• Volume 24,Issue 2,2015 Table of Contents
    Select All
    Display Type: |
    • Software Task Allocation Method in Crowdsourcing

      2015, 24(2):1-6.

      Abstract (2144) HTML (0) PDF 651.07 K (3592) Comment (0) Favorites

      Abstract:The traditional task allocation method mainly depends on subjective judgment and personal experience, which will directly lead to low utilization efficiency of human resources. Considering the shortage in existing task allocation method including the complexity of human resource and difference in ability, a new type of personalized task allocation method is proposed in "Crowdsourcing", which not only consider the outsouree's comprehensive technical ability, but also take into account his personality attributes, and online reputation. So that the task allocation process is more targeted. This method is applied to "JuHuiNet", and experiments show that this method can provide an effective task allocation decision support for the Outsourcer.

    • Modeling and Simulating of Crowdsourcing Translation Platform Based on Complex Adaptive System

      2015, 24(2):7-13.

      Abstract (970) HTML (0) PDF 845.88 K (2254) Comment (0) Favorites

      Abstract:Crowdsourcing system is a complex adaptive system. The method of crowdsourcing research proposed in this paper is mainly based on this property. Crowdsourcing is an emerging research field of social computing, basing on network is its main feature. Unfamiliar people could make collaborative innovation and profit sharing through the Internet by crowdsourcing. The mechanism design of the crowdsourcing platform always varies from one to another, and a good mechanism design is the basis for stable development of crowdsourcing platform. Based on the theory of complex adaptive system, this paper proposes a new way to research crowdsourcing platform. This paper takes crowdsourcing translation as the research platform, using the concept of Agent in complex adaptive system to model and simulate the roles among crowdsourcing platform. After research, the Agent models are constructed primitively. Besides, the rules of Agent state transition and interaction between the Agents are defined. At last, we establish a simple simulation framework, by dynamic simulating of multi-agent collaboration, to simulate the development of a crowdsourcing platform and verify the reasonableness of the designed mechanisms, which could provide a reliable, credible basis for the design of the crowdsourcing platform and a convenient simulation environment for the study of crowdsourcing platform.

    • >Survey
    • Research Progress on Delaunay Triangulation Dynamic Updating Algorithm

      2015, 24(2):14-21.

      Abstract (1112) HTML (0) PDF 716.91 K (2936) Comment (0) Favorites

      Abstract:Based on the study of delaunay triangulation dynamic updating algorithm, this paper reviews the earlier researches about inserting points and constrained edges into an existed Delaunay Triangulation, or deleting points and constrained edges from the Delaunay Triangulation. This paper describes a series of key techniques in detail, such as point location, LOP principle, diagonal exchanging etc., and also compares the advantages and disadvantages of these algorithms, furthermore analyses the solved problems and existing problems. Finally the problems existing in the delaunay triangulation dynamic updating algorithms are summarized, and some suggestions about future work are proposed in the end.

    • Optimizing Web Service Composition Based on Improved DAG

      2015, 24(2):22-27.

      Abstract (1315) HTML (0) PDF 698.61 K (2125) Comment (0) Favorites

      Abstract:For the complexity of web service composition in current, this paper proposes a web service composition method based on improved DAG (Directed Acyclic Graph). This method presents the possible service matching through constructing DAG. Then it optimizes DAG by deleting the invalid composited-pathways and redundant service and adopting backward-search strategy with QoS to reduce the amount of web service. At last it calculates the QoS of choosing service to acquire the best service. In order to verify the feasibility of the above strategy, this paper makes an experiment on enterprise energy-consuming analysis service composition on interactive plat for smart power, and takes experimental analysis for services of different size. The results show that the improved strategy is more effective to generate optimizing service with high satisfaction and quality, and strategy applies to service composition on interactive plat for smart power.

    • Finite-Time Stability of Networked Control Systems with Time Delay

      2015, 24(2):28-34.

      Abstract (1177) HTML (0) PDF 736.92 K (1811) Comment (0) Favorites

      Abstract:This paper is concerned about the networked control systems with random time delays, which occur in both sensor-controller and controller-actuator. For solving the problem of its dynamic features and uncertainty, one puts forward a state feedback control strategy with Markov characteristics. Moreover, in contrast with the way modeled through Markov stochastic process, each time-delay is described with two Markov chains, so that the resulting closed-loop system is established as a discrete Markovian jump system with four random parameters. A sufficient condition on the issue of finite-time bounded and stabilization is established through the theory of Lyapunov, and a linear matrix inequality (LMI) approach is employed to calculate the gain matrix of controller. Finally, an illustrative numerical simulation is given to demonstrate the effectiveness of the strategy proposed.

    • Accss Control Framework for Composite Electronic Health Records in the Cloud Computing Environment

      2015, 24(2):35-40.

      Abstract (1041) HTML (0) PDF 777.99 K (1717) Comment (0) Favorites

      Abstract:To meet requirements of EHRs security sharing in the cloud computing conditions, this paper presents an access control framework for composite EHRs under the cloud computing environment. We propose and construct composite EHRs based on multi-CDAs' logical relationship. On the basis of attribute-based multilevel access control policy, we realize the security management of composite EHRs. By using the XML Web service, which based on the XML XLINK technology, we achieve the goal of downloading and checking composite EHRs. Compared with existing schemes, our project is much more suitable for EHRs security sharing in the cloud computing conditions.

    • Distributed Cloud Disaster Recovery Platform Structure and Performance Analysis

      2015, 24(2):41-46.

      Abstract (1399) HTML (0) PDF 1.07 M (1926) Comment (0) Favorites

      Abstract:Cloud storage service is derivative products of cloud computing intended to provide an effective solution for mass data storage networks, while save storage costs and system resources. It can provide a complete backup, disaster recovery data center, in order to ensure data security, fault tolerance and efficient storage functions. At present, cloud disaster recovery models are using virtualization technology, which relies on the local server implementations. This paper introduces a model of DHT-based cloud disaster recovery, which is applicable to WAN universal data-level disaster recovery. Finally, in order to verify the feasibility of the model, the scheme is simulated in the cloud computing cluster.

    • Automatic Test System Based on Qt4/VS2010

      2015, 24(2):47-52.

      Abstract (1149) HTML (0) PDF 773.21 K (1713) Comment (0) Favorites

      Abstract:A method to fulfill a function of automatic test system of relay protection device is described by using Qt4 and Microsoft Visual Studio 2010. The system consists of tester, automatic testing software. Automatic test system can realize protection logic of relay protection test, the master function test and the value range detection main test items. It can realize the testing process visible, saving test data, test report generation. Using the feature word concept it solves the problem of test case reuse. Automatic test system has been well applied in the relay protection device in the process of research and development, improving greatly the testing efficiency and testing adequacy.

    • Wireless and Portable System for the Acquisition of Remote-Medical Information about the Elderly Health In-Home

      2015, 24(2):53-58.

      Abstract (1273) HTML (0) PDF 965.83 K (2691) Comment (0) Favorites

      Abstract:According to the situation of the daily living of the older in-home and community health service, this paper investigated the wireless and portable system for the acquisition of the in-home elderly health information by the remote-medical technique. The two layer architecture of the proposed system is addressed including the physiological data collector built based on wireless sensor networks (WSNs), and remote acquisition system of community health service centers for the physiological parameters. The WSN collector with star topology is obtained by a relay routing node controls acquisition nodes by nrf24101, in which each acquisition node constructed by STC12 MCU as master model realize the functions: physiological parameter acquisition, history records inquiry and data transmission. Also, relay routing node was developed by ARM MCU as master model transmitted all data from acquisition nodes to community health center PC server via SOCKET and WIFI with advantages of the reliable communication during long time, which can provide the more useful health information in-home for remote-medical health service center. This developed system can effectively improve the quality of elderly in daily living.

    • IOT Environmental Data Acquisition and Control System Based on ZigBee

      2015, 24(2):59-64.

      Abstract (1140) HTML (0) PDF 803.99 K (3277) Comment (0) Favorites

      Abstract:Most of the wireless sensor network application systems only realize the function of data acquisition and don't provide control function. For the need of environment data acquisition and control system, an IOT environmental data acquisition and control system based on ZigBee was proposed in this paper. The hardware is designed by STM32W108 which with built-in EmberZNet ZigBee protocol software was developed to realize the remote environment data acquisition and control system.

    • Platform for Benefit Analysis of Petroleum Projects

      2015, 24(2):65-69.

      Abstract (1049) HTML (0) PDF 849.52 K (1758) Comment (0) Favorites

      Abstract:In order to meet the needs of different analyses of certain petroleum corporation's economic benefit of the petroleum projects in a better way, the paper analyzes the system requirements in the view of business restructuring, guides the design and implement of the platform in the idea of workflow and modularity. So that the system can have good flexibility, usability and maintainability. This system can meet the demands of various analysis and evaluation and has the characteristics of effective adjustment at any time though defining and maintaining models by the workflow model designer based on JGraph. Simple and effective process engine ensures the normal operation of the process, and at the same time, the guide of users' operation can help avoid improper operations. It has been proven that the platform's design is preferred in the corporation's practical application.

    • Structured Data Query in the Equipment Support Management System Based on Cloud Platform

      2015, 24(2):70-74.

      Abstract (1188) HTML (0) PDF 994.82 K (1992) Comment (0) Favorites

      Abstract:First, this paper talked about the deficiencies of current Equipment Support Management System on massive data query and analysis. Then it proposed and realized a method of Structured Data Query used by the Cloud Platform based on Hadoop, after analyzing the data source. In the article, we used the tool of Sqoop to import data from a relational database into HDFS, and then use Hive to analyze the data. Finally, the experiment proved that the method makes up the shortage of the data query in the environment of single computer, and has high practical value.

    • Realization System of Higher Vocational College's Specialty Education Level Assessment Based on Artificial Intelligence

      2015, 24(2):75-81.

      Abstract (1090) HTML (0) PDF 656.75 K (2203) Comment (0) Favorites

      Abstract:Taking the state demonstration construct key specialty "numerical control technique" of Chongqing Industry Polytechnic College as research target, this paper proposes a perfect model of self evaluation on campus. We also establish related index system and quality standards. By using the principle and method of fuzzy neural network, this paper establishes a comprehensive evaluation model based on FNN-ES, and gives a concrete Implementation of evaluation software based on VC++. This paper also presents a detailed process of employing manual evaluation's results on intelligent model's training and using. It uses matlab to validate and improve the performance of the FNN algorithm. The mature-trained intelligent system can be used for specialty assessment of mature specialty. Then it was spreaded to other colleges. The results of theory and practice researching show that FNN-ES for specialty assessment can overcome various human factors. It makes the assessment result more scientific, stable and reasonable. This system can provide guidance and basic data for off-campus specilty evalution of provincial and national level.

    • Electricity Production Management System Application Integration Platform

      2015, 24(2):82-86.

      Abstract (1409) HTML (0) PDF 1.45 M (2142) Comment (0) Favorites

      Abstract:The paper introduces the SGC integration requirements of electric power production management system, and analyzes the demand of application integration platform. Based on this, the paper expounds the overall architecture, function design and key technical features of the platform. It provides a reference to the ideas and solutions for the power grid enterprise's unified management and application integration eventually.

    • Standard Document Content Indicator Service System

      2015, 24(2):87-92.

      Abstract (1151) HTML (0) PDF 882.36 K (2046) Comment (0) Favorites

      Abstract:Standards have legal effect within a certain range, and it is basic norm of national products and trade contacts. The collection, mining and using of standard documents are necessary conditions of standard information consulting and service. Combining situation of standard document resources and actual user needs, this paper designed a processing flow from standard document photocopy to standard content indicators, and implemented a standard document content indicator service system.

    • Application-Level Continuous Data Protection System for SQL Server Database

      2015, 24(2):93-98.

      Abstract (1125) HTML (0) PDF 705.26 K (2053) Comment (0) Favorites

      Abstract:To solve the problems of traditional data disaster recovery system with large backup window and low disaster immunity, an application-level continuous data protection disaster recovery system combined with SQL Server database is introduced and designed. Application program interface provided by SQL Server is used to read the database transaction log file in the system, then date changes are captured online. The captured data change is recorded in log file and stored in cache-quene. It will be sent to other places to achieve remote offsite disaster recovery. When a disaster occurs, the system uses heartbeat detection, floating IP technologies to take over the broken system. When a malfunction occurs, the system can return to any time point according to the log file. So the system can effectively avoid data loss which caused by man-made or accident.

    • Enterprise Data Warehouse System Based on Metadata-Driven

      2015, 24(2):99-107.

      Abstract (1165) HTML (0) PDF 630.65 K (2003) Comment (0) Favorites

      Abstract:Based on in-depth study of the construction and maintenance of metadata and its management system structure, this paper presents a metadata driven enterprise data warehouse system architecture. Relational model data structure is used in the system architecture through designing metadata interfaces and metadata driven engine. Feedback information of each module in the data warehouse and metadata storage will interact on each other. This work constructs a metadata-driven data warehouse system operation mechanism, resolving the difficulties to update and maintain metadata and low efficiency of data quality checking. Finally, it enhances the management and control capabilities of enterprise data warehouse.

    • Electronic Dictionary Based on Android Platform and Cloud Computing

      2015, 24(2):108-111.

      Abstract (1088) HTML (0) PDF 782.77 K (1772) Comment (0) Favorites

      Abstract:This paper discussed the design and implementation process of electronic dictionary based on Android platform and cloud computing. The local-client used Android SDK and the Eclipse IDE to develop. The cloud server was constructed by load balance, network storage technologies, virtualization, node management and other technologies. The system used two-level index method to store data, greatly improved searching speed.

    • 3D Digital Campus System Based on CityEngine

      2015, 24(2):112-115.

      Abstract (1230) HTML (0) PDF 748.26 K (3098) Comment (0) Favorites

      Abstract:Taking JinMing campus of Henan University as a study area, a three dimensional digital campus is designed and implemented by using ESRI CityEngine platform and technology. The users can visit the virtual campus online, query the information of the campus landscape object, and make sunlight analysis, set geographic information tag. The system provides effective means and tool for campus information management, business process and planning design.

    • GUI Automatic Test System Based on Keywords in XML Technology

      2015, 24(2):116-120.

      Abstract (1218) HTML (0) PDF 723.64 K (1900) Comment (0) Favorites

      Abstract:The GUI automatic test system based on keywords in XML technology is proposed to research on how to improve Web application automatic test efficiency. Using XML technology to design and package keyword, finish writing automated test scripts, test engine to parse the XML file, the explanation key navigation test execution, and report generation. In the case of ERP products show that the system can achieve the test script design, enhance the readability and maintainability, reduce the difficulty of preparation, and enhance the efficiency of the testing procedure.

    • Text Categorization Based on Deep Belief Network

      2015, 24(2):121-126.

      Abstract (1649) HTML (0) PDF 674.63 K (4909) Comment (0) Favorites

      Abstract:With the rapid development of the network, text categorization has become a key technology in processing and organizing large text. There are already many different types of neural networks applied to text categorization and achieve good results. However, most of the document models use only a small amount of features as input which don't take into account the sufficient amount of information. Considering enough characteristics, the dimensions of the disaster will occur, and resulting in a substantial increase training time, difficulty in training the model. This paper considers using deep belief networks to extract features from the text, then using softmax regression classifier for classification. The deep belief networks not only has a high learning ability, but also can extract highly distinguishable and low-dimensional features from the original high-dimensional features. So taking advantage of the deep belief networks to classify the text, can take into account enough information document amount. And the result shows that the use of deep belief networks achieve good performance for text categorization .

    • Replica Placement Strategy Based on Multi-layer Consistent Hashing in HDFS

      2015, 24(2):127-133.

      Abstract (1571) HTML (0) PDF 760.83 K (3363) Comment (0) Favorites

      Abstract:The HDFS distributed file system, with RackAwareness replica placement strategy, ensures the reliability of the data in a certain extent. But the data distribution will be unbalanced after the system runs for a period of time. Although the usage of Balancer program could redistribute tha data, the postposition of unbalanced treatment of the data storage affects the data read rate and reliability of the system. This paper adopts a replica placement strategy, which is based on multi-layer consistent hashing. At first, we will get the position of the frame which corresponds to replica through the consistent hashing algorithm, and then with the consistent hashing algorithm, we will get datanode position which is under the frame, finally, becoming the storage location. Consistent hashing algorithm uses the equal-sized partitions technology and the virtual node technology in the process of searching the corresponding position, which improves the search efficiency and the balance of distribution. The strategy, used in the data equilibrium storage and the upload rate, has greatly improved than the original one. Besides, it has the ability of replicas adaptability.

    • XML File Similarity Retrieval System Based on Lucene

      2015, 24(2):134-139.

      Abstract (1227) HTML (0) PDF 669.34 K (2008) Comment (0) Favorites

      Abstract:On the basis of analysis and study on the open source Lucene system architecture, a semantic search system is designed based on the special XML data sources in this paper. What's more, we use the word item location and word semantic to improve the Lucene's search results and conduct experiments to test and verify the retrieval performance, the accuracy of similarity search, the space efficiency of index and the time-efficiency of supporting inquiry: And finally by deploying the Tomcat server to implement our implement system. The experiment results prove that compared with the original Lucene indexing system, our system can improve the indexing efficiency, query efficiency and accuracy.

    • River Channels Extracting in Remote Sensing Images of Different Scale Based on Genetic Algorithm

      2015, 24(2):140-145.

      Abstract (1030) HTML (0) PDF 764.31 K (1796) Comment (0) Favorites

      Abstract:It is a crucial step in ice flood monitoring to retrieve river channels from remote sensing images. However, it is often the case that one image cannot cover the whole flooded channels, and several images are usually of different scale and deformation. Consequently they cannot be put together directly to form the whole flood channel. In order to get information of the whole ice flood sections, river channels fusion must be used. Features of river channels in remote sensing images of different scale are analyzed in this paper at first, and then the transformation model of point coordinates in different images is established. Parameters in the mathematical model are solved using the genetic algorithm, and river channels in different images are fused together. The genetic algorithm is stable and converges fast according to the processing result. This algorithm also can be adapted to other features fusion in remote sensing images.

    • CPE Security Authentication Mechanism Based on TR069 Protocol

      2015, 24(2):146-150.

      Abstract (1433) HTML (0) PDF 658.30 K (3559) Comment (0) Favorites

      Abstract:TR069 protocol is called the "CPE WAN Management Protocol". It provides a common framework and protocol which manage and configure for next-generation home network devices. Its protocol stack include some standard protocols, such as SOAP, HTTP, SSL/TLS, TCP/IP and so on. When Auto-Configuration Server(ACS) starts to establish connection with the Customer Premises Equipment (CPE), it may choose the layer of SSL/TLS to increase security. In this paper, the process of mutual authentication between CPE and ACS is encrypted, which is designed and implemented using OpenSSL development package, include the method of generate a self-signed certificate, and the process of certificate is verified. Finally, this paper verified its validity by experiment, and analyzes the key frame by capture package.

    • Selection of the Minkowski Exponent for MWK-Means

      2015, 24(2):151-154.

      Abstract (1224) HTML (0) PDF 823.22 K (2204) Comment (0) Favorites

      Abstract:Compared to the traditional K-Means, the MWK-Means needs to obtain feature weights adaptively and select suitable exponent. Choosing the Minkowski exponent in an unsupervised setting is a way to calculate three-scale values of each exponent. It gets the best of each exponent based on the selection criteria of three scales, and then gets the mean of two closer exponents. According to this strategy, we put forward a new strategy of selecting the Minkowski exponent based on ranking, ranked the values of three scales each. Then, we added the two closer rankings of each exponent as comprehensive rank and used them to determine the final exponent. This paper used the above two strategies of selecting Minkowski exponent to test UCI dataset. The result shows that the new strategy is better.

    • Automatic Identification of Uncertainty Information in Natural Language

      2015, 24(2):155-158.

      Abstract (1162) HTML (0) PDF 669.00 K (2193) Comment (0) Favorites

      Abstract:There are a lot of uncertainty information in natural Language. It is becoming a focus of researches in NLP recently. However, the research on Chinese is still scarce. In this paper, we use SVM, which is a good solution to the high dimension, nonlinear and local small sample, to identify Chinese uncertainty information recognition as a question of classification. We carry experiment on Chinese uncertainty corpus published by Fudan University, which confirms the availability exposed by our paper based on SVM. Compared to the sentence scoring model, our system has better recall rate.

    • Compressed Sensing-Based Robust Facial Expression Recognition

      2015, 24(2):159-162.

      Abstract (1226) HTML (0) PDF 726.93 K (1883) Comment (0) Favorites

      Abstract:In order to effectively improve the performance of facial expression recognition under the noisy background, a method of robust facial expression recognition based on compressed sensing is proposed. Firstly, the sparse representation of corrupted expression images of the identified test sample is sought, then the compressed sensing theory is used to solve its sparsest solution. Finally, according to the sparsest solution, facial expression classification is performed. Experimental results on benchmarking Cohn-Kanade database show that facial expression performance obtained by this method is better than the nearest neighbor (NN), support vector machine (SVM) and the nearest subspace (NS). Therefore, the proposed method shows both good recognition performance and high robustness on facial expression recognition tasks.

    • DHCP Client Based on None Operating System

      2015, 24(2):163-169.

      Abstract (1427) HTML (0) PDF 1.14 M (1912) Comment (0) Favorites

      Abstract:The paper takes embedded devices which consist of ARM Cortex M3/M4 core as the foundation, studies on solution of realizing DHCP client based on none operating system. Checking schemes of transport layer UDP are optimized. Static memory allocation is used for optimizing the running efficiency of DHCP and stability of the system. The optimization algorithm of resisting ARP spoofing in the process of DHCP is proposed. In order to improve the DHCP client network security and service performance, a method of updating the whole LAN's ARP caches according to DHCP ACK is provided.

    • Clustering Algorithm Based on the Cluster Radius Differentiation and Node Energy Interval

      2015, 24(2):170-173.

      Abstract (1129) HTML (0) PDF 659.00 K (1729) Comment (0) Favorites

      Abstract:In this paper, we propose an optimized Cluster Radius Differentiation and Node Energy interval algorithm, the CRDNE algorithm. This algorithm is aimed to prolong the network lifetime of electronic guide systems by balancing nodes' energy. In our CRDNE algorithm, we divide the tour guide area into hot spots and non-hot spots by routing hops firstly. Then, according to the characteristics of different spots, we give different definition of cluster radius. At last, we select the cluster head based on interval energy. At the end of our paper, we also give simulation results by comparing CRDNE algorithm, LDCR algorithm and Leach-V algorithm to show the superiority of our algorithm based on Matlab.

    • Piecewise Fitting of Trend Component from Timing Data

      2015, 24(2):174-179.

      Abstract (1127) HTML (0) PDF 675.90 K (2282) Comment (0) Favorites

      Abstract:Trend components often choose single form functions for fitting in the process of timing data modeling and analysis. Therefore, the fitting accuracy is difficult to improve for long timing data. As regard to this important problem, a piecewise fitting algorithm is implemented. Through the calculation of each order derivative of the timing data, the algorithm effectively divides the fitted timing data into a number of different patterns of subsequence. On this basis, corresponding fitting functions are chosen to fit each subsequence trend components respectively. Test results show that the new algorithm is feasible and effective.

    • Expected Speed of Intelligent Vehicle Setting by Distance Algorithm

      2015, 24(2):180-183.

      Abstract (1632) HTML (0) PDF 1008.48 K (2079) Comment (0) Favorites

      Abstract:This paper introduces an expected speed of intelligent vehicle setting algorithm called distance setting algorithm. Discrete setting algorithm and continuous setting algorithm, as conventional expected speed setting algorithm, both have problems. When the expected speed changes, the former one might cause speed oscillation and the latter one might have a delay output. Taking these problems into consideration, distance setting algorithm takes advantage of that the variation of speed is proportional to the increment of distance. This method could make a smooth speed transition and a quick adjustment to expected speed, avoiding oscillation. Experimental results show that this method has better performance than the conventional methods.

    • Method for Segmentation of the Low Contrast CT Images

      2015, 24(2):184-188.

      Abstract (1237) HTML (0) PDF 926.52 K (2639) Comment (0) Favorites

      Abstract:Vascular segmentation based on CT images plays an important role in many practical applications, such as disease diagnosis, surgical planning and so on. Due to limitations of individual differences and image forming apparatus, angiographic images still remain low contrast and strong noise. The paper provides a method of vessel segmentation, which first do the image preprocessing using histogram, then improve vesselness function of the vessel enhancement using Hessian matrix to make it more sensitive to small and fuzzy tubular structures, finally region growing algorithm is employed to extract the richer in vessel branching. The experiments proved the segmentation method can be achieved vessel segmentation accurately. It can avoid the error segmentation effectively and has a better robustness.

    • Fast Image Stitching in the Airborne Infrared Search and Rescue System

      2015, 24(2):189-194.

      Abstract (1167) HTML (0) PDF 762.55 K (1885) Comment (0) Favorites

      Abstract:The maritime search and rescue system which based on the helicopter plays an important role in the process of shipwreck. The current domestic maritime search and rescue flight team is not equipped with an infrared search and rescue system. It is imminent that the airborne infrared search and rescue system, which achieves fast and accurate positioning of the drowning. One of the difficulties is to achieve fast infrared image stitching. In this paper, on the basis of the existing algorithms, combined with the project requirements, a fast stitching algorithm for infrared images is proposed. Firstly, the original image is pre-treated to eliminate the effects of noise. Secondly, the image ROI area to be found by using of image similarity overlap and image matching is completed by using an adaptive algorithm based on the absolute difference. Finally, fusion of the continuous images is achieved by using the weighted average algorithms. The experimental results show that: the algorithm has a fast stitching speed and strong portability and practicality.

    • Improved Harris Corner Text Location

      2015, 24(2):195-199.

      Abstract (1254) HTML (0) PDF 731.81 K (1869) Comment (0) Favorites

      Abstract:The calculation of weighted corner saturation gets the wrong location in text when the corners are over crowding, or the corners are insufficient. This paper solves the overcrowding of non-text corner by using the aspect ratio data (the ratio of exernal rectangular height and width), area ratio data (the ratio of white area and external rectangular area) of the candidate block as the eigenvalue.This text location equation is put forward with the combination of Binary linear regression. Using the numerical of regional block ratio area of high to width ratio of the text region is usually appear the poles distribution, it employs constant C1 in the locationequation to locate the text. Then, it adds constant C2 when value between the poles to locate the non-text. The experimental results show that this algorithm has achieved better effect than the method of calculating weighted corner saturation.

    • Method Based on the Fault Signal Noise Ratio to Determine the Number of Principal Component

      2015, 24(2):200-205.

      Abstract (996) HTML (0) PDF 723.42 K (2009) Comment (0) Favorites

      Abstract:Multi-way principal component analysis (MPCA) is an effective method for fault diagnosis in batch processes. In MPCA, the determination of principal component numbers(PCs) is the key to the model, which concerns the reliability, accuracy, completeness of PCA model. The traditional method, using CPV to determine PCs, is too subjective and does not consider the failure factors. In order to improve the detection performance, and effectively extract principal component, this paper proposes a method that is combing SNR with MPCA to select PCs in batch process, SNR indicates the relationship between the sensitivity of fault diagnosis and PCs. On the basis that the principal information fully describes the data ,and considering the influence of fault information on CPs, then it selects principal component. Applying this method to fault diagnosis in penicillin batch fermentation process, the simulation results show that the response curves of T2 statistics and SPE statistics are more sensitive to fault, which effectively improves the accuracy rate of fault diagnosis.

    • Co-Channel Interference in a Dense WLAN Environment Based on NS2

      2015, 24(2):206-210.

      Abstract (1245) HTML (0) PDF 678.83 K (2126) Comment (0) Favorites

      Abstract:In this paper, we first introduce the reasons of co-channel interference in WLAN, and then build a dense WLAN environment in NS2. We explore the strength of the co-channel interference, as the number of APs increase in a dense WLAN environment, by measuring its total throughput, end to end delay and the average throughput. The simulation results indicate that the strength of co-channel interference follow certain rules. It provides a basis for controlling the strength of co-channel interference when we plan the WLAN network. It also provides references for the simulation study of the dense WLAN.

    • Cryptanalysis of Two New Certificate-Based Signature Schemes

      2015, 24(2):211-215.

      Abstract (1243) HTML (0) PDF 677.62 K (2205) Comment (0) Favorites

      Abstract:A new certificate-based proxy blind signature scheme is analyzed, which is proposed by Di Zhengyuan etc.. However, this scheme is insecure, because it can suffer from at least two types of public key replacement attack. That is, any one can replace the public key of the original singer or the public key of the proxy singer, and then forge a valid proxy signature on any message. In addition, the new certificate-based aggregate signature scheme propose by Chen Jianneng etc., is analyzed. The result showed that their signature scheme also can suffer from the public key replacement attack. Furthermore, the attack method in this paper has valuable reference to the construction of the type of certificate-based proxy signature.

    • Ontology Based Electricity Knowledge Management for Cross-Media Resources

      2015, 24(2):216-219.

      Abstract (1528) HTML (0) PDF 579.17 K (2145) Comment (0) Favorites

      Abstract:With the rapid growing of massive digital resource, how to manage different formats of digital resources efficiently and search the needed recourses accurately is very difficult for knowledge management in electric power enterprises. Most of the traditional search methods are based on keyword matching and fail to consider the semantic information, so these methods cannot provide accurate, personalized learning resources for users and lead to a serious waste of resources and manpower. In order to solve this problem, this paper uses semantic metadata to descript various heterogeneous resources, and develop an power knowledge ontology annotation method. With the proposed method, the different formats of digital resources of the electric power company can be retrieved effectively and the knowledge sharing and reuse can be achieved.

    • Improved Gray Correction Algorithm for Image Preprocessing Pavement Cracks

      2015, 24(2):220-223.

      Abstract (1140) HTML (0) PDF 753.55 K (1815) Comment (0) Favorites

      Abstract:In view of the traditional gray correction algorithm in the brightness uneven pavement crack image processing easily blurred edges, local contrast is not enhanced. This paper proposed a change the initial background image to select and adopt the local contrast enhancement of image and gray correction improved gray level image fusion algorithm based on fast gray traditional correction algorithms. The experimental results show that compared with the traditional method, the effect of pretreatment improved algorithm for pavement crack image is enhanced.

    • Interactive-Based Parallel Ant Colony Optimization

      2015, 24(2):224-228.

      Abstract (1232) HTML (0) PDF 718.86 K (1917) Comment (0) Favorites

      Abstract:Although a lot of important results are achieved in the research of traditional ant colony optimization, and there are many shortcomings in solving large-scale combination optimization problems, such as premature convergence and time consuming. Therefore, a parallelization of ant colony algorithm based on the combination of neighborhood search algorithm and ant colony optimization is proposed and realized. The results of experiment show that the parallel algorithm has much higher quality and stability than that of traditional serial ant colony optimization for solving large-scale TSP problems.

    • Analysis and Improvement of WSN Application Layer Protocol MQTT-SN and CoAP

      2015, 24(2):229-234.

      Abstract (1600) HTML (0) PDF 737.96 K (3932) Comment (0) Favorites

      Abstract:For the problem that WSN needs a suitable application layer communication protocol, this paper analyzes two kinds of mainstream WSN application layer communication protocols MQTT-SN and CoAP and gives the corresponding improvement schemes. By analyzing the design concept and working mechanism of these two application layer communication protocol, this paper shows the protocol performance and the differences among applicable scenarios. Using the CoAP advantages, we further improve the MQTT-SN scheme to make it is suitable for the P2P communication and the blockwise data transmission.

    • Research and Application of Curriculum Knowledge Atlas

      2015, 24(2):235-239.

      Abstract (1075) HTML (0) PDF 708.15 K (1657) Comment (0) Favorites

      Abstract:With the development of college education, courses and teachers are becoming increasingly more. To promote the curriculum and the teachers' knowledge sharing, this article studies the use of knowledge atlas. Based on the theory of knowledge map, this paper calculates the similarity of the course, teachers' membership degree and similarity, and to build the curriculum knowledge and teachers knowledge maps. It can realized the mutual navigation between curriculum and teachers through the knowledge map, and it also can recommend the corresponding teachers for users. Finally, we applied knowledge atlas to query, improve the efficiency of the query. The study of this paper has certain positive meaning to the knowledge sharing.

    • Platform for Automatic Processing of Meteorological Services Products

      2015, 24(2):240-243.

      Abstract (1304) HTML (0) PDF 702.33 K (1666) Comment (0) Favorites

      Abstract:A platform was developed by using C # and Microsoft Access 2010 in a VS 2010 development environment. The platform has many features that data collection, processing, transmission, backup, and the whole process of monitoring about meteorological service product of Meteorological Service Center of Shanxi. It has been put into trial operation of business, each module are working properly. It not only simplifies the workflow, but also effectively protect the timely arrival rate of meteorological services products to upload, thus greatly improving the work efficiency to achieve the desired effect.

    • Temporal Unified Power Grid Model

      2015, 24(2):244-247.

      Abstract (1502) HTML (0) PDF 1.10 M (2099) Comment (0) Favorites

      Abstract:In the production process of power grid, power grid resource management and standardized management have been put forward further requirements, it's need to build national network grid and horizontal and vertical into "ONE NET". This paper is based on the grid graph and data integration model, starting from the multi temporal unified version angle, analysising the management mechanism of flexible devices, topology and graph version, providing the safeguard for the power grid resource's graph and data consistency and integrity.

    • Electronic Handbook of Communication Equipment Failure Recovery

      2015, 24(2):248-252.

      Abstract (1379) HTML (0) PDF 664.78 K (1937) Comment (0) Favorites

      Abstract:Aimed at the current situation of army's communication equipment failure recovery, a new kind of electronic handbook of communication equipment failure recovery based on .NET is designed. The system uses .NET surroundings and Access data base and the core components of ADO.NET to realize the functions of user management and fault information management and data maintenance and so on. This paper firstly analyses the system's overall framework and system function. Then, it elaborates the system's key technology. Finally, it proves the validity of the system through general use.

    • Display Technologies on Ultra-high Resolution GIS Information

      2015, 24(2):253-256.

      Abstract (1188) HTML (0) PDF 1.16 M (1965) Comment (0) Favorites

      Abstract:To overcome difficulties in processing and implement the ultra-high resolution GIS map information display, technologies such as cluster parallel processing, WMS services, GIS rendering etc are researched in this paper. A cluster-based GIS tiled display system is presented. Parallel WMS access technology is used to get GIS data, projection transformation is discussed to process map data. And OpenGL texture rendering method is researched to parallel display. Thus, ultra-high resolution GIS data is displayed on the tiled screen. The experimental results show that the cluster-based GIS tiled display system presented is feasible and can greatly improve the display resolution of map.

    • Smart Home Burglar Alarm Subsystem Based on ARM+ZigBee

      2015, 24(2):257-260.

      Abstract (1414) HTML (0) PDF 702.36 K (2430) Comment (0) Favorites

      Abstract:This paper proposes a scheme of remote monitoring and alarm functions for home security subsystem by using ZigBee technology, image capture and compression technology and network transmission technology. It introduces how the system is designed and how it works generally. The overall block diagram design of the system, hardware platform of Anti-theft alarm subsystem, embedded software platform as well as diver programming have all been realized. Furthermore, the designed has improved both the image acquisition process and the programming of workflow for ZigBee. It turns out that users can remotely view image/video of the abnormal point to take further action when the system audible alarms and notifies the users at a certain time that detects an abnormality which makes it has practical significance.

    • Construction of Service Desk Knowledge Base Based on Hierarchical Knowledge Extraction Model

      2015, 24(2):261-265.

      Abstract (1136) HTML (0) PDF 791.70 K (1849) Comment (0) Favorites

      Abstract:In view of the shortcomings of traditional operational knowledge base construction, proposed an automatic hierarchical knowledge extraction model to build the knowledge base on service desk. Firstly, we made quantitative analysis on short text of events worksheet by the establishment of production and operation feature lexicon. Then, we used the improved KNN text classification algorithm to classify the short text of events. Finally, we completed knowledge discovery by the field topic rules. We applied this method to the construction of the knowledge base of enterprise service desk. It can automatically complete the transformation of events worksheet to knowledge, which not only makes up the defect of the hand to create knowledge, but also promotes the automation of the whole operational process.

    • Robot Control System Based on Gesture Recognition

      2015, 24(2):266-269.

      Abstract (1271) HTML (0) PDF 681.21 K (2518) Comment (0) Favorites

      Abstract:A robot control system based on the hand gesture recognition is researched in this paper. First of all, this system uses image recognition technology and YCrCb skin color model to find the palm. Then it analyzes the fingertip and palm center. Furthermore, using frame difference method to identify the movement tendency of the hand and some simple gesture information. Finally, the signals recognized by the system will be transmitted to the robot. This is accomplished through the wireless Bluetooth serial port, in order to control the robot by the hand gesture. This system, which is compiled by OpenCV computer vision library under VS2010, can control the robot through some simple gesture and get rid of the physical contact during the Human-Machine interaction. The experimental result shows that this system can control the robot move forward, move backward, turn left, turn right, stop, speed up in real-time and the recognition rate is above 90%. This technology also has a high reference value on researches such as machine learning and automatic recognition.

    • Introduction to Spring Zero Configurationand XML Configurationand

      2015, 24(2):270-275.

      Abstract (1356) HTML (0) PDF 601.68 K (2520) Comment (0) Favorites

      Abstract:The benefits and shortcomings of XML configuration and zero configuration of the Spring Framework is compared from several aspects. How to use two configurations flexible in the actual development is summarized to improve the efficiency of project development. Firstly, XML configuration and zero configuration of the Spring Framework is introduced. Secondly, how to implement dependency injection of the Spring Framework is illustrated through XML configuration and zero configuration. Then, the relative advantages of XML configuration to zero-configuration is analyzed from bone architecture and design aspects of the Spring framework. Practice results show that the zero configuration should be used during the development of practical application. And late in the development, when the function of the project is completed, zero configuration should be converted to XML configuration, disable zero configuration. Thus, the efficiency of project development will be improved significantly.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063