• Volume 24,Issue 7,2015 Table of Contents
    Select All
    Display Type: |
    • Performance Evaluation of the Enterprise-level Virtualization

      2015, 24(7):1-8.

      Abstract (1549) HTML (0) PDF 1.12 M (3356) Comment (0) Favorites

      Abstract:With the rapid development of computer hardware performance and virtualization technology, server virtualization technology is being used increasingly to reduce the integration cost of information center room or improve hardware utilization. However, how to choose the best server hardware to build high performance and low cost virtualization platform, especially on performance evaluation is one of the urgent problems. This paper briefly introduces four kinds evaluation methods of virtual server. Through the analysis and comparison between different methods, it assess the advantages or disadvantages of evaluation methods and its application environment. Based on the analysis above, it puts forward reference suggestions for better deploying server virtualization system.

    • Research and Implementation of IM Based on MQTT Protocal

      2015, 24(7):9-14.

      Abstract (2984) HTML (0) PDF 679.60 K (8311) Comment (0) Favorites

      Abstract:With the development and popularity of the mobile Internet and intelligent terminal, Instant Messaging once again become a hot field. However. Due to limitations of the mobile terminal device in a low power, low bandwidth and other aspects, it calls for higher requirements on Instant Messaging protocol. MQTT(Message Queuing Telemetry Transport) was designed as an extremely lightweight publish/subscribe messaging transport, and it is ideal for mobile applications. This paper introduced the basic content and features of MQTT, and gave a comparison with other instant messaging protocols such as SIMPLE and XMPP, then proposed a instant messaging solution of mobile terminal based on MQTT. Based on open source MQTT Broker Mosquitto, this paper also designed and implemented a instant messaging client for mobile terminal, and this client achieved instant message,presence,group functions and so on.

    • Collaborative Filtering Recommendation Algorithm Based on User Preferences and Project Properties

      2015, 24(7):15-21.

      Abstract (1879) HTML (0) PDF 570.26 K (2908) Comment (0) Favorites

      Abstract:Collaborative filter algorithm is one of the most widely used technologies of personalized recommendation. However, the existing recommendation algorithms only consider the user item rating matrix specific value while calculating the target user neighbor. User preferences and user ratings and the relationship between the project properties are ignored. Moreover, the accuracy also needs to be further improved. To solve this problem, this paper proposed a new collaborative filtering algorithm based on user preferences and project properties (UPPPCF). By using the traditional user project evaluation matrix, the algorithm synthesizes user preferences and the project properties. The project score matrix is changed into project properties score matrix based on user preference. Then the nearest neighbors of target user sets are computed according to this new score matrix. As a result, the proposed algorithm overcomes the insufficiency of existing similarity calculation methods, which only depend on user ratings value. Meanwhile, an effective measurement method for predictor decision is suggested in this paper. The experimental results on MovieLen datasets show that the proposed algorithm can effectively improve the existing traditional collaborative filtering. In addition, the recommendation accuracy has been significantly improved.

    • Color Image Fusion Algorithm Based on Block Information Entropy

      2015, 24(7):22-28.

      Abstract (1412) HTML (0) PDF 1.34 M (2598) Comment (0) Favorites

      Abstract:A method of color image fusion is proposed based on block information entropy, concerning the spatial resolution reduction of the original artwork during the fusion process with the traditional image fusion method. The developed method generates new fusion image by blocking images, calculating the information entropy of the blocked image on the luminance component I in color space IHS, and fusing the pivot element of the corresponding block whose information entropy is more. The experiment suggests that the method proposed in this thesis is better capable of planning scenic detailed information as a whole, compared to the traditional color image fusion method. In addition, it performs exceptionally in many aspects including information entropy and average gradient. Therefore, it is indeed of some practical value.

    • Closed-Loop Product Lifecycle Management System for Intelligent Product Based on Network

      2015, 24(7):29-34.

      Abstract (1510) HTML (0) PDF 978.94 K (2711) Comment (0) Favorites

      Abstract:In order to achieve efficient management and take full advantage of the information produced by products in the period of usage maintenance and the ends, the concept and architecture of closed-loop product lifecycle management is introduced briefly. Based on that, plasma system is taken as a specific application example. The product life cycle information flow model is summed. The C-L PLM software for intelligent products is designed and realized. At last, an application is taken as an example, displaying the running state information of the key components of the probe measuring equipment.

    • Objectification Parallel Computing Framework

      2015, 24(7):35-40.

      Abstract (2011) HTML (0) PDF 1.22 M (2140) Comment (0) Favorites

      Abstract:At present, the distributed computing, parallel computing and memory computing are key technologies and research spots of improving performance. In Big Data scene, the computing performance of data statistics and analysis system degrades so noticeably that it cannot satisfy user demand. To deal with the problem, this paper provides the Objectification Parallel computing Architecture. Based on the architecture, we develop the system which includes the Object Server Component, Object Manager Component and Client Proxy component. The system is applied to the Electric Asset Quality Supervision Manage System (EAQSMS) of State Grid of China. The result shows that the statistics performance of system index is improved dramatically.

    • Statistics Information Management System

      2015, 24(7):41-45.

      Abstract (1382) HTML (0) PDF 647.47 K (2101) Comment (0) Favorites

      Abstract:Statistics work is the fundamental to achieve the enterprise information. With the increase of the requirement to statistics work, technology reformation of statistics is faced with the big challenge. In this paper, it is in allusion to the problem which is not satisfied by client in electric power statistics process to transform, with uniform data platform as centre. The statistics information management system is established which is combined with business intelligence and data statistics. In this system, it can unify data storage and standardize index management. Through the user interface, it can accomplish operation, like forms report, data examination and application analysis. It is proved availability of this research result with this system coming into service to statistics work that work pressure is lightened, work efficiency and quality is enhanced.

    • Research and Implementation of the Flexible Configuration in Business Process

      2015, 24(7):46-50.

      Abstract (1427) HTML (0) PDF 615.71 K (2228) Comment (0) Favorites

      Abstract:This paper implements a lightweight workflow engine system which is flexible and can be configured. The system uses tools of JaWE for visual modeling, then it generats XPDL format process definition file. It designs an engine executive mechanism based on Token, which makes the control of engine system with the business process implementation more accurate and efficient. It adopts appropriate process definition management strategy that gives the modification definition support during process operation. At the same time, the engine forms business system by using the way based on components configuration, which makes application engine business system have great flexibility. The engine system has been successfully applied in a pharmaceutical enterprise project management platform, and has obtained a good application effect.

    • Development of Flight-refuel Training Simulator

      2015, 24(7):51-56.

      Abstract (1393) HTML (0) PDF 1.28 M (2559) Comment (0) Favorites

      Abstract:The function of flight-refuel training simulator was proposed for requirement of flight-refuel training. The architecture of simulator was designed. The implement of simulator components were explained, which include simulation cabin, flight simulating, umbrella movement, movement platform, signal collecting control, manipulating loading, visual sign, instruction console, computing net and sound communication. The combination of object and picture was adopted in the simulator. The sense of arriving area is strong and the effect is vivid in the process of through the umbrella. The simulation training helped the flight of fighter plane, so a better apprise was given by training aviator. The simulator can improve the simulation training and promote the fighting capacity.

    • Modern Agriculture Data Acquisition System Based on 3G and STM32

      2015, 24(7):57-62.

      Abstract (1810) HTML (0) PDF 1.09 M (3362) Comment (0) Favorites

      Abstract:A kind of modern agricultural data acquisition system based on STM32 and 3rd Generation (3G) was introduced in this paper. The system could achieve the long-distance agricultural field for unattended monitoring, the collection of temperature, humidity, light intensity and other aspects data. By using the nRF24l01 wireless network was connected to a temperature and humidity sensor DHT11 and BH1750FVI light sensor. The data collected by nodes were transmitted to the control center. The RT-Thread embedded operating system was the software platform, which used light TCP/IP protocol stack LwIP Point to Point Protocol (PPP) dial of 3G module MC509 to connect to the Internet. It could carry out remote monitoring and management of the farm by the use of mobile phone Application (APP) or computer environment when the data was transmitted to the LEWEI Internet. Experiments showed that the system was stable. This paper provided a solution for wireless remote data monitoring. It had positive significance to improve agricultural management benefit.

    • Intelligent Tutoring System of Laboratory Based on Wireless Sensor Networks with ZigBee

      2015, 24(7):63-68.

      Abstract (1233) HTML (0) PDF 1.00 M (2089) Comment (0) Favorites

      Abstract:It is difficult to analyze students' score because of lacking recorded data, which will cause high costs in practical hands-on training of education. To address this problem, an intelligent tutoring system based on wireless sensor networks with ZigBee is designed. Firstly, nodes of WSN based on embedded operating system TinyOS are designed. Then, collector and coordinator are designed. Finally, experiments are done on 80 students with designed system in this paper. Experimental and analysis results show that a learning environment where wireless sensor networks provide a significant degree of support during laboratory sessions, student performance had significantly improved, and this has been proven evidently for the students in the low-achievement group when being compared to the results delivered by the students in the high-achievement group.

    • Password Cracking System Based on Rainbow Table in Distributed GPU Environment

      2015, 24(7):69-73.

      Abstract (1678) HTML (0) PDF 563.54 K (2705) Comment (0) Favorites

      Abstract:Rainbow table is the most commonly used tool in password cracking field. Rainbow table constructed by CPU occupies huge memory space and time, which is the biggest problem in rainbow table application. This paper concentrates on the research of the bottleneck problems of rainbow table: search time, construction time and memory space. By building a model of rainbow table parameters and time-space to analyze parameter values that can be used in application, high speed GPU was adopted to optimize construction method of rainbow table. A rainbow table password attacking system based on distributed GPU was designed and realized, including cipher extraction module, cipher distribution module, GPU managing module and rainbow table module. Test results in actual password attacking system show that the method can effectively develop password cracking efficiency, reduce rainbow table utilization of space and time and increase actual password length that rainbow table can attack.

    • Mobile Medical Consulting System Based on J2ME and J2EE

      2015, 24(7):74-78.

      Abstract (1227) HTML (0) PDF 724.19 K (1682) Comment (0) Favorites

      Abstract:For the convenience that the patient is not restricted to time and space to get the health care knowledge, this paper uses the technology based on J2ME and J2EE, designs and develops a mobile medical consultation system. The mobile client of the system can realize the functions of login for registered users, query for drugs, symptoms and disease, deployment for comments and announcement. The WEB server can manage the information of user, medical, disease, announcements and comment. The system can realize the maximization sharing of medical knowledge, and to a certain extent, alleviate the pressure of the difficult medical treatment and nervous medical resources. Experimental results show that the system has the advantages of simple operation, strong portability, fast loading speed and less resource-intensive, and thus reaching the design requirements.

    • Cold Roller Management Information System Based on the Internet

      2015, 24(7):79-82.

      Abstract (1382) HTML (0) PDF 1.01 M (1859) Comment (0) Favorites

      Abstract:Roller system management is related to the iron and steel company production efficiency. Establishing roller management information system could not only give a good guidance of an economic and reasonable way of using the rolls in the plant, in which the roller system management is regulated horizontally and vertically in the company, it could also waste the complicated and cumbersome manual recording and reduce the roller system failure rate and miss-operating and improve products quality. The system adopts the Asp language and combines Sqlserver 2008 powerful database system. Using LAN connects IE browser to operate, and realizes the management of tracking roll status, inventory and roll consumption, the detection of the roll system, scrap, exchange, inspection and fault searching. Recording to the historical trends, generates reports and prints and exports Excel files using Flash curve. Finally, it realizes the whole process network and whole life management of the rolls.

    • Automation Test Framework for MVC GUI Based on Robot Framework

      2015, 24(7):83-87.

      Abstract (2154) HTML (0) PDF 645.53 K (3484) Comment (0) Favorites

      Abstract:This article proposes an automated test framework for MVC GUI module, based on Robot Framework. The GUI automation test framework is divided into four aspects: user interface function testing, information set function testing, information query function testing, and special items testing. The whole framework, making the GUI test and the Database test combined together, fully completes the coverage of GUI automation test. According to different system environment, by writing Python scripts, the underlying data can be flexibly called. The combination of black-box and white-box test makes the tester quickly focus the code defect, and guarantees the correctness and completeness of the development program effectively. At the same time, the applicability of this test framework has been verified, as OpenWRT LuCI module specifically addressed.

    • Improved Minimum Link Load Balancing Scheduling Algorithm

      2015, 24(7):88-92.

      Abstract (1578) HTML (0) PDF 628.10 K (2115) Comment (0) Favorites

      Abstract:In case of limited resources, FTP service resource sharing platform cannot afford the rapid growth of visits, data capacity and network traffic required for computing needs with single server. This paper adopts a minimum connection scheduling policy design, achieves improved minimum link load balancing scheduling algorithm and evaluates the performance of the transmission speed, loading users number and disk read speed and other aspects in the redundant resource sharing platform of scheduling server designed by increasing the backup scheduling servers. The results shows that the performance of the resource sharing platform designed in this paper has significantly improved, which has practical significance in promoting the technology of building efficient resource sharing platform under conditions of limited resources.

    • Improved Multi-strategy Concept Similarity Calculation Method

      2015, 24(7):93-98.

      Abstract (1328) HTML (0) PDF 678.25 K (1869) Comment (0) Favorites

      Abstract:Ontology mapping is the key technology to solve the heterogeneous problem among ontology, and concept similarity computation is a crucial step in ontology mapping process. In view of the problems existed in ontology mapping, an improved multi-strategy ontology mapping model is proposed. The most related concepts are filtered based on similarity of concept names. Then we calculate concept similarity by combining property-based similarity, structure-based similarity and instance-based similarity. Finally, we use the test set called benchmark provided by OAEI to test the performance of our mapping algorithm. The experimental results show that this method improves the recall and precision of ontology mapping while maintaining mapping efficiency and currency.

    • Weight of Software Cost Estimation Analogy Model Using C&S-PSO

      2015, 24(7):99-103.

      Abstract (1400) HTML (0) PDF 675.75 K (1855) Comment (0) Favorites

      Abstract:Software cost estimation technology has become an important measure of software project management aspects of the control software schedule, reducing software risks and ensure software quality. In this paper, we use the model of C&S-PSO and weighted analogy estimates characteristic attributes to the weights. According to both MMRE and Pred (0.25) standards, we compare un-weighted analogy model, SRV, FNN and CART to estimate accuracy. Additionally, we use the non-parametric bootstrap method for raw data sampling, analysis PSO weighted analogy estimation model of stability. The results show that from the view of estimation accuracy the model of PSO has higher precision in weighted analogy estimates, and the model has also better stability.

    • Local Progressive Interpolation for Subdivision with Shape Control

      2015, 24(7):104-110.

      Abstract (1323) HTML (0) PDF 866.18 K (1956) Comment (0) Favorites

      Abstract:A new scheme for constructing a Catmull-Clark subdivision surface with shape control is proposed, which interpolates the local vertices of a quadrilateral mesh with arbitrary topology. Firstly, utilizing the local property of the progressive iterative approximation method, this subdivision scheme chooses a subset of the vertices on the control mesh to be adjusted and remains the others unchanged in the iterative process, it results the limit surface of the subdivision interoplates the corresponding subset of the vertices on the initial mesh. Secondly, the shape control for Catmull-Clark subdivision in the proposed scheme is based on a two-phase subdivision. The two-phase scheme works by applying a modified Catmull-Clark subdivision for the initial mesh to generate a new mesh firstly, and then applying the regular Catmull-Clark subdivision for the new mesh to resulting the limit surface. The modified subdivision scheme carries a parameter for each face of the initial mesh, and these parameters provide the degrees of freedom for the shape control of the interpolating subdivision surface. It is proven that the scheme based on Catmull-Clark subdivision with shape control is convergent. The experimental examples are given to show that the method is effective both in local progressive interpolation and shape control.

    • Recognition Algorithm for Display Value of LCD Meter Based on the ACSS Corner Localization

      2015, 24(7):111-116.

      Abstract (1645) HTML (0) PDF 807.48 K (1916) Comment (0) Favorites

      Abstract:In view of the problem of recognition for the value of LCD meter under the industrial field with complex background, an algorithm based on ACSS corner localization is proposed. Firstly, according to the principle of ACSS corner detection, a method which can be suitable to detect vertices of the value area is designed to locate the area. Secondly, the gradation characteristics of the display value is used to determine the area of the string, the local threshold is used to binary the string and then split the string. Finally, three-line scanning method is used to identify the character. Experimental results for heat meter prove the robustness and adaptability of the proposed algorithm.

    • Improvement and Implementation of SVM and Integrated Learning Algorithm

      2015, 24(7):117-121.

      Abstract (1279) HTML (0) PDF 635.51 K (2178) Comment (0) Favorites

      Abstract:The main drawback of support vector machine (SVM) algorithm is that it needs large memory and long training time while handling large training data set. In order to speed up the training and improve classification accuracy, this paper proposes a binary classification model, which fuses the Bagging, SVM and Adaboost algorithm. And a kind of denoising algorithm is proposed. Contrast SVM, the SVM-Adaboost and classification model proposed in this paper by experiment. With the expanding of training data, this classification model has improved training speed significantly under the premise of improving accuracy.

    • Agent-Based Orphan Problem Solving Algorithm in ZigBee Networks

      2015, 24(7):122-127.

      Abstract (1089) HTML (0) PDF 683.52 K (1834) Comment (0) Favorites

      Abstract:The default distributed address assignment mechanism (DAAM) of ZigBee protocol exits orphan problem without a good solution. This paper presents a mechanism called agent based address assignment mechanism (ABAAM) which can effectively reduce the orphan problem caused by the network preset parameters and nodes position. When one node cannot join the network, it selects one route node in the neighbor table as an agent and joins the network; the tree routing protocol is also improved to be compatible with the current allocation algorithm. Theoretical analysis and simulation show that the proposed algorithm has a better performance in the success rate than the default DAAM algorithm.

    • Application of Duplication Removal Method of Rabin Fingerprint in Search Engine

      2015, 24(7):128-131.

      Abstract (1141) HTML (0) PDF 945.87 K (3011) Comment (0) Favorites

      Abstract:The existing search engine of massive data takes up large memory, needs much time and provides results of great duplication rate. To overcome these disadvantages, this paper proposes a duplication removal method based on the Rabin Fingerprint method, which cannot only remove the duplicated URL, but also remove the same even similar website content on different URL so that it can speed up the searching speed, save the memory capability and improve the accuracy of the research.

    • Application of Digit Recognition Based on Hopfield Neural Network with CS

      2015, 24(7):132-136.

      Abstract (1032) HTML (0) PDF 752.90 K (2058) Comment (0) Favorites

      Abstract:The basic theories of cuckoo search (CS) and Hopfield Neural Network (HNN) are introduced, and the application of Hopfield Network in the digit recognition is researched. Aiming at the problem that Hopfield Neural Network can easily fall into local minimum, a new method that Hopfield network combines CS is presented. The method uses the global search capability of CS for complex, multimodal, nonlinear and non-differentiable functions to make Hopfield network keep a higher success rate even if noise-to-Signal ratio is high, and a simulation was carried out. Experiment results show that this method has a better performance.

    • Restudy of Features Principal Component Algorithm

      2015, 24(7):137-141.

      Abstract (1094) HTML (0) PDF 765.85 K (1573) Comment (0) Favorites

      Abstract:This paper analyzes the “distance method” that is an algorithm of language features and points out the questions of “distance method”: “Breakpoint” that be used cut into two sets will affect the accuracy of calculation. It designs a new algorithm named “clustering method” with the idea of clustering analysis. The defects of two methods can complement each other and should be used together in practical application.

    • Fourier Series Fitting Method of Multiple Periodic Time-Series Data

      2015, 24(7):142-148.

      Abstract (1024) HTML (0) PDF 802.30 K (2049) Comment (0) Favorites

      Abstract:Generally speaking, time-series data can be divided into three ingredients such as trend, random and season. Analyzing and modeling through the available time-series data, change law can find things contained. A kind of high precision data fitting method was designed for multiple periodic time-series data. Firstly, the algorithm eliminated random component of fitted time-series data. Secondly, several co-primed basic cycles were analyzed by the application of the theory of autocorrelation function. Finally, multiple periodic time-series data was fitting by using multiple sets of Fourier series based on the least squares principle. Practical application proved the effectiveness and progressiveness of the algorithm.

    • QR Code Design of Information Security Based on Rijndael Encryption Algorithm and SHA512 Encryption Algorithm

      2015, 24(7):149-154.

      Abstract (1181) HTML (0) PDF 1.33 M (3066) Comment (0) Favorites

      Abstract:With the QR code technology being widely applied in electronic ticketing, bank checks, E-commerce and other fields, many safety problems have emerged, such as information leakage and data tampering. Based on Visual Studio 2008 c platform, the method with Rijndael random variable and random keys secondary Rijndael encryption protection is proposed using Rijndael encryption and SHA512 digital signature technology. This paper presents a novel design of information security before generating QR code. The encryption principle, algorithm and implementation, safety performance of the proposed method are discussed. Also corresponding testing and analysis are provided to verify the feasibility of the proposed algorithm. Results have proved that the information safety performance of QR code is greatly increased with the encryption algorithm, the efficient management and the multiple- protection to a key. This just causes a smaller increase in the content of the encryption data than those of the raw data.

    • Word Similarity Computing Method Based on HowNet

      2015, 24(7):155-158.

      Abstract (1166) HTML (0) PDF 724.96 K (2158) Comment (0) Favorites

      Abstract:A common method of word similarity computing is based on a semantic dictionary. This paper introduces the “HowNet” in the basic concepts and hierarchical architecture, drawing lessons from Liu Qun, Li Sujian basic theory in word similarity. It makes use of “HowNet” sememe hierarchical architecture to calculate sememe similarity, then calculates the similarity of the concept, and finally gets the similarity of the words. This paper also makes appropriate adjustment to the computing method, so that the calculated results can be more in line with the actual situation.

    • Mixed Biogeography-Based Optimization Algorithm for Data Clustering

      2015, 24(7):159-164.

      Abstract (1005) HTML (0) PDF 739.50 K (1861) Comment (0) Favorites

      Abstract:Cluster analysis is an important task of data mining, however, traditional biogeography-based optimization algorithm with limitations such as prematurity and poor convergence can not satisfy the demands of solving the NP (Non-deterministic Polynomial) clustering problem. A novel algorithm Mixed Biogeography-Based Optimization (MBBO) is proposed. The algorithm integrates a new migration operator, which is constructed on gradient descent local search, and uses clustering validity index as the individual fitness to optimize implicit cluster structures in datasets. Experimental results on the four benchmark datasets (Iris, Wine, Glass and Diabetes) show that MBBO algorithm outperforms the traditional optimization algorithms such as PSO, BBO, and K-means in terms of clustering validity and convergence, and can acquire the higher quality cluster structures of the datasets.

    • Improvement of OPIC Algorithm Based on Indexed Properties

      2015, 24(7):165-168.

      Abstract (1072) HTML (0) PDF 709.01 K (1945) Comment (0) Favorites

      Abstract:The reliability of search results is an important index affecting the majority of Internet users use search engines. TS algorithm is proposed based on the open source OPIC algorithm. The algorithm is based on improved indexing attribute and to create two properties includes Webpage creation time and Webpage depth added to TS algorithm to realize the diversification Webpage score. This can improve the disadvantages of the OPIC algorithm emphasis on the history of the page, to make the search results more reasonable. Finally, it is proved by experiments that the result of TS algorithm is more reliable.

    • Personalized Recommendation of Book Services Based on Cloud Computing Technology in Triple-Play

      2015, 24(7):169-174.

      Abstract (1264) HTML (0) PDF 713.81 K (1522) Comment (0) Favorites

      Abstract:With the rapid development of cloud computing, the number of book services based on SaaS will grow rapidly, which makes it difficult for users to decide in personalized services selection. By establishing preference tree, we have constructed user model and service model of book services based on cloud computing technology in triple-play. In order to solve the recommendation problem, an algorithm of service selection is designed. The analysis and experiment show that the algorithm can achieve service selection according to user preferences.

    • Decision-Making Algorithm Combining Information Fusion and BP Neural Network

      2015, 24(7):175-179.

      Abstract (1438) HTML (0) PDF 1.16 M (2404) Comment (0) Favorites

      Abstract:The fixed BP (Back-Propagation) neural network structure can hardly play to its advantage when the input information become complicated and variable. So the decision- making algorithm is proposed, which combines information fusion with BP neural network. That is, using Dempster-Shafer(D-S) evidence theory to select the structure of BP neural network according to the changing input information. Simultaneously, the initial values are optimized by the Particle Swarm Optimization (PSO) algorithm to improve the problem of BP Neural Network's easily trapping into the local minimum and slow convergence rate. The simulation result shows that through the optimization of combined information fusion with BP neural network, the training time and prediction accuracy are more effective than that only using BP neural network, which has certain advantage of adapting to the complex and varied input information.

    • Improved Limited Tolerance Relation Model Based on Degree of Difference Between Objects

      2015, 24(7):180-184.

      Abstract (1034) HTML (0) PDF 739.28 K (1602) Comment (0) Favorites

      Abstract:The classical rough set theory is not directly to deal with incomplete information system, therefore, the rough set model of tolerance relation, non-symmetric similarity relation, limited tolerance relation, limited non-symmetric similarity relation and limited non-symmetric similarity relation model based on object difference degree have been proposed. Through the analysis of the advantage and disadvantage of these models, the new definition of the degree difference between objects, it puts forward a new extension of rough set which is limited tolerance relation model based on degree of difference between objects, the results show that the proposed model more accurate, more practical.

    • College Entrance Examination Voluntary Recommendation System Based on Collaborative Filtering

      2015, 24(7):185-189.

      Abstract (1719) HTML (0) PDF 839.07 K (4024) Comment (0) Favorites

      Abstract:Information overload problem in recent years makes the personalized recommendation technology arise, the collaborative filtering recommendation technology by establishing contacted between the user and the information has been widely used in every field of e-commerce. And in the field of the college entrance examination voluntary students also have the “information overload” problem, which means they cannot choose the suitable college from many colleges efficiently. Therefore, the idea of collaborative filtering is applied to this new field, take the students as users and colleges as the items in the recommendation system. By analysing students' voluntary reporting relevant data from the previous year, three processes of building user attributes matrix, finding the neighbor users and generating recommendation are described in detail. The recommendations results of the experiment show the effectiveness of recommendations systems, and it lays the foundation for further research work.

    • Kernel Module Detection Method of Guest Virtual Machine Based on Virtualization Technology

      2015, 24(7):190-194.

      Abstract (1398) HTML (0) PDF 827.16 K (2082) Comment (0) Favorites

      Abstract:The virtualization technology is one of the key technologies of the cloud computing. Meanwhile, monitoring virtual machine is an important function on the virtualization platform. In order to obtain the internal information of the virtual machine better, a lightweight virtual machine kernel module detection method (KMDM) is designed and implemented on the virtualization environment of Xen. The KMDM resides in the host machine and uses the virtual machine introspection mechanism to obtain the kernel module information of the virtual machine. The experimental results show that the KMDM can detect the kernel module information of the guest virtual machine, and the detection results are accurate and reliable.

    • Automated Method for Detecting Reflected XSS Vulnerabilities of Android Apps

      2015, 24(7):195-199.

      Abstract (1324) HTML (0) PDF 715.83 K (2762) Comment (0) Favorites

      Abstract:This paper presents an automated method for detecting reflected XSS vulnerabilities of Android Apps. Through identifying and classifying Android Apps components, automatically inputting test cases, clicking on the input box-related buttons and monitoring the results, to determine whether the applications have potential reflected XSS vulnerabilities. Moreover this method implements support for WebView by image processing. Based on this method, a prototyping tool is also implemented. The experiment results demonstrate that this proposed method can detect reflected XSS vulnerabilities of Android Apps with high practicability and effectiveness.

    • Application of Improved Apriori Algorithm in Social Network Friends Recommendation

      2015, 24(7):200-204.

      Abstract (1261) HTML (0) PDF 719.34 K (2348) Comment (0) Favorites

      Abstract:Considering the limits that the Apriori algorithm produces numerous candidate itemsets during the self-joins of frequent items and scans database time after time, this paper proposed an improved algorithm. This algorithm maps the database to a boolean matrix, and then, deletes those meaningless items and records after the AND operation between matrix columns. This will greatly reduce the time and space complexities. Applying to the friend recommendation algorithm in social networks, this improved algorithm regards the interested users and information as records, takes the concerned users as deal items, builds a transaction database, computes frequent 2-item sets and recommends Top-N users ranked by supporting number as friends. The experiment proves the improved algorithm has higher precision and recall in friend recommendation algorithms of social networks.

    • Opening Laboratory System Controller

      2015, 24(7):205-210.

      Abstract (1081) HTML (0) PDF 780.00 K (2084) Comment (0) Favorites

      Abstract:In order to promote the opening and informationization management of laboratory, a set of field controller applied to open laboratory system is designed by using Zigbee and multiple sensors. The controller can collect and report the data of laboratory environmental parameters, lights and running status of curtains, and implement the remote and linkage control on the lights and curtains according to the preset strategy. Open laboratory system composition is introduced. On this basis, the controller hardware structure and realization methods of software and hardware are analyzed and the feasibility and effectiveness of the design scheme are verified by experiment.

    • Low-resolution Safety Helmet Image Recognition Combining Local Binary Pattern with Statistical Features

      2015, 24(7):211-215.

      Abstract (1461) HTML (0) PDF 760.64 K (2500) Comment (0) Favorites

      Abstract:According to the entrance and export of construction surveillance video, this paper discusses the low-resolution image recognition method of the safety helmet and deduces the relation of different features and classifiers with recognition rate in view of taking account of the low-resolution safety helmet recognition problem at the long distance. It first captured the head of video to obtain images of the size of 22×22, and then extracted the statistical features of each image, LBP and PCA features. Finally, the recognition rate of test sample was calculated by taking advantage of minimum distance classifier and BP artificial neural network. The experimental results show that the LBP statistical features in combination with BP artificial neural network can recognize the safety helmet effectively. The recognition rate reached 87.27%.

    • RMB Authentication Technology Based on Color Ink Image

      2015, 24(7):216-220.

      Abstract (1055) HTML (0) PDF 725.98 K (2142) Comment (0) Favorites

      Abstract:The traditional algorithm and system designed by using the color sensitive sensors and the mechanism of changing color of the color ink is facing the complicated hardware design and constrains about the space inside the banknote counting machine in the practical aspects. In view of this, an algorithm of using the color information of the color ink image based on a single ordinary camera to effectively achieve authentication is proposed. Under the condition of the same color temperature, the color aberration between the color of the color ink themselves and the background color is treated as the principal component of features, and the other color features are combined, it can achieve whether the currency is true or false by the nearest neighbor classifier in the color ink image which is acquired by the CMOS image sensor—MT9T001. Experimental results show that the false accept rate(FAR) is high and the false alert rate is low. Compared with the existing algorithms, it did not only simplify the hardware design and space requirements, it also has a good performance of grasping the false. Now it has been applied to an embedded system.

    • IMS Access Gateway Intelligent Routing

      2015, 24(7):221-225.

      Abstract (1197) HTML (0) PDF 806.59 K (2231) Comment (0) Favorites

      Abstract:In the digital telephone switching system, designing an IMS access gateway is to solve the applications of voice access to the CM-IMS network. When IP or the TDM relay failed, the IMS access gateway intelligent routing can reconnect automatically. According to the actual configuration, the routing strategy can meet the reliability of communication and lowest cost. This paper introduces the application and research of IMS access gateway and expounds the situation of Asterisk. It describes the function of IMS access gateway intelligent routing and analyzes the design in detail, including the attributes of the routing and the definition of data structure. Finally, I realize the function of intelligent routing in combination with the Asterisk open source project. Choosing relay and number transform are verified by experiments. And the intelligent routing has reached the requirement of reliability and low cost.

    • Visualization and Control of Flight Simulation Model Based on XNA

      2015, 24(7):226-231.

      Abstract (1409) HTML (0) PDF 624.96 K (2189) Comment (0) Favorites

      Abstract:Compared with other third-party flight simulation software development platform, XNA framework is an application of Microsoft Visual Studio integrated development environment extensions, and the flight simulation software development which has independent intellectual property rights. This paper focuses on the visualization and control issues based on XNA flight simulation model; it briefly includes loading and rendering of the key technologies of flight simulation model, and the theory and way for the control of aircraft components like the rudder, aileron and landing gears. It proved that the XNA framework can also be simple to efficiently implement the visualization and control of the flight simulation model, with independent intellectual property rights of flight simulation software development and provide a new method based instance.

    • Asynchronous Communication Between Windows and Linux Platforms Based on Socket

      2015, 24(7):232-235.

      Abstract (1493) HTML (0) PDF 637.81 K (2739) Comment (0) Favorites

      Abstract:This article analyses the principle and characteristics of I/O multiplexing models. It uses the socket's asynchronous communication to solve the problem of insufficient number of concurrent when Windows platform communicates with Linux platform. And the whole system adopts Client/Server model to build cross-platform asynchronous communication program. The server uses the epoll model provided by Linux and the client uses the AsyncCallBack provided by.NET to realize the cross-platform asynchronous communication. In addition, the program combines with the multithreading programming method to deal with the display problem of the client. From the observation of communication process, the server can receive data sent by multiple clients in the meantime and return data to them. In conclusion, with the using of the epoll interface, Linux server's concurrency is improved. For this reason, the real-time performance of the network communication between Windows and Linux platforms is also improved.

    • Python3 Programming Environment Based on Web

      2015, 24(7):236-239.

      Abstract (1680) HTML (0) PDF 1.02 M (2879) Comment (0) Favorites

      Abstract:In order to simplify the programming environment, and enhance programming experience, we propose a web-based python3 programming environment. The web environment of this application uses python-based Django framework. This application can achieve the purpose of running python3 code in the browser by convering the python3 code into browser executable JavaScript script. Compared with traditional python3 programming environment, this programming environment can achieve remote programming and code sharing without installing and deploying any development environment locally. Experimental results shows that our programming environment has strong feasibility, good stability and good concurrency.

    • Optimal Implementation of Lblock on FPGA

      2015, 24(7):240-243.

      Abstract (1819) HTML (0) PDF 716.41 K (3313) Comment (0) Favorites

      Abstract:LBlock is a lightweight block cipher designed by Wu Wen-ling and Zhang Lei in ACNS 2011. In this paper, the optimal implementation of LBlock encryption algorithm in hardware is studied. Firstly, the same operation is realized in one module, then the main program calls several times to complete the encryption, especially 32 in Block. Secondly, the same register is used in the subcell and key transformation, the cipher round operation and key update is designed in same module, so that it can release the number of the registers and accelerate the speed of implementation. Last, the sub-modules are combined into a complete program, the correctness of Lblock is tested. It can greatly reduce the area of LBlock algorithm by the optimal method, which can meet the application requirements of smaller chip area and provide reference for the further application of IOT encryption.

    • Research on DHCP Failover and Its Experimental Design

      2015, 24(7):244-249.

      Abstract (1501) HTML (0) PDF 1.34 M (2590) Comment (0) Favorites

      Abstract:DHCP services are widely used in large-scale network infrastructure. In order to setup secure, reliable DHCP Server, the authors study the Failover protocol and design experiment on the application of DHCP Failover Server based on the LINUX environment. This paper describes in detail the configuration of DHCP Failover Server in the experiment, network security configuration and the verification of experimental results. The experiment shows that a disaster backup of DHCP Server effectively ensures the stability of users' network and improves the efficient in the use of IP resources.

    • Improved Leach Protocol for WSNs Based on NS2 Simulation

      2015, 24(7):250-253.

      Abstract (1158) HTML (0) PDF 706.14 K (1704) Comment (0) Favorites

      Abstract:This paper proposes an improved LEACH protocol method based on analysing the LEACH protocol of WSN in operating mechanism, adapting to the scene and exiting defects. At last, the emphases is proving the improved LEACH protocal method's practical operating performance by simulating with NS2 environment. The simulation results show that the improved LEACH protocol method can extend the operating life of WSN, save the limited energy of nodes, reduce the mass extinction of nodes and keep an adequate quantity nodes to operate compared to the routine LEACH protocol.

    • Soldering Robot Path Optimization Based on Removed Cross Point Ant Colony Algorithm

      2015, 24(7):254-258.

      Abstract (1435) HTML (0) PDF 672.06 K (1890) Comment (0) Favorites

      Abstract:Concerning the short comings of ant colony algorithm on soldering robot path optimization,we propose an algorithm to remove cross point on the welding path automaticly and fusion it with the ant colony algorithm. By increasing the link in removing cross point, we can get a better welding path, reduce the time consumption of welding circuit board. Because the link in removing cross point will increase the time cost, this paper is to analysis and research the method for fusion of remove cross point algorithm and ant colony algorithm, hoping to find a less time's cost and a fusion method of better optimization results.Simulation of the 200 solder joints, results show that the algorithm has a better effect.

    • ADSN Multi-Sensor for Positioning to Automatic Plotting System of the Ancient Dwellings

      2015, 24(7):259-263.

      Abstract (1062) HTML (0) PDF 643.06 K (1663) Comment (0) Favorites

      Abstract:Portable and efficient lossless drawing is an important function of the ADSN (Ancient Dwellings Sensor Network). Through the function of the ADSN localization sensor with node communication RSSI to complete the accurate positioning and ranging between the different roles to form a topology which distance can get to know. Using the RSSI signal divergence ranging and the point-to-point precision positioning of the infrared sensor to correct the RSSI's accuracy of the close range, and with remote ultrasonic point-to-point precision ranging to form a remote RSSI correction together, make the accuracy reach to 10cm in the range of 50 meters by the range fitting. deploy functional nodes (ID) to corresponding functional areas of residential sampling, define different functional areas; the topology formation, using the standard functions pattern library to matching, complete the real drawing of the ancient dwellings. The practical application proven the usefulness of this method.

    • Secondary Development Based on CATIA System and Application of Die Design

      2015, 24(7):264-267.

      Abstract (1198) HTML (0) PDF 636.23 K (3321) Comment (0) Favorites

      Abstract:In order to solve the problem of the t-tube die structure parametric design, secondary development of CATIA interface based on Component Application Architecture(CAA), which applies VC++6.0 on Window XP operation system is introduced in this paper. Based on the study of parameters described method of the size, location of die structure, on how to automatically generate wing structure three-dimensional shape by CATIA secondary development, and to obtain t-tube die surface, parameters of the die model are studied. The application of CATIA secondary development technology in the Visual Studio environment on the basis of the description of the structural parameters of the t-tube die structure, combined with the C++ languages programming, parametric design of the t-tube die structure is realized.

    • Industry Information Consumption Sharing Platform

      2015, 24(7):268-271.

      Abstract (1043) HTML (0) PDF 744.10 K (2048) Comment (0) Favorites

      Abstract:In view of the country attaches great importance to information pin fee and the needs of the enterprise two fusion, this paper builds a platform using PaaS mode of sharing the information consumption industry. The article expounds the industry operating model of sharing platform of information consumption, clears the functions of the system. Platform architecture contains multi-layer, USES the force data model and the way of two kinds of data isolation building database, vertical segmentation implementation through the server and the database cluster system extension. Through the system prototype trial, it found that the user experience is good, the system can improve the enterprise's information consumption level and reduce the threshold of the enterprise information construction.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063