• Volume 25,Issue 4,2016 Table of Contents
    Select All
    Display Type: |
    • Static Detection of Android Malware

      2016, 25(4):1-7.

      Abstract (2011) HTML (0) PDF 674.46 K (2721) Comment (0) Favorites

      Abstract:The static detection system referred in this article is used to detect unknown malware. First of all, the Android application sample is preprocessed and permission information that the application developer applies for is extracted as a kind of characteristic attribute. If there is shared object file, the name of function called from other libraryis is extracted as another kind of characteristic attribute. Secondly, the two optimal classifiers chose are used to hand two classes of features separately. Finally, the result of comprehensive judgment system depends on the result of classifiers about two types of characteristic attribute. The result of experiment shows that the static detection system can detect the unknown malware efficiently, and the accuracy of the static detection system reaches up to 95.4%.

    • Extraction Scheme of Target Speaker's Speech Under Multi-Speaker Environment

      2016, 25(4):8-15.

      Abstract (1628) HTML (0) PDF 955.21 K (3165) Comment (0) Favorites

      Abstract:Aiming at multi-speaker communication scene in real life, an effective solution is designed and proposed based on researches of underdetermined blind speech separation method of target sound source's azimuth information and nonlinear time-frequency masking and BP speaker recognition technology, which can extract any target speaker's speech in any orientation. The solution is generally divided into two stages, one is target speech search and the other is target speech extraction. The search stage uses BP speaker recognition technology. The speech extraction stage uses the method of underdetermined blind speech separation based on sound source azimuth information by an improved potential function clustering and nonlinear time-frequency masking. The results show that the solution is feasible. It can effectively extract the target speaker's speech in any position from the mixed speech stream. The average SNRG is 8.68dB, the similarity coefficient is 85%, the recognition rate is 61%, and the running time is 20.6S.

    • Fault Model Research of Engine Control Circuit

      2016, 25(4):16-22.

      Abstract (1236) HTML (0) PDF 906.61 K (2742) Comment (0) Favorites

      Abstract:The CFM56-5B turbofan engine was discussed in this paper, functional model of engine control system and the control circuit's external interface were defined through requirement analysis. It proposed basic modeling principle of simulation of engine control circuit. Then the conditional directed graph theory combined with assemblies modeling method was adopted to establish engine control circuit simulation model. Finally, MATLAB/Simulink was used to simulate the component model of engine control circuit. And the results show that the simulation models are accorded with the requirements of simulator engine control system through adjusting and proving.

    • Synchronization Control of Stochastic Memristor-Based Neural Networks with Time-Varying Delays

      2016, 25(4):23-28.

      Abstract (1293) HTML (0) PDF 735.78 K (1719) Comment (0) Favorites

      Abstract:Stochastic noise is unavoidable in the implementation of real complex artificial neural network model and large scale integrated circuit. Therefore, the practical research significance of stochastic memristor-based neural network is important. Aiming at the problem of synchronization control of stochastic memristor-based neural networks with time-varying delays, based on non-smooth analysis and the theory of set-valued maps and stochastic differential inclusions, a novel control method is given using the method of Lyapunov functional and the fundamental inequality. State feedback controller has been put forward to achieve synchronization index for the drive system and corresponding response system of the stochastic memristor-based neural network. Meanwhile, a numerical example is given to verify the theoretical analysis in this paper.

    • Prediction of Facial Beauty Based on HodgeRank

      2016, 25(4):29-35.

      Abstract (1541) HTML (0) PDF 925.01 K (1942) Comment (0) Favorites

      Abstract:In recent years, with the rapid development of computer technology, perception of human facial beauty is an important aspect of human intelligence and has attracted more and more attention of researchers. For the current study methods that exist in the training data set of scoring most depends on manual processes, and the facial beauty assessment is not detailed enough to predict the results, this paper aims to investigate and develop intelligent systems for learning the concept of female facial beauty with data mining learning and producing human-like predictors. Our work is notably different from and goes beyond previous works. We impose less restrictions in terms of pose, lighting, background on the face images used for training and testing, which greatly reduces the manual operation for classification and we do not require costly manual annotation of landmark facial features but simply take raw pixels or texture feature as inputs. We show that a biologically-inspired model with clustering and the improved BP network method can produce results that are much more human-like approach.

    • Association Analysis Based Detection System for Android Permission Abuse Attacks

      2016, 25(4):36-42.

      Abstract (1736) HTML (0) PDF 802.60 K (2065) Comment (0) Favorites

      Abstract:In order to restrict the behaviors of applications, a permission system is designed in Android system. However, for the permissions granted by the users, applications will no longer be restricted and can use these permissions at will, which may cause the potential permission abuse attacks. To detect the permission abuse behaviors of applications, an association analysis based detection method was proposed. This method dynamically detects sensitive behaviors of applications and operations of users, then calculates the degree of association between them. Detection result will be obtained through comparing the differences between detected applications and benign applications. A prototype system named DroidDect was designed and implemented based on the above method. The experimental results show that permission abuse behaviors in Android applications can be effectively detected by DroidDect with advantages including low system overhead.

    • Distributed Symbolic Execution Platform

      2016, 25(4):43-48.

      Abstract (1717) HTML (0) PDF 711.66 K (2512) Comment (0) Favorites

      Abstract:In software engineering, symbolic execution technology is an efficient program defect detection technology. Symbolic execution uses symbolic values as the inputs, which transforms the execution of the program into the corresponding symbolic expressions, and the precise analysis of the program behaviors is realized by systematacially traversing routing space. However, due to the restriction of the path explosion and constraint solving problems, symbolic execution technology has poor scalability. In order to mitigate the problem, this paper implemented a distributed symbolic execution platform which realized tasks parallelly execute and reduced the symbolic execution time overhead through a scheduling algorithm distributes tasks from master to slaves.

    • Enterprise Collaborative Product Development Management System

      2016, 25(4):49-55.

      Abstract (1752) HTML (0) PDF 946.06 K (1744) Comment (0) Favorites

      Abstract:This article is based on one enterprise collaborative product development management system. It finds out the defects among the existing business, and researches on how to solve the key problems in the system. Combined with the actual needs from the enterprise, this article described how to control and manage the version of the whole product lifecycle of product based on the prototype J2EE system. And finally the article proved the feasibility and effectiveness of the system through a sample.

    • Network Teaching System of “C Program Design” Based on B/S

      2016, 25(4):56-62.

      Abstract (1252) HTML (0) PDF 841.72 K (13228) Comment (0) Favorites

      Abstract:To promote the classroom teaching result of "C Program Design" and better realize the remote, simultaneous, real-time and interactive teaching and study, we have developed the "C Program Design" network teaching system based on B/S. On the basis of analyzing the demand, characteristics and structure of the system, firstly we analyze the needed technology and system models. Then to realize the system, we study the methods of material processing, user interface and database designing, system authorization setting and so on. Finally, realization of intelligent question bank, website testing and release are also presented. This system adopts Visual Studio 2005 as the development environment and SQL Server as the back stage database. The system is characterized by sound basic architecture, convenient later maintenance and strong expandability. The system is also applicable to the development of other network courses.

    • Signal Acquisition System for Neutral Beam Injector RF Ion Source

      2016, 25(4):63-67.

      Abstract (1385) HTML (0) PDF 944.88 K (2172) Comment (0) Favorites

      Abstract:Neutral beam injection(NBI) heating is one of the most important auxiliary heating means of Tokamak(EAST) experiment device, and the RF ion source is the crucial part of the research of NBI system in institute of plasma physics. In order to diagnose the plasma parameters accurately, a Langmuir probe signal acquisition system is designed by using PXI as the platform in this paper. In the hardware part, it is mainly aimed at the problem of the interference of the 1MHz RF source in the process of producing plasma, so a 4th-order Butterworth low-pass filter is designed. The software part, which is based on LabVIEW, is designed to acquire and process the probe signal real-timely. The processed data is displayed on the GUI interface and stored on the local hard disk. The implementation of the system can effectively solve the problem of interference in the RF ion source test, improve the accuracy of the data acquisition, and provide a more reliable basis for the RF plasma discharge debugging.

    • Remote Detection System in Laser Power Based on LabVIEW

      2016, 25(4):68-72.

      Abstract (1620) HTML (0) PDF 842.97 K (2357) Comment (0) Favorites

      Abstract:In this paper, a virtual instrument technology based on LabVIEW is proposed to measure laser power remotely and automatically. This system is based on DH-JG2 optical power meter, NI-USB 6008 data acquisition card, personal computer(PC) as well as HP laserJet 1020 Plus printer, which can realize the functions of laser power data acquisition, data analysis, saving the original data to access and generating test report. The power output of laser is unstable. Consequently, abnormal conditions of laser can't be feedback to inspectors with the available devices. In order to solve this problem, a mobile phone and TCP protocol are adopted to realize the function of remote controlling, attaining the real-time processing. The detection system has been used to measure laser power curve that can be used for CW lasers. It shows that the design has a good performance of the real-time detection and a high operability, as well as a broad prospect.

    • 3D Game Engine with Advanced Rendering Technology in DX 11

      2016, 25(4):73-79.

      Abstract (1396) HTML (0) PDF 917.50 K (2367) Comment (0) Favorites

      Abstract:The advanced rendering technologies of DirectX 11 were studied and applied to the 3D game engine. Advanced rendering technologies of DirectX 11 included MultiTex, CubeMap, NormalMap and ShadowMap, etc.. MultiTex was used to implement 3D terrain rendering, CubeMap was used to do environment map rendering, NormalMap was used to do special texture processing and ShadowMap is used to achieve the effect of mature realistic shadow. The paper also gave a detailed framework of interpreter and multi-branch of rendering core framework design, and completed the related technical cases to test on the engine. The result showed that the engine was true to life and effective in processing graphics.

    • Dynamic Remote Monitoring System for Landscape Based on GIS

      2016, 25(4):80-85.

      Abstract (1318) HTML (0) PDF 975.86 K (1909) Comment (0) Favorites

      Abstract:Due to human activities and surface movement make a great change of land cover, it is necessary to carry out environmental monitoring of landscape dynamic and accurate mapping. A kind of landscape dynamic monitoring system based on geographic information system(GIS) is proposed. The multi-temporal decision tree classifier and morphological image processing technology are used for the system. It monitors the land use/cover change(LUCC) dynamically according to the spectrum and surface model data of remote sensing image. Experiment is conducted in local image in the Landsat 5 TM database. The results show that, this method can achieve 90.77% recognition accuracy, has lower computation time and can detect vegetation distribution(plant/Vegetation Restoration), city(city/demolition) and physical morphology(fluvial geomorphic change/slope instability).

    • Massive Financial Reconciliation File Approximate Comparison Model and System

      2016, 25(4):86-90.

      Abstract (1669) HTML (0) PDF 705.64 K (1938) Comment (0) Favorites

      Abstract:Focus on TB Level massive financial reconciliations file approximate comparison problem, this paper researched a number of the financial reconciliations file features to enhance the mass data comparing speed in financial sector, and proposed a multi-level approximate comparison model-UpCompare Model. UpCompare Model is a kind of multi-process technology based on hash index table, using fast winning strategy as the core algorithm, effectively solving the massive financial reconciliations file approximate comparison problem. Experimental results show that, by using UpCompare Model, bank transaction settle system efficiency improved more than 5× in daily financial reconciliations file approximate comparison.

    • Construction Method of Semantic Search System in Power Domain

      2016, 25(4):91-96.

      Abstract (1511) HTML (0) PDF 805.94 K (2922) Comment (0) Favorites

      Abstract:Large amounts of data resources including relevant standards, products and technical documents, document management, fault recover records, etc. in the power domain continue to accumulate. How to fast query and search of these documents has important value for grid scheduling and fault recovery. The traditional search system is based on the key words matching, which cannot find accurate answers for query business terms. This paper designs a semantic search system for power domain. We research on word segmentation technology, knowledge graph and inference engine. The design architecture and key modules of the system are introduced, and the effectiveness of the method is evaluated by experiments.

    • Distributed Cache Based on MongoDB

      2016, 25(4):97-101.

      Abstract (1786) HTML (0) PDF 679.74 K (2368) Comment (0) Favorites

      Abstract:With the development of State Grid's information technology, new challenges are presented to the data processing, concurrent requests and responsiveness of conventional power information systems. According to the characteristics of power information system's data processing, a distributed cache based on MongoDB is proposed in this paper. The operational mechanism, server-side architecture and the design of client's function modules in distributed cache are analyzed and discussed. The distributed cache based on MongoDB can effectively reduce the payload on access to the database layer of power information system, and then improve the performance of power system as a whole. It adopts the distributed files to store the cache data with good reliability and scalability to support the function of data redundancy backup and failure recovery. Now the distributed cache based on MongoDB has been successfully applied to the Project Management System of one power corporation.

    • Intelligent Building System Based on Integrated Monitoring Platform

      2016, 25(4):102-106.

      Abstract (1484) HTML (0) PDF 978.78 K (1953) Comment (0) Favorites

      Abstract:Intelligent building is a new type of architecture concept, which is developed with the widely use of computer technology, communication technology and web technology. Intelligent building not only pursues the beauty and the stability of the structure, but also pays more attention to the management and control of the building by various advanced technologies. Based on NARI RT21 Integrated monitoring platform, this paper realizes the centralized monitoring of multiple subsystems such as the building automation, security and protection, fire control, energy collection and so on. Through the intelligent linkage between the subsystems, the cost of building integrated management can be reduced.

    • Application of Thread Pool Technology in Examination System

      2016, 25(4):107-111.

      Abstract (1338) HTML (0) PDF 646.59 K (1699) Comment (0) Favorites

      Abstract:When large-scale client requests for applications in server concurrently, traditional solutions create a thread for every request, which will lead to a serious decline in server performance and even crash. By analyzing the JDK's Executor framework, the paper described in detail thread pool model from the principle of work, core thread pool object, implementation strategy and other aspects, applied the thread pool to a online examination system of three-layer C/S architecture, and gave the server's design framework and implementation code. Through simulation tests, the stability of the thread pool technical in the process of solving large concurrent access is proved.

    • Mobile Information Sharing Platform Based on MongoDB

      2016, 25(4):112-117.

      Abstract (1383) HTML (0) PDF 703.24 K (1935) Comment (0) Favorites

      Abstract:At present, the application system has shifted from PC to mobile devices, and the university is in the peak period of building the wisdom of the campus. It is in urgent need of building information sharing platform based on mobile devices. At first, MongoDB is chose to store data. According to the characteristics of the University, an information sharing platform is designed and implemented. Practical application shows that the system has the advantages of simple operation, stable running, convenient using for the teachers and students.

    • Privacy Protection Scheme for Short Message

      2016, 25(4):118-122.

      Abstract (1306) HTML (0) PDF 702.15 K (1804) Comment (0) Favorites

      Abstract:In order to protect the privacy of short message, a privacy protection scheme for short message is proposed in this paper, which is based on asymmetric encryption. In this security system, the message is first encrypted by the receiver's public key to obtain message ciphertext. Then the message ciphertext is combined with the life time information and encapsulated into Message Self-destructing Object(MSO). At last, the MSO is sent to the receiver through the operator. After getting the MSO, the receiver can use the private key to decrypt the ciphertext to obtain the original message only when the current time is in its life time, and after its life period, the system will automatically delete the MSO to protect the user's privacy. The experiments show that this scheme can effectively protect the privacy of short message and remove the expired MSO. And the system has low performance overhead, it is suitable to be used widely in people's daily life.

    • Visual Query System for Electronic Commerce data

      2016, 25(4):123-127.

      Abstract (1339) HTML (0) PDF 681.00 K (2178) Comment (0) Favorites

      Abstract:How to analyse the potential value of a customer is a problem that cannot be neglected while the e-commerce is becoming more and more mature. Aiming at solving this problem, the paper designs and implements a visual query system, which is used for analysing customers' preference and digging their potential value. Based on the SSH framework, this system uses Highcharts to do the data visualization at the front-end, while the database of products is established via the web parser and the database of user-expense behavior extracted from the campus's traffic is established via DPI. This system reaches the expected target for data analysis and is good for shopping preference analysis after testing.

    • Core-Selecting Mechanism Based Secure Routing Protocol for Internet of Things

      2016, 25(4):128-134.

      Abstract (1142) HTML (0) PDF 753.81 K (1689) Comment (0) Favorites

      Abstract:Designing a secure routing protocol to ensure the privacy of information and network security is a huge challenge of Internet of Things. In this paper, a new Core-Selecting mechanism is proposed, and the mechanism is applied to the design of routing protocol for the Internet of Things. Based on this, we designed and implemented a new secure routing protocol named PALXC for Internet of Things, which can help to resist internal collusion attack and select trusted route. Theoretical analysis and simulation experiment results show the effectiveness of the designed protocol.

    • Anomaly Detection Method Based on ICMP Traffic for SDN

      2016, 25(4):135-142.

      Abstract (1494) HTML (0) PDF 1.08 M (2206) Comment (0) Favorites

      Abstract:ICMP(Internet Control Message Protocol) provides a good way to observe the status of network in real time. When the network is in fault or is attacked, the percent of ICMP traffic and the percent of packet type in ICMP characteristics will change. Since the control plane in Software-Defined Networking(SDN) can observe ICMP traffic, and the value of ICMP traffic is also small, this paper proposes a lightweight anomaly detection system based on SVM classification method to improve the accuracy and real-time performance of anomaly detection system. We name it as AD-ICMP-SDN(Anomaly Detection Method based on ICMP Traffic for SDN). The experiment results have shown that AD-ICMP-SDN can effectively improve the accuracy rate and false rate.

    • Research of Business Contacts Incremental Update in Unified Communications for Mobile Internet

      2016, 25(4):143-147.

      Abstract (1021) HTML (0) PDF 695.43 K (1671) Comment (0) Favorites

      Abstract:In recent years, with the rapid development of mobile Internet, the telecommunications industry has entered the mobile era. Against this significant background, companies can make use of the mobile Internet and converge communication traffic to expand into the mobile field. As an entrance to corporate communication, the significance of business contacts can't be ignored. However, the limited characteristic of mobile Internet resources has not been paid attention to by the update technology of traditional. As a result, it is no longer conducive to the current converged communications. Therefore, this paper puts forward an incremental update methods based on LDAP directory service in order to reduce resources consumed in the mobile client and server side. In conclusion, an experimental and comparative analysis of the full amount update technology used in traditional corporate directory and incremental update technology presented in this paper is conducted with an aim to verify and confirm that the incremental update method applied in the mobile Internet gains advantages over the full amount of update.

    • Z Specification Automatic Generator

      2016, 25(4):148-155.

      Abstract (1345) HTML (0) PDF 1004.24 K (2564) Comment (0) Favorites

      Abstract:The formalized Z language can improve the reliability and robustness of the software via using complex mathematical theories. However, only a few people can understand these theories and compile with Z specification. At present, the main research of Z language focuses on the theoretical research. There is no corresponding tools support the automatic generation of Z specification. The research of Z specification automatic generator introduced in this article can help with the compilation of the Z specification and cut the cost of formal development. This automatic generator has great significance for the large-scale promotion of the Z language.

    • Distributed Crawler Based on the Improved Kademlia Protocol

      2016, 25(4):156-161.

      Abstract (1082) HTML (0) PDF 885.45 K (2070) Comment (0) Favorites

      Abstract:With the explosive growth of Internet information, researches on search engine and big data call for an efficient, stable and scalable crawler architecture to collect and analyze Internet data. Inspired by peer to peer network, we use distributed hash table as a carrier of communication between nodes, while a distributed hash table implementation-Kademlia protocol is modified and improved to meet the needs of the distributed crawler cluster's scalability and fault tolerance. In the experiments, we carried out multi-threaded experiment on single computer and node expansion experiment on distributed cluster. From system performance and system load point of view, the experimental results show the effectiveness of this kind of distributed cluster.

    • Clustering Time Synchronization Protocol Based on Event Driven for Wireless Sensor Network

      2016, 25(4):162-166.

      Abstract (1030) HTML (0) PDF 681.54 K (1945) Comment (0) Favorites

      Abstract:In this paper, we propose a K cover clustering time synchronization algorithm(K-CTSA) based on event driven for wireless sensor networks. When events are detected by a node, the node broadcasts event message. The neighbor nodes switch from dormancy to activation after they receive the broadcast message. In order to ensure the accuracy of the monitoring event, K coverage must be guaranteed in the monitoring area. In this paper, we election K nodes in the event area based on fuzzy logic and the K nodes cooperate to complete the task. The K-CTSA algorithm can select a cluster head from the K nodes. In order to ensure the reliability of monitoring tasks, the clock in the active nodes must be synchronized. Clock offset and drift are estimated by using the minimum linear two multiplication between cluster head and intra cluster nodes. Experimental simulation shows that the network node survival time and stability of K-CTSA are obviously better than the TPSN, which under the premise of ensuring the synchronization accuracy.

    • Image Mosaic Method Based on Gaussian Second-Order Difference Feature Operator

      2016, 25(4):167-173.

      Abstract (1028) HTML (0) PDF 1.30 M (2056) Comment (0) Favorites

      Abstract:In order to compose the wide visual angle and high resolution image from the sequence of images which have overlapping region in the same scene quickly and correctly, an improved SIFT algorithm which based on D2oG interest point detector was proposed. It extracted the image feature points and generated corresponding feature descriptors by improved SIFT algorithm. Then, feature point matching pairs were purified using the random consistency(RANSAC) algorithm and the transformation matrix H was caculated. Last, the seamless mosaic of images was completed by using the image fusion algorithm of slipping into and out. The images which had the four typical transformations were separately processed with the traditional SIFT and the proposed method in the experiment. The result indicated that the number of feature pairs is fewer, the mosaic time is shorter and the matching efficiency is higher than that of SIFT algorithm. This method reduces the complexity of operation and improves real-time of image mosaic simultaneously.

    • Merging Three-Way Decisions with Decision-Theoretic Rough Sets

      2016, 25(4):174-179.

      Abstract (1047) HTML (0) PDF 749.74 K (1698) Comment (0) Favorites

      Abstract:Paw lak rough set model was lacking in giving semantic to positive regions, negative regions and boundary regions. The boundary could not make decision again. But three-way decisions gave a new semantic to boundary regions and we can deal with samples in boundary regions. Based on importance of attribute, samples which meet the conditions were delimit to decision region and others would be maintained in the boundary regions in order to reduce false positives when deal with samples in boundary regions. Based on the study of probabilistic rough set model, three-way decisions-theoretic rough set, Bayesian decision-making process and decisions-theoretic rough set model, this paper presents Three-way Decision mix Decision-Theoretic rough set model(TmD). Compared with the new model with Paw lak-three way decisions model, the loss of division of this model is smaller and the result is more reasonable. This model gives the boundary regions semantic which is delaying decisions. Using three-way decisions makes iterative operation for delaying decisions. In the process of iteration, attributes will be ordered based on the importance of the attribute, thus objectively get the attribute of priority being used in the process of iteration. Experimental results show that the model has a smaller decision cost than only using decision-theoretic rough sets and three-way decisions with iterative operation have a higher accuracy when deal with samples in boundary regions. This paper provides a new method for accurate decision-making.

    • Solving Circle Permutation Problem Using Improved Genetic Algorithm

      2016, 25(4):180-185.

      Abstract (1037) HTML (0) PDF 703.95 K (1727) Comment (0) Favorites

      Abstract:Circle permutation problem is a typical combinatorial optimization problem; moreover, it is a NP complete problem. Genetic algorithm is a kind of evolutionary method based on natural biological evolution. It is simple and easy, and has characteristics of abstraction and robustness. which has been successfully applied to many engineering optimization problems. A new method based on improved genetic algorithm is presented for solving circle permutation problem. Firstly, the relationship between circular permutation problem and the traveling salesman problem is analyzed, and then circular permutation problem is translated into traveling salesman problem. Next, it is solved by the improved genetic algorithm. Finally, in the simulation experiments, compared with the existing algorithm, the proposed method is a simple and effective algorithm for solving circle permutation problem.

    • Application of Improved Particle Swarm Algorithm in the Soft Measurement of Ethylene Yield

      2016, 25(4):186-190.

      Abstract (1034) HTML (0) PDF 744.82 K (1490) Comment (0) Favorites

      Abstract:According to the problem that the particle swarm optimization(PSO) is easy to fall into local convergence, a new method named GPSO algorithm is proposed to improve the algorithm, which is based on the reaction factor and the law of gravity. The algorithm uses the gravity law to quickly determine the optimal direction of the particles. When the particles fall into local optimum, the particles are drapped out of local optimum. The simulation experiments show that the improved algorithm has achieved remarkable results in the convergence speed and the optimization ability. Finally, the model of ethylene cracking conversion was obtained by using the improved algorithm to optimize the parameters of BP neural network. The experimental results show that the neural network model based on the improved algorithm can better predict the conversion rate of ethylene.

    • Method for Image Segmentation Based on Optimized Multi-Kernel SVM and K-means Clustering

      2016, 25(4):191-196.

      Abstract (1195) HTML (0) PDF 1.45 M (1714) Comment (0) Favorites

      Abstract:Image segmentation is an important topic in image understanding and computer vision. When support vector machine(SVM) is used for image segmentation, the design of its kernel and selection of the parameters directly affect the segmentation effect. Considering the problem that SVM based on single kernel could not keep the balance between the segmentation accuracy and generalization performance, an image segmentation algorithm using optimized multi-kernel SVM(OMKSVM) based on K-means clustering was proposed in this paper. According to the multi-kernel learning theory, the new multi-kernel is constructed by a linear combination of single kernels. Firstly, the K-means clustering algorithm was applied to obtain the training samples for MKSVM automatically. Then color and texture features were extracted from the image as attributes of training samples of MKSVM, Particle Swarm Optimization(PSO) algorithm was employed to optimize the kernel parameters, the weight coefficient and the punishment coefficient of SVM simultaneously. Finally the OMKSVM was obtained to segment image. Three groups of complex color image were selected to verify the correctness of the proposed method. The results demonstrate that our method can segment the color images effectively, and has stronger generalization ability comparing with the single kernel SVM-based method.

    • Algorithm for the Bidirectional Pedestrian Counting Based on the Classification of Moving Objects

      2016, 25(4):197-200.

      Abstract (1021) HTML (0) PDF 690.54 K (1788) Comment (0) Favorites

      Abstract:This paper proposes an algorithm for the bidirectional pedestrian counting based on the classification of moving objects in intelligent video surveillance. First of all, detect and track the moving objects. According to the feature information of the blocks of moving objects has been detected through the predetermined counting line, divide the moving objects into non-pedestrian, single pedestrian and multiple pedestrians. For the case of multiple pedestrians, detect the head and shoulder in the blocks using Hog and SVM and count the number of pedestrians. In this paper, with the direction information of moving objects and the number of pedestrians including in the blocks of moving objects, calculate the bidirectional flow of people when the pedestrians cross the the predetermined counting line. The algorithm in this paper acquires good effect in the corridor environment.

    • Auditory Saliency Calculation Based on Sparse Dictionary

      2016, 25(4):201-205.

      Abstract (1371) HTML (0) PDF 678.06 K (1722) Comment (0) Favorites

      Abstract:Auditory attention saliency computation model is one of the fundamental problems in the study of auditory attention model, and the key of this model is the selection of appropriate features. In this paper, an auditory significance calculation model based on sparse dictionary learning is proposed from the view of feature selection. The first step is getting the characteristics of a variety of acoustic signals by the K-SVD dictionary learning algorithm. Then the dictionary set is classified and integrated. Based on a selected feature dictionary, OMP algorithm is used for signal sparse representation. And the sparse coefficients are combined frame by frame to obtain the auditory saliency map. The simulation results show that this auditory saliency map computation model can achieve better correspondence characteristic with the nature attribute of acoustic signal in feature selection. The saliency map based on dictionary of basic characteristics can highlight the structure characteristics of noisy acoustic signal. The saliency map based on dictionary of special characteristics can achieve selective attention for certain signals.

    • Mixed Programming Between Matlab and C++ to Generate Power Test Signal

      2016, 25(4):206-209.

      Abstract (1839) HTML (0) PDF 693.62 K (2928) Comment (0) Favorites

      Abstract:According to the problem that it is difficult to generate white noise and some other speaker power test signals in C++ Builder and the problems of compatibility in mixed programming between Matlab and C++ Builder, a mixed method combined Matlab with C++ is put forward. Firstly, a dynamic link library DLL is generated in Matlab. Then, VS calls the DLL file and writes interface function to create another DLL file which can be used in C++ Builder. Finally, design the application program to generate the speaker power test signal in C++ Builder. To verify the accuracy of the generated signal, some parameters of signal are calculated, such as the mean, variance, self-correlation, spectrum and power spectral density, the probability density and RTA of one third octave. Comparing the calculated results with the standard signal's, it shows that the signal generated by mixing programming can be used for speaker power test.

    • Local Blur Detection Optimization Algorithm

      2016, 25(4):210-214.

      Abstract (1498) HTML (0) PDF 727.73 K (2128) Comment (0) Favorites

      Abstract:The existing blur detection algorithm based on features has to calculate local features many times in order to optimize the blur response. Complicated adjacency relationship leads to large computing tasks and low efficiency. To solve the time problem, this paper proposes a local blur detection optimization algorithm with the perpendicular context in single scale. Firstly, we calculate features such as local heavy-tailedness feature, kurtosis feature, local power spectrum feature and local filters, Then naive Bayesian classifier is used to combine these features. Finally, this paper takes the blur response information of adjacent pixels as context to update the pixel itself, increases support region of context to take the information around the pixel into account more adequately, uses one-dimensional perpendicular context to reduce the amount of calculation, forms new energy function, and obtains the final blur response by minimizing the energy function. Experimental results show that the modified algorithm can detect local blur effectively and improve time efficiency.

    • Outlier Detection Algorithm Based on Grid Probability

      2016, 25(4):215-220.

      Abstract (1114) HTML (0) PDF 1.02 M (1695) Comment (0) Favorites

      Abstract:With the rapid development of the mobile networks and intelligent terminals, location-based service has become more and more hotter on the internet, therefore the correction of the base stations' position becomes a critical factor. For the wrong base stations are uncertain, it proposes a new detecting algorithm based on the probability of the near grids, which is used to verify the wrong base stations. Firstly, it divides the data space into some grids. Secondly, combining with the users' attendance location information, it gets the track of the base stations in a short dynamic time and maps them to the corresponding grids. Finally, referring to the position characteristics of the base stations, it could give the membership probabilistic and filter the outliers, that are the wrong base stations. The results show that the algorithm has low complexity and high accuracy of detecting the wrong ones.

    • Hybrid Segmentation Algorithm for Chinese Text Using First Pinyin Letter Index

      2016, 25(4):221-225.

      Abstract (1330) HTML (0) PDF 635.64 K (2093) Comment (0) Favorites

      Abstract:Chinese automatic segmentation is the basis of web text mining and other Chinese information processing applications. Booming Chinese information processing applications put forward a higher requirement for Chinese automatic segmentation. This paper presents a new segmentation algorithm FPLS, which uses a dictionary with a first letter of the Pinyin as a first level index and words count as the secondary index structure. A bidirectional matching method and rules are employed to resolve ambiguity segmentation problem in the algorithm. Comparing with the existing algorithm, algorithm FPLS gets higher accuracy and efficiency.

    • Compare about Chinese Word Segmentation Tools to Agricultural Search Engine

      2016, 25(4):226-231.

      Abstract (1165) HTML (0) PDF 602.17 K (2046) Comment (0) Favorites

      Abstract:Chinese word segmentation technology is the most critical part of Chinese word processing technology, and it is widely used as one of the most important part in pre-processing methods. This paper mainly analyses and compares the influence of ASPSeek, ICTCLAS, Paoding, MMseg, IK and JE six segmentation tools on agricultural search engine. The results showed that ICTCLAS word segmentation has the most optimization in accuracy, while JE word segmentation has the highest measure of F1 in the application effect of agricultural search engine.

    • Format of Triangular Mesh File OFF and Transformation of STL to OFF

      2016, 25(4):232-236.

      Abstract (1914) HTML (0) PDF 670.26 K (3743) Comment (0) Favorites

      Abstract:OFF(Object File Format) is a kind of common format for three-dimensional model described with triangular mesh. The research of OFF is the foundation condition for reading, displaying and other operations. Nowadays, it doesn't have a set of standards and specifications about the simple analysis of OFF. First of all, the software is based on Visual C++6.0 developing platform and uses MFC to achieve a visual interface. In addition, we can read and write the OFF file taking advantage of C++ standard I/O library and the view of OFF file is implemented by using OpenGL technology. In the end, we have a system that realizes the functions of reading and displaying for OFF file while it completes the transformation of file from OFF to STL with format conversion algorithms.

    • SDN Testbed for Protocol Oblivious Forwarding

      2016, 25(4):237-241.

      Abstract (1603) HTML (0) PDF 788.32 K (2539) Comment (0) Favorites

      Abstract:The OpenFlow-based software-defined Networking could not easily support forwarding of the new protocols, thus Protocol-Oblivious Forwarding technology is proposed. On the basis of POF technology and OpenFlow controller POX, this paper designs and implements the controller which supports POF technology, employs the full potentials of POF devices and reflects the programmability of SDN. Meanwhile, we construct a network testbed based on POF controller, and experimentally illustrate that POF controller can effectively manage the POF network and provide the controlling functionality with high performances.

    • Visual Precision Measurement System for Paper Flatness

      2016, 25(4):242-245.

      Abstract (1335) HTML (0) PDF 819.62 K (2860) Comment (0) Favorites

      Abstract:Aiming at the paper flatness measurement, a method based on four-step phase-shifting algorithm has been studied and proposed for the structured light measurement. The sine light that projected to the paper surface by DLP is scanned in steps of 1/4 period. After modulated by the surface topography of the paper to be measured, the structured light distribution information is acquired by the camera along with the phase main value of the structured light obtained through four-step phase-shifting algorithm. Finally, the absolute phase demodulation can be achieved through the multi-frequency heterodyne principle and the paper surface topography can be reconstructed through the height information after mapping the relationship between the phase and height. Using paper surface coordinate point cloud height range and standard deviation for quantitative evaluation of its flatness, the experimental results show that the measurement accuracy and stability meet the requirement of paper flatness measurement with the accuracy of 0.1mm and the measurement time of less than two seconds.

    • 3D Positioning Technology for Firefighters' Emergency Rescue

      2016, 25(4):246-251.

      Abstract (1217) HTML (0) PDF 814.59 K (1764) Comment (0) Favorites

      Abstract:This paper researches a three-dimensional positioning scheme for emergency rescue of trapped firefighters at the fire scene. This scheme adopts Chirp Spread Spectrum(CSS) and it's particular Symmetric Double-Sided Two-Way Ranging(SDS-TWR). Combining BMP085 pressure sensor to measure altitude, it can implement three-dimensional positioning of firefighters. Due to the complex environment of the fire scene would cause multipath effect when Chirp signal being transmitted, this scheme uses Kalman filtering method to filter out mutative coordinate value, thus the positioning error can be controlled within 1 m.

    • Construction and Optimization of VRML Virtual Library

      2016, 25(4):252-257.

      Abstract (1121) HTML (0) PDF 719.84 K (2041) Comment (0) Favorites

      Abstract:In the view of wide application of virtual campus based on VRML, taking the construction of Virtual Library as an example, this paper discusses the construction and optimization of VRML virtual scene. The development process from basic data collection, 3D model establishment, 3D model optimization angles is presented. Using visibility sensor schedule algorithm and LOD idea, this paper dispatches the scene in horizon range, achieving a quick view of the VRML scene by dispatching object in the horizon according to the viewpoint of distance operation. Through publication and testing, the VRML virtual library has the characteristics of simple operation, high fidelity, strong adaptability and high practical value.

    • USB Wireless Network Card Based on Stream Interface-driven

      2016, 25(4):258-262.

      Abstract (1103) HTML (0) PDF 856.63 K (1522) Comment (0) Favorites

      Abstract:Aimed at Windows CE system-driven development, the development and design of USB wireless network adapter under the frame of streaming interface drive mode strategy is proposed. The overall process design of the platform streaming interface drive and the function implementation mode of USB wireless network adapter are elaborated. Field testing results show that the system is stable and reliable in operation and can basically satisfy the service objects of the system design.

    • Wireless Image Acquisition System of WIFI Lens Camera

      2016, 25(4):263-267.

      Abstract (1188) HTML (0) PDF 865.28 K (2164) Comment (0) Favorites

      Abstract:Wired camera has many defects such as poor mobility and less flexible, so the paper presents a combination of the camera module, WIFI module and stm32 chips to form a WIFI wireless lens Camera. Through researching on theory and entity of camera module as well as WIFI module, this method implements wireless image data transmission to the display device processor by WIFI wireless data transmission technology, LWIP protocol and Socket network programming. When the display device with WIFI wireless network card could connect to the camera's internal WIFI hotspot, it could conveniently complete wireless image transmission, display and storage through a series of operations like connecting to the server, turning on the camera, preserving the image and so on.

    • Design and Implementation of Load Balancing Based on Ceph Object Storage Cluster

      2016, 25(4):268-271.

      Abstract (1183) HTML (0) PDF 623.80 K (2713) Comment (0) Favorites

      Abstract:When mass parallel data access the ceph object storage cluster, the problems of increasing error rate and low access rate are existed. At the first, the authors design and deploy the ceph object storage cluster, and then design object gateway nodes to achieve interactive features of user data according to user requests. Second, I install and deploy haproxy on four service nodes, which can achieve the function of load balancing and reduce the pressure of four service nodes. Finally, the authors design and implementation of four different kinds of storage clusters based on ceph object gateway nodes. Through a lot of comparison tests, this design can not only reduce the error rate of 0.96 percent, but also enhance access rate of 74.04 percent.

    • Adaptive Compressed Sensing Reconstruction of Core Images Using Information Entropy

      2016, 25(4):272-277.

      Abstract (1140) HTML (0) PDF 1.06 M (1728) Comment (0) Favorites

      Abstract:Aimed at the details vague problem of Block Compressed Sensing-Smooth Projected Landweber compressed sensing reconstruction of core images, a Block Compressed Sensing-Smooth Projected Landweber compressed sensing reconstruction of core images using information entropy is proposed. The method introduces discrete wavelet transform into the sparse representation and conducts multiscale block for each subband, and then adaptively allocates the sampling rates and determines the measurement matrix. The reconstruction can be achieved by Wiener filter combined with Landweber iterative. The experimental results show that the reconstruction quality is improved by 2-4dB compared with that of Block Compressed Sensing-Smooth Projected Landweber under the same sampling rates.

    • Platform Integration for Mobile Personal Knowledge Management Based on Resource-Oriented Architecture

      2016, 25(4):278-282.

      Abstract (1249) HTML (0) PDF 745.45 K (1831) Comment (0) Favorites

      Abstract:Aimed at the lack of both functional integrity and real-time response in current personal knowledge management(PKM) tools, an agile and real-time PKM architecture based on intelligent mobiles is proposed. Comparing with the Service-oriented Architecture of Web Services, the advantages of Resource-oriented Architecture(ROA) in scalability, security, and interactivity are illustrated. Based on ROA, the solutions to integrate the mobile personal knowledge management tools with current third-party knowledge management systems are presented. An application for mobile personal knowledge management is created with tools of J2EE, JQUERY, RESTLET and ANDROID to demonstrate the key techniques to implement the integration between heterogeneous knowledge management platforms.

    • ARP Budget Management Information System Application

      2016, 25(4):283-287.

      Abstract (1075) HTML (0) PDF 669.15 K (1468) Comment (0) Favorites

      Abstract:With the continuous development of national construction and information industry, Institute gets a rapid development in scope and diversification of business. In this process how to achieve reasonable and efficient budget management and control has become the core of the budget management. This project is based on ARP comprehensive financial and scientific research project system. According to the accounting system model in which subject section acts as the accounting core in the institute, ARP budget management system is established, linking the scientific project budget and actual outlay. Through the input of the project budget, the budget control of the claim payment and the real-time inquiry of the budget, the budget management model of budget making in advance, budget control during the project and budget analysis after the project is realized, which provides the implementation of the budget and expenditure details and other information services to the management and scientific research personnel in the institute.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063