• Volume 25,Issue 7,2016 Table of Contents
    Select All
    Display Type: |
    • Energy Efficiency Evaluation of Machine Tool Manufacturing System Based on Grey Fuzzy Algorithm

      2016, 25(7):1-7. DOI: 10.15888/j.cnki.csa.005328

      Abstract (1401) HTML (0) PDF 659.10 K (1852) Comment (0) Favorites

      Abstract:For machine tool manufacturing system has the characteristic of diversity, complexity and randomness of dynamic varity in main body of energy consumption structure, ten evaluation indexes are concluded from four aspects including economy, products equipments and task flow, and energy efficiency evaluation index construction of machine tool manufacturing system is structured. In this paper, a combination evaluation method of energy efficiency is proposed. The combination of Rough Sets and AHM is adopted in the step of determining weights, which combines the subjective and objective of weight value. Besides, the gray correlation method and grey fuzzy evaluation are used in other steps, to avoid grey and uncertainty. Lastly, living examples and simulation contrast experiment verify the feasibility and stability of the method.

    • Daile Wen - Chinese Translation Audible Electronic Dictionary

      2016, 25(7):8-16. DOI: 10.15888/j.cnki.csa.005241

      Abstract (4461) HTML (0) PDF 921.13 K (12023) Comment (0) Favorites

      Abstract:This software is completed by Visual c + + 6.0 and Access 2003 tools, and designed in the Unicode character set patterns, to solve the problem about system compatibility and character output garbled in current national language in software development. This development model is used simply, has stable operation, flexible interface, and is convenient for user unified processing (backup, print) vocabulary and voice database at the same time also provides technical guidance to other national language text translation software development. Currently translation supporting tools for Dai region has not yet been released, Daile Wen - Chinese Translation Audible Electronic Dictionary is an important “application innovation” in the field of Dai information technology, it's the basic support of research about minority language cultural information element representation and extraction, and the main function is responsible for Dai queries, translation, reading, etc. Daile Wen - Chinese Translation Electronic Dictionary designed to achieve the common functions such as Dai-Chinese bilingual translation, Dai people reading, Dai phonetic display, it also supports the lexicon to add, modify, delete custom actions, it implements the good human-computer interaction function.

    • Elastic Container Resource Management Framework for Online Payment

      2016, 25(7):17-22. DOI: 10.15888/j.cnki.csa.005245

      Abstract (1319) HTML (0) PDF 731.16 K (1765) Comment (0) Favorites

      Abstract:With the large-scale application of online payment business, system operations staff need more convenient server resources management mechanism to meet the demand for system scaling. In this paper proposs a lightweight and elastic resource management framework based on the technology of container. It also proposes the application service performance diagnosis method and the cluster dynamic adjustment method. Experimental results show that this approach is effective under typical data processing applications for online payment.

    • Dynamic Migration Strategy of Practical Teaching Platform Based on CloudComputing Environment

      2016, 25(7):23-35. DOI: 10.15888/j.cnki.csa.005231

      Abstract (1298) HTML (0) PDF 917.22 K (1862) Comment (0) Favorites

      Abstract:The biggest feature of Cloud service environment is on-demand delivery, through virtualization technology will be related to build a unified scheduling of resources, and in accordance with the needs of users to provide services, therefore, cloud service has parallel computing, open and on-demand delivery characteristics. For training teaching platform, in the cloud computing environment need to face a variety of users' needs, such as the request of a variety of tasks, the type of experimental tasks are not same, there is a big difference between the device resources, through virtualization technology to achieve standardized management of the resource sharing, cloud resource scheduling can effectively meet the needs of users. Dynamic migration strategy is designed to achieve the management of resources and tasks in the three layers of collaborative resource scheduling mechanism. This research focuses on the task partitioning, resource allocation, resource scheduling strategy, etc., based on the design of the prototype system, the system simulation experiments, is conducted to verify the feasibility and effectiveness of the dynamic migration strategy of training platform in cloud computing environment.

    • Electrical System of Rural Intelligent Allocation Based on IOT Technology

      2016, 25(7):36-41. DOI: 10.15888/j.cnki.csa.005217

      Abstract (1407) HTML (0) PDF 1.07 M (1789) Comment (0) Favorites

      Abstract:Due to problem of obsolete and sole function equipment and the requirement of improving power distribution efficiency and security in rural and remote areas, a design of intelligent power distribution system in rural grid based on Internet of Things (IoT) technology is proposed in this paper. The functions of collecting the data of electric quantity information, data processing and transmission of the data, alarming in abnormal state and analyzing the harmonic are realized in the rural intelligent power distribution system. In this paper, the system architecture and composition are summarized; the design process and key points are described in detail; the results of the harmonic analysis are validated. The application of the system indicates that it can improve the distribution efficiency to optimize status of rural distribution substation, and monitor the operation of the equipment based on the IOT.

    • Development of a Real-Time Expert Diagnostic and Supervision System for Flow Corrosion Condition Based on Aspen Plus Technology

      2016, 25(7):42-48. DOI: 10.15888/j.cnki.csa.005271

      Abstract (1344) HTML (0) PDF 1.07 M (2472) Comment (0) Favorites

      Abstract:Aiming at decreasing the flow corrosion failure happened frequently in refining system, considering the requirements of onsite system reliability and security, on the basis of enterprise's existing information system, a real-time expert diagnostic and supervision system for flow corrosion condition based on Aspen Plus technology is developed. The system uses object-oriented design principles, with .NET as the development platform and MySQL as the backend database. Using the ActiveX technology of Visual Basic (VB), and Aspen Plus, process simulation model is connected with the system. Windows Communication Foundation (WCF) and .Net Remoting techniques are used for data communication. This structure given previously can be applied to a variety of oil refining systems. An application instance in atmospheric overhead system has been developed, which can achieve the dynamic data monitoring, the query of historical data, guidance and measures of limiting alarm, with effective function in corrosion prevention and control.

    • Automatism Storage Handling Robot Based on STM32 Controller

      2016, 25(7):49-54. DOI: 10.15888/j.cnki.csa.005233

      Abstract (1675) HTML (0) PDF 828.76 K (2653) Comment (0) Favorites

      Abstract:For the need of the actual industrial production, the design of intelligent robot achieving precise handling is illustrated. The robot uses the grey scale sensor, color recognition sensor to complete tracking, the orientation of recognition. By STM32 producing PMW waveform control servo motor rotation, it accurates handing material; Simulates the real environment, path planning of high fault tolerance rate. Experimental results show that robot design is simple, easy to implement and to be batch producted, practical and reliable, and can be widely applied in the field of automation.

    • Agricultural Products Quality Safety Supervision Software Based on Android

      2016, 25(7):55-60. DOI: 10.15888/j.cnki.csa.005216

      Abstract (1255) HTML (0) PDF 779.71 K (1768) Comment (0) Favorites

      Abstract:To meet the Government supervision department personnels' demand of quickly checking the quality of agricultural products and timely registering the inspection, the supervision software of agricultural products quality and safety based on Android is developed. This paper introduces the function module of the supervision software of agricultural products quality and safety, creat the Android client and server system architecture, focuses on the design of the user interface of the client, and researches the key technologies of data reading and writing. The software was applied in agricultural regulatory system in Taizhou, Jiangsu Province. The application was stable and effective, and met the expected requirements.

    • Application Relation Analyzer for Information System

      2016, 25(7):61-65. DOI: 10.15888/j.cnki.csa.005230

      Abstract (1324) HTML (0) PDF 1.51 M (1849) Comment (0) Favorites

      Abstract:The application of the information system is a tool to analyze the relationship between the application of the information system in the way of 3D visualization. It can display all the application nodes, the relationship between the applications, the flow of information, the application of basic information, application of monitoring information and the application of alarm information. And it can be used to directly, quickly and accurately locate the fault nodes and the influence range when a problem occurs. At the same time, it also can display the relationship between the internal system structure and the structure of the application nodes in 3D visualization. Analyzer data source is from the relational database, back-end uses J2EE technology, three-dimensional visualization uses Unity3D. The whole analyzer has the characteristics of flexible deployment, good expansibility, easy operation, clear and intuitive data.

    • Application of GUI Automatic Test Tool in Civil Aircraft Data Link System

      2016, 25(7):66-71. DOI: 10.15888/j.cnki.csa.005249

      Abstract (1480) HTML (0) PDF 2.19 M (1864) Comment (0) Favorites

      Abstract:With the rapid development of the integrated and modularized civil aircraft electronic system and the widely use of aircraft data link system, the requirement of the automatic test in aircraft data link system becomes imperative. GUI automatic test is based on HMI. This document introduces an improved GUI automatic test framework based on HMI (Human Machine Interface) which is implemented in civil aircraft data link system. It changes the manual test of internal modules into the automatic test of the functional black box which makes the test more efficient.

    • Warehouse Visual Management System Based on Unity3D

      2016, 25(7):72-76. DOI: 10.15888/j.cnki.csa.002543

      Abstract (2267) HTML (0) PDF 1.28 M (3285) Comment (0) Favorites

      Abstract:VR technology is a hot research field in the computer, the application of VR technology to warehouse management is the development trend of modern warehousing. Based on the theory of modern warehouse and Unity3D, the implementation method of warehouse and visualization management system is proposed. The management system is based on the B/S architecture deployed on the warehouse center of the server, the customer accesses and controls 3D warehouse center through the browser. It Imports all kinds of commodity models into the Unity3D, through the function script control to achieve roaming, positioning, product storage and other functions. Through the WebService interface, it can realize the real-time control of access control, monitoring, and other information control. Practice shows that the system can save the cost of warehouse management and improve the warehouse efficiency.

    • Multi-Platform Oriented Downhole Operation Training Simulator

      2016, 25(7):77-81. DOI: 10.15888/j.cnki.csa.005225

      Abstract (1464) HTML (0) PDF 723.75 K (1623) Comment (0) Favorites

      Abstract:Since downhole operation training system can't meet the staff' requirements of learning whenever and wherever and training content lack of interactive, a set of multi-platform which supports 3D interaction of the downhole operation simulation training system is established. This system applies many technologies such as WEB, Navigation Mesh, Database, Android, fused mobility training, digital training, interactive training, optimizes the mode of tradition training, solves the problem of data source supporting in multi-platform, overwrites target homing road with the help of Navigation Mesh. Downhole operation training isn't restricted by network and equipment, interactive training content, and has the great value of improving training quality and reducing the accident rates of job location.

    • Design and Implementation of Vehicular Ad-Hoc Network Terminal

      2016, 25(7):82-88. DOI: 10.15888/j.cnki.csa.005260

      Abstract (1367) HTML (0) PDF 795.10 K (2556) Comment (0) Favorites

      Abstract:Based on the WAVE VANET, can realize the automatic networking between the vehicle terminals, and solve the problem of channel switch and link connection rate when the vehicle is moving. The thesis proposes a set of hardware and software solution, which uses the 802.11p rf module as the air interface, through analyzing the WAVE protocol and related technologies. The project uses Exynos4412 processor as the central controller, USB camera as the video capture module, and U-Blox7 module as a positioning module, and it can achieve text, voice, video transmission and GPS positioning function.

    • Design of a Workflow Management Platform and its Application on Self-Service

      2016, 25(7):89-95. DOI: 10.15888/j.cnki.csa.005316

      Abstract (1780) HTML (0) PDF 981.52 K (2352) Comment (0) Favorites

      Abstract:With the popularization of information technology, workflow technology has been widely used in information, manufacturing and software fields. More and more enterprises introduce workflow engine and workflow management platform into the daily processes management. But each workflow management platform has its own requirments on business background, system environment and interfaces, which leads to the difficulty on the transplant between different companies. In this paper, referring to the reference model of workflow management platform, we developed a workflow management platform based on its business characteristics, J2EE and SOA architecture. The successful application of self-service greatly improves the operational efficiency and service levels. It is better to improve the efficiency of the inter-bank market, such as self opening accounts and information disclosure. Performance test results show that the concurrency and stability of the platform can meet the general business requirements.

    • English Learning and Test System Based on Web Technology

      2016, 25(7):96-100. DOI: 10.15888/j.cnki.csa.005270

      Abstract (1483) HTML (0) PDF 920.72 K (1903) Comment (0) Favorites

      Abstract:This paper introduces an English online learning system based on Web technology, and describes the system design schema in detail and the related key technologies. First of all, intelligent test paper generation algorithm and strategies of the system are analyzed, combining practicality and operability of proposed algorithm with practical technical indicators the mathematical model is established, and an improved genetic algorithm is designed for solving the model, a group of test papers are generated randomly by test paper indicators to meet the individual needs of different users. Secondly, by introducing Ajax technology, it realizes the time controll of examinations, resolve the bottlenecks problem which is caused by B/S structure, and ease the flow of data.

    • Mobile Security Protection System Based on HTTPS

      2016, 25(7):101-106. DOI: 10.15888/j.cnki.csa.005276

      Abstract (1266) HTML (0) PDF 909.87 K (1920) Comment (0) Favorites

      Abstract:With the continuous development of mobile internet, wireless networks and intelligent mobile terminals, mobile interactive platform has become an important symbol of modern enterprise informatization. However, being faced with the increasingly serious network security threats, various kinds of security issues must be taken into full account in the process of the access and use, during the process of the construction of mobile interactive platform. Combined with the characteristics of the existing business, Jiangsu Electric mobile interactive platform is accomplished as an example in this paper to put forward a new mobile security program to ensure that the confidentiality of mobile interactive platform's safety, effectiveness and communication links. The platform meets the interactive demand of mobile for electricity customers and employees.

    • Door and Window Access Control System Based on STM32 for Residential Community

      2016, 25(7):107-112. DOI: 10.15888/j.cnki.csa.005261

      Abstract (1604) HTML (0) PDF 1.01 M (2064) Comment (0) Favorites

      Abstract:A door and window access control system based on STM32 MCU was designed to address such problems as non-timely management, large consumption of human resources, and low efficiency typical of public door and window management in residential communities. The system, based on traditional door access control design, utilizes Zigbee wireless sensing network technology to implement the wireless communication among door and window access controllers. The system, which is controllable by the administrator user by means of the Ethernet, is additionally capable of automatic regulation in response to the environmental data detected by the sensors. Also, distributed self-adapting interference technology based on frequency agility is used in an attempt to solve the WIFI signal interference encountered in residential community environments. This system is then tested and is found to work stably, promising a prospect of extensive application.

    • CDN System Based on Cloud Computing for New Media Broadcasting

      2016, 25(7):113-118. DOI: 10.15888/j.cnki.csa.005247

      Abstract (1285) HTML (0) PDF 886.41 K (1808) Comment (0) Favorites

      Abstract:The rapid growth of the number of Internet users makes the visiting requirements of streaming media continue to increase, the huge demand for streaming media access and the limited ability of servers to distribute streaming media cause some problems, such as slow system response and the decrease of user experience. To solve these problems and apply the solution to the New Media Broadcasting the CDN system based on cloud computing is proposed, it mainly uses cloud computing and CDN to enable the users to access the nearest required resource, to ensure the quality while it increases the distribution speed of streaming media and reduce costs to improve user experience. This paper mainly describs the structure and major functions of the CDN system based on cloud computing for New Media Broadcasting, specifically introduces the client speed measurement technology by means of Hadoop and a caching technology based on user behavior.

    • Carbon Emission from Oil and Gas Development in China Based on Spatial Information System

      2016, 25(7):119-123. DOI: 10.15888/j.cnki.csa.005269

      Abstract (1330) HTML (0) PDF 839.82 K (1735) Comment (0) Favorites

      Abstract:Carbon emissions in the process in oil and gas development is an important part of the natural process of carbon emissions and building carbon system based on space information system contributes to the realization of real-time carbon emissions data query, update, analysis and sharing, the system uses B/S design pattern, integration of geographic information technology and distributed processing technology, based on the silverlight for distributed system architecture, realizes space information system development and design, at the same time the measurement algorithm is introduced, a calculation is made of carbon emissions for oil and gas development, analysis, the analysis result is expressed in the form of the annual report of income and expenses, and provides effective data for carbon reduction decision support.

    • Application of Lua Language in Lightweight Web Server Design

      2016, 25(7):124-129. DOI: 10.15888/j.cnki.csa.005223

      Abstract (1604) HTML (0) PDF 685.89 K (2784) Comment (0) Favorites

      Abstract:Lua is a tiny script language. Its good expansibility and integration make it easy to integrate to other languages and then implements all kinds of applications. So it is widely used. This paper designs and realizes a lightweight web server procedure in linux operating system by using lua scripting language and standard c language. Using the Lua scripting language, not only makes a Web server easy to configure and install, but also can run smoothly in those who cannot afford the IIS hosts; it further improves the running speed of the server, and enhance the flexibility and extensibility of the server.

    • Microblog New Word Recognition Combining Skip-Gram Model and Word Vector Projection

      2016, 25(7):130-136. DOI: 10.15888/j.cnki.csa.005236

      Abstract (1256) HTML (0) PDF 781.95 K (2677) Comment (0) Favorites

      Abstract:With the popularity of microblog and other social networks, a steady stream of new words emerge, Chinese word segmentation systems often cut the new words into Chinese characters. The new word discovery has become a hot topic in the field of Chinese natural language processing. Existing new word recognition methods rely on the statistical data of large-scale corpus, the ability of new low-frequency word recognition is poor. This paper presents an extension of skip-gram model and word vector projection method, after the combination of the this two methods can ease the data sparseness problem effectively in natural language processing, to identify new low-frequency words, and to improve the precision and recall rate of Chinese word segmentation system.

    • Three-Dimensional Sensor Node Localization Based on AFSA-LSSVM

      2016, 25(7):137-141. DOI: 10.15888/j.cnki.csa.005278

      Abstract (1016) HTML (0) PDF 883.60 K (1529) Comment (0) Favorites

      Abstract:In order to improve location precision of three-dimensional wireless sensor nodes, a novel three dimensional node location method of wireless sensor network is proposed in this paper based on least squares support vector machine (LSSVM) which parameters are optimized by artificial fish algorithm (AFSA). Firstly, the study samples are constructed for three-dimensional nodes localization model, and then LSSVM is used to build three-dimensional node localization model in which fish feeding behavior, cluster and rear end behavior are simulated to find the optimal parameters of LSSVM, and finally the performance is tested by simulation experiment. The results show that, compared with other localization methods, the proposed method can improve the precision of the sensor nodes and it has some practical application values.

    • Population Diversity Genetic Algorithm and its Application in Fault-Tolerant Optimization

      2016, 25(7):142-146. DOI: 10.15888/j.cnki.csa.005187

      Abstract (1079) HTML (0) PDF 824.19 K (2261) Comment (0) Favorites

      Abstract:A diversity genetic algorithm(DGA) is designed to maintain the diversity of population during the evolutionary process. Through the applications of DGA and Monte Carlo simulation method into design optimization, it has ability to find the most fault-tolerant solution from all the optimal solutions. As the result of the numerical experimentation, it is intuitively verified that maintaining the diversity of the population plays an important role in the optimization of fault-tolerant, and the result of the method used into the structure optimization design of a spring is a strong proof that it is more effective than existing methods.

    • Improved Collaborative Filtering Algorithm

      2016, 25(7):147-150. DOI: 10.15888/j.cnki.csa.005224

      Abstract (1163) HTML (0) PDF 919.72 K (2420) Comment (0) Favorites

      Abstract:Traditional elective system has structural deficiencies and defects. To avoid the fact that college students choose a course with blindness, therefore, with improved collaborative filtering algorithm, college students can get personalized elective course election. This paper first introduces two kinds of recommendation algorithms. Also the paper emphatically introduces recommendation algorithms based on collaborative filtering. It analyzes the advantages and disadvantages of the two algorithms. Finally, for data sparsity of collaborative filtering algorithm, it proposes an improved collaborative filtering algorithm, that adds factor in content-based collaborative filtering to solve this problem. Improved collaborative filtering algorithm avoids the traditional algorithms emerging data sparseness problem. Recommending appropriate courses for students on human-oriented, individual needs of students can be met.

    • Anchor Node Distribution Algorithm Based on RGM Algorithm

      2016, 25(7):151-155. DOI: 10.15888/j.cnki.csa.005237

      Abstract (1150) HTML (0) PDF 1.10 M (1896) Comment (0) Favorites

      Abstract:All current localization algorithm study focuses on how to improve the positioning accuracy, but rarely studys how to arrange node. Just randomly selecting anchor nodes meet the conditions, however, the algorithm does not explicitly request how to arranged anchor node, so you want to get the appropriate anchor node at all times can only randomly arranged a large number of anchor nodes. However, a large number of increasing the number of anchor nodes is bound to greatly increase the cost of the system and in the actual operation of the arranged is unrealistic. Based on the above issue, this paper proposes a distribution optimization algorithm basis on RGM algorithm. Algorithm detailed analysis of the coverage area of each set of positioning unit, positioning accuracy meets the conditions for the basis to calculate the coordinates of each anchor node. Simulation results show that according to the algorithm arranging anchor nodes does not reduce the positioning accuracy.

    • Application of Hybrid Computing Neural Network Model in Water Flooded Layer Recognition Based on Reverse Cloud Transformation

      2016, 25(7):156-160. DOI: 10.15888/j.cnki.csa.005504

      Abstract (1167) HTML (0) PDF 762.04 K (1704) Comment (0) Favorites

      Abstract:So far, the existing method for automatically discriminating information is difficult to reflect the impact of mixing quantitative and qualitative indicators of the combination of the water layer recognition. Therefore, in order to improve the accuracy of determining flooded layer, this paper proposes neural network model to calculate quantitative and qualitative transformation hybrid cloud-based discrimination to achieve flooded layer. On the one hand, qualitative information is extracted logs by cloud model, to ensure the integrity and objectivity of the original data; on the other hand, the information in the qualitative concept forward through the normal cloud is converted to quantized transform numerical information, ensures the scientific data; the eventual establishment of correspondence between the characteristics of the system input and results. Experimental results show the high accuracy of the calculation method for water layer recognition neural network based on hybrid cloud transformation, it has the characteristics of fast, flooded layer identification is a more practical approach.

    • Study of Real-Time Traffic Flow Prediction Based on Wavelet Fuzzy Neural Networks

      2016, 25(7):161-164. DOI: 10.15888/j.cnki.csa.005258

      Abstract (1156) HTML (0) PDF 697.88 K (1590) Comment (0) Favorites

      Abstract:Real-time traffic flow prediction is one of important contents of intelligent transportation system research. Combined with the related knowledge of wavelet analysis and fuzzy neural networks, this paper gives the traffic flow forecasting model based on wavelet fuzzy neural networks. It takes wavelet function as fuzzy membership function, uses neural networks to realize fuzzy reasoning, and finishes the estimation of next cyclical traffic flow. Simultaneously the genetic algorithm is used to optimize the overall network. After the field data test, this method has high forecasting precision, stable convergence process, strong adaptability.

    • Collaborative Filtering Recommendation Based on User Trust Model

      2016, 25(7):165-170. DOI: 10.15888/j.cnki.csa.005229

      Abstract (1159) HTML (0) PDF 730.65 K (1964) Comment (0) Favorites

      Abstract:Collaborative filtering is one of the most important technologies in E-commerce. With the development of E-commerce, the magnitudes of users and commodities grow rapidly, the problem of data sparsity of user project is becoming more and more significant. In traditional collaborative filtering recommender systems, similarity of users is often calculated based on common ratings. When user-item ratings are sparse, the accuracy of recommendations will be influenced because users with similar preferences can't be found accurately. Considering the effect of users' ratings and trusts on the recommendation results, this paper applies AHP to construct user trust model and proposes a collaborative filtering recommendation method combining user trust model. The experimental results show that, user similarity calculation method combining user trust can effectively reflect the user's cognitive changes, ease the impact of data sparsity on the collaborative filtering recommendation algorithm and improve the accuracy of recommendation results.

    • Analysis of the Sentence Tendency in Uighur Language

      2016, 25(7):171-175. DOI: 10.15888/j.cnki.csa.005277

      Abstract (1214) HTML (0) PDF 714.48 K (1849) Comment (0) Favorites

      Abstract:The precondition of network public opinion analysis and network content security is based on the accurate and reliable text tendency analysis. In this paper the Chinese emotion dictionary which included HowNet, NTUSD and emotion word dictionary released by Dalian university is implemented intersection operation and union Operation. By selecting, translating for Uighur vocabulary, with the synonymous dictionary, the Uighur emotional polarity dictionary is constructed. At the same time the impact is analyzed and summarized about the Emotional Modifier such as the effect of negative word, degree adverbs and the Sentence's adversative conjunction etc. Then the effect degree is converted into emotional weight value. In the end the weighted algorithm based on the emotion words and the modifier words is designed to decide a sentence emotional polarity. The experiment result proves that this algorithm is basic validity compared to Chinese emotional tendentiousness algorithm by testing on self-built corpus.

    • Time-Frequency Representation and Reconstruction Based on Compressive Sensing

      2016, 25(7):176-181. DOI: 10.15888/j.cnki.csa.005239

      Abstract (1122) HTML (0) PDF 850.59 K (2315) Comment (0) Favorites

      Abstract:Traditional time-frequency analysis is restricted by the Nyquist sampling theorem. As the amount of information increases, higher requirements are needed in sampling rate, transmission velocity, and storage space. Moreover, bilinear Wigner-Ville distribution is suffered from cross terms when processing multi-component signals. Using the kernel function based methods to suppress cross terms can decrease time-frequency concentration. In this paper, compressive sensing is combined with time-frequency analysis to solve the above problems. Under the framework of compressive sensing based time-frequency analysis, the restriction of Nyquist sampling theorem can be lessened, and the Wigner-Ville distribution can achieve suppressed cross terms with high time-frequency concentration. Simulations are provided for mono-component signal, multi-component signal, and bat sound signal, based on different window functions such as the rectangular window or the Gaussian window, to verify that the compressive sensing based time-frequency representation reconstruction is superior to the traditional reconstruction method. Moreover, we analyze the relationship between different sample regions and the performance of the reconstructed time-frequency representations, in terms of the mean-square-error (MSE) and time-frequency concentration measurement (CM).

    • K-Means Algorithm Based on Synthetic Weighting of AHP and CRITIC

      2016, 25(7):182-186. DOI: 10.15888/j.cnki.csa.005267

      Abstract (1401) HTML (0) PDF 610.90 K (3223) Comment (0) Favorites

      Abstract:The traditional K-means algorithm is regarded that the attributes of swatches have the same effect on the clustering analysis. Based on AHP and CRITIC, comprehensive weighting of K-means clustering algorithm is proposed to solve the problem in this paper. First, each of attribute weight is calculated by CV-K-means method, thus judgment matrix is determined by comparing the two.Then, according to the analytic hierarchy process subjective weights of attributes is determined. And using the CRITIC method the objective weight of each attribute is determined, difference coefficient method is used to determine coefficient of combination. The experimental results show that the algorithm accuracy is higher than the traditional K-means algorithm.

    • Algorithm of Traffic Flow Measuring Based on Video

      2016, 25(7):187-191. DOI: 10.15888/j.cnki.csa.005301

      Abstract (1159) HTML (0) PDF 1.29 M (2963) Comment (0) Favorites

      Abstract:The vehicle counting algorithm based on virtual line inevitably exists the possibility of missing and error. Concerning this issue, this paper extracts and combines two types of image information- the virtual lines' relative positions with the objects and its pixel value variance, then a new vehicle segmentation and counting method is proposed. First, it determines the relative positions between the objects and the virtual lines, and combines with the variance of virtual lines' pixel value. With these information, it can improves the accuracy of the traffic flow by means of dividing vehicles. A testing system is developed for testing the performance of the method. The system has run in some kinds of weather, and its result is analyzed. The results show that the method has excellent performance both in real-time and accuracy in the daytime and the accuracy was above 95% for each lane of traffic. But the performance in the nighttime may not be optimal. Therefore, improvement is planned to make during following research.

    • Mutual Authentication and Key Agreement Protocol without Bilinear Pairing

      2016, 25(7):192-195. DOI: 10.15888/j.cnki.csa.005157

      Abstract (1188) HTML (0) PDF 596.46 K (1831) Comment (0) Favorites

      Abstract:To improve the performance of identity authentication protocol using public key cryptography effectively, a new secure and effective mutual authentication key agreement protocol combined with one-way hash function is proposed. The communication cost is reduced clearly in this protocol, because the two parties of authentication needs only message exchange twice. The computation complexity of the agreement is equivalent as classical protocol using public key cryptography. The security of this protocol is proved by mathematical derivation and the formal deduction which aims at all- known attacks. In this protocol, a secure one-time symmetric key is generated after successful authentication.

    • Online Handwritten Signature Verification Method Based on DCT and SVDD

      2016, 25(7):196-199. DOI: 10.15888/j.cnki.csa.005248

      Abstract (1222) HTML (0) PDF 632.75 K (1885) Comment (0) Favorites

      Abstract:In order to make online handwritten signature verification more practical, this paper presents a method based on Discrete Cosine Transform (DCT) frequency analysis and Support Vector Data Description (SVDD). Signature data is collected by Android mobile phone software, and then extracts signature features based on DCT frequency analysis and Singular Value Decomposition (SVD). The online signature verification is established based on SVDD, for which is suitable for the small amount sample and one-class classification method, and uses the grid search method to optimize the kernel function parameters. The experimental results show that this method is efficient, has a low complexity, can extract the signature features clearly, and obtains a better recognition effect with a small amount of a real signature as the training sample.

    • Location of Importing Fresh Food Distribution Centers Based on Improved Rough Set and Analytic Hierarchy Process

      2016, 25(7):200-202. DOI: 10.15888/j.cnki.csa.005323

      Abstract (1440) HTML (0) PDF 607.97 K (1715) Comment (0) Favorites

      Abstract:Location of importing fresh food distribution centers is discussed in this paper. The improved rough set is used to reduce the attribute index of distribution center location, and the multi-factor hierarchy model is set up by using analytic hierarchy process, and the evaluation of the Z enterprise's option address is evaluated. The objective weights and the subjective weights obtained are effectively combined to make the evaluation more objective and scientific. The conclusion shows that method is feasible.

    • Power Load Forecasting Based on Memory Computing

      2016, 25(7):203-207. DOI: 10.15888/j.cnki.csa.005290

      Abstract (1246) HTML (0) PDF 663.36 K (1834) Comment (0) Favorites

      Abstract:Proposing memory computing and the development of technology, is based on the actual situation needs. For industries, its data processing is facing all kinds of problems and difficulties, such as large amount of data processing, low efficiency of data processing and slow processing speed, load forecasting of electric power industry also meet obstacles, to large quantities of data real-time analysis make predictions become a big problem, in this paper, the calculation based on memory, combined with bp neural network prediction model, make the research problems on load forecasting, compared with traditional methods, experimental proof has qualitative improvement.

    • Construction and Application of Embedded Image Processing System Based on ARM920T

      2016, 25(7):208-212. DOI: 10.15888/j.cnki.csa.005250

      Abstract (1266) HTML (0) PDF 736.28 K (2215) Comment (0) Favorites

      Abstract:The article research on a method that corss compiling OpenCV and Qt on Linux OS and porting it to Linux operating system. It builds up an Embedded Image Processing System with ARM920T which is a core that can achieve complicated image processing. This platform makes classic algorithm barcode recognition come true. The article describes barcode position recognition and algorithm. The experimental result verifies the availability of the method in this article.

    • Research on Static Feature System in Malicious Web Pages

      2016, 25(7):213-218. DOI: 10.15888/j.cnki.csa.005257

      Abstract (1067) HTML (0) PDF 648.25 K (1808) Comment (0) Favorites

      Abstract:Malicious Web pages is a new kind of Web-based attack method. In drive-by-download exploits, attackers embed malicious code into a Web page. When a victim visits this page, the code attempts to download and execute malwares by exploiting vulnerabilities in browser or its plugins. Considering the problem of extracting static feature from malicious Web page, this paper selects 14 static features based on information gain theory and proposes 8 new static features are proposed by analyzing obfuscated scripts. In addition, two improvements of original feature extraction process are proposed as follows: preprocessing for original Web page based on different code format; reprocessing HTML code which are dynamically generated by JavaScript to further extract HTML features. The experimental result shows that, on unbalanced data set and balanced data set, our static feature system is provided with a certain validity.

    • Relational Database RedoLog Mining Technology Based on Data Block

      2016, 25(7):219-224. DOI: 10.15888/j.cnki.csa.005209

      Abstract (1318) HTML (0) PDF 903.71 K (1687) Comment (0) Favorites

      Abstract:The relational database can submit objects rapidly by means of the Redo log and also can record the operation process and the operation content. The most important method to realize database replication is transmitting and writing changed data in the disaster backup end through the analysis of the Redo log and the capturing of the changed data contents. The structure of Oracle Redo log file database is analyzed in this paper, and the header information of the log file is also stated. Considering the technology of Redo log file head positioning, the paper presents a Redo log database mining algorithm based on data block. The paper also validates the feasibility and reliability of the technology of the Redo log mining through the comparative analysis. Research direction is discussed at last.

    • Camera Posture Positioning of Virtual Camera System Based on Unity3D

      2016, 25(7):225-229. DOI: 10.15888/j.cnki.csa.005240

      Abstract (1407) HTML (0) PDF 1.07 M (3010) Comment (0) Favorites

      Abstract:With the vigorous development of virtual reality technology, the research of virtual camera system has been placed more and more attention. Making television programs and film special effects embark on an unprecedented new level, because of using the virtual camera system. However, in the study and use of virtual camera system, the actual situation of the synchronization camera motion attitude is a key issue to resolve, namely the MEMS sensor will generate noise in the measurement process, and it is necessary to improve the accuracy. In order to resolve the problem, a real-time virtual camera system that based on Unity3D and using C#. The system focuses on the technology of synchronous fusion that basedon the posture of entitative camera and virtual camera. In order to reduce noise, Kalman filtering technique is used to filter the sensor data. The result shows that the virtual camera's synchronized movement can meet the needs of TV recording and film special effects in this virtual camera system.

    • Network Camera Degradation Modeling Based on Maintenance Cycle Forecast

      2016, 25(7):230-234. DOI: 10.15888/j.cnki.csa.005235

      Abstract (1077) HTML (0) PDF 703.15 K (1780) Comment (0) Favorites

      Abstract:The network camera is an important part of security system, and its reliability directly affects the performance of the security system. Now the research can obtain the overall stability of the security equipment or the stability of a single product, which may not guarantee the overall performance evaluation on the basis of individual differences; In view of this, this paper puts forward the reliability analysis method based on Winner process data. First of all, it sets up the equipment degradation model based on the Winner process and obtains prior data from equipment data samples using PPS sampling method, and determines its prior distribution; Secondly, it calculates confidence interval of maintenance cycle of the equipment, and builds a posteriori estimation for sample degradation data, and forecast maintenance cycle of security equipment. Finally, an example shows the significance of this research and the value of this method.

    • Research and Design of Wireless Sensor Network Security System

      2016, 25(7):235-241. DOI: 10.15888/j.cnki.csa.005314

      Abstract (1847) HTML (0) PDF 410.30 K (1718) Comment (0) Favorites

      Abstract:Wireless sensor network (WSN) is a new type of wireless network. It has many advantages, but there are also some problems, which allow adversary much easier to analyze network vulnerabilities, to conduct an attack and destroy a whole network. This paper proposes a model of secure wireless sensor network, which is able to defend against most of known network attacks and doesn't significantly reduce the energy power of sensor nodes (SN). We propose clustering as a way of network organization, which reduces energy consumption. Network protection is based on the calculation of the trust level and builds trusted relationships between trusted nodes. Operation of trust management system is based on a centralized method. The experimental results show that the wireless sensor network model designed in this paper solves the task of development of energy efficient; TMS shows satisfied results in preventing the attacks.

    • Design of High-Voltage Trigger Device in Spark Gap Switches

      2016, 25(7):242-246. DOI: 10.15888/j.cnki.csa.005273

      Abstract (1394) HTML (0) PDF 690.27 K (2143) Comment (0) Favorites

      Abstract:The triggering device of spark gap switches is developed in this paper。It adapts a circuit scheme of the full bridge inverter and voltage doubling rectifier as the core. The paper also analyzes the relationship between output voltage and doubling capacitance on the basis of the working principle of the circuit as the basis of parameter selection. And designing an ignited control circuit with copper ball trigger switch for guaranteeing the reliability and quickness of the ball gap switch breakdown. At the same time, using the Atmega16 microcomputer is control core for program to ensure high voltage ball gap switches working in a reliable state of voltage low shake. The device has Verified on the PSCAD simulation software and set up an experimental prototype. And the experimental results show that the device output voltage is in a high precision, short charging time and stable performance.

    • Energy Efficiency Evaluation in Cloud Computing Environment

      2016, 25(7):247-253. DOI: 10.15888/j.cnki.csa.005026

      Abstract (1322) HTML (0) PDF 628.69 K (2534) Comment (0) Favorites

      Abstract:High energy consumption issue is one of the major obstacles for the new cloud era. The energy efficient cloud environment with high performance, and low power consumption has received extensive attention. In this paper, the definition of energy efficiency is given . The principles, the mathematical expression and the measuring and calculation approaches for implementing high energy efficiency are concluded and summarized. On this basis, the key technology is deep analyzed and studied, at last the problems and challenges are summarized and analyzed.

    • Research on Integration Process of Civil Airborne Software

      2016, 25(7):254-258. DOI: 10.15888/j.cnki.csa.005201

      Abstract (1080) HTML (0) PDF 932.37 K (2260) Comment (0) Favorites

      Abstract:DO-178B standard has provided the guidelines for Civil Airborne Software Development. Compared with traditional software engineering, DO-178B standard is object-oriented and process-oriented. This standard requires related objects for different level software. The applicant should provide the evidences to the certification authority to show the software complies with the airworthiness objects. As for the software coding and integration process, DO-178B requires the output of software coding and integration process is correct and completed. But this standard doesn't provide how to meet with the objects. By radio tuning software coding and integration process and a research on the compiling and linking process explains how to comply with this object of DO-178B.

    • Research on Risks Factors of Female Breast Cancer Recurrence Based on Logistic Regression, Artificial Neural Network and Support Vector Machine

      2016, 25(7):259-263. DOI: 10.15888/j.cnki.csa.005181

      Abstract (1319) HTML (0) PDF 659.96 K (2562) Comment (0) Favorites

      Abstract:In order to find out the influencing factors of breast cancer recurrence, this paper investigates the artificial neural network(ANN), support vector machine(SVM) and logistic regression for the prediction of breast cancer recurrence. A data set containing 277patients' records which is provided by the University of Wisconsin Hospitals, Madison from Wolberg is used to study the influencing factors of recurrence of breast cancer. By using logistic regression, artificial neural networks and support vector machine, it determines the important factors of breast cancer recurrence, and then compares these three methods. The results show that tumors size, nodules risk, the degree of malignancy(P<0.05) are the main factors of breast cancer recurrence. Compared to the logistic regression model, support vector machine and artificial neural network has better prediction performance, and support vector machine performs best.

    • Document Classification Based on Improved QPSO and RBF Neural Networks

      2016, 25(7):264-267. DOI: 10.15888/j.cnki.csa.005340

      Abstract (1196) HTML (0) PDF 736.06 K (1753) Comment (0) Favorites

      Abstract:To enhance the accuracy of the text classification, a new method based on quantum PSO and RBF neural network is proposed. Firstly, it establishes the key words set to describe the classification of the samples, and uses fuzzy vector space model to build the feature vectors of every kind of sample, then automatically classifies the texts by RBF neural network, optimizes the parameters of RBF neural network by improved quantum PSO to enhance its approximation capability. The new method is proved by the classification of some documents in China periodical document database. The experiment shows that this method makes significant improvements in classification accuracy compared to other methods.

    • Adaptive Control System of Traffic Signal at the Intersection and its Extension

      2016, 25(7):268-272. DOI: 10.15888/j.cnki.csa.005441

      Abstract (1114) HTML (0) PDF 877.35 K (1803) Comment (0) Favorites

      Abstract:Due to the current intersection signal control is mainly controlled by the traditional way, most do not have intelligence, it's difficult to achieve on the random change of traffic control effectively. In order to solve the problem, this paper from two aspects of the fuzzy control and adaptive control starts to study the problem, and analyzes its simulation, the results show that, the adaptive control system is better than the control effect of fuzzy control and traditional control system. At last, it extends single intersection to the multi-intersection traffic signal control.

    • Encryption Method of Power Line Links of Intelligent Home Furnishing Devices

      2016, 25(7):273-277. DOI: 10.15888/j.cnki.csa.005254

      Abstract (1246) HTML (0) PDF 687.24 K (1851) Comment (0) Favorites

      Abstract:The interconnect architecture and method of modern intelligent home furnishing devices are introduced. The problems of power line communication's encryption method in current intelligent home furnishing devices are discussed. A NFC-based encryption method of power line communication is proposed. The NFC card's UID is used by this method to produce network member key and to complete the encryption process of PLC link. Through actual measurement, the current problems of power line communication's encryption method is resolved well by the NFC-based method, the convenience, accuracy, and stability levels of NFC card reading process are increased. The method's safety level is high, and has strong interference restraining ability towards outside interference.

    • Work Pool Technology of Loosely Coupled Multiprocessor System

      2016, 25(7):278-281. DOI: 10.15888/j.cnki.csa.005133

      Abstract (1028) HTML (0) PDF 666.04 K (1689) Comment (0) Favorites

      Abstract:The paper analyzes the dynamic balance working principles of centralized work pool, decentralized work pool and distributed work pool in the multiprocessor system. Through the simulation experiment, it brings、 forward a loosely coupled multiprocessor system using the work pool technology to assign the work tasks to the idle processors in a timely manner, which makes each machines of the loosely coupled multiprocessor system (especially for heterogeneous cluster platform) work coordinately. The speed of massive data processing is efficiently improved.

    • Application the KPI Optimization Method Based on T-S Fuzzy Reasoning

      2016, 25(7):282-285. DOI: 10.15888/j.cnki.csa.005336

      Abstract (1132) HTML (0) PDF 620.39 K (1908) Comment (0) Favorites

      Abstract:Fuzzy system is a knowledge-based or rule-based systems, its core is a so-called IF-THEN rules consisting of knowledge base. Fuzzy inference is the process that for a given system input, integrated use of knowledge in the fuzzy inference rules, to obtain the system output. The basic idea of fuzzy TS model is that the normal fuzzy inference rules and reasoning are converted into a mathematical form of expression. This article intends to performance appraisal and the superiority of the fuzzy inference for effective combination of research and discussion of basing on TS fuzzy reasoning in the performance appraisal. Its convergence and superiority is verified

    • Key Technology of Seismic Data 3D Visualization Display Based on VolumeViz

      2016, 25(7):286-290. DOI: 10.15888/j.cnki.csa.005390

      Abstract (1415) HTML (0) PDF 756.83 K (2051) Comment (0) Favorites

      Abstract:Along with the application of 3D visualization technology becoming more and more extensive, the problems become the obstacle of restricting the development of 3D visualization of seismic data. For example,the amount of information of 3D seismic data is too much, the computation of 3D visualization rendering is too large and rendering speed is too slow. This paper based on the Open Inventor VolumeViz, through the conversion of 3D seismic data storage format, it achieves the storage of a large amount of data, through the automatic control of the resolution ratio, it reduces the amount of computation. And finally with building the scene database and rendering scene, it finishes 3D visualization of seismic data.

    • Calligraphy Simulation Based on Hand Drawn Speed

      2016, 25(7):291-295. DOI: 10.15888/j.cnki.csa.005500

      Abstract (1075) HTML (0) PDF 735.78 K (2277) Comment (0) Favorites

      Abstract:The advantages and disadvantages of different methods are analyzed, and a new method based on hand drawn speed is proposed. The method first of all has a certain frequency sampling user hand trajectory points and calculates the user's drawing speed, then according to the pen movement simulation speed calligraphy pen writing gets weight effect. Finally, in pen to put pen to paper and pen calligraphy peak effect, in order to achieve Chinese calligraphy writing simulation effect. Experimental results show that the method doesn't need rely on special handwritten device, only needs to collect user writing speed information, it can achieve better simulation effect of calligraphy writing, for the user to achieve calligraphy writing provide a new method.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063