Loading...

Table of Content

    27 February 2013, Volume 1 Issue 2
    图像处理
    Research on Video-based Face Recognition and Tracking Algorithm
    TONG Lin
    2013, 1(2):  1-4.  doi:10.3969/j.issn.1006-2475.2013.02.001
    Asbtract ( 539 )  
    Related Articles | Metrics
    Video-based face recognition and tracking are the research hotspots of computer vision. How to fully utilize the spatial and temporal information in video to overcome the difficulties existing in the video-based face recognition, such as low resolution of face image in video, large variation of face scale, is the focus of this paper. Firstly, a face recognition algorithm using the Associative Neural Network is introduced. And then, the algorithm is merged into TLD (Tracking-Learning-Detection) to improve the performance. The experimental results demonstrate that the improved algorithm is successful and practical.
    Microcosmic Fractal Image Processing Based on Matlab
    NING Ji;ZHANG Wei
    2013, 1(2):  5-8+14.  doi:10.3969/j.issn.1006-2475.2013.02.002
    Asbtract ( 539 )  
    Related Articles | Metrics
    For a series of microcosmic structure images obtained through the scanning electron microscopy, according to the description about fractal by K. Falconner, this paper preliminarily judges whether the image has fractal features, then a fractal analysis method is brought in the image processing of the material with fractal feature in microcosmic structure. Based on the Matlab tool, it combines with the normal method of image processing, makes further research on the structure’s fractal feature, gets information of box-counting dimension and analyzes the results after observation.
    A Method for Vehicle Detection Based on Local Gradients Vector
    YANG Xiao-wei;XU Gui-li;WANG Biao;GUO Rui-peng;TIAN Yu-peng;HE Yin-nan
    2013, 1(2):  9-14.  doi:10.3969/j.issn.1006-2475.2013.02.003
    Asbtract ( 556 )  
    Related Articles | Metrics
    The real-time performance of vehicle detection is very important in an intelligent transportation system. Conventional Histogram of Oriented Gradients (HOG) method has problems of lots of dimensions of feature vector and huge calculation. Therefore, this paper studies the characteristics of gradient distribution of vehicles and the influence of feature’s dimension to Support Vector Machine (SVM)’s time performance. Therefore, the paper proposes a vehicle detection method, which combines local gradient vector’s mean and scatter matrix with SVM. First of all, the sampled image is divided into a number of blocks uniformly. Then the gradient vector’s mean and scatter matrix are calculated as feature vectors in each block. At last, the classification and identification are performed by SVM, which further reduces the calculation by variable step size. The experimental results show that the method’s accuracy is equal to conventional method, but the average recognition time is reduced to 51% of conventional method.
    Parallelization of Image Clustering
    CAO Lei;CHENG Jian-la
    2013, 1(2):  15-18.  doi:10.3969/j.issn.1006-2475.2013.02.004
    Asbtract ( 445 )  
    Related Articles | Metrics
    As technology advances, image data is rapidly growing including images and videos on Internet. How to effectively manage the image data is a great challenge. Image clustering is an important image data managing solution. This paper proposes a solution of MapReduce parallelization about the SIFT image feature extraction and K-means clustering method on Hadoop platform. It achieves good results.
    Application of Image Processing Technology in Plant Organ Model Reconstruction
    ZHOU Yun-hui
    2013, 1(2):  19-21.  doi:10.3969/j.issn.1006-2475.2013.02.005
    Asbtract ( 480 )  
    Related Articles | Metrics
    Because the traditional plant modeling method cannot effectively improve visual effect of model reconstruction, image processing technology has been gradually introduced into plant model reconstruction. This paper takes model reconstruction of rice leaf organ as the research object. Leaf image is processed by image processing technology firstly. The application of image processing technology in plant organ model construction is researched. Then rice leaf model reconstruction is implemented with mathematical model. Experiment simulation results show this method can achieve model reconstruction, and it has reference value for other research of related fields.
    Circle Detection Algorithm Based on Gradient Hough Transform and SVM
    CHENG Peng;ZHU Mei-lin;GENG Hua
    2013, 1(2):  22-26.  doi:10.3969/j.issn.1006-2475.2013.02.006
    Asbtract ( 521 )  
    Related Articles | Metrics
    Hough transform is a well established method for circle detection. However, circle Hough transform is quite time-consuming. In this paper, some improvements based on standard Hough transform are employed to improve the algorithm. The 3D Hough transform is transformed into the combination of two 2D Hough transform. Gradient information is treated as the value of the voting rights in the accumulated array. SVM is used in the recognition of false circle. The experimental results indicate that the proposed approach can improve the detection accuracy and computational efficiency.
    An Improved Algorithm of Visual Navigation Parameters Collection
    LI Dan
    2013, 1(2):  27-30+3.  doi:10.3969/j.issn.1006-2475.2013.02.007
    Asbtract ( 512 )  
    Related Articles | Metrics
    In the process of visual navigation, image processing unit processes the image collected by CCD in order to pick up the navigation parameters. Traditional method of collecting navigation parameters is slow in collecting speed and unclear in the collected route. This paper presents an improved algorithm of collecting navigation parameters with the advantages of small calculating works and optimizing easily, which is used in DSP. With the help of this algorithm, this paper realizes the fast collecting of the navigation parameters and the collected route is clear and accurate.
    Intelligent Blood Cell Image Segmentation Based on Reinforcement Learning
    WANG Chuan-zhong;XIONG Hou-jin
    2013, 1(2):  31-34.  doi:10.3969/j.issn.1006-2475.2013.02.008
    Asbtract ( 540 )  
    Related Articles | Metrics
    Intelligent medical image processing is an important research direction in the field of medical image applications. Traditional medical image analysis is often open-loop, and the image segmentation is independent of the image recognition with low intelligence, which requires inspectors with higher skill level. In consideration of these facts, reinforcement learning is applied to blood cell image, which use the blood cell features information as feedback for the image segmentation and evaluate the segmentation results in order to realize the closed-loop intelligent blood cell image segmentation.
    Prohibition Road Sign Detection Algorithm Based on Visual Saliency and Symmetry Projection
    TAO Chen;XU Dan;ZHANG Hai-yu;DENG Jian
    2013, 1(2):  35-37+4.  doi:0.3969/j.issn.1006-2475.2013.02.009
    Asbtract ( 477 )  
    Related Articles | Metrics
    A new detection algorithm for prohibition signs in outdoor environment is proposed. First the salient regions are found by special color of road signs and then central symmetry projection is used to find location and scale of the regions. Experiment results show that the method obtains high detection rate as well as low false alarm during real time. The algorithm meets the requirement of real-time application.
    算法分析与设计
    Research on Minimum Angle Trust Localization Algorithm on IOT’s Perceptual Layer
    WU Xue-qin;LI Jing-zhao
    2013, 1(2):  38-42.  doi:10.3969/j.issn.1006-2475.2013.02.010
    Asbtract ( 561 )  
    Related Articles | Metrics
    The perceptual layer is at the most front-end of information collection, which plays a fundamental role in the internet of things. How to improve the perception layer node positioning accuracy is one of the important research projects in IOT industry because of the limit of energy. This article focuses on the origin DV-Hop arithmetic’s shortage by using all anchor node equal to the unknown node positioning, introduces the concept of minimum angle trust and proposes the minimum angle trust localization algorithm on IOT’s perceptual layer, that is DV-Hop_Toma. Simulation results, by using Matlab, show that DV-Hop_Toma improves the positioning precision comparing to the original algorithms.
    Algorithm of Image Region Matching and Reduction Based on Mix-graph Structure
    ZHUANG Xiao-fang;TENG Zhong-jian;HONG Qin
    2013, 1(2):  43-47+5.  doi:10.3969/j.issn.1006-2475.2013.02.011
    Asbtract ( 508 )  
    Related Articles | Metrics
    This paper discusses the principles of connectivity, similarity and comparability in image identification based on the mixed-graph structure. It proposes a reduction algorithm that compares each composite node in a mixed-graph against a reference image to find the possible matches and the corresponding maximal similarity value (i.e., compound similarity), and reduces the mixed-graph using the best matches. To ease the calculation and better illustrate the reduction process, this paper labels the nodes in the mixed-graph with single attributes, and simplifies the similarity computation to sort and query operations with a linear complexity. The results show that the method is efficient and feasible.
    Research on Solving Unconstrained Optimization Based on Cultural-Differential Algorithm
    ZHOU Xiao-wen;JIANG Ze-jun
    2013, 1(2):  48-55.  doi:10.3969/j.issn.1006-2475.2013.02.012
    Asbtract ( 482 )  
    Related Articles | Metrics
    Unconstrained optimization is an ancient mathematics issue, due to the development of the intelligent computing science, there are many of techniques that can cope with such problems as well, besides classic mathematics’ method. This paper takes advantage of the cultural algorithm’s double-layers architecture and embeds the differential evolution in updating operation of the knowledge space to achieve situationable knowledge updating by differential evolution during evolution of the whole architecture, then population space makes use of all these information to assure correct evolution direction and to fulfill individual evolution efficiently in order to improve the algorithm’s performance. This paper selects 6 benchmark functions to test the classic algorithm and the improved algorithm. The results demonstrate that the later improves the performance.
    Research on Algorithms of Optimal Path Planning Based on Real-time Traffic Information
    WANG Yi-song;WANG Zhi-jie
    2013, 1(2):  52-55.  doi:10.3969/j.issn.1006-2475.2013.02.013
    Asbtract ( 452 )  
    Related Articles | Metrics
    To search the path of the shortest travel time, this paper consideres the impact of the degree of road congestion, intersection traffic light delays and restriction of one-way road based on the Dijkstra shortest path algorithm. Simulation results show that these three factors have a greater impact on path planning. After taking full account of these three factors, the shortest time path planning is more closely to the actual situation and is of large application value.
    软件工程
    Exploration of Application Development Model for Internet of Things Based on RESTful
    CHEN Hao;LI Shi-ning
    2013, 1(2):  56-60.  doi:10.3969/j.issn.1006-2475.2013.02.014
    Asbtract ( 492 )  
    Related Articles | Metrics
    Service-based Internet era has been formed with the rapid growth of network technology in recent years. Traditionally, SOAP-based Web services rarely use HTTP response codes and exploit HTTP GET and POST methods only, increase complexity of application programming, but RESTful Web services reduce this complexity. This paper introduces a development model for RESTful applications in Internet of Things. Based on RESTful platform of Internet of Things, wireless sensor nodes and data are abstracted as universal resources to provide rapid prototyping using Django framework.
    算法分析与设计
    Research on Sci-tech Novelty Search Working Platform Based on SaaS Mode
    LI Ya-bing;BIAN Yi-jie;ZHAO Zhe
    2013, 1(2):  61-64+6.  doi:10.3969/j.issn.1006-2475.2013.02.015
    Asbtract ( 504 )  
    Related Articles | Metrics
    According to the existing problems of sci-tech novelty working, this paper introduces the thought of SaaS model and SOA architecture, then analyzes their advantages, puts forward a sci-tech novelty search platform structure based on the SOA, designs sci-tech novelty search service module and rights management module, finally describes the advancement of the platform.
    软件工程
    Research and Application of Software Automation Testing Based on Selenium
    2013, 1(2):  65-68.  doi:10.3969/j.issn.1006-2475.2013.02.016
    Asbtract ( 414 )  
    Related Articles | Metrics
    With the development of software industry, it is much more important for the status of software test during the software development, and furthermore the efficiency of software test is largely improved by employing automatic test tools. The paper introduces the basic components and implementation principles of the open source automation testing software Selenium, and illustrates the automated test process of the B/S architecture application system through a specific case, which can be used for reference on the further research in software automation testing.
    Research and Application of Software Automation Testing Based on Selenium
    WU Ling-lin
    2013, 1(2):  65-68.  doi:10.3969/j.issn.1006-2475.2013.02.016
    Asbtract ( 402 )  
    Related Articles | Metrics
    With the development of software industry, it is much more important for the status of software test during the software development, and furthermore the efficiency of software test is largely improved by employing automatic test tools. The paper introduces the basic components and implementation principles of the open source automation testing software Selenium, and illustrates the automated test process of the B/S architecture application system through a specific case, which can be used for reference on the further research in software automation testing.
    Research on Service-oriented Domain Analysis Method
    XU Cheng-long;FAN Jie
    2013, 1(2):  69-72.  doi:10.3969/j.issn.1006-2475.2013.02.017
    Asbtract ( 499 )  
    Related Articles | Metrics
    Domain engineering provides a strong support for software reuse. Service has been widely used because of its usability, flexibility and scalability. This paper describes the process of extracting service-feature and constructing service-feature model which belongs to service-oriented domain analysis method, proposes a method to combine service in order to make granularity larger and reusability. Feature model is divided into four layers to realize the transformation of service-feature to construct architecture model.
    Design and Implementation of Application Software Running Fault Monitoring System
    GAO Yuan-hong;FU Ya-bing;LIU Yi
    2013, 1(2):  73-75.  doi:10.3969/j.issn.1006-2475.2013.02.018
    Asbtract ( 429 )  
    Related Articles | Metrics
    Application software fault occurring in the running course will bring effect to jobs. This paper introduces a solution: to design a program to realize application software operation monitoring, fault detection and exclusion. The paper discusses the principle of program design, method, and program flow. Comparing with artificial maintenance, the design greatly improves the efficiency of maintenance work, reduces the fault effects to a minimum.
    计算机仿真
    Design and Implementation of Campus 3D Visualization Simulation System
    WU Zhong-lian;SUN Ka;WANG Xin-chun;LI Jun
    2013, 1(2):  76-79.  doi:10.3969/j.issn.1006-2475.2013.02.019
    Asbtract ( 500 )  
    Related Articles | Metrics
    This paper combines with computer graphics and spatial information sciences technologies, makes use of the software Multigen Creator and Vega Prime as modeling tools and simulation platform, VS 2005 as the secondary development software, Access as the underlying database support, through data acquisition, data processing and 3D modeling, realizes the dynamic scene construction technology, large-scale surface features and vegetation model construction technology. This campus 3D visualization system which supports querying the surface features and attributes, realizes the digital campus functions. This technology has great importance on school enrollment, employment, education, alumni relations, showing the school strength and other aspects.
    Design and Implementation of WAN Emulation System Based on Linux
    ZENG Ming-yong;FU Yi;GUO Xiao;TIAN Chang
    2013, 1(2):  80-84.  doi:10.3969/j.issn.1006-2475.2013.02.020
    Asbtract ( 482 )  
    Related Articles | Metrics
    In order to emulate the communication of WANs within LAN environment, a Linux-based large-scale WAN emulation system with strong extensibility is designed, which can be applied to controllably emulate the actual properties such as delay, jitter and packet loss in WANs. A structure which is convenient for distributed networking and extending is built in the emulation system. The key functionalities in large-scale network emulation are designed and implemented, such as dynamic transparent routing, channel properties emulation and traffic monitoring. The testing results show that it is effective to emulate and manage the communication properties among multiple networks, which facilitates the debugging and testing of protocols or software in WANs.
    ]Research on TENA Object Model
    KONG Yong;DU Xin-yu
    2013, 1(2):  85-89.  doi:10.3969/j.issn.1006-2475.2013.02.021
    Asbtract ( 538 )  
    Related Articles | Metrics
    TENA is a common architecture being developed by U.S. Department of Defense for test and training community, its purpose is to achieve interoperability among ranges, facilities and simulations. The TENA object model is based on the TENA meta-model, which is to enable semantic interoperability among range resource applications by providing the common language, and has the most positive impact of any activity on the future reusability and composability of range resources. The paper discusses the TENA object model on how it is created, stored, standardized, and managed.
    信息安全
    An Autonomous Access Control Method of Implementing Data Packet Encryption and Decryption Technology Based on Firewall
    ZHANG Xue-feng
    2013, 1(2):  90-93.  doi:10.3969/j.issn.1006-2475.2013.02.022
    Asbtract ( 467 )  
    Related Articles | Metrics
    The paper presents an independent host access control method to realize packet encryption and decryption based on firewall. It realizes personal firewall function using NDIS filter driver technology, and it is easy to realize the access control in high performance or simple network environment. The access control method has good universality, high safety, strong controllability and good scalability characteristics, and its purpose is to prevent illegal (unauthorized) host access security network, reduce the packet loss, and improve the system of transfer rate when the host access network. The experimental results show that this method contributes to improve the stability of system and reduce the illegal access during the encryption and decryption process.
    esign and Implementation of Remote Monitor and Control System Based on Embedded Web Server
    XU Ye;YUAN Min;LI Guo-jun
    2013, 1(2):  94-98.  doi:10.3969/j.issn.1006-2475.2013.02.023
    Asbtract ( 425 )  
    Related Articles | Metrics
    The rapid development of information technology and the wide application of embedded system have brought revolutionary changes to people’s life. The combination of embedded system and Internet has become a trend of the future. Therefore, an embedded Web server is designed. This server uses hyper text transfer protocol and common gateway interface technology, increases database function. In the client, users can monitor local devices and admin historical data through Internet and browser remotely. The use of OPC technology achieves communication between the Web server and PLC. This monitor system can not only meet the needs of supervisory task, reduces the operation and maintenance cost, but also improves the efficiency. The system is of a very high value in use.
    Study of Decoy Host Security Solutions Based on VFS
    XIAO Gang
    2013, 1(2):  99-102+.  doi:10.3969/j.issn.1006-2475.2013.02.024
    Asbtract ( 474 )  
    Related Articles | Metrics
    This paper studies the realization mechanism of virtual file system (VFS) in operating system kernel. Through the modification the part of functions of virtual file system, such as readdir, filldir, lookup, etc, it realizes the safety function. Network decoy system increases the reliability of information security from network system structure; it is a new style system for defense invader inside and outside in battle of network.
    人工智能
    Application of Cordic Algorithm for Stream Processor
    MA Shi-yu;FAN Xiao-ya
    2013, 1(2):  103-107.  doi:10.3969/j.issn.1006-2475.2013.02.025
    Asbtract ( 474 )  
    Related Articles | Metrics
    The stream processors are applied widely in high performance computing. But the existing computation speed of stream processors can’t satisfy people’s needs. Through study, the bandwidth in accessing memory is the reason limiting the computation speed of stream processors. So how to reduce the times of accessing memory becomes the key to improve the computation speed of stream processors. This paper constructs the transcendental function unit by using the Cordic algorithm, reduces the times of accessing memory, and improves the computation speed of stream processors.
    Verilog Design of Integer DCT and Quantization Module in H.264/AVC
    SHEN Jing-tong;ZHANG Wei
    2013, 1(2):  108-112+.  doi:10.3969/j.issn.1006-2475.2013.02.026
    Asbtract ( 552 )  
    Related Articles | Metrics
    The video compression standard H.264/AVC uses 4×4 integer DCT and quantization methods, which avoid data mismatch and improve data accuracy, thus has high compression efficiency. This paper analyzes the algorithm of integer DCT and quantization in H.264. By transforming DCT into two quick butterfly computations, it reduces algorithm complexity and makes it easer to realize. The synthesis and simulation by QuartusII show the correct results. The design is of 54.54MHz high clock frequency, low resource usage and low power dissipation.
    Research on Process Definition File Parsing Methods Based on VTD-XML
    TANG Shi-feng;YANG Guo-qiang
    2013, 1(2):  113-116.  doi:10.3969/j.issn.1006-2475.2013.02.027
    Asbtract ( 462 )  
    Related Articles | Metrics
    The dissertation analyzes the traditional DOM and SAX parsing technology and points out their defects: DOM easy to use but there is a high memory consumption; SAX memory consumption is low but it is difficult to pay a return visit. The dissertation utilizes VTD-XML technology supporting for XPath and provides a schedule of parsing process definition file. Experiment results show that the method improves the parsing efficiency, reduces the memory consumption.
    Web Knowledge Discovery Based on Text Classification
    LU Cao-fang;XUE Xiang-feng;ZHU Yue-chao;ZONG Jun-jun
    2013, 1(2):  117-119.  doi:10.3969/j.issn.1006-2475.2013.02.028
    Asbtract ( 476 )  
    Related Articles | Metrics
    The paper studies the related technologies of the Chinese text knowledge discovery on Internet, according to the features of search engines classification, comparing and analyzing search engines with features of text classification, discovers that the engines of simplex search text information is more suitable for text classification. This paper proposes a Internet achieving information prototype based on text classification, proposes an extraction method on user knowledge of interest, users can extract text information of interest to improve accuracy of text information mining.
    Research on Emotion Physiological Signals Feature Selection Based on Adaptive Neighborhood TS
    MO Jian-lin;WANG Yu-jing
    2013, 1(2):  120-122.  doi:10.3969/j.issn.1006-2475.2013.02.029
    Asbtract ( 437 )  
    Related Articles | Metrics
    In emotion recognition of physiological signals, selection of valid feature subset is the important step to identify emotion. An improved neighborhood structure by adaptive neighborhood elements is proposed to solve the problem about feature selection of emotion physiology signal. Simulation shows that the method of finding valid feature subset is feasible and effective.
    应用与开发
    Design and Realization of Numerical Sea Ice Forecast System Based on Data Marts
    CAO Cong-hua;WANG Ning;HUANG Juan;CAO Ya-jing;DING Yi;ZHONG Shan;
    2013, 1(2):  123-125+.  doi:10.3969/j.issn.1006-2475.2013.02.030
    Asbtract ( 484 )  
    Related Articles | Metrics
    Based on the Visual Studio 2008 and Visual Fortran 8.0 platform, the numerical sea ice forecast system based on Data marts is developed. It integrates initial field, numerical forecast model, numerical forecast results to the same platform. Based on the large data marts of north ocean observation and forecasting, a whole chain is formed which is “input initial field-input forecast parameter-compute numerical-view result”.
    Design and Implementation of Securities Short-term Trading Analysis System
    HUANG Liang;ZHANG Sheng;ZHANG Zhao
    2013, 1(2):  125-129.  doi:10.3969/j.issn.1006-2475.2013.02.031
    Asbtract ( 397 )  
    Related Articles | Metrics
    This paper develops a securities short-term trading system in accordance with the provisions of the Japan’s “Financial Instruments and Exchange Act”. The system is one of the planning project of the Japan’s financial services agency. The system analizes the specified securities and cycle’s transaction data, and the results of the analysis are provided to relevant person; it is a judgment basis of whether an illegal trading happened. The JSP, Hibernate, Struts and other technologies are used in the development of the system, it is also characterized by its good operability and maintainability.
    Design and Implementation of Task Scheduling Middleware for GPU Cluster
    CHEN Chun-lei
    2013, 1(2):  130-133.  doi:10.3969/j.issn.1006-2475.2013.02.032
    Asbtract ( 680 )  
    Related Articles | Metrics
    In a GPU cluster, the static task scheduling policy may result in unbalanced allocation of computing resource, because GPUs work as co-processors. A weight-based dynamic scheduling policy is proposed and implemented as a middleware, so that it can be applied to the GPU cluster. Under this policy, local GPUs and remote GPUs are not explicitly distinguished, and no global information is required. Every cluster node decides whether to use local GPUs or remote GPUs, according to weights of GPUs. And these weights are locally maintained by each node, respectively. As a carrier of the policy, the middleware ensures that the policy is transparent to users. It is composed of three parts: API library, resource management daemon, and GPU execution daemon. The policy is validated on a two-node cluster. Experiments show that the weight-based dynamic scheduling policy can achieve a 16% higher GPU utilization rate than the static policy, and a 45% higher GPU utilization rate than another dynamic policy (global-queue-based policy).
    Study and Design of Automatic Map Making of Wind Rose Diagram
    CAO Li-juan;ZHOU Ling;CHEN Yan-li;MA Guang-liang;
    2013, 1(2):  134-137+.  doi:10.3969/j.issn.1006-2475.2013.02.033
    Asbtract ( 578 )  
    Related Articles | Metrics
    Wind rose diagram is the professional statistical chart used to quantitative analysis of wind element in meteorological science. Taking the meteorological wind hourly data of Huang Bohai Area’s ocean stations for example, this article expatiates on the method of using database stored procedure to exstract, analyze and count, and writes program to realize the map automatic designing based on C# developing environment.
    Design of New Antimicrobial Peptides and Prediction of Its Activity and Function
    YANG Li-min;HUANG Yan;ZHANG Ri-jun
    2013, 1(2):  138-142.  doi:10.3969/j.issn.1006-2475.2013.02.034
    Asbtract ( 426 )  
    Related Articles | Metrics
    This paper determines the parameters of quantization factor through analyzing the impact of antimicrobial peptide activity factor. Then, it analyzes activity factor data of existing antimicrobial peptide, and obtains range of parameters. To get new peptide, it shears and links existing antimicrobial peptides’ sequence by using Java technology. At last, according to the parameter range it predicts activity and function of new peptide. At the same time, it builds the three-dimensional structure of antimicrobial peptide. The results show that net charge of four antimicrobial peptides is identical; however, it is essential to antibacterial activity. Hydrophobic residue% and α-helix% have significant effect on distinguishing four types of antimicrobial peptides.
    Research on Disease Diagnosis Expert System Based on Case Reasoning
    SHEN Jing
    2013, 1(2):  143-146.  doi:10.3969/j.issn.1006-2475.2013.02.035
    Asbtract ( 527 )  
    Related Articles | Metrics
    Viewing at the problems that the disease diagnosis mainly depends on the personal experience judgment and the rule-based reasoning inefficiency and lacking of flexibility, an algorithm of case matching is proposed. The diagnosis results are achieved through symptoms matching and analysis of patients, the recommended treatment is given depended on the results. The relations between the new symptoms and related disease are determined by the calculation of the correlation, and are updated into the case library. Obtained by experiment, the accuracy rate of system diagnosis is 90.18%, it shows that the system is of a high diagnostic efficiency and better intelligence, and can provide a certain supporting for doctors in medical diagnosis.
    Optimizing CBR Model Using Genetic Algorithm
    SHEN Qi;
    2013, 1(2):  147-149+.  doi:10.3969/j.issn.1006-2475.2013.02.036
    Asbtract ( 530 )  
    Related Articles | Metrics
    Case based reasoning (CBR) is a kind of reasoning technology in the field of artificial intelligence in recent years. Feature selection is the hot topic and the difficulty in CBR technology. In order to get optimal feature subset in feature selection process, this paper combines gray correlation degree analysis with genetic algorithm (GA), taking the gray correlation analysis result as the initial population for GA heuristic search, and proposes a new GA-CBR case reasoning optimization model. The test results show this model is effective to improve the CBR forecast accuracy.
    Forecast of Oilfield Indexes Based on Elman Neural Network and Genetic Algorithm
    LIU Xian-de;YANG Ting-ting;YAN Hu-yong
    2013, 1(2):  150-152.  doi:10.3969/j.issn.1006-2475.2013.02.037
    Asbtract ( 491 )  
    Related Articles | Metrics
    Based on the application of the index prediction in oil field actual development, this paper puts forward a method combining neural network and genetic algorithm build a forecasting model. Neural network using a dynamic feedback Elman network, gives full play to the advantages of its dynamic prediction, and at the same time, by the help of a genetic algorithm compensates for its slow training speed and easy to fall into the local minimum points. By improving genetic algorithm’s selection operator it not only can save fine individual but also can improve the search efficiency. This paper organically combines neural network with genetic algorithm and realizes the complementary advantages. Taking the oilfield real data for example to test and verify model, the results show that this model can achieve good prediction effect, the method is efficient and feasible.
    Management System of Distributed Database Based on Amoeba Middleware
    SUN Wei;TAN Cheng-xiang
    2013, 1(2):  153-156.  doi:10.3969/j.issn.1006-2475.2013.02.038
    Asbtract ( 519 )  
    Related Articles | Metrics
    This paper proposes a management system of distributed databases in the background of the large-scale application of databases. The system uses the middleware of Amoeba to realize the management of server cluster. It utilizes Amoeba to gather and modify the information of servers, to configure the parameters of Amoeba servers and MySQL database servers, load balancing, the separation rule of read and write, and data segmentation. Administrators can use this system to master the state of servers and avoid tedious operation. At last, the experiment shows that it can effectively configure the parameters to manage a large number of servers.
    Construction of Digital Hospital Taking Electronic Medical Records as Core
    HE Le-ping
    2013, 1(2):  157-158+.  doi:10.3969/j.issn.1006-2475.2013.02.039
    Asbtract ( 549 )  
    Related Articles | Metrics
    The hospital information construction taking electronic medical records as core is an important part of the reform of public hospitals of the Ministry of Health, meanwhile it is the main content of a hospital grade. With the deepening of health care reform, the main emphasis of hospital information construction is gradually transferred to the clinical information systems. This article describes the status and characteristics of digital hospital construction that takes electronic medical records as the core about Inner Mongolia People’s Hospital, and some experience and recommendations about how to use social resources to build informatization, in order to inspire and make reference for other hospitals information construction.
    Application of WiFi Technology in Staff Positioning System on Android Platform
    PEI Wen-lian;ZHAN Lin
    2013, 1(2):  159-162.  doi:10.3969/j.issn.1006-2475.2013.02.040
    Asbtract ( 564 )  
    Related Articles | Metrics
    Benefited from the mature GPS technology, outdoor positioning accuracy has been satisfied, while with the increasing number of large buildings, indoor locating application is becoming more important. Android mobile phone provides free Internet access service, such as WiFi and GPRS, so that users can easily connect to network. By comparing different positioning technologies, on the basis of the comparison, WiFi positioning technology is applied to Android platform on a smart phone. This paper realizes large department store positioning service of staff, and a LBS application system which can communicate betueen the client and the server.
    Application of Excel Form in Fast Plotting Exploratory Points by Category in CAD
    YOU Su-nan
    2013, 1(2):  163-168+.  doi:10.3969/j.issn.1006-2475.2013.02.041
    Asbtract ( 556 )  
    Related Articles | Metrics
    For solving the problems that the special investigation software with the complicated operation, bad elasticity, bad adaptability, sometime not enough capacity, lower handwork operation efficiency and easy to make mistake when conducting “copy” and “paste”, can not meet the requirement of fast production when carrying out to plot the “location of exploratory point” by category of exploratory point during the large geological investigation process, this paper develops the fast plotting exploratory point technology by category in CAD with Excel form, combines the strong data calculation and process functions of Excel and the strong plotting functions of CAD, omits the form and transfer sector of “SCR script document”, it is of the simple method, easy to operate, good elasticity, strong adaptability, conduct adjusting and revising in batches conveniently, large data capacity, and can plot more than 10000 exploratory points once time. It can be used repeatedly after forming formwork, is of certain usage value in large engineering.
    Design and Implementation of Auto-filled Bulk Web Forms System
    ZHANG Zheng;
    2013, 1(2):  169-172.  doi:10.3969/j.issn.1006-2475.2013.02.042
    Asbtract ( 533 )  
    Related Articles | Metrics
    Using VBA(Visual Basic for Application), this paper carries out the secondary development programming on the reported data for realizing auto-filled Excel data into the new added page of interim relief in profile of the ACFTU aiding data management system, and gives the detailed implementation process. It solves the problems of manually slow input and error-prone, and realizes the auto-filled Web forms. With a friendly interface, without human intervention and so on, it is of a strong practical utility and referenced value.
    Design and Implementation of Desktop Security Baseline Management System
    LIU Lan;ZHU Cheng-rong
    2013, 1(2):  173-176.  doi:10.3969/j.issn.1006-2475.2013.02.043
    Asbtract ( 460 )  
    Related Articles | Metrics
    With the research of desktop core security configuration standard and the function demand of desktop configuration management system, this paper proposes a system of desktop security baseline management based on the Microsoft’s baselines, in the background of the security operation management of large enterprises servers. This system consists of the baseline management console and the client service, can customize baselines, distribute and deploy baselines, discover the non-compliance configurations, inquire the baselines’ information. It provides a unified configuration management and monitoring platform for enterprises and institutions to implement the security configuration management.
    Study on Performance Evaluation of Listed Companies in China Based on Data Mining
    FAN Yu;SONG Yu-xiang
    2013, 1(2):  177-180.  doi:10.3969/j.issn.1006-2475.2013.02.044
    Asbtract ( 528 )  
    Related Articles | Metrics
    The article studies with 10331 observed samples in A-shares during 2006-2011, from the profit ability, the debt paying ability, the growth ability and the operation ability which reflect the enterprise performance. This paper uses data mining techniques to establish the evaluation model of listing corporation performance. After analysis of the current development situation of listing corporation performance in China, it is found that China listing corporation performance appears N trend. The article enriches the evaluation method of listing corporation performance, expands the performance study of listing corporation, and analyzes the current situation of performance of listing corporation in China. The author hopes that can help on the follow studying.
    网络与通信
    Research on MAC Protocol for Underwater Acoustic Networks Based on OPNET
    XU Xiao-na;CHENG En;LIN Wen
    2013, 1(2):  181-184.  doi:10.3969/j.issn.1006-2475.2013.02.045
    Asbtract ( 445 )  
    Related Articles | Metrics
    MAC protocol in underwater acoustic network decides the ways that nodes share the UWA channel’s property. It affects the utilization ratio of the UWA channel. This paper makes modeling and simulation of the data link layer protocol based on OPNET, compares random access MAC protocol and RTS/CTS approach protocol, and analyzes the performances affected by transmission range of each node, data packet size and network topology. Simulation result shows that comparing to random access protocol, the RTS/CTS approach protocol has the better performances in complex underwater acoustic environment than randan access protocol.
    Research on Voice Quality Assessment Methods of IP Network
    CHEN Zhi-wei;HU Zhi-guo;
    2013, 1(2):  185-188.  doi:10.3969/j.issn.1006-2475.2013.02.046
    Asbtract ( 406 )  
    Related Articles | Metrics
    This paper reviews existing subjective and objective voice quality assessment methods and analyzes their advantages and disadvantages, as well as their application environment. Finally, some predictions on the future trend and possible promising of audio quality assessment are given.
    Design and Implementation of Indoor Vehicle Tracing and Positioning Simulation System Based on RFID
    CHEN Yue-mei;CAI Jian-yong;CHEN You-jia;HUANG Yong-liang;LIN Hong
    2013, 1(2):  189-193.  doi:10.3969/j.issn.1006-2475.2013.02.047
    Asbtract ( 468 )  
    Related Articles | Metrics
    This paper proposes an idea of tracing and positioning indoor vehicles with RFID positioning technology, and designs a system to simulate the application of RFID in parking lot. Starting from basic principles of the system, this paper introduces the overall software structure and the compositions of functions, mainly talks about the design and realization of key modules. The system is developed by Visual C# and SQL Server 2005. Simulation results show the effectiveness of the method.
    Design of Network Center Engine Room Remote Monitoring System Based on Configuration
    ZHU Hong;JI Cheng-ping
    2013, 1(2):  194-196+.  doi:10.3969/j.issn.1006-2475.2013.02.048
    Asbtract ( 456 )  
    Related Articles | Metrics
    The equipments in engine room of network center have strict requirements on appropriate temperature and appropriate humidity, so the remote environment supervision and control of network center for the maintenance of equipments and the management of engine room has great significance. A remote environment supervision and control system of network center engine room is presented according to the method of configuration software. The system chooses the micro controller, which is Freescale 32 ColdFire series with Ethernet function MCF52233, as the core design main control panel to carry out the collection of the temperature and the humidity of engine room, wave filtering, deliver, automatic control, remote monitor and management. Moreover for the convenience of the expansion of the system, the configuration software method is adopted to PC side, which is convenient to use and allocate. The article briefly gives the basic important points of hardware design of the system and software design of MCU and PC, elaborates the key technique.
    Research on Geolocation Mechanism in LBS Application
    WANG Hai-bo;WANG Zhao-hua
    2013, 1(2):  197-200.  doi:10.3969/j.issn.1006-2475.2013.02.049
    Asbtract ( 458 )  
    Related Articles | Metrics
    Geolocation function is an indispensable function in location based service. With the establishment of HTML5 specification, the main browsers support geolocation functions natively. This paper researches on the geolocation mechanism adopted on the main browsers, analyzes the query request and query response in detail. Then it pointes out the shortcoming of the current geolocation mechanism, which doesn’t allow users to choose the third-party geolocation server. This paper puts forward a method to give the users choice to select geolocation server according to the accuracy.
    An Algorithm of Resource Search of P2P-VoD System in Wireless Mesh Networks
    JIANG Hui-lin
    2013, 1(2):  201-205.  doi:10.3969/j.issn.1006-2475.2013.02.050
    Asbtract ( 466 )  
    Related Articles | Metrics
    Aiming at the problem that the Gossip-based resource search scheme brings the low-efficiency resource search and high message overhead in wireless mesh networks, this paper designs a resource search scheme of P2P-VoD system over the wireless mesh networks. The system is composed of two layers: the mesh routers are grouped as a logical structure in the upper layer by making use of Chord algorithm, which is responsible for the distribution and index of media resource; the mobile devices are considered as the lower layer. In terms of the proposed resource search algorithm, the P2P-VoD system can fast discover the optimal source with needed resource for mobile nodes. Simulation results show that this approach can efficiently improve the efficiency of resource search and reduce the delay of data delivery.
    Research on Mobile WiMAX-based Broadband Visual Communication System for Emergency
    ZHANG Fan
    2013, 1(2):  206-208.  doi:10.3969/j.issn.1006-2475.2013.02.051
    Asbtract ( 426 )  
    Related Articles | Metrics
    With the frequency of public security problems, the requirements of emergency communications systems have become more and more high. Because of its faster networking, high speed, large capacity and other advantages, mobile WiMAX technology can provide fast and reliable broadband for visual emergency communications systems. In this paper, several kinds of mobile WiMAX-based visual application solutions are discussed, then it elaborates that the mobile WiMAX-based broadband visual communication system for emergency is feasible.
    Research on Application System Migrating from IPv4 to IPv6 Under B/S Structure
    LIU Sheng-han;LU You-fei;XIAO Jian-yi
    2013, 1(2):  209-213+.  doi:10.3969/j.issn.1006-2475.2013.02.052
    Asbtract ( 460 )  
    Related Articles | Metrics
    With the continuous development and construction of IPv6 network, the application system migrating from IPv4 to IPv6 under the existing mainstream framework (B/S) faces the transformation and deployment issues. This paper proposes a set of scientific migration sehedules from the perspective of the application layer starting. First of all, when migrating in the process of IPv4 to IPv6, the two cores, the runtime environment to build and the Socket programming transformation, are put forward, and the key transformation technologies of the application system under B/S structure are discussed based on them. Then, according to the network characteristics of the application, the application migration process is designed. Finally, the proposal is to be proved feasible by testing the transformation program.
    Realization of Policy Automatic Deployment Using Ontology Modeling and SWRL Reasoning
    HUANG Liao-ruo;SHEN Qing-guo
    2013, 1(2):  214-219.  doi:10.3969/j.issn.1006-2475.2013.02.053
    Asbtract ( 478 )  
    Related Articles | Metrics
    In order to deal with the dynamic change of the network structure and promote the automatization of the network management, the PBNM system has to accurately recognize the topology of network, and then deploy the appropriate policy for the device according to the current environment. This paper integrates the PBNM with ontology and SWRL, researches on the construction of the ontology repository and reasoning rule repository, and realizes the policy automatic deployment using ontology modeling and SWRL reasoning.
    Design and Implementation of Campus Wireless Network Portal Secondary Identity Authentication
    TANG Qiang;YE Xiao-hua;YIN Xiang
    2013, 1(2):  220-222.  doi:10.3969/j.issn.1006-2475.2013.02.054
    Asbtract ( 524 )  
    Related Articles | Metrics
    With the expansion of campus network and the construction of WLAN, the wireless network has become an important part of the campus network. Based on the demand of our school, this paper combines the wireless AC controller with ABMS bras to simplify the operating process of users side, describes the architecture, working principle and certification process of wireless network users access and control adopting secondary identity authentications one-pass.