• Volume 23,Issue 9,2014 Table of Contents
    Select All
    Display Type: |
    • >Survey
    • Survey on Software Complexity Research

      2014, 23(9):1-5.

      Abstract (1795) HTML (0) PDF 834.78 K (3283) Comment (0) Favorites

      Abstract:The software complexity is the origin of Software Crisis, and a software project must be failure when the complexity is higher than the controllable degree of the manager. In this paper, an induction and summarization of complexity research actuality is given systematically at first. Then, the paper analyzes the problems existed in the current research, also discusses and prospects the future of software complexity research.

    • Real-Time Voiceprint Recognition Based on VQ and GMM

      2014, 23(9):6-12.

      Abstract (1721) HTML (0) PDF 1.13 M (2788) Comment (0) Favorites

      Abstract:At present, the voiceprint recognition system has achieved high identification precision. But with the increase of the number of target speakers, general system has difficulty in satisfying the need of real time. Therefore, a two-layer recognition model is raised in this paper. The first layer based on VQ-VPT model quickly sorts out K target speakers' voiceprint models which are most similar to the speaker's voiceprint characteristics. In the second layer, the GMM-UBM model matches the K voiceprint models to make a final judgment. Via experimental verification, under the premise of ensuring high recognition accuracy, the two-layer recognition model has greatly improved the recognition speed of the system.

    • Current Status and Challenges of Highway Bigdata Processing

      2014, 23(9):13-17.

      Abstract (1507) HTML (0) PDF 977.23 K (3517) Comment (0) Favorites

      Abstract:Massive Heterogeneous Data, aka, the Big Data is being generated along with Highway daily operation, and the volume increase in fast speed. As a consequence of these massive data, data storage and analyze encoutered big challenges. How to store data in high efficency, approach of easy access and feasibility of data analyzing is an urgent issue to be addressed. This article will investigate the source of big data generated by Highway daily operation and its characteristics. Then this paper discusses the significances of big data research and data processing technologies in industry, also the challenges will be mentioned in detail.

    • AFDX HW/SW Co-Design Based on FPGA

      2014, 23(9):18-25.

      Abstract (1594) HTML (0) PDF 3.37 M (2179) Comment (0) Favorites

      Abstract:With our national strategy implementation involving large civil aircraft, AFDX endpoint card based on FPGA is proposed, which is specific to AFDX backbone network of large aircraft avionics system. Based on the thought of HW/SW co-design, the programme designs a new type of AFDX endpoint card with PCIE or SOPC interface. AFDX endpoint card based on FPGA can be directly applied in such platforms as large military transport aircraft, helicopters, fighter jets, airport ground maintenance system and so on and can enhance safety and reliability of military computer. What's more, development process will be accelerated and the cost will be lowed by offering related standards and specifications for electronic equipments of different kinds of weapon platforms.

    • Research and Design of Meteorological Stream Media Service of Mobile Terminal

      2014, 23(9):26-31.

      Abstract (1430) HTML (0) PDF 1.07 M (2573) Comment (0) Favorites

      Abstract:The mobile 3G/4G networks application promotes the development of multimedia technology and some products on mobile terminals. Professional real-time meteorological stream media service is ushering in new opportunities and challenges. Therefore, this work designed a solution of mobile terminal meteorological stream media service. The solution expanded FFMPEG to support encoding and file formats, improved Web services of meteorological streaming media, and provided efficiently diverse meteorological forecasts. In addition, this work also expands a new idea for mobile terminal meteorological applications.

    • Public Service Platform of Digital Library Based on Cloud Computing

      2014, 23(9):32-36.

      Abstract (1423) HTML (0) PDF 1.21 M (2759) Comment (0) Favorites

      Abstract:Digital library has become an effective platform of national reading, people can read on line, download or shared digital resources and so on. With the explosive growth of digital information resources, how to effectively solve the massive digital library information storage and process resources, meanwhile make resources of digital libraries that lie in different regions and have different types integrated has become a hot research. This paper based on universal reading platform of Anhui Education Press digital library of public services, research the architecture platform of digital library based on cloud computing, in use of distributed storage and parallel computing characteristics of cloud computing, which providing a feasibility study for the construction of digital library of the Press.

    • Patent Cloud System Based on Cloud-Computing Technology

      2014, 23(9):37-41.

      Abstract (1931) HTML (0) PDF 1.01 M (2741) Comment (0) Favorites

      Abstract:This article first introduces patent-cloud and put forward the implementation background, in the full investigation and reference of domestic and foreign e-commerce platform design and operation mode, combined with the implementation of the patent cloud platform, carries on the design to the overall architecture of cloud platform, Then, introducing the idea of construction of basic platform and the idea of construction of patent cloud based software, at last, design the application software system suitable for patent cloud platform. Including three application patent public service cloud, hosting services cloud, patent patent business cloud.

    • LDAP and RBAC Based Document Management System

      2014, 23(9):42-46.

      Abstract (1397) HTML (0) PDF 957.73 K (2586) Comment (0) Favorites

      Abstract:With the advancement of the EAST project, more and more documents are produced. In order to effectively manage huge amounts of documents, share documents, and promote the collaboration with other organizations, we need to design an integrated document management system, which has a powerful document management function, a strong user management function and a blameless permission control function. Using PHP and MySQL to design control and data structure, the function of document create, edit, delete, search, upload and download is accomplished. The Lightweight Directory Access Protocol technology is used to manage users and achieve access control. By using the Role Based Access Control method, the advanced user permission distribution is achieved. Combining with user and role information, document version control and workflow management are also implemented. Finally this system meets the demand of EAST document management.

    • Household Remote Video Monitoring Platform Based on ARM

      2014, 23(9):47-51.

      Abstract (1739) HTML (0) PDF 1.34 M (2749) Comment (0) Favorites

      Abstract:A household remote video monitoring platform is designed and basis of embedded and WIFI wireless network. This system chooses S3C6410 microprocessor which based on ARM11 cores as the kernel controler regards USB camera as capture terminal, captures video with application function which provided by Video4Linux2, encodes and decodes the video by T264 software, and transfers the video data and control instruction rely on RTP/RTCP protocol and TCP protocol through WIFI wireless network. The experimental results show that this platform makes video image smooth, and it can well meet the demand of household wireless video monitoring application. At the same time, this platform has simple structure, low cost, and easy to promote.

    • RMB Banknotes Infrared, Ultraviolet Characteristics Detection Method

      2014, 23(9):52-56.

      Abstract (1833) HTML (0) PDF 1019.06 K (7009) Comment (0) Favorites

      Abstract:According to the requirements for image analysis and identification ability from state in 2010 published "identifying instrument general technical conditions", the paper currency image authentication function is added in the traditional counting money machine. At present, domestic mainstream counting machine, banknote at a speed of 20 frames per second or so, in order to match the speed and ensure the accuracy, a high speed image acquisition method based on contact image sensor and DSP and programmable logic device CPLD is proposed. A large number of experiments show that at the same time to complete collection three high quality images of the visible light, infrared image and ultraviolet image just need 40.5ms, to meet the requirements for current market currency count machine sheet of paper 50 millisecond speed.

    • Energy Management System for Cement Enterprise

      2014, 23(9):57-60.

      Abstract (1864) HTML (0) PDF 859.94 K (2714) Comment (0) Favorites

      Abstract:The demand characteristics and design principles of cement enterprises in the progress of energy management system construction were systematically analyzed in this paper. The design scheme of energy management system based on OPC technology and.NET multi-layer architecture was proposed besides. The principle of system design, the compositions of the hardware and software, and the function features were introduced. The system could share data resource with DCS, and waste heat generation system, and thus could provide global energy balance analysis. Accordingly, the system is useful for reasonable energy utilization and energy saving.

    • Smart Album Based on OpenCV

      2014, 23(9):61-64.

      Abstract (1744) HTML (0) PDF 1.08 M (3730) Comment (0) Favorites

      Abstract:An album management system which can intelligently classify a large number of digital photos is present and designed to meet the need of the effective management of the growing number of digital photos. The key technologies include extracting the extra information of digital photos, face detection, face annotation, face recognition and feature matching, which are mainly implemented by OpenCV vision library. Experiments show that the system can effectively automatically implement the classification of time and people number, and semi-automatically implement the classification of people and scene by interactive method, which has a high application value.

    • Scheduling Algorithm with Communication Overhead Reduction

      2014, 23(9):65-71.

      Abstract (1399) HTML (0) PDF 1.66 M (2750) Comment (0) Favorites

      Abstract:Embedded applications in multi-core processors have been widely used in recent years, but the inevitable inter-core communication overhead has blocked system performance continuous improving. So it's important to research on how to reduce inter-core communication overhead. This paper focused on cycle-dependent tasks on homogeneous multicore platforms and proposed an algorithm to reduce schedule length. The algorithm scheduled a few tasks in advance by one cycle so as to the intra-periodic dependency can be converted to inter-periodic dependency. We simulated our algorithm and tested on 2-core and 4-core platforms, and the result showed this method reduced communication overhead and improved system performance relative to the initial algorithm.

    • Automatic Generation of Java Code Based on SSH Framework

      2014, 23(9):72-77.

      Abstract (1449) HTML (0) PDF 2.28 M (2609) Comment (0) Favorites

      Abstract:It will improve production rate and release developer's burden by using software reusing technology. Automatic code generation is one of most commonly used methods. Based on SSH framework, this paper studied its control layer. After studying the javabean data which generated by hibernate, this paper auto-generated the control layer codes by using Model generated technology and config tree method. Producing a Demo System and testing it. the Demo System provide a friendly interface based on SWT framework.

    • Iris Sodium Loop Detection Algorithm

      2014, 23(9):78-82.

      Abstract (1670) HTML (0) PDF 1.12 M (2720) Comment (0) Favorites

      Abstract:Sodium loop is one of the most important characteristics in computer-aided diagnosis of iris. It is related to the discretion of the cholesterol content in the body closely. This paper presents a algorithm of iris sodium loop detection under the space of HSI, Firstly, Segmenting the iris with sclera, eyelash and eyelid to complete feature selection, in order to reduce the shade of effects on the detection of sodium. Secondly, do the rectangular expansion process on iris image, to reduce the sodium loop detection range. Finally, under the HSI space, analyzing rectangular iris image's hue and saturation. Through the data fusion of H, S component to complete the sodium loop detection automatically, Experimental results show that the algorithm can achieve accurate detection of sodium loop.

    • Improved Learning Algorithm of Boolean Formula

      2014, 23(9):83-88.

      Abstract (1607) HTML (0) PDF 1.22 M (2636) Comment (0) Favorites

      Abstract:Currently, most of the study of Boolean formula learning is theoretically the modeling and derivation. Less people considers efficiency improvements in practical applications. Now more mature Boolean formula learning algorithms mainly use the query model, and the query model relies on external SMT tools to answer the query problems. Although Boolean formula learning algorithm can get the right result after a polynomial number of queries, reducing the number of queries can reduce the number of using SMT tools to answer the queries, namely to reduce the computing time of the queries. This paper took the smallest monotonous assignment vector of the monotone theory to reduce the number of queries in Boolean formula learning algorithm and improved the efficiency of the learning algorithm.

    • Image Fusion in Power System Based on Laplacian Pyramid Transform

      2014, 23(9):89-93.

      Abstract (1550) HTML (0) PDF 1.10 M (2321) Comment (0) Favorites

      Abstract:In this paper, an improved Laplacian pyramid algorithm is proposed. To prevent the loss of target information, the algorithm uses a weighted fusion method optimized by genetic algorithm on the top-level, and uses a local energy fusion method by adding the phase information on the other levels. The experimental results show that the algorithm can retain more image details in the information, enhance the definition of images significantly, and detect the target in the fused image more conveniently.

    • Algorithm for Misused Pairwise Keys Detection in Wireless Sensor Networks

      2014, 23(9):94-101.

      Abstract (1676) HTML (0) PDF 1.19 M (2149) Comment (0) Favorites

      Abstract:In wireless sensor networks, the pairwise keys shared by non-compromised nodes could be compromised, then the adversary would misuse the pairwise keys to forge message report in order to destroy secure communication or deplete the limited resource in sensor nodes. To address this issue, in this paper, an algorithm is proposed to detect misused pairwise keys. Specially, an efficient verifiable authenticator is attached to each message report. The forwarding node can detect whether the pairwise key is misused by verifying the authenticator. The security analysis and performance analysis demonstrate the efficiency of the proposed algorithm. Moreover, the proposed algorithm can be integrated with most of key pre-distribution schemes or false data filtering schemes to provide more reliable secure communication.

    • Train Operation Control Optimization Model Based on Genetic Algorithm

      2014, 23(9):102-106.

      Abstract (1552) HTML (0) PDF 1009.62 K (2570) Comment (0) Favorites

      Abstract:To solve the conflict of energy-saving, time-saving and comfort better, the train operation optimization control model is built under many constraints, and the condition conversion points are the goals for the model. And Optimal Operation of the Bend (OOB) is proposed as the rule for train, the operation strategy for the corners is optimized. By analyzing the model, Genetic Algorithm (GA) is used to solve this optimization model. In the end, a simulation is made to validate the model with MATLAB. From the case analysis, it proves the effectiveness of the given method to optimize the operation model, which reduces the energy consumption by 33.27% with only 11.96% extended at run time. At last, the good operation strategy is given.

    • Method of Path Planning Based on Virtual Force Field and A* Algorithm

      2014, 23(9):107-111.

      Abstract (1515) HTML (0) PDF 1018.87 K (2834) Comment (0) Favorites

      Abstract:The traditional A* algorithm requires all the node information and neglects the width of the vehicle in practical application. To solve the problem, we proposed a new algorithm which is based on A* algorithm and uses VFF method together. When using the new algorithm, problems such as that vehicle falls into local minima and swings violently when there are obstacles near the target can be avoided. The simulation results verify the effectiveness of the new algorithm. The experimental results show that the proposed algorithm widens the use range of the original algorithms and improves the ability of real-time navigation for unmanned vehicles.

    • Multi-View Stereo Video Based on Fusion and Eye-Tracking

      2014, 23(9):112-117.

      Abstract (1161) HTML (0) PDF 1.25 M (2630) Comment (0) Favorites

      Abstract:As multi-view stereo video has some new characteristics, such as massive volumes of data, high-demand in the velocity of transition, limited 3D view fields supported. These problems have not been well-solved and blocked the industrialization of multi-view stereo video technology. In view of this, this paper proposes a method of multi-view stereo video transition and display based on an image fusion algorithm and eye-tracking. First, we capture each frame from the original video, then, we use an image fusion algorithm, process each frame of the multi-view stereo video and output the frames at the original rate. At the same time, we use eye-tracking, which effectively enlarged the stereo view field. Experimental results show that the Two-dimension views image can be shown on the stereoscopic display in a 3D way. It could transmit the video smoothly and effectively while computing and eye-tracking. It could bring the viewers three-dimensional feelings when watching.

    • Color Disease Spot Edge Detection of Crop Based on Multifeature Selection and Support Vector Machine

      2014, 23(9):118-123.

      Abstract (1126) HTML (0) PDF 1.17 M (1967) Comment (0) Favorites

      Abstract:In order to correctly extract the lesion of crop disease images, proposes a method to detect color edge of crop disease based on support vector machines and multi feature selection. The method uses (2d + 1) * (2d + 1) as the size of the window through the image. It also is used on the image luminance and chrominance channels calculate variance, mean value difference, maximum gradient, characteristics of space position and mean color difference. In order to accurately identify the edge of disease spot, the characteristics of vector-valued input support vector machine is employed. To improve the efficiency of disease spot of edge detection, a method is proposed in the traversal process, if the eigenvalues are smaller than the threshold, skip d row, d column to traverse. The experimental shows that the method has better than the traditional edge detection operator disease spot edge recognition ability.

    • Improved Sequential Multi-signature Scheme

      2014, 23(9):124-128.

      Abstract (1066) HTML (0) PDF 960.34 K (2231) Comment (0) Favorites

      Abstract:In this paper, a detailed analysis of the digital multi signature scheme and the improved multi signature scheme have been carried out. It points out that the forgery attack process which had been proposed by Zhang et al. cannot be established due to its parameter setting error, and the detailed proof has been demonstrated. A new sequential multi signature scheme enhancement is proposed by improving the existed parameters and adding new ones based on the intractability of discrete logarithm problem. A better security and effectiveness of this new scheme is presented in this paper as well, such as the resistance of forgery attack and the public key substitution attack, the satisfaction of non-repudiation and non-misuse, the property of identity identification, etc.

    • Universal Steganalysis Using Statistical Manifold Dimension Reduction

      2014, 23(9):129-133.

      Abstract (1109) HTML (0) PDF 1.07 M (2370) Comment (0) Favorites

      Abstract:Statistical manifold is a manifold of parameterized probability density function. In order to improve steganalysis rate, we propose a using statistical manifold dimension reduction in this paper. The procedure of this algorithm is as follow: first, we use fisher information metric measures the difference among probability density function of image feature vector. Then, we embed characteristics to lower Eucli—dean space by dimension reduction. Finally, we use the support vector machine (SVM) as classifier. The experimental results show that this algorithm is effective to JSteg, F5, MBS1, MBS2 and nsF5 stegano-graphy algorithm.

    • Fast Traffic Image Defogging Algorithm Based on Image Segmentation

      2014, 23(9):134-138.

      Abstract (1318) HTML (0) PDF 1.08 M (2843) Comment (0) Favorites

      Abstract:Less the traffic image features were considered in the existing defogging algorithms. Defogging quality and real-time performance are poor if they are directly applied to defog. Having analyzed the traffic image features, a fast traffic image defogging algorithm was proposed based on image segmentation technique. Firstly, an improved mean shift algorithm was used to segment sky region. Then atmospheric light intensity was accurately estimated in the sky region. Finally the improved dark channel prior (DCP) algorithm based on bilateral filter was used to defog to the traffic image, and post-processing was done to these defogging image by using fogging image features to enhance the defogging quality. The experimental results demonstrate that the proposed algorithm has higher real-time performance and can obtain better defogging quality. The overall performance of the proposed algorithm is better than that of existing similar algorithm in defogging for traffic images.

    • Delay Scheduling Algorithm Based on Task Classification

      2014, 23(9):139-143.

      Abstract (1557) HTML (0) PDF 1.08 M (2405) Comment (0) Favorites

      Abstract:MapReduce has become a mainstream mass data processing mode, as its crucial part, the scheduler has received extensive concerns of the industry. There are two deficiencies in the current delay scheduling algorithms. Firstly, a limitation of these policies is that all the tasks to be processed should be short as assumed, the performance of the algorithms declined serious when servers handle the tasks of different lengths. Secondly, delay scheduling algorithms based on static waiting time threshold, cannot adapt to the different user needs. To address this issue, this paper proposed a delay scheduling algorithm based on task classification. It adjusted tasks waiting time threshold dynamically according to the information of the different lengths. It shows that this algorithm outperforms previous delay scheduling algorithms in term of the job response time and load balance of the node.

    • Method of Identifying Bridged Electrodes Based on Mutual Information Statistics

      2014, 23(9):144-148.

      Abstract (1271) HTML (0) PDF 1017.86 K (2184) Comment (0) Favorites

      Abstract:Electrode bridging is a common but easily ignored EEG artifact source. Based on the distinctive statistical characteristics of mutual information, a novel algorithm to automatically detect these bridges was developed and further applied to four EEG data sets acquired from different subjects. The applications identified four, four, three and zero pairs of bridged electrodes in these four data sets, respectively. No influencing factors were returned by One-way robustness analyses across different recording tasks and/or pre-processing procedures. And further comparison experiments performed on simulated data indicated that it outperformed the electrical distance method. All these findings suggest that the novel method is able to screen electrode bridges in a satisfying manner, making it of great significance in providing an indication to timely remedy the contaminated EEG data so as to avoid distortions to the resultant EEG topographies.

    • Watermarking Algorithm Based on Discrete Multiwavelets Transform and Quantization Index Modulus Modulation

      2014, 23(9):149-153.

      Abstract (1403) HTML (0) PDF 1.18 M (2390) Comment (0) Favorites

      Abstract:This paper used the idea of multiscale analysis to perform pre-filtering operation on the image with Repeated Rows. It turned the scalar wavelet into discrete multiwavelets transform and then selected the the low frequency subband. For the security of the watermark, the watermark logo is scrambled with a secret key. With the good performance of Quantization Index Modulus Modulation(QIMM), it embedded the watermark bit to different sub-bands and realized blind watermark extraction. Experiments showed that the algorithm in this paper had good image quality and robustness. It also increased the embedding capacity.

    • Survivable Mapping Algorithm Based on Single-Node Failure in IP Over WDM Networks

      2014, 23(9):154-157.

      Abstract (1152) HTML (0) PDF 917.80 K (2280) Comment (0) Favorites

      Abstract:In IP Over WDM networks, a physical link layer always has multiple logical links, regardless of the mechanism, the logical topology is not allowed to become unconnected as the fault of WDM layer. Therefore, solving the survival of IP Over WDM mapping is particularly important. This paper presents a mapping algorithm based on single-node failure based on the existing IP Over WDM static topological mapping algorithm. The objective is to guarantee the connectivity of IP topology when WDM layer's single-node failure.

    • Data Collection Protocols of Multi-Node Cooperative Planning in Wireless Sensor Networks

      2014, 23(9):158-161.

      Abstract (1162) HTML (0) PDF 1.03 M (2364) Comment (0) Favorites

      Abstract:In order to improve the positioning accuracy of wireless sensor networks, reducing network node energy consumption during positioning operation, a clustering-based wireless sensor network localization algorithm of multi-node Collaborative planning is proposed. The algorithm first made the network to be multiple clusters, then it calculated the relative distance between cluster nodes, to improve the accuracy of the positioning coordinates of nodes through collaborative planning approach. After getting the position coordinates of the node relative cluster head within the cluster, then it calculated position coordinates of the cluster head relative to the sink node, in order to achieve precise positioning of any node in the network. Simulation results show that the positioning algorithm of the weighted centroid-based and the reference node sequence, a clustering-based localization algorithm of multi-node Collaborative planning can get better positioning accuracy.

    • Equipment in Wartime Depot-Level Maintenance Operations Optimization of Division of Labour

      2014, 23(9):162-166.

      Abstract (1456) HTML (0) PDF 1.09 M (2939) Comment (0) Favorites

      Abstract:In order to accomplish the task of the equipment repair, according to the distinguishing of depot-level maintenance of equipment in war, this paper proposes a mathematical model of the division of operations in wartime equipment maintenance. Based on many types of multi task repair operations division, it puts forwards repair operations division problem solving scheme with time window. According to the model, using the characteristics of genetic algorithm, integrating the background of the problem and algorithm, this paper tests and analyzes an instance. The results show that the proposed method can effectively solve the wartime maintenance operations and division of optimization problems.

    • Mining Method of Implied Association Page

      2014, 23(9):167-169.

      Abstract (1269) HTML (0) PDF 808.65 K (2196) Comment (0) Favorites

      Abstract:The Clickstream data is the key to the analysis of Internet users psychological tendency, and the association of the user interesting pages group is hidden in the WEB log. Implied association between Web pages can be achieved by analyzing the click stream data. This paper puts forward a method of mining association page. Associated page searching algorithm adopted a model similarly to the Apriori. This algorithm overcomes some shortcomings of predecessors' association page algorithm can better adapt to the complex Internet environment.

    • Path Planning Algorithm for Indoor Cleaning Robot

      2014, 23(9):170-172.

      Abstract (1702) HTML (0) PDF 813.48 K (3470) Comment (0) Favorites

      Abstract:Cleaning robots has become an important one among the family as service robots; full coverage path planning is one of the important technologies. This paper presents a new path planning algorithm, which uses a grid model for modeling for the indoor environment, and generates an undirected complete graph G. It uses depth-first search and breadth-first search combined in figure G, while applying topological sorting constantly updated graph G to generate the full coverage of the shortest path planning. Finally, it uses the spanning tree to prove the effectiveness and feasibility of this algorithm.

    • Study on MOOC Intelligent Answering Using Support Vector Machine

      2014, 23(9):173-176.

      Abstract (1180) HTML (0) PDF 940.17 K (2342) Comment (0) Favorites

      Abstract:With the development of Internet technology and the MOOC Courses, the intelligent answering also has drown more attention, because it can solve user unsure questions timely. Intelligent answering system typically includes comprehension questions, information retrieval and answer extraction and selection. Question classification is a part of comprehension questions, which directly affects the accuracy of the final answers. It is verified by the training and test sets using the improving method which is based on support vector machine. The results show this method get high classification accuracy on intelligent answering.

    • Traffic Features Based Categories Identification on Users’ Network Be

      2014, 23(9):177-181.

      Abstract (1383) HTML (0) PDF 935.84 K (2961) Comment (0) Favorites

      Abstract:In recent years, the research on analyzing the users' network behavior has attracted much attention. In this paper, we study the problem of identifying users' network behavior categories. The research is based on a dataset that consists of 220 thousand network packets, with which we extract the statistical features needed for the identifications. We propose the identifying algorithm, and we also apply the algorithm to make categories identification on the network dataset. The results show the presented work can achieve very high accuracy.

    • Method of Scattered Point Cloud Reduction Based on Quadratic Reduction

      2014, 23(9):182-185.

      Abstract (1489) HTML (0) PDF 1.48 M (2981) Comment (0) Favorites

      Abstract:Point cloud reduction is an important step of reverse engineering. The quality of reduction is directly related to the efficiency of subsequent surface reconstruction. This paper analysed several commonly used methods of point cloud reduction and proposed an improved method against the lacks of existing methods. This method uses the PCA principal component analysis to fit tangent plane with K-Nearest Neighbour points. It calculates the distance between the point and the plane as the basis for initial reduction. Then it uses uniform grid for resampling process to retain some feature points. Through initial reduction and quadratic reduction to finish point cloud reduction. At last, it validates the effectiveness of the method with experiments.

    • Image Matching with Advertisement of Content-Based Video

      2014, 23(9):186-190.

      Abstract (1084) HTML (0) PDF 1.39 M (2694) Comment (0) Favorites

      Abstract:The purpose of video advertisement system is real-time obtainment of advertisement consultation of relative goods showed in video when users watching video. The contents of this research are the solution of system, analysis of difficult points, and solution of the difficult process on image matching with video ads. Firstly, it segments image simply. Then, it filters unmatched image twice by percentage of histogram method. At the last, it matches the image after segmenting precisely by simplified SIFT. We can receive the information whether the goods is the most similar to the image from video ads. Experiments show that this video advertisement system is real-time and possessing high matching rate on certain condition.

    • Status Assessment of UHV Substation Secondary Equipment Based on Fuzzy Comprehensive Support Vector Machine Method

      2014, 23(9):191-197.

      Abstract (1527) HTML (0) PDF 1.82 M (2270) Comment (0) Favorites

      Abstract:According to the scientific basis insufficient in the maintenance of secondary equipment of transformer substation, a status assessment model based on fuzzy comprehensive support vector machine (FC-SVM) is proposed. The online alarm information uploaded from integrated automation system and offline information in maintenance report is analyzed, an effective utilization and information extraction of various assessment factors is achieved by using fuzzy comprehensive assessment method (FCA), based on which, the secondary equipment status is assessed via SVM. Experiment analysis is carried out on four different kernel functions and radial basis function (RBF) is selected as the kernel function for the proposed model, finally. Experimental results show that the status assessment accuracy of secondary equipment is improved by using FC-SVM.

    • Application of Formal Metrods and Signal Interpreted Petri Net to PLC Programming

      2014, 23(9):198-203.

      Abstract (1672) HTML (0) PDF 1.12 M (3025) Comment (0) Favorites

      Abstract:To overcome the defects in traditional PLC programming, an approach combined formal methods with Signal Interpreted Petri Net (SIPN) is presented. An example of robot welding unit is used to illustrate this process. This paper builds a model of the control algorithm with Signal Interpreted Petri Net first, and verifies whether it satisfies the safety, liveness and reversibility characteristics of basic Petri net. Then it uses the model checking tool Cadence SMV for model verification and validation, to test whether it meets the properties of certainty, termination and output correctness. Thus the possible events like concurrency, conflict and deadlock in control algorithm designing process can be avoided and correct and dependable PLC programs are designed.

    • U-Boot’s Transplantation and Implementation Based on S3C2410

      2014, 23(9):204-207.

      Abstract (1228) HTML (0) PDF 885.92 K (2451) Comment (0) Favorites

      Abstract:The operating system kernel transplantation is the premise and foundation of the embedded system development. In view of the complexity and diversity of the U-boot transplantation, this paper analyzed the file structure and starting process of U-boot, it has chosen S3C2410 of SanSung company for development board, cross-compilation environment construction and U-boot transplantation and the kernel of the burning process were introduced in detail. We combined the function of U-boot with the characteristics of Linux in the transplantation process, this method has the characters of fast transplant, simple modify of kernel and strong commonality. Through compile testing, U-boot transplantation is implemented successful on the S3C2410, provides a reference for other U-boot transplantation.

    • Method of Improving Measurement Precision of Ultrasonic Flowmeter

      2014, 23(9):208-212.

      Abstract (1519) HTML (0) PDF 1.21 M (2811) Comment (0) Favorites

      Abstract:The ultrasonic flowmeter with transit-time difference method can realize the flow measurement by detecting the propagation time of ultrasonic signals between the transmit and receive from the transducer. The resonant frequency of ultrasonic transducer and the phase and amplitude changes in the process of ultrasonic signal propagation will affect the measurement precision of the arrival time of ultrasonic signal, and the measurement accuracy of ultrasonic flowmeter is affected finally. The precise measurement for arrival time of ultrasonic is one of the effective way to improve the measurement accuracy of ultrasonic flowmeter. The processing and acquisition circuit of the ultrasonic signal transmitted and received are designed and researched by the paper. The experimental results and experimental data are obtained and the experimental analysis and conclusionare given. The way to improve the measurement accuracy is given by software algorithm.

    • Extraction and Application of CATIA Model MBD Data Oriented to Three-Dimensional Machining Process Planning System

      2014, 23(9):213-218.

      Abstract (1429) HTML (0) PDF 1.17 M (3343) Comment (0) Favorites

      Abstract:With the deepening of MBD(Model Based Definition) technology applications in the field of three-dimensional CAD, MBD Part Design Model(Three-Dimensional Part Model designed with definition of MBD) has been the only data source of the three-dimensional machining process planning and provides a complete manufacturing information for the design process in process planning. Manufacturing feature recognition is the core technology of Three-Dimensional machining process planning and the prerequisites of process planning activities. And its data mainly comes from the Geometric information and Non-geometric information(MBD Data)of MBD Part Model. This paper focuses on the pivotal technic and difficulty of MBD Data's extraction of CATIA Three-Dimensional Model which is commonly used in auto and aviation field, describing how to apply CAA secondary development technology in depth, extracting MBD Data and useing it to feature recognition technic of three-dimensional machining process planning system, guaranteeing the following machining process planning.

    • Trajectory Planning of Robot Based on Nearly Arc-Length Parameterize Curve

      2014, 23(9):219-223.

      Abstract (1406) HTML (0) PDF 721.98 K (2867) Comment (0) Favorites

      Abstract:This paper mainly studied the joint type arc length parametric industrial robot trajectory planning method. Using the approximation of the arc length parametric curve interpolation method to end the robot trajectory parameters for arc such as discrete interpolation point sequence, the displacement of each joint point by solving inverse kinematics of robot sequences adopts the method of the limit of velocity and acceleration of each joint planning. This method is effective to avoid the joint space interpolation calculation and jacobin matrix calculation. In matlab7.8 platforms, the instance simulation is carried out on the above theory. The simulation results show that the trajectory planning method is feasible.

    • Cross-Efficiency Evaluation Method of Fuzzy DEA Based on Fuzzy Expected Value

      2014, 23(9):224-229.

      Abstract (1731) HTML (0) PDF 1.02 M (3304) Comment (0) Favorites

      Abstract:Studying on the cross-efficiency evaluation method based on fuzzy DEA is a new research subject, which has a wide application prospect. This paper proposes a method evaluation of fuzzy DEA cross-efficiency, which is on the basis of the fuzzy DEA based on the fuzzy expected value and cross-efficiency. We first calculates the optimal value weights that meets the maximize fuzzy expected efficiency. And then we obtain the peer-efficiencies through the optimal value weights and construct the cross-efficiency matrix. Lastly, we can rank all the DMUS according to the fuzzy expected cross-efficiency.

    • Approach to Locate Multi-License Plates Based on Video Streams

      2014, 23(9):230-235.

      Abstract (1768) HTML (0) PDF 1.26 M (2600) Comment (0) Favorites

      Abstract:For the location of multiple License Plates in video streams, this paper presented an effective method of Multi-license plates location based on image restoration and HSV color model. The main idea of this method was to use an improved Wiener filter to get the video image recovery. And then in HSV color space, it constructed a five-scale gray image according to the color characteristics of license plate, and used the morphology smooth to eliminate noise. Finally, the potential region of the plate was segmented through horizontal and vertical projection value and we got the accurate position of the multiple plates by prior knowledge of the car-plate region. Experimental results show that the proposed method can extract multiple motive license plates exactly from a complex background.

    • Analysis of Mobile Application Structure and System Construction Based on WebServer

      2014, 23(9):236-239.

      Abstract (1483) HTML (0) PDF 815.34 K (2275) Comment (0) Favorites

      Abstract:Mobile learning device can learn at any time, any place through the portable mobile computing. In the construction process of mobile application system, SSH integrated framework can be used in Web development server procedures. The representation logic and control logic separated are respected by the presentation layer. It uses business logic layer to process, reduce the coupling system architecture. This software structure is clear, expansibility and maintainability of higher.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063