical analysis and practical verification of the method. The new mode also integrates the most commonly used document processing functions in a platform for providing more convenient, accurate and efficient information services.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063