• Volume 24,Issue 12,2015 Table of Contents
    Select All
    Display Type: |
    • Mass Customization Model Based Production Plan Control Method and System

      2015, 24(12):1-9.

      Abstract (1765) HTML (0) PDF 1.09 M (2634) Comment (0) Favorites

      Abstract:Nowadays, the manufacturers in china are facing the problem of meeting the personalized requirements with a reasonable price, a short delivery time and in the same quality. In contrast to traditional compromising solutions, the New PPC method based on Make to Availability (MTA) and Assemble to Orders (ATO) offers a win-win way that meets the complex requirements. This article introduces the Production Plan Control (PPC) Method of MTA and ATO and a relevant PPC system. The feasibility and validity of the system has been verified practically.

    • Population Risk Dynamic Simulation for Rainstorm Flood Disaster Based on ABM and ABS

      2015, 24(12):10-17.

      Abstract (1899) HTML (0) PDF 769.87 K (2052) Comment (0) Favorites

      Abstract:As a complex system engineering, population risk assessment for rainstorm flood disaster has a very important significance on the theory and practice of flood control. Targeting on the problem that dynamic changes of population risk for rainstorm flood should be obtained by disaster management, this paper constructs population risk assessment model for rainstorm flood by using agent-based modeling (ABM) method. On NetLogo platform, agent-based simulation (ABS) and the constructed model are employed to simulate the population risk changes for rainstorm of the Huaihe River Basin. The simulation results show that the proposed model can dynamically analyze population risk under low-risk status, medium-risk status and high-risk status. The experimental results demonstrate that the dynamic changes of population risk in the whole process of rainstorm flood could be solved by using ABM and ABS.

    • Construction and Development of Mobile Health

      2015, 24(12):18-24.

      Abstract (1583) HTML (0) PDF 702.63 K (2216) Comment (0) Favorites

      Abstract:Big data in biomedicine emerges through IoT(internet of things), mobile and traditional internet. Mobile medical cloud constructs the processing platform of biomedical big data through cloud computation. This paper analyzes the research and application status quo of mobile health, gives a detailed description ailed analysis of ward inspection, mobile nursing, telemedicine, trace and management of medical device, material and medical staff et al. Aiming at the existing problem and the current international development level. This paper gives out the development orientation-mobile health service pattern without boundaries.

    • Compressed Layout for Large Scale Networks Based on GPU

      2015, 24(12):25-33.

      Abstract (1845) HTML (0) PDF 933.18 K (1974) Comment (0) Favorites

      Abstract:One of the ways to study complex networks is making them visualized. With the advent of Web2.0 era and the big data era, the scale of the complex networks is becoming larger. That brings the new challenge for the visualization of complex networks on the layout effect and speed. This paper aims at improving the FDA(Force-Directed Algorithm) from this two aspects. On the layout effect, the articulation points of the complex networks are used to compact the networks, which achieves showing the layout result hierarchically. On the speed of the algorithm, repulsive force and attraction are computed on GPU, and the operation of updating the coordinates of vertex is also implemented on GPU. That improves the efficiency of the algorithm greatly.

    • Implementation of South Yunnan Yi Language Input Method Based on Windows Platform

      2015, 24(12):34-43.

      Abstract (1637) HTML (0) PDF 1.00 M (2819) Comment (0) Favorites

      Abstract:The number of Yi language ancient books is large, but it's in rapidly reduced, the need to use the scientific method to rescue, organize, specification. To meet the needs of archaeologists and publishing industry, from practicability consideration of Chinese, English, Yi language mixed input in the composing system, using Unicode international coding standard, and realizing the character encoding range from the self-created interval to Chinese interval across. This paper expouned the South Yunnan Yi font design and input method realization involved principles and many issues based on Windows operating systems, and on this basis, use Duoduo-input method API for application development, after overcoming technical obstacles such as the operating system application environments, the font encoding interval and mode, text mixed display, Finally developed the "southern Yunnan Yi digital information processing platform". Whether it is from the analysis of feasibility and practicality on this platform, the third style "Southern Yunnan Yi language free split mode one-to-many shape code input method" to solve learnability problem of the current Yi character input method. it's a stable operation, enter quick, easy learning Yi input method, especially for the promotion of Yi language information technology has widely value in use and application.

    • Lane Departure Warning System Based on Model Driven Approach

      2015, 24(12):44-51.

      Abstract (1518) HTML (0) PDF 1.13 M (1853) Comment (0) Favorites

      Abstract:Lane departure warning system(LDWS) is one of the main functions for the vehicle active safety system. This paper researches some critical techniques of LDWS. The road model is made as the core and detect lanes based on the model driven approach. In order to detect curve, the region of detection is divided into multiple sub regions, then lane marks are detected in each region independently. For speeding up the detection and decrease error, the size of each sub region is changed based on the detection result and fitting values of the road model in each frame. For increasing the detection stability, the Sobel filter is adopted for nearby sub regions and Gabor filter is adopted for distant sub regions. Furthermore, the Gabor filter is set adaptively based on the road geometry. Experimental results shows the system can accurate detect the curve and predict lane departure range precisely. Furthermore, the system has good robustness in the noisy environments.

    • Online Platform of Chinese Culture Genes

      2015, 24(12):52-57.

      Abstract (1694) HTML (0) PDF 884.81 K (2118) Comment (0) Favorites

      Abstract:The extraction of the Chinese culture gene is of greatly importance to the protection and development of our country's culture. But the deep excavation of cultural heritage and the discovery of evolution connotation are challenging. Cultural gene is a characterization unit of cultural patterns and cultural features, a human connotation password set. Through representation of culture genes, we can deeply mine culture in a bid to provide a deeper understanding to the interpretation of human culture. Based on the identity of cultural genes, it provides the cultural gene upload, download, search, voice recognition and other functions. The platform also completes the crawler-based content aggregation technology to enrich the cultural heritage database, and inherit Chinese culture.

    • Web Application Vulnerabilities Scan System

      2015, 24(12):58-63.

      Abstract (1831) HTML (0) PDF 738.27 K (3270) Comment (0) Favorites

      Abstract:First the paper analyzes severe situations of Web application vulnerabilities security and urgent requirements of Web application vulnerability detection technology. Then it analyzes the working principle of the scanning system, studies and summarizes detection methods of SQL injection, XSS and uploads file vulnerability. Based on those achievements, a system infrastructure of Web application vulnerability scanner is designed. The final experimental testing results prove the feasibility of the system design.

    • Enterprise SOA Integrated Architecture Design Based on Midrange

      2015, 24(12):64-68.

      Abstract (1388) HTML (0) PDF 720.09 K (1969) Comment (0) Favorites

      Abstract:According to DoDAF enterprise architecture framework and taking the web service technology as an upper integration architecture and the midrange system as an underlying integration framework, the paper explores how to apply SOA to create a new modern management mode for the connected enterprise and the integrated architecture design methodology in order to break the interconnecting barriers between the enterprises and systems. Through the case study and investigation on the relationship between DoDAF 2.0 described Models of Service Viewpoint and System Viewpoint, we present a hierarchical architecture approach to integrated SOA of the connected enterprise, which demonstrates the advantages of the Midrange platform in enterprise SOA integrated architectures.

    • Application of TENA in Military Simulation System of Our Country

      2015, 24(12):69-73.

      Abstract (1702) HTML (0) PDF 733.84 K (3665) Comment (0) Favorites

      Abstract:Currently, there are many independent and closed "chimney" simulation systems in some range training systems, which is not only a waste of resources but incompatible with other systems well. In view of this situation, the paper focused on using of the testing and training architecture (TENA) that US developed to make improvements. According to the characteristics of TENA's architecture, the paper summarizes the framework to adapt the domestic simulation systems. Finally, the conclusion shows that it can improve the performance of the system using TENA in the domestic simulation system.

    • Design and Implementation of a Database Application Security Controls Based on AOP

      2015, 24(12):74-80.

      Abstract (1767) HTML (0) PDF 896.38 K (2244) Comment (0) Favorites

      Abstract:The security of the database access control needs common used in various modules as a system-level modules. There are two traditional ways to achieve it, the first one is by the way of the component interface call to join the secure access module into each required, and the second one is through the AOP configuration mode. The two ways require developers to write a lot of function code or configuration information. According to the problem of the configuration information for a large quantity of code and the high cost of modify the processing, this paper proposes a visualization of the AOP configuration, access control injection module automatically through Dom4j configuration mode to complete the security access, reduce the configuration information that developers have to written redundancy, as while as make it more flexible to change content.

    • Key Technology of the Smart Grid Data Processing Research and Application

      2015, 24(12):81-87.

      Abstract (1492) HTML (0) PDF 1.28 M (1697) Comment (0) Favorites

      Abstract:Because of the large volume of data acquisition terminal and the rising of the network scale in the smart grid, data size is growing explosively. How to deal with the data efficiently, has become one of huge challenges that the power sector faces. This article proposes overall framework from the Angle of technology which is suitable for the development of data information processing of smart grid. The architecture is divided into four aspects:data acquisition, data storage, data processing and data visualization. Based on that, the paper introduces the techniques and effect of all aspects. Finally the massive data processing in application of smart grid has been achieved in Jiangsu Electric Power Company.

    • Intelligent E-Learning System Based on Multi-dimensional Recommendation

      2015, 24(12):88-92.

      Abstract (1762) HTML (0) PDF 692.05 K (2232) Comment (0) Favorites

      Abstract:Aiming at the shortage in the present e-learning systems, how to establish an intelligent e-learning system effectively using data mining is discussed. Associations are extracted from mass of user data in order to provide a comprehensive personalized, customized learning sequence. Associations between Users & Courses, Courses & Courses, Users & Users are mined using data mining, and a multi-dimensional network is built on that basis. Multi-dimensional recommendation is utilized to recommend useful courses to users. Experiments show that multi-dimensional recommendation has a high precision and provides a good experience to users.

    • Development of PEID for Automatically Acquiring Product Lifecycle Data

      2015, 24(12):93-99.

      Abstract (1371) HTML (0) PDF 887.08 K (2180) Comment (0) Favorites

      Abstract:In order to acquire the data automatically and effectively that is produced by products during the use, maintenance and end of life stage, the concept, type, function and reference architecture of product embedded information device is introduced briefly. Based on that, the UML model of PEID components is analyzed and PEID is designed and realized. At last, combined with the low temperature plasma equipment system for the specific application examples, the local monitoring station software and data server are taken as the PLM agent to test and verify the feasibility and practicality of PEID, which can achieve the correct acquisition and transmission of product life cycle data and provide data support for the closed-loop PLM system.

    • Lightweight Audio and Video Engine for Android

      2015, 24(12):100-104.

      Abstract (1641) HTML (0) PDF 673.54 K (1952) Comment (0) Favorites

      Abstract:With the rapid development of mobile Internet and mobile terminal equipment, mobile audio and video is applied more and more widely, the application software should process audio and video files efficiently to meet the needs of the public. For the purpose of improving the operational efficiency, this paper analysis and research multimedia processing, design and implement a lightweight audio and video engine, use the modular method, accomplished receive the media file, recognize the file format, separate containers into the audio and video streams and decode to output, use HTTP protocol and H.265 video decoder, AAC audio decoder, the software size is reduced to be smaller, then complete the Android platform interactive JNI, use the MediaPlayer of Android in the application to implement the audio and video play.

    • Highway Logistics Transportation Enterprises Oriented GIS Regulatory System

      2015, 24(12):105-109.

      Abstract (1434) HTML (0) PDF 765.51 K (1854) Comment (0) Favorites

      Abstract:Based on the project of "GIS Solution for Logistics Transportation" of laboratory, the GIS regulatory system of highway logistics transportation enterprises oriented is designed according to the business process of some highway logistics transportation enterprises in Liaoning Province. Firstly, the article describes the framework structure which the system adopted. And then the overview of system and function module division are introduced. In the end, expounds the realization of event-driven process of core modules. At the same time, the data communication connection handle and data processing in the case of high concurrent are discussed.

    • Embedded Multicore Operating Systems Model for Multi-Level Memory Architecture

      2015, 24(12):110-117.

      Abstract (1542) HTML (0) PDF 671.05 K (2020) Comment (0) Favorites

      Abstract:Multicore processors have already became mainstream and are being widely applied in embedded devices. Current research on how operating systems support multicore processors has focus on tightly coupled and shared memory architecture, which is the most common architecture for multicore processors, but ignores other special memory architectures. In this paper, a new embedded multicore operating system model based on a single code and multiple data is proposed for memory-constrained and multi-level memory architectures. Experiments show that, when applied to an eight-core DSP based on a multi-level memory architecture, this model can efficiently reduce the code space overhead by 80% compared to AMP; and the time cost related to real-time is ten times lower than that on SMP.

    • Artificial Bee Colony Algorithm Based on Adaptive Cauchy Mutation and Its Convergence Analysis

      2015, 24(12):118-124.

      Abstract (1446) HTML (0) PDF 757.17 K (1833) Comment (0) Favorites

      Abstract:As to the problem of falling into the local optimum in standard artificial bee colony, it is proposed to introduce an adaptive factor which can expand the search of the swarm and use the Cauchy distribution to improve the universality of colony search. This improved algorithm named adaptive Cauchy mutation artificial bee colony (ACMABC). Then the ACMABC is analyzed in theory by using the theory of random process to prove the convergence of the algorithm. Finally, this modified method is applied to the optimization of the parameters of wind power short-term prediction model, compared with standard statistic strategy, an illustration with higher precision is given.

    • Optimized Implementation of KLT Feature Points Tracking Algorithm Based on DSP

      2015, 24(12):125-132.

      Abstract (1501) HTML (0) PDF 826.27 K (2099) Comment (0) Favorites

      Abstract:The paper proposes an optimized implementation of the algorithm based on the platform of C6000 DSPs, in consideration of the DSP hardware resource characteristics and software pipelining technique. Based on the analysis of algorithm process modular. We completed the designation and implementation of Floating-to-Fixed-Point conversion; for Compute-Intensive modules, we present the concrete optimized method, including improving the performance of Software pipelining, reducing memory access, achieving task level parallelism. The experiment made in Code Composer Studio results show that, the efficiency and resource utilization of the optimized implementation scheme are increasing, and the optimization method in this paper also apply to all C6000 DSPs.

    • Algorithm for Micro-blog User's Followee Recommendation Based on Matrix Factorization

      2015, 24(12):133-141.

      Abstract (1889) HTML (0) PDF 761.02 K (2584) Comment (0) Favorites

      Abstract:Micro-blog is a social network platform that provides us a new communication and information sharing service. It has become more and more important in our daily life. An user can follow his interested friends to expand his social circle throw following relationship. But how to recommend high quality following users is always a difficulty of personalized service. For the issue, a Seeker-Source matrix factorization model based on micro-blog features is proposed in this paper. The algorithm is an improved algorithm which is based on "Seeker-Source". We extracted the characteristics of user's interest from each data source, and then introduced into the matrix factorization model which is suitable for recommending followee friends. Finally, we optimize the model and get the best factor parameter matrix to recommend followee friends. The experimental results carried on real data sets show that the proposed method performs better than the traditional matrix factorization model.

    • Ship Opportunistic Network Routing Based on Position Information Prediction

      2015, 24(12):142-147.

      Abstract (1454) HTML (0) PDF 1.01 M (1485) Comment (0) Favorites

      Abstract:The opportunity network communication is to use the communication opportunity created by the mobile node to gradually transmit messages. Because in the ocean the nodes are sparsely distributed, however, the efficiency is not high when it is used in the ocean. Thus it leads to the low possibility of encountering communication among ships, Meanwhile, due to the relatively low ship speed and the fixed channel, the efficiency of tradition opportunity network routing protocol is not high. This paper makes full use of the ship position information, sailing direction and the interpolation algorithm to predict the future location that nodes may arrive at, and improve the spray and wait protocol, through which to increase the probability and efficiency of the data passing to the aimed ship and raises the connection quality of ship opportunity network. Finally, compared with the currently popular opportunity network routing protocol by simulation experiment, it has achieve relatively good experimental results.

    • Improved Carrier Synchronization Method in OFDM Systems Based on Training Sequence

      2015, 24(12):148-151.

      Abstract (1546) HTML (0) PDF 736.64 K (1482) Comment (0) Favorites

      Abstract:Aiming at the carrier synchronization sensitiveness in OFDM (orthogonal frequency division multiplexing) systems and the common synchronization method's being not suitable for data transmission in burst packet transmission mode, an improved method and a new measuring function are given. The method uses the repeatability of the training sequence to achieve carrier synchronization in time-domain. The simulation results show that, the improved method with high SNR can keep the MSE (mean square error) with the order of magnitude of 10-6, and suits for?burst packet transmission mode without the feedback of frequency domain.

    • Improved Simulated Annealing Algorithm of Solving TSP

      2015, 24(12):152-156.

      Abstract (1500) HTML (0) PDF 688.74 K (2984) Comment (0) Favorites

      Abstract:A new method of solving traveling salesman problem is given by using simulated annealing algorithm. Based on the basic principle of simulated annealing algorithm, in view of the faults easily falling into local optimal solution when transformation only exchange two of the cities, puts forward an improved method by using reverse operation in the process of creating new solution. This makes the iterative process breakthrough circle of local optimum and jumps to another search space, which makes it more diversified and improves the local search ability of simulated annealing algorithm. And it is applied to solve TSP, which improves its ability of local search. The experiment results on several public test data show that the proposed approach is stable and feasible. Moreover, it has good performance in solving combinatorial optimization problems.

    • Methods of Massive Data Query Optimization for Urban Rail Transit Network

      2015, 24(12):157-162.

      Abstract (1296) HTML (0) PDF 825.15 K (1513) Comment (0) Favorites

      Abstract:The center of urban rail network needs to collect the data of all the urban rail lines and the size of table records will reach billions. The data query on urban rail network will need too much time and the system efficient is very low. We propose the program to optimize the system architecture by database cluster and middleware, which improves query efficiency because of more powerful storage and parallel processing capacity than that of a single database. An sharding method that divide the data horizontally by lines to avoid the expensive table joins crossing databases and the new rail line can be easily extended just by adding more database nodes. Serveral technologies, such as table partitioning, index, materialized view and SQL etc. are used also to optimize the reaction time when standalone inquiring. A special light-weight database access middleware used in the system architecture is designed to solved some key problems such as SQL parsing, route inquiring and result data merging etc.. The experiments are carrieded out on data from Guangzhou Metro as verifying the scheme of this paper. The results show that the reaction time of all types of queries is reduced 90% at least.

    • End-user Oriented Customizable Statistics Service

      2015, 24(12):163-169.

      Abstract (1164) HTML (0) PDF 780.98 K (1611) Comment (0) Favorites

      Abstract:In traditional enterprise application, developers should develop different statistics modules according to corresponding business requirements. It is difficult to meet the individual needs of business users by using such "predefined" statistics methods. In order to simplify the development process of statistics modules and meet the individual data needs of users, this paper presents an end-user customizable statistics service solution. This paper focuses on the representation of user-oriented metadata model and statistical model, ad hoc query method based on dynamically constructed SQL, then presents the design and implement of a statistics service system supporting enterprise application.

    • Time Predictability Analysis for Communication Modules in Servant/Exe-Flow Model

      2015, 24(12):170-175.

      Abstract (1186) HTML (0) PDF 768.89 K (1653) Comment (0) Favorites

      Abstract:Minicore is a new microkernel based on Servant/Exe-Flow Model, in which the execution model and the storage model are independent of each other. The highly modularity design of microkernel made Minicore rely heavily on the inter-servant communication module, because a servant is the basic unit of the operating system. As a result, in order to analyse its time predictability, it is inevitable to conduct a time predictability analysis for Communication Modules in Servant/Exe-Flow Model. In the thesis, we estimate the WCET of Minicore's communication modules and analyze its time predictability with the definition of CIPr (Configuration-Induced Timing Predictability), providing data to support its future mechanism of timing predictability, and foundation for future work of time predictability analysis for Minicore. Static WCET analysis and a path-based algorithm have been adopted in our work. Applying to the communication modules in Minicore, the method includes four phrases:extract code snippets for each communication mode, analyse communication control flow, analyse processor features, and calculate WCET finally.

    • Adaptive Extended Kalman Filter in the Application of the Mobile Robot Localization

      2015, 24(12):176-181.

      Abstract (1368) HTML (0) PDF 1.11 M (2686) Comment (0) Favorites

      Abstract:Concerning the error accumulation problem in mobile robot localization, a adaptive extended Kalman filter (AEKF) algorithm is presented. The extended Kalman filter and adaptive Kalman filter algorithms are analyzed. AEKF use the Taylor series in sampling time and the Sage-Husa time-varying noise estimator to estimate observation noise in real time, it overcomes the linearization error and enhance the environmental adaptability. Meanwhile, the AEKF convergence and complexity of operation are analyzed and combined with experiments show that AEKF has good comprehensive performance in terms of speed and precision. Finally, the effect of robot localization completed by two kinds of algorithm is analyzed and the error comparison by experiment is completed. The results indicate AEKF has better performance on localization.

    • Estimation of Distribution Algorithm for Signal Timing Optimization of Isolated Intersection

      2015, 24(12):182-185.

      Abstract (1337) HTML (0) PDF 691.23 K (1456) Comment (0) Favorites

      Abstract:Optimization the signal timing of the intersections is the key problem of the traffic signal control. For the purpose of reducing the traffic jam, optimization model for the four phases signal control of an isolated intersection is established, in which the total delay of vehicles is adopted as the objective function, and the effective green time in each phase as the control variables. Integer encoded PBIL algorithm and real number encoded EMNA algorithm are proposed to solve the traffic signal timing problem. The experimental results show that both the algorithms can get rational signal timing more effectively with less population size than that of the genetic algorithm.

    • Improved Algorithm of LEACH Protocol for Wireless Sensor Network

      2015, 24(12):186-190.

      Abstract (1189) HTML (0) PDF 657.95 K (1824) Comment (0) Favorites

      Abstract:With the continuous development of wireless sensor network technology, more and more fields need to use it. But node carrying capacity is limited in the network, causing the problem of short lifetime. It also restrict the widely used of this technology. LEACH algorithm is now widely used in wireless sensor network protocol. It improved the node energy consumption effectively, but the cluster in the algorithm is adaptive random, lack of considering the current node's energy and cluster distribution balance. So it may make the network energy loss uneven, lead to network premature death. This article combine theoretical analysis and simulation verification. For LEACH agreement clusters process, introduced into optimal cluster, dual cluster head to transmit data and other methods to prolong the network lifetime, balance energy consumption of nodes in the network, The experimental results show that, the improved method effectively reduces the network energy consumption, ensure the network load balance, and prolong the life span of the network.

    • Smoothing and Compression Algorithm of Triangular Mesh Models Based on Laplacian

      2015, 24(12):191-195.

      Abstract (1452) HTML (0) PDF 745.01 K (2750) Comment (0) Favorites

      Abstract:Triangular mesh models are widely used in various fields and develops rapidly. In order to preserve the local geometric features of the mesh model, and at the same time can better keep the edge and texture details while smoothing and denoising, a partial differential equation smoothing method based on Laplacian is came up, and it can get good denoising effect. In order to transmit and operate three-dimensional data more conveniently, an eigen-decomposition and spectral compression method based on Laplacian is came up, and it can realize the compression of the model.

    • Recommendation Algorithm Based on the Partition of Directed Graph

      2015, 24(12):196-203.

      Abstract (1239) HTML (0) PDF 804.36 K (1642) Comment (0) Favorites

      Abstract:By using the principle of resource allocation, we propose a recommendation algorithm which is based on the partition of directed graph. The items directed graph is established by combining with the bipartite graphs network structure and resource allocation method, and is partitioned by the method of Asymmetric Nonnegative Matrix Factorization. Then we classify items by the relationship between them, set connection weights between the items and implement a recommendation from the Top-N items to the user. Experimental results show that the proposed algorithm can improve the recommendation accuracy and the recommendation diversity, and reduce the popularity of recommendation to a certain extent.

    • New User Satisfaction Model of Cloud Services in Digital Library

      2015, 24(12):204-207.

      Abstract (1353) HTML (0) PDF 739.57 K (1616) Comment (0) Favorites

      Abstract:With the development of cloud computing technology, evaluating cloud services in digital Library becomes top urgent. Based on the analytic hierarchy process (AHP), the paper designs a new user satisfaction model to evaluate cloud services in digital library. To obtain the relative important degree of evaluation indexes from estimators, the paper puts forward a new method to construct judgment matrix of AHP. Examples show that:1) the user satisfaction model can accurately locate cloud services that estimators urgently hope to improve; 2) the improved AHP algorithm can acquire index weight value from estimators, and help to improve the accuracy of user satisfaction.

    • Novel and Efficient Moving Target Detection Method

      2015, 24(12):208-214.

      Abstract (1225) HTML (0) PDF 990.65 K (1617) Comment (0) Favorites

      Abstract:A novel and efficient moving target detection method is proposed. The method by improving the seven-frame difference and background subtraction to eliminate the moving object detection of "empty" and false targets. Through the optical flow computation model for the weight function and the introduction of universal dynamic image model to establish a new optical flow constraints, it can solve common optical flow field calculation time-consuming and the unestablished problem caused by brightness changes of constraint equation, and also obtain accurate information campaign; Finally, threshold segmentation and morphological processing is completed to extract the target. Analysis indicate that the proposed method can detect and segment the moving target accurately and fastly.

    • Hybrid Particle Swarm Algorithm for Multi-Objective Optimization Based on Decomposition

      2015, 24(12):215-222.

      Abstract (1235) HTML (0) PDF 1.02 M (2727) Comment (0) Favorites

      Abstract:To deal with the problems of the way for selecting the global best position and reserve the diversity, a multi-objective particle swarm optimization algorithm based on decomposition and crowding distance was proposed. We introduced the Tchebycheff decompostion mechnisam and choose the best solution which comes form the neighbour weight vectors to be this particle's global best solution. To confine the flying of the particle,this paper introduced a new speed restriction factor. Comparing with three state-of-the-art multi-objective optimizers on ten test Problems, Smoeadpso outperforms the other algorithms as regards the coverage and approximation to the real pareto front.Meanwhile, the uniformity of the solution set to the 3 objective problems performs better than other particle algorithms.

    • Improvement Artificial Fish-Swarm in Wireless Sensor Network Coverage Optimization

      2015, 24(12):223-227.

      Abstract (1611) HTML (0) PDF 789.48 K (1710) Comment (0) Favorites

      Abstract:Aiming at redundant nodes in wireless sensor networks and increased network costs, an improved coverage optimization method artificial fish swarm algorithm is proposed in this paper. First of all, mathematical model of nodes' utilization rate and coverage rate is established, and then artificial fish swarm algorithm is improved One, probability density function is used in the initial stage for the distribution of the initial location of individuals in the fish swarm so as to effectively avoid chaotic state of the fish swarm individual in the beginning; two, chaos algorithm is used in the foraging stage to interfere with the location of fish swarm individuals so as to effectively reduce the time of fish swarm individual getting close to the optimal solution; three, Gaussian mutation is used in the cluster behaviors so as to reduce the time of producing the optimal solutions. The improved artificial fish swarm can get the optimal coverage scheme while solving the model. Simulation experiments show that it can effectively improve the effect of network coverage as well as node's utilization rate, and reduce the network costs.

    • High Utility Sequential Pattern Mining Algorithm Based on MapReduce

      2015, 24(12):228-232.

      Abstract (1745) HTML (0) PDF 710.79 K (2071) Comment (0) Favorites

      Abstract:Because of the rapid growth of data, the high utility sequential pattern mining algorithms' efficiency decreases seriously. In view of this, we propose a high utility sequential pattern mining algorithm based on MapReduce, namely HusMaR. This algorithm is based on MapReduce, which using the utility matrix to generate candidate efficiently, random mapping strategy to balance of computing resources and field-based pruning strategy to prevent an explosion. Experimental results show that in the large scale of data, the algorithm achieves a high parallel efficiency.

    • iLOF*:An Optimized Local Outlier Detection Algorithm

      2015, 24(12):233-238.

      Abstract (1492) HTML (0) PDF 777.37 K (2833) Comment (0) Favorites

      Abstract:Outlier detection is an important branch in the areaof data mining,It has been widely used in weather forecasting, network intrusion detection, telecommunications and credit card fraud detection,etc. LOF algorithm has good detection effect and availability, but its computation is very high, whose efficiency is not good enough,And when calculating the distance between two objects, LOF algorithm ignores the different influence of different properties.To solve above disadvantages, we put forward an improved outlier detection algorithmiLOF*. iLOF* algorithm usesgrid to reduce the data sets, so as to improve the efficiency of the algorithm; at the same time, when calculating the distance between the object, iLOF* algorithm gives different weights to different properties through the introduction of information entropy, which improve the accuracy of the algorithm.In addition, we use the parallel computing framework MapReduce to parallel iLOF * algorithm, which further improves the efficiency of algorithm on large data sets.The experimental results demonstrate the effectiveness and efficiency of the proposed algorithm.

    • Community Division of Bipartite Network Based on Information Transfer Probability

      2015, 24(12):239-242.

      Abstract (1307) HTML (0) PDF 682.66 K (1807) Comment (0) Favorites

      Abstract:Bipartite network is a performance of complex networks, the divided of unilateral node of bipartite network has important practical significance for the study of complex networks of community division. Based on the idea of information transfer probability, this paper presents a community of bipartite network divided clustering algorithm (IPS algorithm). The algorithm simulates the probability of information transfer in the network, through mutual support value between the nodes in network.select the max value as the basis for merger different communities and introduction of bipartite network module as a basis for judging the merits of community division. Finally, we using actual network test the performance of the algorithm. Experimental results show that the algorithm can not only accurate divided the unilateral node of bipartite network, but also can get high quality community division.

    • Contraband Classification based on Improved FCM Algorithm

      2015, 24(12):243-248.

      Abstract (1541) HTML (0) PDF 753.77 K (1511) Comment (0) Favorites

      Abstract:For the disadvantage of passive millimeter wave (PMMW) image, such as poor quality, obscure boundary and difficult identification, an improved FCM clustering algorithm is proposed by the subtractive clustering based on the traditional words model. Moreover, with the visual words extracted, the pistol, knives and explosives are briefly by the method of SIFT. Finally, experimental results show that the improved algorithm can be accurately classify the contraband. Furthermore, the average recognition rate can reach more than 90%. Compered with FCM clustering algorithm and K clustering performance, the improved FCM clustering algorithm is excellent.

    • Security of Cognitive Radio Network Based on Multi-Perspective

      2015, 24(12):249-255.

      Abstract (1329) HTML (0) PDF 641.64 K (1741) Comment (0) Favorites

      Abstract:Cognitive radio network is a kind of wireless network in order to solve the problem of shortage of spectrum resources, and puts a new technology that can allocate shortage of spectrum resources efficiently, while brings the new questions about security because of characteristics, such as dynamic, distribute, openness. The paper introduces the security of cognitive radio and existing solutions from multi-perspective, including protocol stack and cognitive behavior. Finally, we discuss the development of cognitive wireless security in the future.

    • Solution to a Class of Diophantine Equations over a Finite Field and Its Application

      2015, 24(12):256-259.

      Abstract (1439) HTML (0) PDF 583.78 K (1683) Comment (0) Favorites

      Abstract:This paper focuses on cx+by(mod N), the linear Diophantine equations over a finite field, and derives the general solution and the amount of solutions in the domain from the equations. Then demonstrates that this solution can partly reduce the amount of calculation which derive the signer's private key in some curve cryptography schemes to N/z (z is the smallest non-zero element of subgroup < -b >). Finally, lists five curve cryptography schemes that based on this type of equation, and takes the solution of the private key of a digital multi-signature scheme on the generalized conic curve over Zn as an example to introduce the topic.

    • Application and Model of Energy Balance Scheduling in Cigarette Enterprise

      2015, 24(12):260-264.

      Abstract (1273) HTML (0) PDF 802.72 K (1621) Comment (0) Favorites

      Abstract:For the energy balance scheduling of supply and demand in cigarette enterprise, the energy balance scheduling method and mathematical model of cigarette enterprise were studied. An optimization model for energy balance scheduling was established. In the model, the conditions of energy variety and time-interval supply are taken into account, and the object is to minimize unit final product comprehensive energy consumption and unit consumption of the final product cost. An improved genetic algorithm was designed to solve the model, which includes a subset real number encoding and divisional crossover operation. A case for steam balance scheduling of a cigarette factory shows that the model and algorithm can solve the energy balance scheduling of cigarette enterprise, and the comprehensive energy consumption is about 2% shorter than before.

    • Automated Disease Coding Method Based on Text Analysis

      2015, 24(12):265-268.

      Abstract (1311) HTML (0) PDF 607.49 K (3527) Comment (0) Favorites

      Abstract:Disease coding is the process of transforming diagnosis names to standard ICD(International Classification of Diseases) codes. Due to the huge amount of workload and the low efficiency of manual coding, it's necessary to achieve the automation of disease coding. This paper presents a method for automated coding of disease. Specifically, we present ICD as documents with a text modeling approach, and then get the most relevant ICD code of a diagnosis name with the text correlation measure. The experiments proves that our method has a good accuracy, it's very efficient and easy to switched among classification levels, could be widely applied to various types of data analysis scenarios.

    • Analysis and Performance Evaluation of Vector Control Based on DSP

      2015, 24(12):269-272.

      Abstract (1452) HTML (0) PDF 623.00 K (2206) Comment (0) Favorites

      Abstract:To make up for the blank of evaluation of vector control on DSP in servo control system, the performance analysis and evaluation are given based on the real-time requirements of vector control. The key modules of servo control and the properties of software and hardware in DSP are discussed, which lays the foundation of the work of evaluation. The CPU load is chosen as the performance index and the applicability of vector control is analyzed on specified conditions. Results of evaluation may have some reference value for the selection of vector control on DSP.

    • Using Improved Unsupervised Relation Extraction Method to Construct Traffic Ontology Based on Web

      2015, 24(12):273-276.

      Abstract (1378) HTML (0) PDF 577.83 K (1556) Comment (0) Favorites

      Abstract:Domain ontology is an efficient and reasonable display form of domain concepts and their relationships. In the process of building domain ontology, the problem often encountered is that ontology concept is complete but concept relations are complex and diverse and artificial tag cost too much. Using unsupervised Relation Extraction algorithm on rich Web information related with domain Ontology concepts solve previous problem. But the traditional method based on unsupervised learning does not take into account the situation of a single sample with more concepts, leading to the final incomplete results. We used Web information in trafffic field to construct ontology, introduced the weight of sample concept relation pair to a traditional unsupervised learning approach-Kmeans to solve this problem and achieved good results through experiments.

    • Keyword Extraction Method Based on K-means in the Application of Equipment Classification

      2015, 24(12):277-282.

      Abstract (1425) HTML (0) PDF 698.06 K (1743) Comment (0) Favorites

      Abstract:Expository is the most common form in text classification. With the continuous increase of information, how to improve the efficiency of expository text classification is a hotspot in researching. Keyword extraction is used to improve the efficiency in text classification. This paper suggests to extraction keywords in the text based on the use of K-means algorithm by constructing the Vector Space Model (VSM) subject to pre-assumed initial keyword frequency. The KNN text classification algorithm verifies keywords extracting based on the use of K-means algorithm not only makes the classification accuracy slightly increased, but also reduce the dimension, thus realizing the text classification efficiency.

    • Improved Landweber Algorithm for Image Restoration

      2015, 24(12):283-288.

      Abstract (1389) HTML (0) PDF 856.81 K (2711) Comment (0) Favorites

      Abstract:The exsisting Landweber iterative algorithms suffer from slow rate of convergence and sensitiveness to noise. In this paper, two common imaging blurs, named motion blur and atmospheric turbulence blur, are discussed about the mechanism of the image blurred, and we propose an improved Landweber iterative algorithm for image restoration. The improved method only expedites the convergence in the signal domain, and inhibits the expansion of noise. The experimental results demonstrate that the proposed method can still improve the restoration accuracy of results at the same time of speeding up convergences, and further show the application effect by applying the method to the remote sensing image and high-speed railway image.

    • Analyzing Users' Searching Behavior Based on Hadoop

      2015, 24(12):289-294.

      Abstract (1248) HTML (0) PDF 829.99 K (1729) Comment (0) Favorites

      Abstract:The analysis of users' behavior of searching Webpages is the hotspot of current information searching. This paper focus on the weakness in the parallel calculation search of cloud calculation, like slow research speed, low efficiency and so on, a method based on Hadoop for mass users to search Web-pages is proposed, in which users' impact factors, time vector and Web-related factors are added to the algorithm based on the PageRank algorithm so as to further improve the efficiency for users in searching Web-pages. Analysis of query log in Youku laboratory is used in the experiment to prove algorithm in this paper has good effect as well as some guiding significance for users' behavior analysis in cloud computing.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063