• Volume 26,Issue 2,2017 Table of Contents
    Select All
    Display Type: |
    • Big Data Platform of Electric Power Enterprise

      2017, 26(2):1-8. DOI: 10.15888/j.cnki.csa.005604

      Abstract (2033) HTML (0) PDF 1.75 M (2948) Comment (0) Favorites

      Abstract:In electric power, there are application requirements of big data in every specialty. At the same time, there are many big data solutions and technology roadmap. The unified platform needs to achieve for integrated enterprise information system to avoid multiple construction. In this paper, the application requirements and technique actuality have been analyzed. Then, we propose the function architecture of basic platform for big data. At last, the design theory and implementation of the platform are discussed in detail.

    • Analysis on Fruit Fly Optimization Algorithm

      2017, 26(2):9-17. DOI: 10.15888/j.cnki.csa.005602

      Abstract (1888) HTML (0) PDF 2.08 M (4167) Comment (0) Favorites

      Abstract:In order to overcome the demerits of Fruit Fly Optimization Algorithm(FOA), such as long running time and easily relapsing into local optimum, which are caused by improper parameters setting, this paper mainly researches how the main parameters of FOA influence the following aspects:running time, optimization performance and convergence velocity. Taking six standard testing functions optimization as an example, we make the simulation experiments of FOA under the different parameters. Firstly, qualitative conclusions of influence of important parameters on FOA's performance are drawn by comparative analysis and study. And then the reasonable value ranges of the parameters are given in order to get a better balance between FOA's performance and its running time. Experimental results show that reasonable parameters settings not only shorten FOA's running time, but also speed up its convergence velocity and improve its optimization precision.

    • Analysis and Practice of Semantic Model in Tourism Auto-Answering System

      2017, 26(2):18-24. DOI: 10.15888/j.cnki.csa.005640

      Abstract (1284) HTML (0) PDF 1.17 M (1965) Comment (0) Favorites

      Abstract:According to the weakness of shallow semantics models based on lexical analysis which are commonly used in QA system, shallow semantics models cannot accurately analyze the deep semantics of users' questions. This paper focuses on the tourism QA application field, adopts the combined category grammar (CCG) to parse the question sentences, and uses lambda calculus to express the question semantics, so that semantic models on tourism questions can be derived. And it's convenient to search answers according to such accurate semantic quickly. The research first carries out data acquisition and corpus tagging preparatory work,including the analysis of tourism question corpus both in sentence pattern and syntax. Then the supervised learning process based on a probabilistic CCG algorithm is used to train a reliable semantic dictionary. At last, an automated answering system is built according to the semantic dictionary and related knowledge, which is mainly about the question parsing and building of corresponding semantic models. The final result on evaluation dataset shows that the semantic analysis method has relatively clear improvement in analytical performance.

    • Approach to Make Mood Maps Based on Sentiment Analysis of Chinese Micro-Blog

      2017, 26(2):25-29. DOI: 10.15888/j.cnki.csa.005594

      Abstract (1676) HTML (0) PDF 971.47 K (2785) Comment (0) Favorites

      Abstract:Since the time of web2.0, social network information of internet has increasingly integrated into people's life. The analysis of the vast social network information has become an important research direction in the field of text analysis. In this article, through establishing emotional dictionary and semantic rules, the emotional colors of Chinese micro-blog are analyzed and calculated. Then the emotion map combined with GIS spatial analysis method gives a scientific and quantitative description of subjective emotion by means of objective evaluation and the emotion revealed on the map. This article which takes the result of micro-blog sentiment analysis as evaluation index to evaluate the Gross National Happiness, analyzes the meaning of evaluating the happiness with mood map created on the approach which combines the GIS with the traditional sentiment analysis.

    • >Survey
    • Overview of Unstructured Power Data Storage Base on Distributed File System

      2017, 26(2):30-36. DOI: 10.15888/j.cnki.csa.005626

      Abstract (1391) HTML (0) PDF 1.17 M (2211) Comment (0) Favorites

      Abstract:With the development of Smart Grid, in the process of the operation, maintenance and management of Smart Grid, massive heterogeneous data can been generated. The massive data includes videos, images, sensor data and some enterprise file information, etc. Traditional relational database is unable to store so large-scale unstructured data. So far, it is one of the hot research topics that how to store the unstructured data efficiently, cheaply, safely and reliably, and how to retrieve and analyze quickly. This paper analyzes the generation and characteristics of big data of Smart Grid, and review the storage technology of distributed file system in industry. Finally, we propose a distributed file system storage strategy for unstructured data of Smart Grid.

    • Application of Bluetooth Communication Intelligent Helmet Based on Android

      2017, 26(2):37-42. DOI: 10.15888/j.cnki.csa.005599

      Abstract (1273) HTML (0) PDF 1.14 M (2368) Comment (0) Favorites

      Abstract:In the process of driving a motorcycle, drivers have to wear helmets to ensure safety. However, there are some inconveniences and potential safety risks when drivers have a phone call or want to check the time while driving. In order to solve these problems, this paper studies the intelligent helmets which use Bluetooth connection to Android phone. The user can operate mobile phone and helmet to realize relevant functions through speech recognition. It uses 51 single chip microcomputer as the central processor to manipulate and control the Bluetooth module as well as other functional modules. Meanwhile, an APP is designed to enhance the user experience. It provides an easier interoperate between helmet and mobile phone via Bluetooth technology. This APP realizes not only data transmission function, but also instructions recognition and speech synthesis function.

    • Communication System of X-Ray Single Crystal Diffraction Remote Control System

      2017, 26(2):43-50. DOI: 10.15888/j.cnki.csa.005600

      Abstract (1570) HTML (0) PDF 1.42 M (2321) Comment (0) Favorites

      Abstract:In order to break through the control mode of remote control system of X-ray single crystal diffraction, in which upper computer positive controls lower computer, the enterprise-class RabbitMQ message queue server is used to act as control communication server to build a messaging platform for X-ray single crystal diffraction remote control system. And we have achieved the remote operation and control among various distributed subsystems. The paper mainly introduces the design of the communication system for remote control system and the primary testing shows this communication architecture can realize stable and precise messaging.

    • Assessment of Power System Stability Based on QPSO-SVM

      2017, 26(2):51-57. DOI: 10.15888/j.cnki.csa.005677

      Abstract (1169) HTML (0) PDF 1.15 M (1496) Comment (0) Favorites

      Abstract:With the fast development of national power industry,ultra high voltage power transmission has already been applied in practice. And the following features such as stability and security of power system have become more crucial owing to the complexity of the grid. On the one hand, voltage stability is the major factor accounting for the power system reliability. On the other hand, the online assessment of the voltage stability in real time has always been an obstacle in the concerning research. This paper aims to put forward a QPSO-SVM model which can be applied to the online assessment of the voltage stability in real time, based on the increasing accuracy and efficiency of calculation by means of SVM model as well as the production of parameter via the method of QPSO. In addition, it ensures the absolute assessment and the comprehensive application to all networks adopt the component of tangent vector of power flow power as VSI so as to improve the assessment accuracy of machine learning. Finally, it is approved that by means of WSCC9-bus, the learning time, the assessment time and the accuracy have been increased by 23.2%, 63%, 77.9%, and 26.2%, 56.9%, 72.56% and 28.9%, 42.19%, 82.34%, respectively, compared with GA-SVM, SVM and BPNN. Also, the method based on the IEEE14 experiment is an ideal path for the online assessment of the voltage stability for the power system in real time due to the fact that the key buses can be found before the system collapses and that it shares the same findings with the power flow calculation.

    • Mobile Campus Navigation System Based on Android

      2017, 26(2):58-62. DOI: 10.15888/j.cnki.csa.005583

      Abstract (1977) HTML (0) PDF 947.33 K (4562) Comment (0) Favorites

      Abstract:Aiming at the problem of the navigation information on Baidu map being not perfect in campus, an Android mobile navigation system is designed and implemented through setting up net database. The overall architecture of the system and the client software structure are introduced firstly. Then this paper discusses emphatically the design of function modules, including client interface, route navigation module, campus building navigation module and indoor scene module. The system has two distinct characteristics, which are embodied in the hierarchical software architecture, and in the combination of Baidu maps and self-build database. With the comparison between our system and Baidu map, the experimental results show that our system is able to navigate the missing common building in the campus of Baidu maps successfully. All in all, our system has the advantages of simple operation, stable operation, high user experience, maintainability and strong practical value.

    • Intelligent Sanction System of Expense Claims

      2017, 26(2):63-67. DOI: 10.15888/j.cnki.csa.005578

      Abstract (1637) HTML (0) PDF 1.14 M (2290) Comment (0) Favorites

      Abstract:With the increasingly fierce market competition, the importance of cost control for the enterprise is increasing. Financial reimbursement system is an important window of enterprise cost expenditure, which plays a key role in controlling the cost of enterprises. Traditional financial management software focuses on the business process. The management and control of reimbursement is weak, and all levels of managers in the examination of the expense claims have to approve in vain due to the lack of relevant information. In this paper, the intelligent sanction system of expense claims provides decision support for the approval of the expense claims, improving the efficiency and quality of the sanction and reducing the cost. The basic function and application process of the intelligent sanction system of expense claims are introduced in detail.

    • Intelligent Home Voice Control System Based on the GSM

      2017, 26(2):68-72. DOI: 10.15888/j.cnki.csa.005615

      Abstract (1227) HTML (0) PDF 779.10 K (1949) Comment (0) Favorites

      Abstract:A design program of intelligent home voice control system based on GSM is presented on Android mobile phone platform. Via the voice recognition of Android mobile phone, the intelligent home can have a function of being controlled by remote voice through this program, which greatly improves the operability and the security requirements of the intelligent home. Test results prove the features of real-time, effectiveness and stability of the system. Meanwhile, this system can also provide a practical reference solution for human-computer interaction, having a wide range of application.

    • Design and Implementation of Chinese Speech Synthesis System

      2017, 26(2):73-77. DOI: 10.15888/j.cnki.csa.005616

      Abstract (1535) HTML (0) PDF 877.78 K (3033) Comment (0) Favorites

      Abstract:In order to realize that machine can make a sound, this paper designs and builds the HTK (HMM-Tool-Kit) platform to realize the Chinese speech synthesis system. The parameter synthesis method realizes the synthesis from text to speech, and this paper has a detailed discussion for the implementation technology of the text analysis, prosody control and speech synthesis in synthetic system. Finally, with experiments under the environment built on the Linux, the expected results are obtained, realizing the transformation from the text to speech.

    • Research on Distributed Storage Engine in Unified Communications Systems

      2017, 26(2):78-82. DOI: 10.15888/j.cnki.csa.005618

      Abstract (1530) HTML (0) PDF 888.20 K (1589) Comment (0) Favorites

      Abstract:Unified Communications is one of the research hotspots in today's computer applications, and people's requirements of application service in unified communications system applications and services are increasingly higher. In terms of data access, based on the traditional relational database or file system-based storage, traditional way has become increasingly unable to meet the needs of the application. With the development of Hadoop technology and related subsystems, the advantages of distributed storage become obvious. Therefore, on the basis of analyzing respective characteristics and system architectures of HBase and Hive, this article combines with specific projects of Unified Communications and proposes the design method of storage engine based HBase-Hive integrated design, in order to solve the unsatisfied problem of data security, data access efficiency etc. in Unified Communications systems. The contrast experiments show that the design scheme not only improves the efficiency in data query, but also makes fully prepare for the development of subsequent data mining.

    • Intrusion Prevention and Recovery System Architecture Based on Policy Shunt

      2017, 26(2):83-87. DOI: 10.15888/j.cnki.csa.005620

      Abstract (1159) HTML (0) PDF 765.51 K (1673) Comment (0) Favorites

      Abstract:By making full use of the security features of intrusion detection products, this paper designs an intrusion prevention and recovery system architecture based on policy shunt. The system uses the double NIDS system as the front-end detection module, making the double NIDS system completely cover the various protocol layers of intrusion detection by policy shunt and gives full play to the advantages of both NIDS detection system to achieve the high-efficiency intrusion detection. In addition, the system combines with the host logs protection mechanisms and the key recovery mechanisms. Therefore, even in the case of intrusion and data destruction, the system can ensure the security of the critical parts in the system.

    • Multi-Split Air Conditioning Remote Monitoring and Control System

      2017, 26(2):88-92. DOI: 10.15888/j.cnki.csa.005623

      Abstract (1792) HTML (0) PDF 835.56 K (2360) Comment (0) Favorites

      Abstract:Intelligent air conditioning is a branch of intelligent buildings, and especially in the office buildings, the intelligent level is of great significance to save electric energy. Aiming at the remote monitor and control technology of multi-split air conditioning system, this paper presents two remote monitoring schemes:one is the line control scheme, the other is the group control scheme. Both schemes present respectively the implementation of bottom hardware, software protocol and control flow to support connecting to a remote server, monitoring corresponding multi-split air conditioning indoor machine with client. By the comparison tests, the two schemes can realize the remote control of the multi-split air conditioning, and the performance is reliable and stable.

    • Non-Vehicular Fast Charger System for Electric Vehicles

      2017, 26(2):93-98. DOI: 10.15888/j.cnki.csa.005688

      Abstract (1339) HTML (0) PDF 924.08 K (1895) Comment (0) Favorites

      Abstract:A high power non-vehicular charging system is designed in order to meet the demand of the electric vehicle fast charging. In this system, advanced digital control technology, electronics power switching and controlling technology, PWM control method and the PI algorithm combining parameter and integral separation are applied. And this system also concludes the components of various electric circuits of control, protection and communication to realize the intelligent charging function for electric vehicle. The experimental results indicate that the charging system can output high current and high voltage, so that it can meet the fast charging requirement of electric vehicle and play a key role in the popularity of electric vehicles.

    • Bank Customers Recognition System Based on Face Layered Filter

      2017, 26(2):99-103. DOI: 10.15888/j.cnki.csa.005627

      Abstract (1571) HTML (0) PDF 1.91 M (1770) Comment (0) Favorites

      Abstract:Bank customer identification has a far-reaching significance, which can identify the bank's important customers by using face recognition algorithm in different application scenarios. When the feature information of face is changed or masked, the accuracy of recognition will be greatly reduced. The paper introduces the face layered filtering algorithm to remove non characteristic information (such as beard, glasses, scars, etc.) before doing face recognition, so that the face recognition target has a higher unity. By using MUCI data sets to verify the feasibility of facial layered filterer, we add the face layered filtering algorithm in unified recognition module to improve the recognition efficiency. And the feasibility of the algorithm is verified.

    • Gray Image Enhancement Algorithm of Power Line

      2017, 26(2):104-111. DOI: 10.15888/j.cnki.csa.005611

      Abstract (1307) HTML (0) PDF 2.57 M (1538) Comment (0) Favorites

      Abstract:The efficiency of power line patrol is highly improved by Unmanned Aerial Vehicle, and it can be further improved if those collected digital images can be processed with computers. Image enhancement is an important procedure for image process. Two different kinds of gray image enhancement algorithm based on random mathematics model and fuzzy mathematics model respectively are discussed combined with the characteristics of power line gray image, and the performance of these algorithms is compared. The disadvantage of each current image enhancement algorithm in power line gray image is analyzed. Accordingly, we provide an improved image enhancement algorithm based on fuzzy mathematics model and its applicability is tested with examples.

    • Fault Self-Recovery Algorithm for Management Node in Cloud Storage System

      2017, 26(2):112-117. DOI: 10.15888/j.cnki.csa.005568

      Abstract (1521) HTML (0) PDF 1.05 M (1652) Comment (0) Favorites

      Abstract:In order to solve the storage service unavailable problem on account of the management node fault in huge cloud storage system, an analysis model for fault effect of management node is built and a dynamic self-recovery algorithm for management node based on message called FRA-M is presented. FRA-M implements the cooperation, transparent take-over and self-recovery of management nodes by metadata update control based on load balance. Experiment shows FRA-M can provide management nodes auto switching when fault occurs and achieve good load balance by favorable resource allocation. The performance of FRA-M is also maintained in a relatively stable interval by reasonable control of TCP timeout, fault detection cycle and fault detection timeout. The storage service availability, data usability and data reliability are guaranteed by FRA-M during the breakdown of management nodes.

    • Workload Aware Elastic-Scaling Algorithm for Short Message Service Cloud Gateway

      2017, 26(2):118-123. DOI: 10.15888/j.cnki.csa.005572

      Abstract (1193) HTML (0) PDF 1.36 M (1582) Comment (0) Favorites

      Abstract:SMS (Short Message Service) gateway has characteristics such as high concurrent capacity, high peaks, difficult to predict and high resources consumption. How to improve the system efficiency and stability has always been one of the key issues for the telecom operators to solve. This paper presents elastic SMS cloud gateway design and an elastic control algorithm, which can realize load sensing by dynamic resource control through the cloud computing platform, and improves SMS gateway service quality and the efficiency of resource utilization. Results of test on simulation environment show that, comparing with existing algorithms, the proposed algorithm is more efficient on scaling control, and has less resource utilization jitter on the condition of cluster size change.

    • Location Algorithm Based on RSSI Modified Weighted Centroid

      2017, 26(2):124-128. DOI: 10.15888/j.cnki.csa.005524

      Abstract (1104) HTML (0) PDF 1.02 M (2245) Comment (0) Favorites

      Abstract:The modified weighted centroid location algorithm applying to outdoor is proposed. The algorithm analyses the measure principle of Received Signal Strength Indication (RSSI), in the case of unknown path decline index, which can convert the distance relation to the received power relations. In addition, the RSSI measure distance is obtained by the Gauss filtering, and the inverse is used as the weighting factor of the modified weighted centroid localization. The weighted centroid algorithm discusses the impact on the precision resulting from the adjustment coefficient. The ideal correction factor of the outdoor environment is obtained through the comparative analysis. The simulation experiments show that the best location accuracy of the improved algorithm is 0.5190m enough to meet the actual location demand when the dynamic adjustment coefficient is 4.

    • Hierarchical Clustering Routing Algorithm for Wireless Sensor Network

      2017, 26(2):129-133. DOI: 10.15888/j.cnki.csa.005569

      Abstract (1094) HTML (0) PDF 949.80 K (1432) Comment (0) Favorites

      Abstract:In this paper, a hierarchical clustering routing algorithm (HCRA) is proposed for time-driven data collection methods, in which different types of sensors have different data collection period. In heterogeneous Wireless Sensor Networks, the energy consumption of all kinds of sensor nodes should be balanced. In the choice of cluster head node, the data acquisition cycle between different nodes is adequately considered in the HCRA algorithm. The algorithm uses a hierarchical threshold, and the probability and frequency of nodes with higher acquisition cycle becoming cluster head nodes is increased, so it can prolong the life time of nodes with lower acquisition cycle. Compared with the LEACH and LEACH-MAC algorithm, the simulation shows that, in the multilevel heterogeneous network model, the HCRA algorithm provides longer network survival time, and the stability period of the network is improved.

    • Particle Filter Fault Prediction Based on Fuzzy Closeness Degree

      2017, 26(2):134-138. DOI: 10.15888/j.cnki.csa.005586

      Abstract (1078) HTML (0) PDF 1.36 M (2134) Comment (0) Favorites

      Abstract:The fault characteristics of complex equipment are characterized by uncertainty, nonlinearity and so on. For prevention of failure may cause serious consequences, it is necessary to improve the accuracy of fault prediction. As fault prediction has the characteristics of uncertainty, we design a method of fault prediction, which combines fuzzy mathematics closeness degree with particle filter algorithm to predict fault. The new method uses the membership function to describe the normal system with the normal fuzzy sets and the abnormal system with the abnormal fuzzy sets, and uses particle filter algorithm to calculate predictive value and the membership degree. Then we can calculate the closeness degree of predicted value of the normal membership degree with normal and abnormal fuzzy subset to implement a fault prediction. This method predicts whether the three tank system is faulty by the change of water level of the T2 tank in the three tank system and makes test by the fault of the UH-60 planet gear disc when the crack begins to increase, and we have compared with Particle filter fault prediction based on Dynamic Time Warping match, Fault prediction algorithm based on stochastic perturbation particle filter and FDI method based on particle filter. The feasibility of the proposed method is verified by experiments, which can predict the failure of the system in time.

    • Research and Simulation for Service-Peer Selection Mechanism on P2P Streaming System

      2017, 26(2):139-144. DOI: 10.15888/j.cnki.csa.005570

      Abstract (1258) HTML (0) PDF 1.03 M (1722) Comment (0) Favorites

      Abstract:Based on the characteristics of IP address, this paper proposes an algorithm which can statically measure inter-peer distance. And considering these factors such as coherence of peer contents, the locality of peer, stability and transmission capacity, we propose an algorithm of choosing service node based on the characteristic of data transmission delay of inter-peer. Simulation results show that our algorithm can enhance performance of P2P system and optimize the routing of P2P system.

    • Robot Path Planning Based on the Improved Artificial Bee Colony Algorithm

      2017, 26(2):145-150. DOI: 10.15888/j.cnki.csa.005601

      Abstract (1184) HTML (0) PDF 1.04 M (1770) Comment (0) Favorites

      Abstract:Path planning problems are known as one of the most important techniques used in robot navigation. This paper adopts an Improved Artificial Bee Colony (IABC) algorithm and combines with cubic Bezier curve to describe the path, which implements the path optimization. The standard artificial bee colony algorithm has shortcomings of falling into local optima and the convergence speed is slow in the later. To overcome these disadvantages, the proposed algorithm modifies the search methods of employed bees and onlooker bees. Compared with other algorithms, we gain the advantages and disadvantages of the different algorithms in path optimization. The experimental results demonstrate that the IABC algorithm has better search performance in path optimization and is able to get a shorter path.

    • Face Recognition Algorithm Based on Subspace Analysis

      2017, 26(2):151-157. DOI: 10.15888/j.cnki.csa.005598

      Abstract (1119) HTML (0) PDF 1.22 M (1739) Comment (0) Favorites

      Abstract:When it comes to the face recognition, this paper exceptionally focuses on the facial feature extraction based on subspace analysis. Firstly, this paper introduces the constitution of the face recognition system, and then analyses the key technologies, such as the face detection, feature extraction, and image pretreatment processing. It mainly analyses the various face recognition algorithms. According to the high efficiency of wavelet in the processing of image data matrix and the shortcoming of less dimension of the LDA training sample, PCA cannot use higher order statistical properties of the data. Combining these three algorithms, this paper puts forward the improved recognition method. Simulation experiments with MATLAB are carried out and the results show the effectiveness of the method.

    • Delay Tolerant Network Routing Algorithm Based on Energy Consumption Game Strategy

      2017, 26(2):158-162. DOI: 10.15888/j.cnki.csa.005607

      Abstract (1006) HTML (0) PDF 1.24 M (1588) Comment (0) Favorites

      Abstract:In order to improve the efficiency of node energy consumption management and enhance the forwarding efficiency of data during the data delivery process in the delay tolerant network, a delay tolerant network routing algorithm based on energy consumption demand evolution mechanism is proposed after introducing the node energy consumption game model. The data delivery mechanism is designed according to flood routing strategy, and the node can develop the corresponding delivery operation according to its own energy surplus when the data is sent to the network, giving a unit of the reward to the middle node for firstly delivering the data to the destination node. Then a reasonable data delivery operation is selected by node strategy game model to improve the energy consumption of nodes, promoting both of the data delivery energy management efficiency and data transmission efficiency. Simulation results show that this algorithm has higher data delivery ratio and lower transmission delay than the contrast algorithm.

    • Multi-Pose Extraction of Person in Specific Location Based on Poselets

      2017, 26(2):163-167. DOI: 10.15888/j.cnki.csa.005681

      Abstract (1483) HTML (0) PDF 1.21 M (2346) Comment (0) Favorites

      Abstract:At present, the study on people recognition is still a quite challenging problem, and it is a new subject to combine with multi-pose for person recognition. Therefore, it is a significant step for people recognition to capture multi-pose samples accurately. Poselets can detect all the people and the corresponding position in the image, but it cannot locate the people on a particular location. Therefore, this paper presents a method of pose extraction which based on poselets for the specific location:First, we should set filtering model according to the head calibration form of the human in specific location, and then using the filtering model, we can screen the figure box detected by the poselets algorithm and sort the results of the screening. Then, we can find the target person of the specific location by combining the sorting score with the maximum weight bipartite graph matching algorithm. Finally, it is easy to extract the corresponding pose. Experimental results show that the algorithm mentioned in this paper can detect the person of the specific location effectively and extract the corresponding pose.

    • Research on Parallel Image Median Filtering Algorithm for Multi Processor Embedded System Based on Cortex

      2017, 26(2):168-173. DOI: 10.15888/j.cnki.csa.005624

      Abstract (1282) HTML (0) PDF 1.33 M (1708) Comment (0) Favorites

      Abstract:Embedded system has become more and more popular in image processing, spatial computing and other fields. In order to achieve a balance in three major aspects of power consumption, cost and computing power, it is an effective solution to improve the computing ability of embedded system, using the multi-core and multi processor system based on parallel computing method. This paper discusses the basic structure of embedded multi processor system based on Cortex, and has a research on parallel image median filtering algorithm on this system. Experimental results show that the parallel algorithm can improve the performance of image median filtering exponentially on the embedded multi processor platform.

    • Adaptive Background Image Segmentation Algorithm Based on GrabCut

      2017, 26(2):174-178. DOI: 10.15888/j.cnki.csa.005637

      Abstract (1829) HTML (0) PDF 1.37 M (3548) Comment (0) Favorites

      Abstract:Graph cut needs user interaction on image segmentation, which comes up with that threshold value method, gets the objects by cutting rectangle and then we remaps to image to finish the interaction by laser radar. GrabCut algorithm is sensitive to local noise, and it is time-consuming. In addition, the edge extraction is not ideal under complex background, so an improved GrabCut algorithm is put forward to adapt background automatically in the determined background. The proposed algorithm chooses probable foreground neighboring pixels as background pixels to make background become simple. It is applicable to the case when foreground pixels account for low proportion in the whole image pixels and the background pixels are relatively simple around the foreground. Experimental results show that error rate of the proposed algorithm is reduced and the efficiency is improved in comparison with GrabCut algorithm after reducing nodes number in the graph. In addition, the edge extraction is more complete and smooth.

    • Wireless Network Channel Equalization Algorithm Based on Non-Stationary Time-Frequency Analysis

      2017, 26(2):179-183. DOI: 10.15888/j.cnki.csa.005663

      Abstract (1357) HTML (0) PDF 1.03 M (2075) Comment (0) Favorites

      Abstract:In the wireless data communication network, the array element inter-symbol interference cause the non-stationary characteristics of channels and it also has a channel imbalance effect, so a channel equalization design is required to improve the performance of data transmission of wireless network. Traditional methods use Hilbert transform spread-spectrum for communication channel equalization and discrete data analysis. Due to the expansion of multipath channel which causes inter-symbol interference, and in order to improve the performance of channel equalization, a wireless network channel equalization algorithm based on non-stationary time-frequency analysis is proposed. This algorithm proposes a space multipath channel model for wireless network data transmission and uses time-frequency analysis method to suppress the inter-symbol interference of signal communication. It also uses this extracted time-frequency characteristics for orthogonal frequency division multiplexing decomposition of communication channel. Through time-frequency characteristic analysis, the phase deviation of spatial symbol is reorganized and the path deviator of phase shift is removed to realize channel equalization. Simulation results show that this proposed algorithm has a good performance for channel equalization. It can effectively suppress the inter-symbol interference of communication channel and reduce the bit error rate of the wireless data communication network to improve the quality of the communication.

    • Application of Text Detection Based on Deep Learning Algorithm in Operation and Maintenance of Bank

      2017, 26(2):184-188. DOI: 10.15888/j.cnki.csa.005628

      Abstract (1509) HTML (0) PDF 1.58 M (2369) Comment (0) Favorites

      Abstract:Screenshots of bank fault often exit in natural scenes. If the text can be accurately detected in the screenshots, it will be able to improve the accuracy of text recognition and improve the case base search and active operation and maintenance capabilities. In order to improve the efficiency of the text detection of natural scenes, an algorithm based on deep learning in natural scene is proposed. Firstly, candidate letters are extracted from the maximum stable extreme region, and candidate texts are generated by single-link hierarchical clustering, then the algorithm makes median filter for the candidate text. Lastly, non-texts are removed by the deep confidence network DBN. Experimental results show that DBN-based approach can effectively improve the accuracy of the text detection of natural scenes, and has better results than traditional methods.

    • Distance-Based Range Queries over Uncertain Moving Objects within Time Intervals

      2017, 26(2):189-194. DOI: 10.15888/j.cnki.csa.005613

      Abstract (1083) HTML (0) PDF 1.09 M (1473) Comment (0) Favorites

      Abstract:Aiming at the scenarios that the query issuers and query sender are uncertain moving objects, a new type of queries named DRqTI (Distance-based Range query within a Time Interval) is defined. The DRqTI searches out the target object in the dataset, which satisfies that the distance to the query issuer does not exceed the threshold value in a given time interval. And query results contain the suitability and valid time intervals which satisfy the condition. Three pruning strategies, namely trajectory-based, time-based and distance-based rules are designed. Furthermore, algorithms that integrate the calculation method of refining and matching degree are developed. On this basis, a query processing algorithm is designed. The experimental analysis shows that distance-based method is the best among three methods and the proposed algorithm can deal with DRqTI problem efficiently.

    • Build of Cross-Platform Communication Model and Implementation Method Based on RCS Library

      2017, 26(2):195-200. DOI: 10.15888/j.cnki.csa.005610

      Abstract (1429) HTML (0) PDF 1.06 M (2366) Comment (0) Favorites

      Abstract:In the field of the control system, MP or Multiple operating systems is often used, which will encounter the communication problems of process control operations in heterogeneous platforms, because different platforms handle data format is different. This paper proposes a cross-platform communication model. The model uses the method of intermediate proxy, which separates the underlying communication and the upper application and makes the underlying communication process transparent to the user. Based on the CMS and NML of RCS library, according to the model, the paper presents the corresponding implementation methods. CMS is the underlying communication management system of RCS library, providing the functions of reading and writing messages, encoding/decoding data and cross-platform communication. NML is the encapsulation of CMS, providing a higher level interface to make the upper system communication more convenient and to solve the communication between the heterogeneous platforms better. The CMS/NML are realized by a series of C++ classes.

    • Adaptive Measuring Tool for Mobile Video Services QoE

      2017, 26(2):201-206. DOI: 10.15888/j.cnki.csa.005580

      Abstract (1371) HTML (0) PDF 1.12 M (2638) Comment (0) Favorites

      Abstract:An adaptive measurement method is proposed based on Android mobile terminals streaming video services QoE, which is adapted to solve the problem of difficulty and inaccuracy in getting quality of experience(QoE) data under the different wireless environments (3G, WiFi). By measuring and evaluating QoE of online video service in real time, it can be more accurate and practical. Thus, an application that can automatically measure QoE of videos is designed to measure objective quality of service (QoS) parameters and map to the subjective QoE (MOS value) through a utility function. Finally, we improve the theoretical model by studying the correlation between theoretical QoE assessment model (taken from the literature) and actual user feedback. It shows that the results obtained by the improved model measuring, under wireless environment is closer to the actual user feedback, which can better evaluate the QoE.

    • Illegitimate Website Detection Based on Multi-Dimensional Features

      2017, 26(2):207-211. DOI: 10.15888/j.cnki.csa.005597

      Abstract (1655) HTML (0) PDF 1.19 M (2678) Comment (0) Favorites

      Abstract:The Web Information Extraction and Knowledge Presentation System is proposed to extract information from data intensive web pages. It downloads dynamic web pages, based on a knowledge database, changes them to XML documents after preprocessing, finds repeated patterns from them, by using a PAT-array based pattern discovery algorithm, recognizes their data display structure models, automatically based on the repeated patterns and an ontology-based keyword library, and then extracts the data and stores them in the knowledge database with the object-relational mapping technology of XML. Through these steps, web data is extracted automatically, and the knowledge database is also expanded automatically. Experiments on the traffic information auto-extraction and mixed traffic travel schemes auto-creation system showed that the system has high precision and is adaptive to web pages in different domains with different structures.

    • Risk Early-Warning Model Based on SVM Decision Tree

      2017, 26(2):212-216. DOI: 10.15888/j.cnki.csa.005589

      Abstract (1297) HTML (0) PDF 954.90 K (1933) Comment (0) Favorites

      Abstract:The security monitoring data of Dangerous chemicals business has great social value, especially real-time accurate prediction of the security risk has become a hot warning research. From the view of four dimensions which are people, equipment, the environment and management, this article analyzes the relevant indicators of safety hazards warning, constructs the bottom-up decision tree based on multi-classification SVM warning model, constructs a bottom-up decision tree SVM multi-classification model based on early warning, to achieve the security level of accurate classification and for future production safety status warning. By comparison with more top-down classification model, it confirms that early warning model used in this paper has better performance in real-time and accuracy, and meets the basic requirements of early warning models.

    • Frontend and Backend Decoupling Model and Development

      2017, 26(2):217-221. DOI: 10.15888/j.cnki.csa.005638

      Abstract (1531) HTML (0) PDF 949.21 K (2405) Comment (0) Favorites

      Abstract:With the rapid development of internet technology and the popularity of mobile devices, the application system needs to adapt to the changing mobile terminal devices, and needs to be user centric and improve the system friendly. Therefore, this paper studies the development of the frontend and backend decoupling model. Using the data format of JSON, the frontend developments should independently improve user experience and adapt the layout of diffident mobile terminal devices.

    • Experiment of Address Auto Configuration in IPV6

      2017, 26(2):222-226. DOI: 10.15888/j.cnki.csa.005571

      Abstract (1115) HTML (0) PDF 959.25 K (2863) Comment (0) Favorites

      Abstract:With the domestic IPV6 network construction, the demand for technical staff of IPV6 configuration and management is growing. This paper mainly discusses the design of IPv6 address auto configuration experiment based on the software of WMware Workstation and Wireshark, etc. In this IPV6 experiment, we combine engineering configurations with protocols theoretical analyses. The experiment is designed to improve the students' understanding for the IPv6 address auto-configuration protocols and multicast addresses represent and usage, and it also enhances students' project practice ability of configuring and managing the host machine and router of IPV6. In this study, no special hardware and software investment is needed. This experiment isn't limited by the condition and the time, and can achieve the combination of internal and external classroom. The design ideas of this paper offer a useful reference for the construction of IPV6 experimental system.

    • Workflow Task Assignment Method Based on Location Based Service

      2017, 26(2):227-230. DOI: 10.15888/j.cnki.csa.005564

      Abstract (1206) HTML (0) PDF 867.84 K (1744) Comment (0) Favorites

      Abstract:Task assignment strategy has a great impact on the performance of the workflow management system. In order to reduce the execution time of task, improve the operation efficiency of process and promote the customer satisfaction, this paper proposes a workflow task allocation method based on the location service, which is based on the basis of predecessors' research results. This method can solve the task assignment problem of workflow and ensure the task be finished with high quality as soon as possible.

    • Communication Between Labview and PLC Based on OPC UA

      2017, 26(2):231-234. DOI: 10.15888/j.cnki.csa.005577

      Abstract (2294) HTML (0) PDF 917.41 K (7848) Comment (0) Favorites

      Abstract:In this paper, we put forward the communication implementation of the upper computer with the software of Labview and lower computer PLC-300 based on OPC UA technology. The communication is data exchanging between two PC machines. One PC acts as a client, the other one acts as a server, and the server is connected to the PLC-300. The client connects to the server through UA, and then it can realize the communication between Labview and PLC on the client machine. This paper introduces how to create UA Client which can be safely connected with UA Server, and how to finally realize the secure communication between PLC and Labview. In Labview, the data can be displayed in real time when it changes in PLC, and the collected data can be save in the form of text files for follow-up observation and playback. The feasibility of this method is verified by experiments. The system has the advantages of short development period, strong flexibility and system stability. Finally, we fully validate the feasibility of using this method to data communications.

    • Degradation Process Research and Remaining Useful Life Prediction for Industrial Lithium-ion Battery

      2017, 26(2):235-239. DOI: 10.15888/j.cnki.csa.005587

      Abstract (1564) HTML (0) PDF 1.08 M (4061) Comment (0) Favorites

      Abstract:With the lithium-ion batteries widely research and application in the aerospace, military construction, industrial manufacturing, electric vehicles and energy storage equipment areas, its remaining useful life prediction is of great significant. Through analyzing the principle of the lithium ion degradation process data and eliminating lithium-ion battery relaxation effect, this paper establishes Wiener process degradation model with random effects. Knowing its degradation threshold, lithium ion battery life distribution is deduced, and on this basis, we can predict a single lithium-ion battery remaining useful life. Finally using the battery data of NASA PCoE database to verify, the results show that compared with the traditional equipment storage-work joint degradation model, which is mentioned in the references, Wiener process degradation model has higher precision of prediction.

    • Report Designer Based on Service Oriented Architecture

      2017, 26(2):240-244. DOI: 10.15888/j.cnki.csa.005590

      Abstract (1349) HTML (0) PDF 1.05 M (1503) Comment (0) Favorites

      Abstract:The report designer of facing service is based on web and meets the system requirements through providing service. Act as coarse-grained services, this report designer is composed of a plurality of fine-grained sub service, providing a templates-designed service for different business system by converting interface. It reduces development difficulty by dragging component to use. And it is convenient for using and maintain. The report designer uses XML to save and access the template files, and it is quick to change the format of template files through changing the mapping rules to provide convenience for exporting. The new designer solves the problem of inflexibility and non-reusability of the traditional designer which is based on Object-Oriented or Integration-Oriented or Component-Oriented. And the new designer also has the feature of accessibility, interactivity and expansibility.

    • Design of the 4G Network for Improving Video Reliability Mechanism

      2017, 26(2):245-248. DOI: 10.15888/j.cnki.csa.005595

      Abstract (1074) HTML (0) PDF 983.86 K (1591) Comment (0) Favorites

      Abstract:Embedded systems pushes the video stream to the cloud and pulls it from the cloud in 4G environments. Especially in remote update and debugging, there is so much interference that the system is not working properly. Therefore, we propose a kind of technology based on watchdog (commonly known as "watchdog"). This paper mainly analyzes how to make the system work more reliably in the process of using the state machine, the multiple threads and the remote update and so on, and this scheme applies to OMAP (TI's open multimedia development board) to make experiments. Test results show that it is effective to enhance the reliability of the 4G network video.

    • Application of Data Mining in Criminal Intelligence Analysis

      2017, 26(2):249-253. DOI: 10.15888/j.cnki.csa.005609

      Abstract (1941) HTML (0) PDF 1.11 M (3146) Comment (0) Favorites

      Abstract:This paper builds a framework about the crime data mining of on intelligence analysis and decision command based on the principle of prevention and control in public security. First, we can get the standardized crime information according to the preprocessing of crime database and space encoding. Using the related methods used in cluster analysis, classification and association analysis, we can get such information as the spatial-temporal risk distribution of crime, targeted people features and modus-operandi. Finally, by mining the data of actual theft cases in Beijing, it is proved that data mining methods could play significant role in crime intelligence analysis.

    • Research on Structural Characteristics of Urban Rail Transit Network Based on Complex Network Theory

      2017, 26(2):254-259. DOI: 10.15888/j.cnki.csa.005603

      Abstract (1627) HTML (0) PDF 1.11 M (2676) Comment (0) Favorites

      Abstract:In this paper, to study the static and dynamic structure features of Beijing metro network, complex network theory is used for the first time. Based on the structure of Beijing metro network in 2015, metro network sample is built. The paper analyzes the static structure features of metro network by computing characteristics like degree and degree distribution, betweenness centrality, average path length and so on. And, for the first time, section flows of Beijing metro is combined in static network topology. And it also analyzes the dynamic features of the network by computing characteristics like node strength and its distribution, weighted node betweenness centrality and node strength correlation and so on. Thus, the paper explains the interaction between the various factors and the impact of Beijing rail network structure, providing some guidance suggestions for the construction and operation of the rail transit in the future.

    • Synchronization of Time and Frequency of MIMO System on Zynq-7000

      2017, 26(2):260-265. DOI: 10.15888/j.cnki.csa.005608

      Abstract (1146) HTML (0) PDF 1.17 M (2226) Comment (0) Favorites

      Abstract:In the current communications technology, MIMO has a significant technological advantage. MIMO communication system applies multiple transmit antennas and multiple receive antennas. And it makes full use of space resources to improve the quality of communication and to enhance channel capacity under the condition of no increasing spectrum resource and the power of the transmission. However, the offset of the time and frequency will influence the performance of communication system largely. The Zynq-7000 is a new generation of programmable system on chip, which includes the core of ARM processor and integrated FPGA to provide a well software radio development environment. This paper presents a MIMO communication system on the Zynq-7000 platform with an algorithm of time and frequency synchronization and the processing of the implementation. The system tests demonstrate that the algorithm promotes the performance of the communication system.

    • Error Analysis and Correction Method of Defects Reconstruction in Cylindrical Object

      2017, 26(2):266-270. DOI: 10.15888/j.cnki.csa.005631

      Abstract (1362) HTML (0) PDF 1.08 M (2147) Comment (0) Favorites

      Abstract:This paper makes defect location maps for cylinder component ultrasonic testing by using Contour Method and finds that the generation of error of Contour Method for porosity defects reconstruction in cylindrical member is affected by the positioning angle. The experimental results are verified with flaw echo signal which is simulated by finite element software of PZFlex. The influence of the defect location, size and signal attenuation for the positioning angle is analyzed, which lays a foundation for further defect boundary reconstruction.

    • Visual Office Reporting Generation Technology Based on B/S System

      2017, 26(2):271-275. DOI: 10.15888/j.cnki.csa.005778

      Abstract (1129) HTML (0) PDF 962.82 K (2750) Comment (0) Favorites

      Abstract:Office reporting technology is one of the important contents when we develop enterprise information system based on B/S. But in B/S system the application can't get good development due to the restrains of Office's platform and environment. This paper puts forward a method to create a model based on reporting technology in view of AJAX and this model inherits a variety of advantages of traditional reporting technologies. And through its feature of asynchronous communication, this technology realizes the asynchronous visualization reporting generation process, which greatly improves the user's experience. At the same time, this model uses AJAX technology to solve the data access security problems which exist in traditional office reporting technology based on ActiveX. The asynchronous-report-drawing technology provides a new model to achieve the report programming based on Web.

    • Research and Design of Control Signaling for Multi-Form Streaming Media Service System

      2017, 26(2):276-279. DOI: 10.15888/j.cnki.csa.005614

      Abstract (1038) HTML (0) PDF 1.05 M (1435) Comment (0) Favorites

      Abstract:A multi-form streaming media server system is proposed to overcome problems of traditional media server in Video Surveillance Networking System. This system has high expandability and stability by dividing traditional media server architecture into several modules according to its function. It can also realize the load balance and dynamic expansion. Based on this architecture, control protocol is designed, which includes Session Initial Protocol and private protocol. The experimental results show that this method of control can strengthen the reliability and manageability of the system.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《计算机系统应用》
  • 1992年创刊
  • 主办单位:中国科学院软件研究所
  • 邮编:100190
  • 电话:010-62661041
  • 电子邮箱:csa (a) iscas.ac.cn
  • 网址:http://www.c-s-a.org.cn
  • 刊号:ISSN 1003-3254
  • CN 11-2854/TP
  • 国内定价:50元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063