• Volume 24,Issue 4,2015 Table of Contents
    Select All
    Display Type: |
    • Effects of Decision Guidance on Decision-Making Performance of Choosing the Scene Rendering

      2015, 24(4):1-10.

      Abstract (1344) HTML (0) PDF 999.22 K (2034) Comment (0) Favorites

      Abstract:The emergency management information system can provide visual scene rendering when emergencies happen and assist the decision-makers to make reasonable decisions. Because of the limitation of emergencies' extreme conditions, the decision-makers should make effective decisions to the utmost. However, the premise of the highly effective decisions of the decision-makers is that they can choose the scene rendering which matches with the mission requirements. This study conducted two researches and found that the decision-making performance of scene rendering in which the decision-maker's independent choice matches the mission requirements is relatively low, while when there is support from the Decision guidance, the decision-making performance is relatively high. This study will discuss the research result as well as the influential factors, and then provide support for the design, scene rendering as well as the follow-up studies of decision-making performance of the emergency management information system.

    • Implementation of Automated Management Model for Requirement Change

      2015, 24(4):11-18.

      Abstract (1577) HTML (0) PDF 730.34 K (2424) Comment (0) Favorites

      Abstract:Changes of software requirement are uncontrollable. Requirement change and its chain reactions are the most influential risk factor for the project quality during any stages of software development. Automatical requirement management can minimize the negative impact of requirements change. Automaticity of requirement change management relies on formal level and degree of standardization. Based on ideas of recursion and decomposition, this paper analyzes the requirement analysis method, referred to ROB. ROB is closer to reality. ROB is easily understandable and acceptable. ROB is a requirements modeling approach based resource, organization and business. It makes an improvement on management processes and management organization, designs the storage model by formalizing the requirement as a tree. It achieves the automatical and intelligent requirement change management by modify the tree under certain rules and constraints. In practical applications, the effectiveness of our approach has been indicated with a software tool.

    • Real-Like Virtual Fitting for Single Image

      2015, 24(4):19-25.

      Abstract (1455) HTML (0) PDF 1.31 M (2473) Comment (0) Favorites

      Abstract:An image based real-like virtual fitting system focusing on head accessories such as glasses and hat is proposed in this paper. The key techniques are 3D registration and virtual-real synthesis. Firstly, a facial landmark detection and pose estimation based algorithm for capturing registration data is presented. Then the approach using color blending and depth buffering to solve occlusion and model material problem is discussed. The registration algorithm is evaluated on the AFLW(Annotated Facial Landmarks in the Wild) dataset and testified to be precise enough for virtual fitting. Finally, a series of virtual fitting results are showed. The experimental results, which are obtained on the condition of pose variation and part occlusion, indicate that the proposed virtual fitting technique is fast, accurate and real-like.

    • Editing and Simulation Technology for Configurable HCI

      2015, 24(4):26-31.

      Abstract (1422) HTML (0) PDF 1.02 M (2642) Comment (0) Favorites

      Abstract:HCI(Human-computer Interface) is widely applied in industrial control filed. In view of the traditional HCI picture which is fixed and has poor scalability problems, so editing and simulation technology of a configurable HCI is researched in this paper, which enables users to easily custom pictures for the HCI controller. Firstly, the current situation of domestic and foreign configuration and technology of HCI is introduced and the configuration of the HCI system structure is researched. Further, component technology making use of object-oriented technology and design patterns has been designed to achieve picture editing functions. At the same time, program design of simulation function is completed, which possesses a better user experience. Finally, a factory which is combined with reflection technology pattern is used to design for compatibility with different manufacturers. The research results can be used to guide the technology research and product development for configuration and simulation tools of the configurable HCI.

    • Robust Speaker Recognition in Multi-Source Environment

      2015, 24(4):32-37.

      Abstract (1828) HTML (0) PDF 790.99 K (1963) Comment (0) Favorites

      Abstract:The Speaker Recognition System is significantly affected by the Multi-Sound sources problem. In order to overcome this problem, a target sound extraction algorithm named time-frequency masking is proposed. The proposed algorithm is based on the sound source azimuth information and the approximate sparse nature of sound. A Mel-frequency cepstral coefficient (MFCC) based Gaussian mixture model (GMM) speaker recognition system is presented to improve the recognition robustness. The proposed algorithm has been tested on the simulated data through a number of experiments which shows the efficiency and robustness of the proposed algorithm. In the Multi-Sound sources environment, the recognition rate of the proposed algorithm can be improved by about 25%.

    • Simulation System of Equipment Reliability Evaluation

      2015, 24(4):38-43.

      Abstract (1245) HTML (0) PDF 1.69 M (1770) Comment (0) Favorites

      Abstract:The simulation system of equipment reliability evaluation is to the intelligent management of equipment in warehouse and improving overall equipment reliability. Aimed at the equipment reliability evaluation, equipment of warehouse can be modeled. The purpose of it is extracting effective factors to classify equipment and building two models that are the clustering model and the management model. These two models can be combined with the maintenance model, which is based on the equipment reliability evaluation, in order to realize the decisions of the equipment scheduling and maintenance. It can intelligently develop the schedule of equipment's using and maintenance. The structure of this system has certain significance for the study of the equipment reliability evaluation and management at the warehouse.

    • Production Decision Support System Based on Cloud Computing

      2015, 24(4):44-50.

      Abstract (1394) HTML (0) PDF 932.27 K (1979) Comment (0) Favorites

      Abstract:In order to assist enterprises with efficient production, this paper designed and developed a production decision support system (PDSS) based on cloud computing. Cloud computing platform was the guarantee of large scale application and big data processing. The PDSS was a four-layer architecture based on MVC (Model View Controller) pattern. The model base contained various production decision models, which offered a wide range support for the realization of system decision-making function. The data layer, as a data storage medium, provided big data support for PDSS. The system design fully considered the human-computer interaction, the running was stable, and the sub-modules were well connected with each other. Therefore, the PDSS can effectively provide scientific production decision support for enterprises.

    • Power Customer Service Data Analysis System in Big Data Environments

      2015, 24(4):51-57.

      Abstract (1692) HTML (0) PDF 720.31 K (4508) Comment (0) Favorites

      Abstract:As an external service window of power grid enterprise, the customer service center needs to integrate heterogeneous data sources within the enterprise, storage and analysis vast amount of customer service voice information and WEB service information. Hence, it becomes a very important topic on how to carry out the way to store various types of data in power grid efficiently, reliably, inexpensively and with availability of quick access and analysis. We have analyzed the key features and key technologies of big data, and designed the customer service data analysis system for power enterprises under big data Era. This paper covers data architecture, major system functions, key techniques and algorithms of the system. The system is designed on top of big data technology and data warehouse technology to centralized store, manage and use data, to achieve a unified data services platform through metadata management. The system is using Hadoop database for unstructured data storage, which works as data analysis and mining support platform as well. The data warehouse ETL component is designed based on CDC data warehouse ETL model, while the data presentation layer is using multidimensional data analysis techniques. Furthermore, the paper includes case review of the system which proves that the system is low cost with better scalability, reliability and parallel analysis features, etc. It may greatly improve the customer service level of power grid enterprise.

    • ARM-Based Fuzzy PID DC Motor Control System

      2015, 24(4):58-63.

      Abstract (1226) HTML (0) PDF 809.49 K (2370) Comment (0) Favorites

      Abstract:DC motor has a wide speed range, steady and smooth speed performance. The starting torque is large, easy-to-play parking, etc., especially suitable for use in high speed requirements of the occasion. Traditional PID DC speed control changes in working conditions need to adjust the parameters of the adaptive process is complex and difficult. The paper addresses this issue. This paper analyzes the operating characteristics of the DC motor constructed fuzzy rule table PID parameter adjustment, the theoretical analysis and simulation. On this basis, we design and implement a fuzzy PID DC speed control system for DC motor speed to control and display self-adaptivly. We design a fuzzy PID DC speed control system. The system consists of two parts and lower PC program controller, which uses the host computer program written in Visual Basic, is used to set the PID parameters, communication ports, speed display; lower controller uses ARM S3C2440 as the core control unit, including the IGBT drive section, H-bridge reversible circuits, communications circuits, power, speed feedback circuit. Simulation and practical experiments show that the system not only improves the adaptability, but also improves the speed and accuracy quickly. In addition, the modular system structure, easy to spread, can be used for the actual speed of occasions and education and training bench, has some theoretical and practical significance.

    • Optimization Scheme of Information Center Virtualization

      2015, 24(4):64-69.

      Abstract (1510) HTML (0) PDF 829.55 K (2039) Comment (0) Favorites

      Abstract:Based on the defects of traditional information center construction, this paper presents an implementation of virtual optimization vSphere architecture scheme based on informationcenter. Compared with other embodiments of virtualization, the scheme is mainly optimized from two aspects of reliability and storage I/O performance. The scheme optimizes the system reliability from three aspects of the server, network and storage equipment. It analyzes the influence factors of storage device's I/O performance. These factors are separately whether to use the multipath input and output, write-back cache write strategy, I/O disk block size and service performance etc. Finally, through the test of the whole system, we proved the advantages of the scheme.

    • CPU + GPU Technologies for Massive Information Display on Cluster

      2015, 24(4):70-74.

      Abstract (1371) HTML (0) PDF 1.72 M (2164) Comment (0) Favorites

      Abstract:There is much waste of computing resources in cluster, such as setting aside multi-core CPU, underutilization of GPU, separating the use of CPU and GPU. To use CPU and GPU better, some technologies, such as multicore CPU processing, GPU parallel processing and CPU + GPU integrated processing, are researched in this paper. A CPU + GPU cluster parallel display system is presented to improve the parallel display capability of cluster tiled system. The experimental results show that the CPU + GPU cluster parallel display system presented is feasible and can greatly improve the display speed of massvie information.

    • Website Whole Process Monitoring Based on BPC

      2015, 24(4):75-79.

      Abstract (1420) HTML (0) PDF 740.86 K (2616) Comment (0) Favorites

      Abstract:With the increasing competition in the telecommunication industries, the degree of service satisfaction has become an important criterion for customers to choose operators. To provide the best service, the operators are more and more focusing on the performance of the interaction between portal websites and users, but how to monitor various aspects of the response of the system during the interaction is a new challenge. The necessity of the constructing website whole process real-time monitoring system is discussed in this paper and some related technologies are introduced and concrete construction program is presented. Practice has proved that the whole process real-time monitoring system constructed by this program can accurately grasp the real-time response at any time to support all aspects of the system when the user accesses the situation from a business perspective and achieve all-round and whole process associated monitoring to detect abnormal problems in a timely alarm and enhance the user perception.

    • Real-Time Mobile Video Surveillance System Based on Multi-Protocol Communications

      2015, 24(4):80-85.

      Abstract (1574) HTML (0) PDF 726.97 K (2723) Comment (0) Favorites

      Abstract:A real-time mobile video surveillance system based on multi-protocol communications is proposed. The video acquisition module is established with Hi3520 board and mobile camera, while parameter-optimized H.264/AVC is used for video compression. And streaming media protocols compatible with RTP/RTSP and RTMP are used for video transmission; Mobile client based on Android platform can realize real-time analysis for network video streaming data etc. Experimental results show that there is only 1~1.5 second delay for the PC Client and the Video Capture terminal display. Thus the proposed system is a practical solution for the real-time monitoring of multiple application scenarios. The system designed here can obtain continuous scenes and realize HD, real time video monitoring remotely.

    • Cost Management of Highway Maintenance System Based on Client/Server Architecture

      2015, 24(4):86-89.

      Abstract (1450) HTML (0) PDF 747.31 K (2227) Comment (0) Favorites

      Abstract:With the rapid development of computer technology, network technology, information technology as a driving and implementation management system innovation, technology innovation, management innovation, an important means to strengthen the key competitiveness of management unit and the only way. So make full use of modern computer technology, to research developed a corresponding computer management system and it can convenient, accurate and fast provide scientific means for maintenance engineering budget. So it will help to improve the level of maintenance management. In this paper, a highway cost management system based on Client/Server design is studied and discusses the application of this system in the present advantages and technical development methods.

    • Automatic Test System of Digital Protection Device

      2015, 24(4):90-95.

      Abstract (1366) HTML (0) PDF 944.30 K (2136) Comment (0) Favorites

      Abstract:This paper aimds at improving the degree of automatic test of relay protection device further. It is based on the research of existing automatic test system of the relay protection device. It starts from the actual demand and R & D test principle. This paper designs a general automatic test system which can simultaneously support multiple relay protection devices. The maximum of the system has the advantages of existing automatic test system, using distributed architecture and module design idea, makse full use of the existing computer software and network technology, realizing multiple closed-loop automatic test device. Practice has proved that, the system used in the relay protection equipment R & D in the test, can greatly improve the testing efficiency and testing, to ensure the reliability of the device.

    • Large Enterprises Network Security Strategy and Multi-Node Coordination Mechanism Based on IPv6

      2015, 24(4):96-102.

      Abstract (1483) HTML (0) PDF 841.01 K (2129) Comment (0) Favorites

      Abstract:The network structure of large enterprises is complex. It requires cooperation between every department. Building a security policy system of multi-node cooperative mechanism can efficiently solve the problem onthe cooperative security management for large enterprises network. Based on the above background, this paper uses C/S structure, introduces the principle of ant colony and the algorithm of intrusion detection, to carry out a research on the coordination mechanism and security system of multi-node based on IPv6. The designed system in this paper is tested. The result shows it can handle the security problem of the large enterprises network well. It also implements the effective collaboration between large enterprises networks, and solves the problem on the cooperative security management of large enterprises network.

    • Data Monitoring Absorption Refrigeration System Based on LabVIEW and CAN Bus

      2015, 24(4):103-107.

      Abstract (1405) HTML (0) PDF 808.16 K (2770) Comment (0) Favorites

      Abstract:Absorbing refrigeration system will be an important direction of refrigeration technology. The absorbing refrigeration system has the features of long pipelines,complex equipments, numerous and dispersed monitoring points, this paper designs one distributed data acquisition and control system based on LabVIEW and CAN bus. By using CAN bus technology, CAN node is developed with analog data acquisition and control in this system. The system realizes data acquisition and control with the software of LabVIEW to dispose the data collected, which achieves real-time monitoring of the system. The control system composed by CAN bus technology is completely decentralized and simple in structure, stable in work, it makes real-time communication and monitoring between signal nodes come true.

    • Preprocessing Method of Color Contour Map Vectorization

      2015, 24(4):108-112.

      Abstract (2065) HTML (0) PDF 951.81 K (2512) Comment (0) Favorites

      Abstract:DEM generated by topographic map vectorization is wide used in many applications. Because the vague and adhesion phenomena in scanned terrain image will inevitably exist, the results of the contour extracting from blur images are not satisfactory in most cases. Combining with morphological mothod in both RGB and HSV color space, several elimination mothods are used to remove non-contour information, and the remains are color contour with many breakpoints. The UnSharpen Model(USM) is used to sharpen the contour line,then we use models to decrease the line width and to deblur the line in gray modes. By using the removed non-contour information, we propose a new breakpoint-matching method to connent the contour and generate more ideal binary contour with high-quality. The whole preprocessing algorithm is simple, easy to implement.

    • Preliminary Study on Hand Gesture Recognition Based on Convolutional Neural Network

      2015, 24(4):113-117.

      Abstract (2130) HTML (0) PDF 888.04 K (5377) Comment (0) Favorites

      Abstract:The paper proposed a new algorithm used for hand gesture recognition which based on the convolutional neural network. The method not only avoids the hand gesture in the early period of the complex pretreatment, but also can directly input the gesture of original image. The convolutional neural network is characterized by local receptive field, hierarchical structure, global learning for feature extraction and classical. It has been applied to many image recognition tasks. Experimental results showed that the multi-class hand gestures can be recognized with high accuracy, small complexity and good robustness, while the inherent shortcomings of the traditional algorithm are overcame.

    • Authentication Mechanism of Crossing Clouds in Hybrid Cloud Services

      2015, 24(4):118-122.

      Abstract (1268) HTML (0) PDF 687.11 K (2028) Comment (0) Favorites

      Abstract:With the rapid development of cloud computing, more and more businesses and individuals put there storage and computing needs into clouds. But as people have no more effective solutions for the security problems, the use and development are limited when getting data across the clouds. In this paper, we present a Kerberos-based authentication mechanism of crossing the clouds in hybrid cloud services. In this mechanism the Cloudterminal get to the certification with the Private-clouds directly. Issued by the tickets of enterprise Private-clouds Cloudterminal can get the access to the data in the Public clouds in a way based on authentication. In this mechanism there's no need to manage and issue certificates and the key management is simple and easy to control. This paper achieved this certification system, laid the foundation for secure authentication and access controlling when getting data across clouds.

    • Corner Detection and Target Area Extraction Based on Curvature

      2015, 24(4):123-128.

      Abstract (1309) HTML (0) PDF 902.39 K (2023) Comment (0) Favorites

      Abstract:In image retrieval, corner detection with auto-adaptive threshold and target area extraction based on curvature are proposed in this paper. The algorithm judges the importance of corners by using curvature. Firstly, it selects the true corners through the auto-adaptive threshold. Meanwhile, they enhance their curvature. Then, it determines the image's center of gravity by the corners with larger curvature. Last, it extracts the target area by regarding the center of gravity as the centroid. The image retrieval experimental results show that this algorithm can not only detect the corners and extract the target area effectively, but also improve the accuracy and efficiency of image retrieval compared with the traditional method. It provides a new approach for the retrieval of image with complicated background.

    • Weight Solving Method in Hybrid Kernel Function

      2015, 24(4):129-133.

      Abstract (1140) HTML (0) PDF 741.70 K (3222) Comment (0) Favorites

      Abstract:In order to overcome the limitation of single kernel in Support Vector Machine(SVM) model, hybrid kernel is usually used in forecasting. However, the weight of functions in the hybrid kernel is hard to calculate. To solve this problem, we propose a new method based on feature-distance. This method firstly gets an optimization function based on SVM's geometric meaning and a principle, which is the feature-distance of the same kind should be minimized and the different should be maximized, and then analyzes the optimization function to work out the weight. Experimental results show that compared with the cross validation method and PSO algorithm, this method reduces the computing time nearly by 70% with the accuracy kept unchanged.

    • Application of Image Recognition Algorithm in the Training System of Gathering Simulation

      2015, 24(4):134-138.

      Abstract (1118) HTML (0) PDF 721.03 K (1717) Comment (0) Favorites

      Abstract:This paper deeply researches the virtual simulation technology of oil gas gathering transferring system in the view of the present problem and defects existing in the virtual simulation technology. It treats oil gas gathering and transferring system in oil companies as main research object. The system extracts multiple eigenvalues of gathering and transferring tools' images which is on the basis of analysis experiment research in the image of oil gas gathering and transferring tools. This algorithm uses the HSV color space to extract images' color features and takes advantage of fourier descriptor to shape features. It identifies images by least squares SVM algorithm which finally implements real, safe, efficient training of staff, and has achieved good application affect after actual using.

    • Test Case Generation Method in Fuzzing

      2015, 24(4):139-143.

      Abstract (1642) HTML (0) PDF 970.69 K (2827) Comment (0) Favorites

      Abstract:Code coverage has been an important factor affecting the efficiency of Fuzzing, but it is largely affected by Fuzzing test cases, so it is very important to construct efficient tests. Applying genetic algorithm into the generation of test cases, it can not only reduce the redundancy of test cases, but also improve code coverage. So that we can fully test the target in less time, and improve the efficiency and effectiveness of Fuzzing test.

    • Application of the H.264 En/Decoding Algorithm in Video Conference System

      2015, 24(4):144-147.

      Abstract (1129) HTML (0) PDF 1.24 M (2181) Comment (0) Favorites

      Abstract:Video compression is the core technology for video conference, and its quality depends on the compression technology. The H.264 is a high-performance en/decoding algorithm, which has higher compression ratio and better network suitability. This paper introduces the key technology of the H.264 coding algorithm and the framework of Directshow technology. Besides, through embedding the FFmpeg, the open-source library of H.264, into the Directshow Filter Graph, researchers can encode and decode the video data of users.

    • Software Firewall Against DDoS Mimicking Human Behavior

      2015, 24(4):148-152.

      Abstract (1525) HTML (0) PDF 619.82 K (2343) Comment (0) Favorites

      Abstract:HTTP floods mimicking the human behavior is a kind of distributed denial of service attack. This paper presents a resist method, it includes three key points, uses session ID to identify users, discovers the puppet computer by analyzing the request sequence in unit time, interrupts the attacks by discarding or modifying the request message. A software firewall is implemented based on this method, it includes a statistics module and a forwarding module. The statistics module is used to discover the puppet computers. The forwarding module is used to discard or modify the request messages of puppet computers. The firewall is deployed on a web server, the administrator sets the running arguments according to the site characteristics, help rescuing the server from HTTP floods at a low cost.

    • Robust Adaptive Foreground Detection Algorithm Based on Parallel Framework

      2015, 24(4):153-158.

      Abstract (1169) HTML (0) PDF 788.88 K (1831) Comment (0) Favorites

      Abstract:Video surveillance data is increasing quickly, it's a challenge to separate out moving objects from a massive video data in the field of computer vision. The article designs and implements a Cloud-based distributed video processing framework, and proposes an improved adaptive foreground extraction algorithm based on gaussian mixture model(GMM). The method obtains the optimal parameters by adaptive learning gaussian distribution and online EM(Expectation Maximization) algorithm, and it fuses the improved algorithm to distributed video processing framework. The experiment shows that the method can not only greatly improve the efficient of video processing but also accurate extract foreground targets under complex environment , and it has good robustness.

    • Optimization Technology for Light Weight TCP/IP Stack Based on Multimedia Streaming

      2015, 24(4):159-163.

      Abstract (1076) HTML (0) PDF 1.01 M (2236) Comment (0) Favorites

      Abstract:This paper proposes a zero-copy packet loss recovery mechanism on light weight TCP/IP stack. Meanwhile, a new Persistent Timer especially for multimedia streaming is also described. With these two mechanisms, the multimedia streaming transmission could work more effectively and stably on embedded system, avoiding the network congestion. Besides that, an efficiency and stability test is proposed for this improved light weight TCP stack under various transmission situations. Experimental results show that the optimizated light weight TCP/IP stack could keep working under different network congestion.

    • Automatic Recognition of Analog Measuring Instruments Based on Region Growing

      2015, 24(4):164-170.

      Abstract (1262) HTML (0) PDF 889.33 K (2834) Comment (0) Favorites

      Abstract:Aiming at the difficulty of recogniseing complex multi-pointer instruments, this paper presents an automatic recognition system of analog measuring instruments based on region growing. The whole algorithm consists of pointer extraction algorithm based on region growing method and pointer recognition algorithm based on hit-miss transform method or least square method. Besides, the seeds needed by region growing can automatically obtained by fuzzy clustering based on difference image. Experiments show that, the pointer extraction algorithm based on region growing method effectively extract the features of pointers. And the extraction algorithm lays the foundation for the Hit-Miss transform method and the least square method to obtain good recognition accuracy. The algorithm is fast and efficient, can satisfy the requirements of real-time applications. This paper first applies region growing method of image segmentation to the field of analog measuring instruments recognition, enriches the method of analog measuring instruments recognition, achieved good recognition effect.

    • Hub-Based Initialization for K-hubs

      2015, 24(4):171-175.

      Abstract (1808) HTML (0) PDF 726.40 K (2077) Comment (0) Favorites

      Abstract:K-hubs is a Hub-based clustering algorithm that is very sensitive to initialization. Therefore, this paper proposes an initialization method based on Hub to solve this problem. The initialization method takes full use of the feature of the Hubness phenomenon by selecting initial centers that are the most remote Hub points with each other. The experimental results show that compared with the random initialization of ordinary K-hubs algorithm, the proposed initialization method can obtain a better distribution of initial centers, which could enhance the clustering accuracy; moreover, the selected initial centers can appear near the cluster centers, which could speed up the convergence of the clustering algorithm.

    • Multi-Objectives Job Shop Scheduling Optimization Based on Grey Entropy Parallel Analysis Method

      2015, 24(4):176-183.

      Abstract (1133) HTML (0) PDF 972.02 K (1950) Comment (0) Favorites

      Abstract:In this paper, the multi-objective optimization problem was solved with the theory of information entropy and gray correlation analysis method in parallel. The objective function values were used to structure a data sequence. The multi-objective optimization was complicated by using data sequence relation model. Firstly, the grey relational coefficient and the entropy weight were calculated in parallel based on multi-objective value sequence. Then, the information entropy and the grey relational coefficient were combined and used to calculate the grey entropy parallel relational degree (GEPRD), that is, the grey entropy parallel analysis method was built. Finally, the GEPRD was used as the fitness value calculation strategy to guide the evolution of the heuristic algorithm. The Tri-objectives optimization model of job shop scheduling problem was established. In order to verify the feasibility of the new method ,the grey entropy parallel analysis method was testified with differential algorithm and genetic algorithm respectively to solve the Tri-objectives job shop scheduling problem. Experimental results show that this method is effective ,with this method, the convergent and uniform distribution of Pareto can be obtained by this two algorithms. Indicated that it was effective and reliable.The solutions obtained by the difference algorithm are better than those of genetic algorithm.

    • User BehaviorCycle-Based Statistical Approach for Anomaly Detecting on Mobile Devices

      2015, 24(4):184-189.

      Abstract (1036) HTML (0) PDF 1.35 M (2562) Comment (0) Favorites

      Abstract:In this paper, we present a distributed anomaly detection system for mobile devices. The proposed framework realizes a client-server architecture, the client continuously extracts various features of mobile device and transfers to the server, and the server's major task is to detect anomaly using state-of-art detection algorithms. According to the regularity of human daily activity and the periodic of using mobile device, we also propose a novel user behavior cycle based statistical approach, in which the abnormal is determined by the distance from the undetermined feature vector to the similar time segments' vectors of previous cycles. We use the Mahalanobis distance as distance metric since it is rarely affected by the correlate and value range of features. Evaluation results demonstrated that the proposed framework and novel anomaly detection algorithm could effectively improve the detection rate of malwares on mobile devices.

    • Antibiotic Prescribing Behavior of Physicians Based on Improved Affinity Propagation Clustering

      2015, 24(4):190-195.

      Abstract (1092) HTML (0) PDF 821.61 K (1893) Comment (0) Favorites

      Abstract:A method based on improved affinity propagation clustering of data warehouse is proposed by analyzing physicians' antibiotic prescribing practices in this article. Loading pivottable by the data warehouse, we can select a representative physicians' antibiotic prescription data and find the internal factors of antibiotic prescribing behavior of physicians through improved affinity propagation. The data is from the antibiotic prescription of information system of a first-class hospital in Zhejiang province in 2012, which is studied through cross-sectional. Firstly, we build the data warehouse, then cluster and reduce the dimensionality of data set by improved affinity propagation clustering to get the training set and test set. Finally, the results show that different departments, months and types of antibiotics have significant impacts on the data of antibiotic prescriptions. There are significant differences of cephalosporin and penicillin with seasonal changes in this hospital which can be used as evaluation index of the doctor's prescription.

    • Top-N Recommendation Based on Preference Bipartite Network

      2015, 24(4):196-200.

      Abstract (1521) HTML (0) PDF 744.24 K (3325) Comment (0) Favorites

      Abstract:In view of the bipartite graph method of network-based inference (NBI) only considered whether users evaluated the project or not, but not given their scores, the thesis proposed a preferential network-based inference (PNBI) recommended method. Based on inference network, the method takes into account that user's rating values for the program reflects his degree of preference. In the "User-Item" resource allocation process, the method allocates resources to the item that gets a higher score, this method can overcome the NBI algorithm's disadvantage of failing to use low score value. Considering the sparsity of data, the method uses inverted list to discrese the number of calculation to accelerate the algorithm. Experiments on MovieLens dataset show that, PNBI bipartite graph recommended algorithm outperforms NBI bipartite graph recommended algorithm in accuracy, coverage and recall.

    • Improved P Algorithm and its Application in Pavement Crack Detection

      2015, 24(4):201-204.

      Abstract (1001) HTML (0) PDF 795.68 K (1785) Comment (0) Favorites

      Abstract:In view of the traditional P algorithm is easy to be interfered by the road markings, this paper designed a kind of improved P algorithm. It is used to obtain binary image for containing or not containing road crack image. The crack image which does not contain the road marking is the traditional P algorithm, and the crack image containing road marking were thinning of three cases. The experimental results show that, with the traditional P algorithm, the improved algorithm for pavement crack image segmentation and subsequent image processing to produce good results.

    • Cluster-Based Dynamic Classifier Ensemble Selection

      2015, 24(4):205-208.

      Abstract (1335) HTML (0) PDF 683.49 K (2574) Comment (0) Favorites

      Abstract:Dynamic classifier ensemble selection (DCES) is an important field in the machine learning. However, computational complexity of the current methods is very high. In order to solve the problem and improve the performance further, cluster based dynamic classifier ensemble selection (CDCES) is proposed in this paper. Using the proposed method to cluster the testing sample, the degree of DCES is reduced enormously and the computation complexity is decreased. At the same time, CDCES is a more general method and the traditional static ensemble selection and dynamic classifier is a specific case of the proposed method, so CDCES is more robust. Compared with the other algorithms on UCI data set, it is demonstrated that the proposed method is a more effective and lower computational complexity method.

    • Research and Improvement of K-means and Potential Function Clustering Algorithm

      2015, 24(4):209-213.

      Abstract (1558) HTML (0) PDF 781.49 K (2511) Comment (0) Favorites

      Abstract:In the present clustering method, k-means with potential function is the most commonly used algorithm, although the two algorithms have many advantages, but they also have their own limitations. The clustering number of k-means clustering algorithm cannot be determined, estimate in advance, at the same time sensitive to initial clustering center, and easy to be interfered by abnormal point, the clustering range of potential function clustering algorithm is limited, low efficiency of clustering multidimensional data. In view of the above two algorithms disadvantage, an improved clustering algorithm based on K-means and potential function is proposed in the paper. First, potential function method is used to determine the clustering number and initial center, and then cluster by using K-means method. The improved algorithm has the advantage of blind characteristics of potential function algorithm and also has the advantages of high efficiency of K-means. The experiment verified the validity of the improved algorithm, the results show that the improved algorithm have greatly improved in clustering accuracy and convergence speed.

    • Big Data Hybrid Computing Mode Based on Spark

      2015, 24(4):214-218.

      Abstract (1641) HTML (0) PDF 926.41 K (3024) Comment (0) Favorites

      Abstract:The use of big data in the real world was complicated. It may contain different characteristic of data and computing. In this case, the single computing mode was mostly difficult to met the application requirements. Therefore we need to consider different computing mode of mix use. The ultimate evolution of hybrid computing mode is spark system which invented by UCBerkeley AMPLab. It covers almost all the typical big data computing mode, including iterative computing, batch computing, memory computing, flow computing (Spark Streaming), data query analysis (Shark), and map computing (GraphX). Spark provides a powerful memory computing engine and implents computing with excellent performance, while maintaining compatibility with the Hadoop platform. Therefore, with the continuous stable and mature, Spark is expected to be colocalized with Hadoop and became a new generation of big data processing systems and platforms. The paper has studied and analyed the Spark ecosystem, and set up the hybrid computing model architecture based on Spark platform, which also has illustrated the spark ecosystem can meet the application of hybrid computing model.

    • Semantic Mapping Method on the Mobile Users' Point of Interest

      2015, 24(4):219-222.

      Abstract (1086) HTML (0) PDF 680.76 K (1923) Comment (0) Favorites

      Abstract:In view of the problem that marked the POI (Point of interest) of the current mobile users with no unified semantic ontology,this paper categorized POI and established POI ontology hierarchy tree for mobile users, then finished the mapping between the labeled POI information of users and the node of ontology tree by an improved mapping method to provided a unified standardized semantics for mobile users to mark information. An experiment is performed to evaluate the performance of the new similarity measure by using the labeled information of users in a period of 5 weeks, the results show that the method has high accuracy.

    • Data Distribution Management of Flight Simulation Based on HLA/RTI

      2015, 24(4):223-227.

      Abstract (1238) HTML (0) PDF 757.27 K (2491) Comment (0) Favorites

      Abstract:In the big-scale interactive simulation based on HLA/RTI, how to establish information exchange and delivery mechanism of Data Distribution Management (DDM) effectively, has become an important content of distributed interactive simulation. This paper introduces Federation Develpoment and Execute Process Model (FEDEP) and DDM in the simulation of HLA, and then a new DDM algorithm is proposed. The theory and the specific implementations of algorithm were presented. ased on analyzing the simulation system with the DDM algorithm. The result shows that the algorithm could improve data filtering rate effectively, accordingly shorten the simulation time.

    • OAuth Technology and its Application in the Cloud Computing

      2015, 24(4):228-232.

      Abstract (1143) HTML (0) PDF 632.71 K (2427) Comment (0) Favorites

      Abstract:Cloud computing is a complex network environment, and traditional applications use authorization and authentication based on a single security domain mode, it does not meet the requirements of cloud computing, cloud computing needs to establish cross-domain security access control policy. Based on the analysis of the challenges of data security and privacy protection in the cloud computing, this paper introduces the principle and function of the OAuth2.0 protocol, and points out the OAuth2.0 advantage of open license technology and its application in the cloud computing. Finally, through a cloud computing example, the implementation methods and development ideas had been discussed.

    • Journal File of the Secondary Development of the Fluent Based on the Ventilating System of the Subway

      2015, 24(4):233-238.

      Abstract (3619) HTML (0) PDF 878.06 K (2249) Comment (0) Favorites

      Abstract:In the process of applying Fluent software on the numerical analysis simulation of the subway air-conditioning and ventilation system, the designer of air-condition engineer may encounter many problems, such as repetitive work, demanding higher fluid professional knowledge and so on, but in this paper through using Visual Basic, the high-level programming language, compiler parameterized simulation system and invoke Journal parameterization log file can solve those problems. Using Journal parameterization log file is the most important method in the secondary development of the Fluent, not only can make the work more efficient but also can reduce the threshold of the user. The research includes three aspects. First, this research especially puts focus on the command stream file writing method (Journal file) of the software Gambit and Fluent. Second, according to the inputed parameters, the Gambit and Fluent software can automatically build the car body model, conduct numerical simulation calculation and save the Post-Processing Results. The last one, In the process of computing the Journal file of Fluent software can flexibly implement the related functions of CFD analysis, and realize the calculation analysis results compare with the experimental data. On the practical engineering the secondary development of Fluent has a very broad application prospect.

    • Intelligent Detection for IMU Based on Dividing Table Indexing Device

      2015, 24(4):239-243.

      Abstract (1416) HTML (0) PDF 732.23 K (1966) Comment (0) Favorites

      Abstract:According to the current situation that inertial measuring unit(IMU) is detected with low measurement efficiency and large amount of labour, this article designs and develops an IMU intelligent measurement system based on dividing table indexing device. This system makes use of dividing table indexing device to provide reference angle positions, takes advantage of industrial computer to control dividing table indexing device, programmable DC power and IMU to work orderly and harmoniously. Besides, host-computer software can control the programmable DC power to supply electricity for IMU, and automatically send, collect, analyze and process measurement data to detect IMU intelligently, efficiently and accurately. The experiment result shows that 4 IMUs can be detected automatically at the same time, all detection data can be computed, displayed and saved. Moreover, this system has the features of high detection precision, more efficient, high level of intelligence, small amount of labor, and high performance-cost ratio. In addition, all functions in software interface can be operated through manual touch, which makes it convenient to operate.

    • Selection of Drilling Equipments on Deepwater Semi-Submersible Platforms Based on FAHP

      2015, 24(4):244-248.

      Abstract (1038) HTML (0) PDF 738.94 K (2034) Comment (0) Favorites

      Abstract:The reasonability or drilling equipments selection is critical to the overall performance of the platforms. In this article, Fuzzy analytic hierarchy process was applied to select drilling equipments of deepwater semi-submersible platforms. In the case of drilling pump, selection evaluation model was established by considering technical factors and economic factors. The weight of each factor was calculated out by using FAHP and AHP respectively,then optional schemes were sorted out by integrated factor.The result show that the fuzzy analytic hierarchy process can solve the problem of drilling equipments selection effectively. The applicable scope of FAHP and AHP was summarized by comparing the results of two methods. In this way, we can lay a foundation for policymakers to use these analysis methods.

    • Network Communication Control System in the Video conference System

      2015, 24(4):249-252.

      Abstract (1332) HTML (0) PDF 997.39 K (1827) Comment (0) Favorites

      Abstract:In order to resolve the service quality problems of a video conference system in the IP network environment, on the basis of analyzing the video conference's structure and achievement characteristics, we propose the overall framework of the NCCS(network communication control subsystem) in the video conference system. We study realization methods of the NCCS and discuss the specific implementation process of system's various component modules. Finally, we mainly research high-performance concurrent security of network server and integration of multiple media data stream in the NCCS, in addition, we provide an effective solution to streaming media handling method for implementing video conference.

    • Distributed Media Management System of Video Conference Server

      2015, 24(4):253-256.

      Abstract (1200) HTML (0) PDF 655.80 K (2230) Comment (0) Favorites

      Abstract:For the TCP/IP based video conference has been the main requirement because of its convenience and thanks for the well implemented networks now, building a stable video conference server has been required. Differed from normal video-on-demand servers, video conference server requires more on real-time demands, and it faces higher rate of download and upload. Using the basic principles of HDFS for reference, this essay comes up with a reliable distributed file system for the video conference server.

    • Blind Recognition of Systematic Convolutional Code Based on DSP

      2015, 24(4):257-260.

      Abstract (1228) HTML (0) PDF 946.98 K (2207) Comment (0) Favorites

      Abstract:This paper researches an algorithm about the blind recognition of systematic convolutional code. By building data matrix and analyzing the rank property of the matrix, the algorithm can realize the blind recognition of channel parameters, which include the code length, code beginning, code rate, check polynomial as well as the generating polynomial. This paper also proposes the idea to transfer the algorithm to DSP. After transferring the software codes onto the hardware platform, we optimize the algorithm in the software CCS and then finish the simulation of the blind recognition of systematic convolutional code with code rate equals 1/2. It offers support to the fast implementation of the algorithm in actual projects.

    • Analysis of Multi-tier Application Information System Based on Object Component

      2015, 24(4):261-264.

      Abstract (1022) HTML (0) PDF 642.66 K (1680) Comment (0) Favorites

      Abstract:The development of network technology enables information systems to face security, scalability, stability, performance and other aspects of the new challenges. Multi-Tier application information system was proposed in this paper.The object component improves the performance of system. Multi-tier application information system was propitious to be maintained and understood and can provide flexible system architecture and adapt to the demand of enterprise informatization.

    • Three Dimensional Topology Based MAC Protocol for Underwater Acoustic Sensor Networks

      2015, 24(4):265-269.

      Abstract (1420) HTML (0) PDF 1.06 M (2146) Comment (0) Favorites

      Abstract:Due to underwater acoustic sensor networks' (UWASN) broad application prospects in recent years, it catches people's attention gradually. However, due to restrictive underwater environment, acoustic sensor network has some uniqueness. For example, unlike two-dimensional terrestrial sensor networks, underwater acoustic sensor network is three-dimensional. Today, the most existing Medium Access Control (MAC) protocol are designed for the two-dimensional wireless sensor networks, instead of wireless networks based on 3D rarely. In this paper, we proposed a three-dimensional network topology based underwater acoustic sensor network MAC protocol. Nodes in the network will be placed to tree structure according to this protocol. This protocol uses the relationship between the child and its parent, to achieve dynamic three-dimensional networks through dynamic node algorithm. In addition, we analyze and effectively resolved the collision between the nodes, greatly improving the channel utilization. Through the simulation software contrast experimental results of different protocols on the same network topology, it confirms that our protocol can effectively save a lot of energy.

    • Automatic 0-1 Programing Based Reassembly of Fragmented Chinese Documents

      2015, 24(4):270-273.

      Abstract (1422) HTML (0) PDF 736.35 K (1935) Comment (0) Favorites

      Abstract:In this thesis, feature of Chinese characters in regular fragments of document is studies and a method of extracting line-information of text is proposed. By defining the concept of L1-norm based differences between adjacent fragments, we develop a reassembly algorithm base on 0-1 programming and reduce the algorithm complexity by using cluster analysis. Compared with existing method, our reassembly method can fulfill the reassemble of given fragmented Chinese text effectively and efficiently without artificial supplementary.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063