Loading...
主 管:江西省科学技术厅
主 办:江西省计算机学会
江西省计算中心
编辑出版:《计算机与现代化》编辑部
Toggle navigation
Home
About Journal
Editorial Board
Journal Online
Online First
Current Issue
Archive
Most Read Articles
Most Download Articles
Most Cited Articles
Subscription
FAQ
Self Recommendation
Contact Us
Email Alert
中文
Office Online
Submission or Manuscript
Peer Review
Editor-in-Chief
Office Work
Instruction
More>>
Instruction
Submit Flow
Template
Copyright Agreement
The Author Changes the Application
Highlights
More>>
Links
More>>
Visited
Total visitors:
Visitors of today:
Now online:
Table of Content
27 February 2013, Volume 1 Issue 2
Previous Issue
Next Issue
图像处理
Research on Video-based Face Recognition and Tracking Algorithm
TONG Lin
2013, 1(2): 1-4. doi:
10.3969/j.issn.1006-2475.2013.02.001
Asbtract
(
539
)
Related Articles
|
Metrics
Video-based face recognition and tracking are the research hotspots of computer vision. How to fully utilize the spatial and temporal information in video to overcome the difficulties existing in the video-based face recognition, such as low resolution of face image in video, large variation of face scale, is the focus of this paper. Firstly, a face recognition algorithm using the Associative Neural Network is introduced. And then, the algorithm is merged into TLD (Tracking-Learning-Detection) to improve the performance. The experimental results demonstrate that the improved algorithm is successful and practical.
Microcosmic Fractal Image Processing Based on Matlab
NING Ji;ZHANG Wei
2013, 1(2): 5-8+14. doi:
10.3969/j.issn.1006-2475.2013.02.002
Asbtract
(
539
)
Related Articles
|
Metrics
For a series of microcosmic structure images obtained through the scanning electron microscopy, according to the description about fractal by K. Falconner, this paper preliminarily judges whether the image has fractal features, then a fractal analysis method is brought in the image processing of the material with fractal feature in microcosmic structure. Based on the Matlab tool, it combines with the normal method of image processing, makes further research on the structure’s fractal feature, gets information of box-counting dimension and analyzes the results after observation.
A Method for Vehicle Detection Based on Local Gradients Vector
YANG Xiao-wei;XU Gui-li;WANG Biao;GUO Rui-peng;TIAN Yu-peng;HE Yin-nan
2013, 1(2): 9-14. doi:
10.3969/j.issn.1006-2475.2013.02.003
Asbtract
(
556
)
Related Articles
|
Metrics
The real-time performance of vehicle detection is very important in an intelligent transportation system. Conventional Histogram of Oriented Gradients (HOG) method has problems of lots of dimensions of feature vector and huge calculation. Therefore, this paper studies the characteristics of gradient distribution of vehicles and the influence of feature’s dimension to Support Vector Machine (SVM)’s time performance. Therefore, the paper proposes a vehicle detection method, which combines local gradient vector’s mean and scatter matrix with SVM. First of all, the sampled image is divided into a number of blocks uniformly. Then the gradient vector’s mean and scatter matrix are calculated as feature vectors in each block. At last, the classification and identification are performed by SVM, which further reduces the calculation by variable step size. The experimental results show that the method’s accuracy is equal to conventional method, but the average recognition time is reduced to 51% of conventional method.
Parallelization of Image Clustering
CAO Lei;CHENG Jian-la
2013, 1(2): 15-18. doi:
10.3969/j.issn.1006-2475.2013.02.004
Asbtract
(
445
)
Related Articles
|
Metrics
As technology advances, image data is rapidly growing including images and videos on Internet. How to effectively manage the image data is a great challenge. Image clustering is an important image data managing solution. This paper proposes a solution of MapReduce parallelization about the SIFT image feature extraction and K-means clustering method on Hadoop platform. It achieves good results.
Application of Image Processing Technology in Plant Organ Model Reconstruction
ZHOU Yun-hui
2013, 1(2): 19-21. doi:
10.3969/j.issn.1006-2475.2013.02.005
Asbtract
(
480
)
Related Articles
|
Metrics
Because the traditional plant modeling method cannot effectively improve visual effect of model reconstruction, image processing technology has been gradually introduced into plant model reconstruction. This paper takes model reconstruction of rice leaf organ as the research object. Leaf image is processed by image processing technology firstly. The application of image processing technology in plant organ model construction is researched. Then rice leaf model reconstruction is implemented with mathematical model. Experiment simulation results show this method can achieve model reconstruction, and it has reference value for other research of related fields.
Circle Detection Algorithm Based on Gradient Hough Transform and SVM
CHENG Peng;ZHU Mei-lin;GENG Hua
2013, 1(2): 22-26. doi:
10.3969/j.issn.1006-2475.2013.02.006
Asbtract
(
521
)
Related Articles
|
Metrics
Hough transform is a well established method for circle detection. However, circle Hough transform is quite time-consuming. In this paper, some improvements based on standard Hough transform are employed to improve the algorithm. The 3D Hough transform is transformed into the combination of two 2D Hough transform. Gradient information is treated as the value of the voting rights in the accumulated array. SVM is used in the recognition of false circle. The experimental results indicate that the proposed approach can improve the detection accuracy and computational efficiency.
An Improved Algorithm of Visual Navigation Parameters Collection
LI Dan
2013, 1(2): 27-30+3. doi:
10.3969/j.issn.1006-2475.2013.02.007
Asbtract
(
512
)
Related Articles
|
Metrics
In the process of visual navigation, image processing unit processes the image collected by CCD in order to pick up the navigation parameters. Traditional method of collecting navigation parameters is slow in collecting speed and unclear in the collected route. This paper presents an improved algorithm of collecting navigation parameters with the advantages of small calculating works and optimizing easily, which is used in DSP. With the help of this algorithm, this paper realizes the fast collecting of the navigation parameters and the collected route is clear and accurate.
Intelligent Blood Cell Image Segmentation Based on Reinforcement Learning
WANG Chuan-zhong;XIONG Hou-jin
2013, 1(2): 31-34. doi:
10.3969/j.issn.1006-2475.2013.02.008
Asbtract
(
540
)
Related Articles
|
Metrics
Intelligent medical image processing is an important research direction in the field of medical image applications. Traditional medical image analysis is often open-loop, and the image segmentation is independent of the image recognition with low intelligence, which requires inspectors with higher skill level. In consideration of these facts, reinforcement learning is applied to blood cell image, which use the blood cell features information as feedback for the image segmentation and evaluate the segmentation results in order to realize the closed-loop intelligent blood cell image segmentation.
Prohibition Road Sign Detection Algorithm Based on Visual Saliency and Symmetry Projection
TAO Chen;XU Dan;ZHANG Hai-yu;DENG Jian
2013, 1(2): 35-37+4. doi:
0.3969/j.issn.1006-2475.2013.02.009
Asbtract
(
477
)
Related Articles
|
Metrics
A new detection algorithm for prohibition signs in outdoor environment is proposed. First the salient regions are found by special color of road signs and then central symmetry projection is used to find location and scale of the regions. Experiment results show that the method obtains high detection rate as well as low false alarm during real time. The algorithm meets the requirement of real-time application.
算法分析与设计
Research on Minimum Angle Trust Localization Algorithm on IOT’s Perceptual Layer
WU Xue-qin;LI Jing-zhao
2013, 1(2): 38-42. doi:
10.3969/j.issn.1006-2475.2013.02.010
Asbtract
(
561
)
Related Articles
|
Metrics
The perceptual layer is at the most front-end of information collection, which plays a fundamental role in the internet of things. How to improve the perception layer node positioning accuracy is one of the important research projects in IOT industry because of the limit of energy. This article focuses on the origin DV-Hop arithmetic’s shortage by using all anchor node equal to the unknown node positioning, introduces the concept of minimum angle trust and proposes the minimum angle trust localization algorithm on IOT’s perceptual layer, that is DV-Hop_Toma. Simulation results, by using Matlab, show that DV-Hop_Toma improves the positioning precision comparing to the original algorithms.
Algorithm of Image Region Matching and Reduction Based on Mix-graph Structure
ZHUANG Xiao-fang;TENG Zhong-jian;HONG Qin
2013, 1(2): 43-47+5. doi:
10.3969/j.issn.1006-2475.2013.02.011
Asbtract
(
508
)
Related Articles
|
Metrics
This paper discusses the principles of connectivity, similarity and comparability in image identification based on the mixed-graph structure. It proposes a reduction algorithm that compares each composite node in a mixed-graph against a reference image to find the possible matches and the corresponding maximal similarity value (i.e., compound similarity), and reduces the mixed-graph using the best matches. To ease the calculation and better illustrate the reduction process, this paper labels the nodes in the mixed-graph with single attributes, and simplifies the similarity computation to sort and query operations with a linear complexity. The results show that the method is efficient and feasible.
Research on Solving Unconstrained Optimization Based on Cultural-Differential Algorithm
ZHOU Xiao-wen;JIANG Ze-jun
2013, 1(2): 48-55. doi:
10.3969/j.issn.1006-2475.2013.02.012
Asbtract
(
482
)
Related Articles
|
Metrics
Unconstrained optimization is an ancient mathematics issue, due to the development of the intelligent computing science, there are many of techniques that can cope with such problems as well, besides classic mathematics’ method. This paper takes advantage of the cultural algorithm’s double-layers architecture and embeds the differential evolution in updating operation of the knowledge space to achieve situationable knowledge updating by differential evolution during evolution of the whole architecture, then population space makes use of all these information to assure correct evolution direction and to fulfill individual evolution efficiently in order to improve the algorithm’s performance. This paper selects 6 benchmark functions to test the classic algorithm and the improved algorithm. The results demonstrate that the later improves the performance.
Research on Algorithms of Optimal Path Planning Based on Real-time Traffic Information
WANG Yi-song;WANG Zhi-jie
2013, 1(2): 52-55. doi:
10.3969/j.issn.1006-2475.2013.02.013
Asbtract
(
452
)
Related Articles
|
Metrics
To search the path of the shortest travel time, this paper consideres the impact of the degree of road congestion, intersection traffic light delays and restriction of one-way road based on the Dijkstra shortest path algorithm. Simulation results show that these three factors have a greater impact on path planning. After taking full account of these three factors, the shortest time path planning is more closely to the actual situation and is of large application value.
软件工程
Exploration of Application Development Model for Internet of Things Based on RESTful
CHEN Hao;LI Shi-ning
2013, 1(2): 56-60. doi:
10.3969/j.issn.1006-2475.2013.02.014
Asbtract
(
492
)
Related Articles
|
Metrics
Service-based Internet era has been formed with the rapid growth of network technology in recent years. Traditionally, SOAP-based Web services rarely use HTTP response codes and exploit HTTP GET and POST methods only, increase complexity of application programming, but RESTful Web services reduce this complexity. This paper introduces a development model for RESTful applications in Internet of Things. Based on RESTful platform of Internet of Things, wireless sensor nodes and data are abstracted as universal resources to provide rapid prototyping using Django framework.
算法分析与设计
Research on Sci-tech Novelty Search Working Platform Based on SaaS Mode
LI Ya-bing;BIAN Yi-jie;ZHAO Zhe
2013, 1(2): 61-64+6. doi:
10.3969/j.issn.1006-2475.2013.02.015
Asbtract
(
504
)
Related Articles
|
Metrics
According to the existing problems of sci-tech novelty working, this paper introduces the thought of SaaS model and SOA architecture, then analyzes their advantages, puts forward a sci-tech novelty search platform structure based on the SOA, designs sci-tech novelty search service module and rights management module, finally describes the advancement of the platform.
软件工程
Research and Application of Software Automation Testing Based on Selenium
2013, 1(2): 65-68. doi:
10.3969/j.issn.1006-2475.2013.02.016
Asbtract
(
414
)
Related Articles
|
Metrics
With the development of software industry, it is much more important for the status of software test during the software development, and furthermore the efficiency of software test is largely improved by employing automatic test tools. The paper introduces the basic components and implementation principles of the open source automation testing software Selenium, and illustrates the automated test process of the B/S architecture application system through a specific case, which can be used for reference on the further research in software automation testing.
Research and Application of Software Automation Testing Based on Selenium
WU Ling-lin
2013, 1(2): 65-68. doi:
10.3969/j.issn.1006-2475.2013.02.016
Asbtract
(
402
)
Related Articles
|
Metrics
With the development of software industry, it is much more important for the status of software test during the software development, and furthermore the efficiency of software test is largely improved by employing automatic test tools. The paper introduces the basic components and implementation principles of the open source automation testing software Selenium, and illustrates the automated test process of the B/S architecture application system through a specific case, which can be used for reference on the further research in software automation testing.
Research on Service-oriented Domain Analysis Method
XU Cheng-long;FAN Jie
2013, 1(2): 69-72. doi:
10.3969/j.issn.1006-2475.2013.02.017
Asbtract
(
499
)
Related Articles
|
Metrics
Domain engineering provides a strong support for software reuse. Service has been widely used because of its usability, flexibility and scalability. This paper describes the process of extracting service-feature and constructing service-feature model which belongs to service-oriented domain analysis method, proposes a method to combine service in order to make granularity larger and reusability. Feature model is divided into four layers to realize the transformation of service-feature to construct architecture model.
Design and Implementation of Application Software Running Fault Monitoring System
GAO Yuan-hong;FU Ya-bing;LIU Yi
2013, 1(2): 73-75. doi:
10.3969/j.issn.1006-2475.2013.02.018
Asbtract
(
429
)
Related Articles
|
Metrics
Application software fault occurring in the running course will bring effect to jobs. This paper introduces a solution: to design a program to realize application software operation monitoring, fault detection and exclusion. The paper discusses the principle of program design, method, and program flow. Comparing with artificial maintenance, the design greatly improves the efficiency of maintenance work, reduces the fault effects to a minimum.
计算机仿真
Design and Implementation of Campus 3D Visualization Simulation System
WU Zhong-lian;SUN Ka;WANG Xin-chun;LI Jun
2013, 1(2): 76-79. doi:
10.3969/j.issn.1006-2475.2013.02.019
Asbtract
(
500
)
Related Articles
|
Metrics
This paper combines with computer graphics and spatial information sciences technologies, makes use of the software Multigen Creator and Vega Prime as modeling tools and simulation platform, VS 2005 as the secondary development software, Access as the underlying database support, through data acquisition, data processing and 3D modeling, realizes the dynamic scene construction technology, large-scale surface features and vegetation model construction technology. This campus 3D visualization system which supports querying the surface features and attributes, realizes the digital campus functions. This technology has great importance on school enrollment, employment, education, alumni relations, showing the school strength and other aspects.
Design and Implementation of WAN Emulation System Based on Linux
ZENG Ming-yong;FU Yi;GUO Xiao;TIAN Chang
2013, 1(2): 80-84. doi:
10.3969/j.issn.1006-2475.2013.02.020
Asbtract
(
482
)
Related Articles
|
Metrics
In order to emulate the communication of WANs within LAN environment, a Linux-based large-scale WAN emulation system with strong extensibility is designed, which can be applied to controllably emulate the actual properties such as delay, jitter and packet loss in WANs. A structure which is convenient for distributed networking and extending is built in the emulation system. The key functionalities in large-scale network emulation are designed and implemented, such as dynamic transparent routing, channel properties emulation and traffic monitoring. The testing results show that it is effective to emulate and manage the communication properties among multiple networks, which facilitates the debugging and testing of protocols or software in WANs.
]Research on TENA Object Model
KONG Yong;DU Xin-yu
2013, 1(2): 85-89. doi:
10.3969/j.issn.1006-2475.2013.02.021
Asbtract
(
538
)
Related Articles
|
Metrics
TENA is a common architecture being developed by U.S. Department of Defense for test and training community, its purpose is to achieve interoperability among ranges, facilities and simulations. The TENA object model is based on the TENA meta-model, which is to enable semantic interoperability among range resource applications by providing the common language, and has the most positive impact of any activity on the future reusability and composability of range resources. The paper discusses the TENA object model on how it is created, stored, standardized, and managed.
信息安全
An Autonomous Access Control Method of Implementing Data Packet Encryption and Decryption Technology Based on Firewall
ZHANG Xue-feng
2013, 1(2): 90-93. doi:
10.3969/j.issn.1006-2475.2013.02.022
Asbtract
(
467
)
Related Articles
|
Metrics
The paper presents an independent host access control method to realize packet encryption and decryption based on firewall. It realizes personal firewall function using NDIS filter driver technology, and it is easy to realize the access control in high performance or simple network environment. The access control method has good universality, high safety, strong controllability and good scalability characteristics, and its purpose is to prevent illegal (unauthorized) host access security network, reduce the packet loss, and improve the system of transfer rate when the host access network. The experimental results show that this method contributes to improve the stability of system and reduce the illegal access during the encryption and decryption process.
esign and Implementation of Remote Monitor and Control System Based on Embedded Web Server
XU Ye;YUAN Min;LI Guo-jun
2013, 1(2): 94-98. doi:
10.3969/j.issn.1006-2475.2013.02.023
Asbtract
(
425
)
Related Articles
|
Metrics
The rapid development of information technology and the wide application of embedded system have brought revolutionary changes to people’s life. The combination of embedded system and Internet has become a trend of the future. Therefore, an embedded Web server is designed. This server uses hyper text transfer protocol and common gateway interface technology, increases database function. In the client, users can monitor local devices and admin historical data through Internet and browser remotely. The use of OPC technology achieves communication between the Web server and PLC. This monitor system can not only meet the needs of supervisory task, reduces the operation and maintenance cost, but also improves the efficiency. The system is of a very high value in use.
Study of Decoy Host Security Solutions Based on VFS
XIAO Gang
2013, 1(2): 99-102+. doi:
10.3969/j.issn.1006-2475.2013.02.024
Asbtract
(
474
)
Related Articles
|
Metrics
This paper studies the realization mechanism of virtual file system (VFS) in operating system kernel. Through the modification the part of functions of virtual file system, such as readdir, filldir, lookup, etc, it realizes the safety function. Network decoy system increases the reliability of information security from network system structure; it is a new style system for defense invader inside and outside in battle of network.
人工智能
Application of Cordic Algorithm for Stream Processor
MA Shi-yu;FAN Xiao-ya
2013, 1(2): 103-107. doi:
10.3969/j.issn.1006-2475.2013.02.025
Asbtract
(
474
)
Related Articles
|
Metrics
The stream processors are applied widely in high performance computing. But the existing computation speed of stream processors can’t satisfy people’s needs. Through study, the bandwidth in accessing memory is the reason limiting the computation speed of stream processors. So how to reduce the times of accessing memory becomes the key to improve the computation speed of stream processors. This paper constructs the transcendental function unit by using the Cordic algorithm, reduces the times of accessing memory, and improves the computation speed of stream processors.
Verilog Design of Integer DCT and Quantization Module in H.264/AVC
SHEN Jing-tong;ZHANG Wei
2013, 1(2): 108-112+. doi:
10.3969/j.issn.1006-2475.2013.02.026
Asbtract
(
552
)
Related Articles
|
Metrics
The video compression standard H.264/AVC uses 4×4 integer DCT and quantization methods, which avoid data mismatch and improve data accuracy, thus has high compression efficiency. This paper analyzes the algorithm of integer DCT and quantization in H.264. By transforming DCT into two quick butterfly computations, it reduces algorithm complexity and makes it easer to realize. The synthesis and simulation by QuartusII show the correct results. The design is of 54.54MHz high clock frequency, low resource usage and low power dissipation.
Research on Process Definition File Parsing Methods Based on VTD-XML
TANG Shi-feng;YANG Guo-qiang
2013, 1(2): 113-116. doi:
10.3969/j.issn.1006-2475.2013.02.027
Asbtract
(
462
)
Related Articles
|
Metrics
The dissertation analyzes the traditional DOM and SAX parsing technology and points out their defects: DOM easy to use but there is a high memory consumption; SAX memory consumption is low but it is difficult to pay a return visit. The dissertation utilizes VTD-XML technology supporting for XPath and provides a schedule of parsing process definition file. Experiment results show that the method improves the parsing efficiency, reduces the memory consumption.
Web Knowledge Discovery Based on Text Classification
LU Cao-fang;XUE Xiang-feng;ZHU Yue-chao;ZONG Jun-jun
2013, 1(2): 117-119. doi:
10.3969/j.issn.1006-2475.2013.02.028
Asbtract
(
476
)
Related Articles
|
Metrics
The paper studies the related technologies of the Chinese text knowledge discovery on Internet, according to the features of search engines classification, comparing and analyzing search engines with features of text classification, discovers that the engines of simplex search text information is more suitable for text classification. This paper proposes a Internet achieving information prototype based on text classification, proposes an extraction method on user knowledge of interest, users can extract text information of interest to improve accuracy of text information mining.
Research on Emotion Physiological Signals Feature Selection Based on Adaptive Neighborhood TS
MO Jian-lin;WANG Yu-jing
2013, 1(2): 120-122. doi:
10.3969/j.issn.1006-2475.2013.02.029
Asbtract
(
437
)
Related Articles
|
Metrics
In emotion recognition of physiological signals, selection of valid feature subset is the important step to identify emotion. An improved neighborhood structure by adaptive neighborhood elements is proposed to solve the problem about feature selection of emotion physiology signal. Simulation shows that the method of finding valid feature subset is feasible and effective.
应用与开发
Design and Realization of Numerical Sea Ice Forecast System Based on Data Marts
CAO Cong-hua;WANG Ning;HUANG Juan;CAO Ya-jing;DING Yi;ZHONG Shan;
2013, 1(2): 123-125+. doi:
10.3969/j.issn.1006-2475.2013.02.030
Asbtract
(
484
)
Related Articles
|
Metrics
Based on the Visual Studio 2008 and Visual Fortran 8.0 platform, the numerical sea ice forecast system based on Data marts is developed. It integrates initial field, numerical forecast model, numerical forecast results to the same platform. Based on the large data marts of north ocean observation and forecasting, a whole chain is formed which is “input initial field-input forecast parameter-compute numerical-view result”.
Design and Implementation of Securities Short-term Trading Analysis System
HUANG Liang;ZHANG Sheng;ZHANG Zhao
2013, 1(2): 125-129. doi:
10.3969/j.issn.1006-2475.2013.02.031
Asbtract
(
397
)
Related Articles
|
Metrics
This paper develops a securities short-term trading system in accordance with the provisions of the Japan’s “Financial Instruments and Exchange Act”. The system is one of the planning project of the Japan’s financial services agency. The system analizes the specified securities and cycle’s transaction data, and the results of the analysis are provided to relevant person; it is a judgment basis of whether an illegal trading happened. The JSP, Hibernate, Struts and other technologies are used in the development of the system, it is also characterized by its good operability and maintainability.
Design and Implementation of Task Scheduling Middleware for GPU Cluster
CHEN Chun-lei
2013, 1(2): 130-133. doi:
10.3969/j.issn.1006-2475.2013.02.032
Asbtract
(
680
)
Related Articles
|
Metrics
In a GPU cluster, the static task scheduling policy may result in unbalanced allocation of computing resource, because GPUs work as co-processors. A weight-based dynamic scheduling policy is proposed and implemented as a middleware, so that it can be applied to the GPU cluster. Under this policy, local GPUs and remote GPUs are not explicitly distinguished, and no global information is required. Every cluster node decides whether to use local GPUs or remote GPUs, according to weights of GPUs. And these weights are locally maintained by each node, respectively. As a carrier of the policy, the middleware ensures that the policy is transparent to users. It is composed of three parts: API library, resource management daemon, and GPU execution daemon. The policy is validated on a two-node cluster. Experiments show that the weight-based dynamic scheduling policy can achieve a 16% higher GPU utilization rate than the static policy, and a 45% higher GPU utilization rate than another dynamic policy (global-queue-based policy).
Study and Design of Automatic Map Making of Wind Rose Diagram
CAO Li-juan;ZHOU Ling;CHEN Yan-li;MA Guang-liang;
2013, 1(2): 134-137+. doi:
10.3969/j.issn.1006-2475.2013.02.033
Asbtract
(
578
)
Related Articles
|
Metrics
Wind rose diagram is the professional statistical chart used to quantitative analysis of wind element in meteorological science. Taking the meteorological wind hourly data of Huang Bohai Area’s ocean stations for example, this article expatiates on the method of using database stored procedure to exstract, analyze and count, and writes program to realize the map automatic designing based on C# developing environment.
Design of New Antimicrobial Peptides and Prediction of Its Activity and Function
YANG Li-min;HUANG Yan;ZHANG Ri-jun
2013, 1(2): 138-142. doi:
10.3969/j.issn.1006-2475.2013.02.034
Asbtract
(
426
)
Related Articles
|
Metrics
This paper determines the parameters of quantization factor through analyzing the impact of antimicrobial peptide activity factor. Then, it analyzes activity factor data of existing antimicrobial peptide, and obtains range of parameters. To get new peptide, it shears and links existing antimicrobial peptides’ sequence by using Java technology. At last, according to the parameter range it predicts activity and function of new peptide. At the same time, it builds the three-dimensional structure of antimicrobial peptide. The results show that net charge of four antimicrobial peptides is identical; however, it is essential to antibacterial activity. Hydrophobic residue% and α-helix% have significant effect on distinguishing four types of antimicrobial peptides.
Research on Disease Diagnosis Expert System Based on Case Reasoning
SHEN Jing
2013, 1(2): 143-146. doi:
10.3969/j.issn.1006-2475.2013.02.035
Asbtract
(
527
)
Related Articles
|
Metrics
Viewing at the problems that the disease diagnosis mainly depends on the personal experience judgment and the rule-based reasoning inefficiency and lacking of flexibility, an algorithm of case matching is proposed. The diagnosis results are achieved through symptoms matching and analysis of patients, the recommended treatment is given depended on the results. The relations between the new symptoms and related disease are determined by the calculation of the correlation, and are updated into the case library. Obtained by experiment, the accuracy rate of system diagnosis is 90.18%, it shows that the system is of a high diagnostic efficiency and better intelligence, and can provide a certain supporting for doctors in medical diagnosis.
Optimizing CBR Model Using Genetic Algorithm
SHEN Qi;
2013, 1(2): 147-149+. doi:
10.3969/j.issn.1006-2475.2013.02.036
Asbtract
(
530
)
Related Articles
|
Metrics
Case based reasoning (CBR) is a kind of reasoning technology in the field of artificial intelligence in recent years. Feature selection is the hot topic and the difficulty in CBR technology. In order to get optimal feature subset in feature selection process, this paper combines gray correlation degree analysis with genetic algorithm (GA), taking the gray correlation analysis result as the initial population for GA heuristic search, and proposes a new GA-CBR case reasoning optimization model. The test results show this model is effective to improve the CBR forecast accuracy.
Forecast of Oilfield Indexes Based on Elman Neural Network and Genetic Algorithm
LIU Xian-de;YANG Ting-ting;YAN Hu-yong
2013, 1(2): 150-152. doi:
10.3969/j.issn.1006-2475.2013.02.037
Asbtract
(
491
)
Related Articles
|
Metrics
Based on the application of the index prediction in oil field actual development, this paper puts forward a method combining neural network and genetic algorithm build a forecasting model. Neural network using a dynamic feedback Elman network, gives full play to the advantages of its dynamic prediction, and at the same time, by the help of a genetic algorithm compensates for its slow training speed and easy to fall into the local minimum points. By improving genetic algorithm’s selection operator it not only can save fine individual but also can improve the search efficiency. This paper organically combines neural network with genetic algorithm and realizes the complementary advantages. Taking the oilfield real data for example to test and verify model, the results show that this model can achieve good prediction effect, the method is efficient and feasible.
Management System of Distributed Database Based on Amoeba Middleware
SUN Wei;TAN Cheng-xiang
2013, 1(2): 153-156. doi:
10.3969/j.issn.1006-2475.2013.02.038
Asbtract
(
519
)
Related Articles
|
Metrics
This paper proposes a management system of distributed databases in the background of the large-scale application of databases. The system uses the middleware of Amoeba to realize the management of server cluster. It utilizes Amoeba to gather and modify the information of servers, to configure the parameters of Amoeba servers and MySQL database servers, load balancing, the separation rule of read and write, and data segmentation. Administrators can use this system to master the state of servers and avoid tedious operation. At last, the experiment shows that it can effectively configure the parameters to manage a large number of servers.
Construction of Digital Hospital Taking Electronic Medical Records as Core
HE Le-ping
2013, 1(2): 157-158+. doi:
10.3969/j.issn.1006-2475.2013.02.039
Asbtract
(
549
)
Related Articles
|
Metrics
The hospital information construction taking electronic medical records as core is an important part of the reform of public hospitals of the Ministry of Health, meanwhile it is the main content of a hospital grade. With the deepening of health care reform, the main emphasis of hospital information construction is gradually transferred to the clinical information systems. This article describes the status and characteristics of digital hospital construction that takes electronic medical records as the core about Inner Mongolia People’s Hospital, and some experience and recommendations about how to use social resources to build informatization, in order to inspire and make reference for other hospitals information construction.
Application of WiFi Technology in Staff Positioning System on Android Platform
PEI Wen-lian;ZHAN Lin
2013, 1(2): 159-162. doi:
10.3969/j.issn.1006-2475.2013.02.040
Asbtract
(
564
)
Related Articles
|
Metrics
Benefited from the mature GPS technology, outdoor positioning accuracy has been satisfied, while with the increasing number of large buildings, indoor locating application is becoming more important. Android mobile phone provides free Internet access service, such as WiFi and GPRS, so that users can easily connect to network. By comparing different positioning technologies, on the basis of the comparison, WiFi positioning technology is applied to Android platform on a smart phone. This paper realizes large department store positioning service of staff, and a LBS application system which can communicate betueen the client and the server.
Application of Excel Form in Fast Plotting Exploratory Points by Category in CAD
YOU Su-nan
2013, 1(2): 163-168+. doi:
10.3969/j.issn.1006-2475.2013.02.041
Asbtract
(
556
)
Related Articles
|
Metrics
For solving the problems that the special investigation software with the complicated operation, bad elasticity, bad adaptability, sometime not enough capacity, lower handwork operation efficiency and easy to make mistake when conducting “copy” and “paste”, can not meet the requirement of fast production when carrying out to plot the “location of exploratory point” by category of exploratory point during the large geological investigation process, this paper develops the fast plotting exploratory point technology by category in CAD with Excel form, combines the strong data calculation and process functions of Excel and the strong plotting functions of CAD, omits the form and transfer sector of “SCR script document”, it is of the simple method, easy to operate, good elasticity, strong adaptability, conduct adjusting and revising in batches conveniently, large data capacity, and can plot more than 10000 exploratory points once time. It can be used repeatedly after forming formwork, is of certain usage value in large engineering.
Design and Implementation of Auto-filled Bulk Web Forms System
ZHANG Zheng;
2013, 1(2): 169-172. doi:
10.3969/j.issn.1006-2475.2013.02.042
Asbtract
(
533
)
Related Articles
|
Metrics
Using VBA(Visual Basic for Application), this paper carries out the secondary development programming on the reported data for realizing auto-filled Excel data into the new added page of interim relief in profile of the ACFTU aiding data management system, and gives the detailed implementation process. It solves the problems of manually slow input and error-prone, and realizes the auto-filled Web forms. With a friendly interface, without human intervention and so on, it is of a strong practical utility and referenced value.
Design and Implementation of Desktop Security Baseline Management System
LIU Lan;ZHU Cheng-rong
2013, 1(2): 173-176. doi:
10.3969/j.issn.1006-2475.2013.02.043
Asbtract
(
460
)
Related Articles
|
Metrics
With the research of desktop core security configuration standard and the function demand of desktop configuration management system, this paper proposes a system of desktop security baseline management based on the Microsoft’s baselines, in the background of the security operation management of large enterprises servers. This system consists of the baseline management console and the client service, can customize baselines, distribute and deploy baselines, discover the non-compliance configurations, inquire the baselines’ information. It provides a unified configuration management and monitoring platform for enterprises and institutions to implement the security configuration management.
Study on Performance Evaluation of Listed Companies in China Based on Data Mining
FAN Yu;SONG Yu-xiang
2013, 1(2): 177-180. doi:
10.3969/j.issn.1006-2475.2013.02.044
Asbtract
(
528
)
Related Articles
|
Metrics
The article studies with 10331 observed samples in A-shares during 2006-2011, from the profit ability, the debt paying ability, the growth ability and the operation ability which reflect the enterprise performance. This paper uses data mining techniques to establish the evaluation model of listing corporation performance. After analysis of the current development situation of listing corporation performance in China, it is found that China listing corporation performance appears N trend. The article enriches the evaluation method of listing corporation performance, expands the performance study of listing corporation, and analyzes the current situation of performance of listing corporation in China. The author hopes that can help on the follow studying.
网络与通信
Research on MAC Protocol for Underwater Acoustic Networks Based on OPNET
XU Xiao-na;CHENG En;LIN Wen
2013, 1(2): 181-184. doi:
10.3969/j.issn.1006-2475.2013.02.045
Asbtract
(
445
)
Related Articles
|
Metrics
MAC protocol in underwater acoustic network decides the ways that nodes share the UWA channel’s property. It affects the utilization ratio of the UWA channel. This paper makes modeling and simulation of the data link layer protocol based on OPNET, compares random access MAC protocol and RTS/CTS approach protocol, and analyzes the performances affected by transmission range of each node, data packet size and network topology. Simulation result shows that comparing to random access protocol, the RTS/CTS approach protocol has the better performances in complex underwater acoustic environment than randan access protocol.
Research on Voice Quality Assessment Methods of IP Network
CHEN Zhi-wei;HU Zhi-guo;
2013, 1(2): 185-188. doi:
10.3969/j.issn.1006-2475.2013.02.046
Asbtract
(
406
)
Related Articles
|
Metrics
This paper reviews existing subjective and objective voice quality assessment methods and analyzes their advantages and disadvantages, as well as their application environment. Finally, some predictions on the future trend and possible promising of audio quality assessment are given.
Design and Implementation of Indoor Vehicle Tracing and Positioning Simulation System Based on RFID
CHEN Yue-mei;CAI Jian-yong;CHEN You-jia;HUANG Yong-liang;LIN Hong
2013, 1(2): 189-193. doi:
10.3969/j.issn.1006-2475.2013.02.047
Asbtract
(
468
)
Related Articles
|
Metrics
This paper proposes an idea of tracing and positioning indoor vehicles with RFID positioning technology, and designs a system to simulate the application of RFID in parking lot. Starting from basic principles of the system, this paper introduces the overall software structure and the compositions of functions, mainly talks about the design and realization of key modules. The system is developed by Visual C# and SQL Server 2005. Simulation results show the effectiveness of the method.
Design of Network Center Engine Room Remote Monitoring System Based on Configuration
ZHU Hong;JI Cheng-ping
2013, 1(2): 194-196+. doi:
10.3969/j.issn.1006-2475.2013.02.048
Asbtract
(
456
)
Related Articles
|
Metrics
The equipments in engine room of network center have strict requirements on appropriate temperature and appropriate humidity, so the remote environment supervision and control of network center for the maintenance of equipments and the management of engine room has great significance. A remote environment supervision and control system of network center engine room is presented according to the method of configuration software. The system chooses the micro controller, which is Freescale 32 ColdFire series with Ethernet function MCF52233, as the core design main control panel to carry out the collection of the temperature and the humidity of engine room, wave filtering, deliver, automatic control, remote monitor and management. Moreover for the convenience of the expansion of the system, the configuration software method is adopted to PC side, which is convenient to use and allocate. The article briefly gives the basic important points of hardware design of the system and software design of MCU and PC, elaborates the key technique.
Research on Geolocation Mechanism in LBS Application
WANG Hai-bo;WANG Zhao-hua
2013, 1(2): 197-200. doi:
10.3969/j.issn.1006-2475.2013.02.049
Asbtract
(
458
)
Related Articles
|
Metrics
Geolocation function is an indispensable function in location based service. With the establishment of HTML5 specification, the main browsers support geolocation functions natively. This paper researches on the geolocation mechanism adopted on the main browsers, analyzes the query request and query response in detail. Then it pointes out the shortcoming of the current geolocation mechanism, which doesn’t allow users to choose the third-party geolocation server. This paper puts forward a method to give the users choice to select geolocation server according to the accuracy.
An Algorithm of Resource Search of P2P-VoD System in Wireless Mesh Networks
JIANG Hui-lin
2013, 1(2): 201-205. doi:
10.3969/j.issn.1006-2475.2013.02.050
Asbtract
(
466
)
Related Articles
|
Metrics
Aiming at the problem that the Gossip-based resource search scheme brings the low-efficiency resource search and high message overhead in wireless mesh networks, this paper designs a resource search scheme of P2P-VoD system over the wireless mesh networks. The system is composed of two layers: the mesh routers are grouped as a logical structure in the upper layer by making use of Chord algorithm, which is responsible for the distribution and index of media resource; the mobile devices are considered as the lower layer. In terms of the proposed resource search algorithm, the P2P-VoD system can fast discover the optimal source with needed resource for mobile nodes. Simulation results show that this approach can efficiently improve the efficiency of resource search and reduce the delay of data delivery.
Research on Mobile WiMAX-based Broadband Visual Communication System for Emergency
ZHANG Fan
2013, 1(2): 206-208. doi:
10.3969/j.issn.1006-2475.2013.02.051
Asbtract
(
426
)
Related Articles
|
Metrics
With the frequency of public security problems, the requirements of emergency communications systems have become more and more high. Because of its faster networking, high speed, large capacity and other advantages, mobile WiMAX technology can provide fast and reliable broadband for visual emergency communications systems. In this paper, several kinds of mobile WiMAX-based visual application solutions are discussed, then it elaborates that the mobile WiMAX-based broadband visual communication system for emergency is feasible.
Research on Application System Migrating from IPv4 to IPv6 Under B/S Structure
LIU Sheng-han;LU You-fei;XIAO Jian-yi
2013, 1(2): 209-213+. doi:
10.3969/j.issn.1006-2475.2013.02.052
Asbtract
(
460
)
Related Articles
|
Metrics
With the continuous development and construction of IPv6 network, the application system migrating from IPv4 to IPv6 under the existing mainstream framework (B/S) faces the transformation and deployment issues. This paper proposes a set of scientific migration sehedules from the perspective of the application layer starting. First of all, when migrating in the process of IPv4 to IPv6, the two cores, the runtime environment to build and the Socket programming transformation, are put forward, and the key transformation technologies of the application system under B/S structure are discussed based on them. Then, according to the network characteristics of the application, the application migration process is designed. Finally, the proposal is to be proved feasible by testing the transformation program.
Realization of Policy Automatic Deployment Using Ontology Modeling and SWRL Reasoning
HUANG Liao-ruo;SHEN Qing-guo
2013, 1(2): 214-219. doi:
10.3969/j.issn.1006-2475.2013.02.053
Asbtract
(
478
)
Related Articles
|
Metrics
In order to deal with the dynamic change of the network structure and promote the automatization of the network management, the PBNM system has to accurately recognize the topology of network, and then deploy the appropriate policy for the device according to the current environment. This paper integrates the PBNM with ontology and SWRL, researches on the construction of the ontology repository and reasoning rule repository, and realizes the policy automatic deployment using ontology modeling and SWRL reasoning.
Design and Implementation of Campus Wireless Network Portal Secondary Identity Authentication
TANG Qiang;YE Xiao-hua;YIN Xiang
2013, 1(2): 220-222. doi:
10.3969/j.issn.1006-2475.2013.02.054
Asbtract
(
524
)
Related Articles
|
Metrics
With the expansion of campus network and the construction of WLAN, the wireless network has become an important part of the campus network. Based on the demand of our school, this paper combines the wireless AC controller with ABMS bras to simplify the operating process of users side, describes the architecture, working principle and certification process of wireless network users access and control adopting secondary identity authentications one-pass.