Loading...

Table of Content

    19 November 2013, Volume 1 Issue 11
    图像处理
    A Color Image Encryption Algorithm Based on Multiple Fractionalorder Chaotic Systems 
    WU Xiangjun;;WANG Chunlin;KAN Haibin
    2013, 1(11):  1-7.  doi:
    Asbtract ( 199 )  
    Related Articles | Metrics
    Abstract: In order to achieve effective protection of color image information, an encryption algorithm with the combination of pixel scrambling and ciphertext crossdiffusion technology is proposed. Firstly, the chaotic sequences generated by three fractionalorder chaotic systems are modified to obtain two groups of chaotic key sequences with good property, and the RGB color image is converted into a grayscale image which is composed by primary color components. Secondly, the pixels’ positions of the grayscale image are scrambled by means of one group of improved chaotic key sequences. Thirdly, by using another group of improved chaotic key sequences, the study modifies the pixels’ values of the scrambled image with two rounds of ciphertext crossdiffusion operations between the primary color components and gets the cipher image. Simulation shows that, this algorithm is of a sufficiently large key space, highly sensitive keys, better pixel distribution characteristics, and a good performance against ciphertextonly attack, differential attack, chosen plaintext attack and statistical attack. This can be widely used in secure communication of multimedia data.
    A Method for Keyframes Extraction Based on LBP Feature
    ZHANG Xin;XIE Yuxiang;LUAN Xidao
    2013, 1(11):  8-12.  doi:
    Asbtract ( 230 )  
    Related Articles | Metrics
    Abstract: Aiming at making an improvement on the information capacity of video summary under the premise of summary speed, a new method for video summarization based on rotation invariant uniform pattern feather is presented in this paper. First of all, the amount of frames to be processed is decreased with the presampling approach, upon which local binary pattern feature is extracted. Then, the cluster number is generated according to the similarity between each two adjacent frames. With the cluster number, the kmeans algorithm is applied to cluster similar frames. Finally, the frame which is nearest to the cluster center is used to construct the video summarization. The importance of cluster is evaluated by the function introduced. Experiment results indicate that the proposed method can making an improvement on the information capacity of video summary under the premise of generation speed, the summary performs well to the source video.
    Nonlocal Mean Algorithm Based on Wavelet Packet Transform
    LONG Junyu;YU Aimin
    2013, 1(11):  13-16.  doi:
    Asbtract ( 197 )  
    Related Articles | Metrics
    Abstract: Based on the nonlocal means(NLmeans) filter algorithm, in order to improve the image quality, a NLmeans algorithm based on wavelet packet transform is proposed. Firstly, the image is transformed by the wavelet packet, and the wavelet domain coefficients are applied to estimate the Gaussian noise parameters of the image, then the similarity of the highfrequency subband’s wavelet coefficients is calculated as the weights to adjust the wavelet coefficients, finally the image is reconstructed by the inverse wavelet packet transform. Experiment results show that this algorithm can preserve the edge detail information effectively, and get a superior denoising performance than the original nonlocal mean algorithm.
    Image Edge Detection Based on GL Fractional Differential
    GOU Rong
    2013, 1(11):  17-19.  doi:
    Asbtract ( 146 )  
    Related Articles | Metrics
    Abstract: Traditional image edge detection algorithm based on integer order differential is sensitive to noise, and the image edge detection results are often simple. The fractional differential can enhance the high frequency and keep the middle and the low frequency of the image signal. The paper infers the difference expression of the GL fractional differential, and designs a 5×5 size template. The image edge detection experiments are made with the Sobel, the Prewitt, the Laplacian, and the GL fractional differential algorithm. The results show that the fractional differential algorithm is not sensitive to noise, and can keep the image texture detail of the smoothing region and get more information of the image edge.
    Image Splitandmerge Segmentation Algorithm Based on Information Bottleneck Method
    LI Dedong;XIAO Chuwan;PANG Wei
    2013, 1(11):  20-24.  doi:
    Asbtract ( 202 )  
    Related Articles | Metrics
    Abstract: In image processing, segmentation algorithms constitute one of the main focuses of research. In this paper, new image splitandmerge segmentation algorithms based on a hard version of the information bottleneck method are presented. The objective of this method is to extract a compact representation of a variable, considered the input, with minimal loss of mutual information with respect to another variable, considered the output. First, the algorithm is based on the definition of an information channel between a set of regions (input) of the image and the intensity histogram bins (output). From this channel, the maximization of the mutual information gain is used to optimize the image partitioning. Then, the merging process of the regions obtained in the previous phase is carried out by minimizing the loss of mutual information. Different experiments on 2D images show the behavior of the proposed algorithm.
    Target Detection and Extraction Based on CV Model  2. Sany Heavy Industry, Changsha 410100, China
    PU Xinhua;LI Yongjiu
    2013, 1(11):  25-27.  doi:
    Asbtract ( 223 )  
    Related Articles | Metrics
    Abstract: In target detection and extraction, the traditional snake model and local area detection method based on active contour spend not only more time, but also have no robustness due to initial conditions or constraints of its convergence. This paper proposes a method of target detection and extraction based on the CV model of variational level set. By a large number of experiments, it can be improved significantly on time and robustness.
    An Automatic Traffic Congestion Detection Method 
    SHE Yongye;ZHAO Lixuan;LUO Donghua;LI Xiying;YU Zhi
    2013, 1(11):  28-33.  doi:
    Asbtract ( 189 )  
    Related Articles | Metrics
    Abstract: Traffic congestion is increasingly serious in expressway, and manual surveillance is still a main way to find traffic congestion, which is very ineffective. In this paper, an automatic traffic congestion detection method for expressway surveillance videos is presented. Firstly, the road boundary structure of surveillance video is extracted adaptively. Secondly, edge occupancy rate and weighted average velocity of optical flow in the range of extracted road are calculated. Finally, the traffic congestion is detected by analyzing the two macro traffic state parameters. 〖JP2〗The experimental test results show that this method is effective for expressway switching surveillance video, the detection time is less than 30 seconds, and the detection accuracy rate is above 91.8%.
    Medical Image Processing System Based on Android
    YANG Ping;NI Jun;LIU Zaiying
    2013, 1(11):  34-37.  doi:
    Asbtract ( 254 )  
    Related Articles | Metrics
    Abstract: This paper introduces the form of DICOM medical image and data element structure, and puts forward the method to extract DICOM medical image’s text information and image data, and implements DICOM medical image display and processing system on Android platform. Firstly DICOM images were got from SD card of an Android phone, bitmap objects were obtained by pixel transformation, then the images were displayed and processed. This paper implements the DICOM medical image file on the Android platform to read, display and process. Displaying and processing effect is good.
    算法设计与分析
    A New Fourdimensional Chaotic System and Its Sliding Mode Control
    WU Fengjiao;ZHANG Jianwei;WANG Lei
    2013, 1(11):  38-42.  doi:
    Asbtract ( 189 )  
    Related Articles | Metrics
    Abstract: The nonlinear term is a neccessary condition for chaos, the paper studies a new fourdimensional chaos with only one cubic term and its control. Based on the magnetoelastic system, the new system is proposed and its dynamic characteristics are analyzed, including the phase trajectory map, Poincare map, Lyapunov exponents, and so on. And a new sliding mode control method is designed for the chaos control. The system is controlled to the expected fixed point and periodic orbit respectively. MATLAB simulations are presented to confirm the effectiveness of the controller.
    A New Method for Improving Search Performance of Selforganized Linear Lists
    ZHOU Bei;ZOU Yonglin
    2013, 1(11):  43-48.  doi:
    Asbtract ( 144 )  
    Related Articles | Metrics
    Abstract: Selforganized linear lists are of a better efficiency in nonequal probability search. This paper puts forward a new method of moving to middle, based on three basic strategies. This method optimizes the adjustment method of recording in selforganized linear lists, reduces the comparison times of cumulative record when conflicts occur so as to shorten the reaction of searching. In experimental tests, we proposed a concept on stationarity and nonstationarity of search process, and designed the corresponding test cases. The experiments show that the comprehensive properties of the new method are best.
    A Monotonicitypreserving Quadratic Spline Hermite Interpolation Method 
    SI Jingguo;LIU Jianbin;GAO Feng;LIU Weijia
    2013, 1(11):  49-51.  doi:
    Asbtract ( 161 )  
    Related Articles | Metrics
    Abstract: A method of monotonicitypreserving quadratic spline Hermite interpolation is proposed. The method preserves the monotonicity of a points sequence by setting appropriate knots slopes based on the deep research of previous methods. Meantime, a strict proof is provided. After that, a points sequence experiment is carried out to test the performance of the method proposed in this paper. The result of experiment shows that the method can interpolate the points sequence to a monotonicitypreserving and smooth curves. So the method is of the excellent performance in monotonicitypreserving interpolations.
    A Scalable Coclustering Algorithm Based on MapReduce
    MA Qiao;WAN Jianyi;WANG Mingwen
    2013, 1(11):  52-57.  doi:
    Asbtract ( 196 )  
    Related Articles | Metrics
    Abstract: Collaborative clustering algorithm is a kind of clustering algorithm to cluster the documents and the features at the same time, this algorithm can find the potential relationship between internal document features so as to improve the clustering effect. With the arrival of the era of big data, parallel algorithm showed its superiority, this paper carries out a comprehensive research on collaborative clustering algorithm, and extends the parallel algorithm of it. We studied the collaborative clustering algorithm based on minimum sumsquared residue, and then designed and realized the parallel collaborative clustering algorithm with MapReduce model. Experimental results show that the proposed parallel collaborative clustering algorithm can improve the efficiency of clustering, and be of well scalability.
    Query Optimization on PAR Database 
    TANG Qin;XUE Jinyun
    2013, 1(11):  58-60.  doi:
    Asbtract ( 170 )  
    Related Articles | Metrics
    Abstract: As the amount of data increases rapidly, the query efficiency of database decreases, and the system responds slowly. The design method on the PAR platform is proposed and achieved based on relational algebra query optimization rules. This design not only improves the efficiency of database queries, but also provides a basis for the formal development of highly reliable database.
    Feature Extraction for Indoor Fourrotor UAV
    KANG Yuhang;ZHOU Shaolei;LI Ruitao;QI Yahui
    2013, 1(11):  61-64.  doi:
    Asbtract ( 227 )  
    Related Articles | Metrics
    Abstract: When fourrotor UAV is locating and mapping simultaneously in indoor environment, it needs to extract environment feature. To response to the problem, this paper puts forward a new method by modifying the rules of feature extraction. The method has the merits of traditional methods, fast calculation speed and high precision. The fourrotor UAV which is designed by the laboratory independently is used to carry out experiment, the raw data which are collected by laser scanner is used to segmentationclustering and line fitting, then get the feature which is needed to help fourrotor UAV locate and navigate. Results show that the algorithm can accurately and effectively provide feature to UAV for locating and map building.
    Ship Lock Arrangement in Yangtze Gorges Based on Simulated Annealing Algorithm
    LIU Ruijie;QIN Fang;ZHAI Yue;WANG Lijuan
    2013, 1(11):  65-67.  doi:
    Asbtract ( 187 )  
    Related Articles | Metrics
    Abstract: In order to improve the navigation capacity of the Yangtze gorges ship lock, based on analyzing the navigation capacity of the ship lock and its main influencing factors, this paper proposes a simulated annealing algorithm to improve the ship lock navigation capacity, meantime designs and implements the corresponding algorithm. Computational results show that the proposed algorithm for improving the ship lock navigation capacity is effective, and it offers technical support for improving the navigation capacity of the Yangtze gorges ship lock.
    Cloud Computing Scheduling Algorithm in Meteorological Environment
    WANG Junsong;HAO Yongsheng
    2013, 1(11):  68-73.  doi:
    Asbtract ( 192 )  
    Related Articles | Metrics
    Abstract: Based on the analysis of the characteristic of meteorological computing, we propose a cloud model for meteorology research and computing. At the same time, a resource schedule methodweather cloud is proposed for the model. In accordance with the time constraints, CPU limit, memory limit, disk space constraints, scheduling algorithm classify the meteorological jobs, computing integrated parameters of resources, corresponding scheduling priority given different jobs. Comparisons are executed to test the performance of our method and other methods. Simulations show that our method not only reduces the waiting time, but also enhance the finished instructions number.
    A Buffer Management Algorithm Based on Flash Memory
    SHANG Xiaowei;LIN Yi
    2013, 1(11):  74-76.  doi:
    Asbtract ( 237 )  
    Related Articles | Metrics
    Abstract: In most operating systems which are diskbased system, buffer management algorithm concerns only data hit ratio. However, write cost of flash memory is much more than read cost. In order to improve the performance of flash, we propose the OCFLRU algorithm which is an optimal of the CFLRU. This algorithm used a mixed pageblock data structure to manage clean pages and dirty page clusters. When buffer had no spare space, clean page was preferred to be evicted and dirty pages cluster was evicted from list at last. In this way, performance is improved by reducing writing and erasing.
    信息安全
    Leakage Resilient Encryption Against Adaptive Chosen Ciphertext Attack
    YU Qihong;LI Kai;LIANG Fenglan
    2013, 1(11):  77-81.  doi:
    Asbtract ( 170 )  
    Related Articles | Metrics
    Abstract: Recently, a lot of attacks leak some important information which should be kept secret absolutely, so the security of many traditional cryptosystems is broken. Since 2009, designing cryptosystems which are resilient to leakage gets more and more attention. On the basis of an identifybased leakage resilient CPA secure encryption, the paper associates with a strong onetime true simulation extractable NIZK, ultimately gains an identifybased leakage resilient CCA secure encryption, which improves the security.
    Improvement on Discrete Logarithm Digital Signature Algorithm
    WEI Min;XIAO Xin;SHEN Yan;ZHOU Keyuan
    2013, 1(11):  82-84.  doi:
    Asbtract ( 219 )  
    Related Articles | Metrics
    Abstract: The discrete logarithm digital signature algorithm is analyzed, and the improvement measure is given, the correctness and unforgeability are proved. The numbers of modular multiplication and modular inverse operations are decreased, and the improvement measure is of less time complexity than existing signature algorithms.
    Intrusion Detection Model Based on Factor Neural Networks  2. School of Electrical Information Engineering, Southwest Petroleum University, Chengdu 610500, China
    WANG Aomin;CAO Xiedong;FAN Yong
    2013, 1(11):  85-87.  doi:
    Asbtract ( 238 )  
    Related Articles | Metrics
    Abstract: Through the analysis of network attack and defense, a model of intrusion detection based on the theory of factor neural networks (FNN) is proposed. The structure and the working process of intrusion detection model are described. Combined with the analogous factor neural networks, the analytic factor neural networks can solve the problem of modeling for complex intrusion behavior. Finally an experimental verification of the model is given, which proves that the model of network intrusion detection with high accuracy can accurately judge the known and unknown intrusion behavior.
    Application of Spring Security Framework in Web Development
    ZHOU Wenhong;YAN Sufen;JIANG Yufang;DENG Zhaohui
    2013, 1(11):  88-90.  doi:
    Asbtract ( 232 )  
    Related Articles | Metrics
    Abstract: This article introduces securing Web application using Spring Security framework. It focuses on how to write configuration snippets in Web problem to secure it. Its working core is HTTP request filter chain. Spring Security supports users, password and roles. It can both secure Web view layer and business layer. It is a good Web securing solution for authentication and authority.
    Methods About Realtime Monitoring and Filtering of  Network Information Based on Modal Matching
    ZHANG Xinlin;PENG Canming
    2013, 1(11):  91-94.  doi:
    Asbtract ( 197 )  
    Related Articles | Metrics
    Abstract: Because good and bad information is mixed on network, it is necessary to monitor and filter sensitive key words in many cases. For the target, a new method based on modal matching is in process of studying. By means of extracting eigenvalue of realtime monitored information, vectorizing it, and then improving the algorithm based on Modal Assurance Criterion (MAC) algorithm, eigenvectors of information monitored are matched with those required to be filtered of source repository, in order to get a matching degree as a judgement of information filtration. In accordance with results of filtration experiments in an analog WAN of a network training room, the method of realtime monitoring and filtering of network information based on modal matching is feasible. The accuracy can be accepted for application, and delay time caused by modal matching is in acceptable range.
    网络与通信
    Software Design of RS485 Serial/Ethernet Converter Based on Doublebuffer Queue 
    MA Lingjuan;LI Changqing;LIU Hui
    2013, 1(11):  95-99.  doi:
    Asbtract ( 222 )  
    Related Articles | Metrics
    Abstract: In order to connect the serial devices that scattered in industrial field to the Ethernet, this article designed an embedded RS485 serial/Ethernet data converter which based on STM32F107VC microprocessor. The embedded TCP/IP protocol stack LwIP is transplanted to the ARM platform, and doublebuffering queue is constructed to ensure the efficiency of serial communication. Serial communication protocol and Ethernet TCP/IP protocol are mapped to each other by software programming, so that the data can be converted between serial port and Ethernet. The experiments show that the serial/Ethernet data converter can work normally, data conversion is stable and reliable.
    Data Acquisition System Based on LabVIEW Passive Receiving Serial Port Communication
    YANG Xudong;XU Haiting;WANG Jun
    2013, 1(11):  100-103.  doi:
    Asbtract ( 280 )  
    Related Articles | Metrics
    Abstract: The characteristics of passive receiving serial communication are the lower machine is always sending data to upper computer, but the upper computer receives data passively in the case of not knowing when the machine sending data. This paper studies the application of passive receiving serial communication based on LabVIEW, and designs two serial collection systems for data acquisition on the basis of the characteristics of passive receiving serial communication. Polling serial ports communication can obtain data by using the loop structure querying buffer continuously. Because of the incomplete received date at times, the system saves all the data received from upper computer to temporary files, and we can obtain data by reading the temporary files. To prevent using the loop structure querying buffers of all the serial ports continuously, which result in the waste of the system resources, triggering serial ports communication can obtain data by communicating with outside through shared variables, and trigger serial ports separately by the change value of shared variables. Only need to set some serial port parameters, the two systems can display, playback and realtime storage the data collected by hardware, and can provide convenience for the future research of the collected data. The actual experiment verifies the system is stability and reliability.
    Checkpoint Protocol Based on Byzantine Fault Tolerance
    ZHOU Wei;CHEN Liu;
    2013, 1(11):  104-107.  doi:
    Asbtract ( 256 )  
    Related Articles | Metrics
    bstract: Based on the features of Web services, a Checkpoint protocol in Byzantine fault tolerance is proposed. The Checkpoint protocol creates check point in the replicas periodically and stores the stable states which most replicas accept. The check points can provide historical data when replicas transfer their states and recover. In contrast with other Checkpoint protocols, the most improvement is that the protocol enables the replicas change their states, which is important for Web services. The experimental results show the effective of the algorithm.
    Candidates Voluntary Reporting System Based on Java Mobile Phone
    CHEN Suqing;DUAN Weijun
    2013, 1(11):  108-111.  doi:
    Asbtract ( 201 )  
    Related Articles | Metrics
    Abstract: Combined with the existing college entrance examination enrollment management system, a candidate voluntary reporting system based on mobile phone is presented. We use J2ME to implement informational inquiry and the creating, sending and receiving of voluntary reporting short message, utilize GSM modem to realize the short message communication between client and server.
    Reputation Model of P2P Networks Based on Simulation
    YU Xin;JIN Pengfei;SHI Chuan;WU Qi
    2013, 1(11):  112-115.  doi:
    Asbtract ( 154 )  
    Related Articles | Metrics
    Abstract: Reputation mechanism is an important way to promote the usability of P2P networks. As the core part of reputation mechanisms, a lot of different reputation models have been proposed. On the other hand, the ad hoc nature of current reputation model, has made it a difficult task to evaluate and simulate the reputation models under a quantitative way. Our work is based on a comprehensive analysis of current reputation models, and the implementation by using discrete event simulation. The experiment has proved the effectiveness of our work.
    Using PVLAN to Design Campus Network for Informatization Teaching
    LI Huaixin
    2013, 1(11):  116-118.  doi:
    Asbtract ( 206 )  
    Related Articles | Metrics
    Abstract: Many campus network service in the informatization teaching level is not good due to the unrational design of campus network. It is need that campus network not only provides the function to access internet, but also integrates all kinds of information servers quickly and seamlessly. This paper proposes a PVLAN (Private VLAN) technology on the switch to divide campus network based on different functional areas in the campus. Using Community, Isolated VLAN features in PVLAN, the VLAN partition and data flow control are further refined. With the characteristics of Promiscuous port mode, various servers are flexible accessed to provide fast, safe range of information service for teaching, learning, working, training of teachers and students.
    A New Double Radio Wireless Mesh Network
    ZHANG Zhichao;YAN Chuping;YUAN Haitao;ZHANG Junyuan;JI Long;ZHANG Liru
    2013, 1(11):  119-123.  doi:
    Asbtract ( 189 )  
    Related Articles | Metrics
    Abstract: While the multihop access in the original 802.11 network exists a problem of the whole network’s throughput is decreased as the hop added. So a new double radio wireless mesh network implemented in Linux operating system is proposed in this paper. According to the tests, our double radio WMN algorithm successfully solves the problem and dramatically improves the WMN’s scalability.
    A Multimedia Sharing Project of Android Device Based on DLNA Protocol
    GUO Yongxin;LE Jiajin;XIA Xiaoling
    2013, 1(11):  124-127.  doi:
    Asbtract ( 246 )  
    Related Articles | Metrics
    Abstract: For the future scenes of digital home, this paper presents a multimedia sharing software based on Android platform. Designed in the DLNA framework, and combined with the traits of Android, the software integrates the media server, media controller and media render together. Then we present an optimization plan of media server to make the transfer of home network more stable. We can easily share the multimedia resources with this software in home network.
    应用与开发
    Design of CIM Storage Solution in Relational Database
    DONG Zhangzhuo;KONG Yongchao;LUO Ning;ZHAO Yuanpeng
    2013, 1(11):  128-132.  doi:
    Asbtract ( 241 )  
    Related Articles | Metrics
    Abstract: The quality of CIM storage in relational database directly impacts the operating efficiency of power system analysis software. At first, this paper summarizes the characteristics of CIM, and then puts forward a general method about class, object, attribute types and object attributes, and the relationship between the classes to the SQL Server 2005 database mapping, finally takes the main diagram of topology package as example and uses DDL language to achieve the basic relationships in the diagram. The proposed mapping method is simple, intuitive, and easy to realize, using this method to store the CIM object in the power grid analysis platform has accelerated the progress of the platform development.
    Temperature and Humidity Acquisition System Based on Sensor DHT11
    BU Yongbo;LUO Xiaoling;CHEN Yi
    2013, 1(11):  133-135.  doi:
    Asbtract ( 299 )  
    Related Articles | Metrics
    Abstract: A temperature and humidity acquisition system is designed by using CortexM3 as the main controlling chip and DHT11 as the sensor of temperature and humidity, which meets the requirements of low power consumption and costs. TFTLCD is used to display temperature and humidity values. If the collected data is over requirement, a buzzer sends out alarm signal. Experimental results show that the system works stably and reliably with simple circuit.
    ActiveX Technology in Security RFID System 
    WANG Na;YANG Guoqiang
    2013, 1(11):  136-138.  doi:
    Asbtract ( 206 )  
    Related Articles | Metrics
    Abstract: The paper introduces the importance of ActiveX technology which is used in RFID system, then researches the design method of ActiveX controls in detail. The preparation of ActiveX controls in C#, and some key technologies related control to write, release, call in Web are introduced also.
    Video Surveillance System Based on SIP, RTP/RTCP and RTSP 
    CHU Dian;JIANG Chunhua;HAO Zongbo;JIANG Wei
    2013, 1(11):  139-142.  doi:
    Asbtract ( 281 )  
    Related Articles | Metrics
    Abstract: This paper analyzes the streaming media protocols, describes the principle of SIP(Session Initiation Protocol), RTP(Realtime Transport Protocol), RTCP(RTP Control Protocol) and RTSP(RealTime Streaming Protocol) as well as their communication course on network. Furthermore, this paper also analyzes the relationship between RTP/RTCP and RTSP, and designs the streaming media server based on RTP/RTCP and RTSP. The streaming media server is the most important part of this video surveillance system which uses the C/S structure and provides the service of the multimedia data transmission. At last, this paper analyses the design of video surveillance system based on SIP, RTP/RTCP, and RTSP.
    A Public Meteorology Product System
    ZHANG Zhengwen;ZHANG Zhentao
    2013, 1(11):  143-146.  doi:
    Asbtract ( 191 )  
    Related Articles | Metrics
    Abstract: Due to the progress of new media technology, how to make the meteorological product timely, pretty and more informative has become a urgent problem for meteorology service professionals. Most meteorology business system focuses on weather data presentation and analysis at present. By using theory and technology from different fields like GIS, computer graphics, atmospheric science, public meteorology product system is an easy to use platform aimed to improve the efficiency of service professionals. This system is a complete product making platform which means users can make meteorology product without any other tool. This system gives user corresponding function to facilitate each step of the whole productmaking process especially the newsworthy weather event mining and the product graphic quality control.
    Penbased Table Information Collection System for Agriculture
    FU Kang
    2013, 1(11):  147-150.  doi:
    Asbtract ( 151 )  
    Related Articles | Metrics
    Abstract: Although traditional agriculture develops rapidly driven by information technology, the work of agricultural information collection and dissemination is completed by computer professionals. There is still a “digital gap” between farmers and information technology. To solve this problem, this paper designs and implements an agricultural information collection and dissemination system based on PUI(Penbased User Interface). The system uses daily, natural and commonly used paper and pencil interactive and intuitive access to information, so that farmers who lack of computer knowledge can easily use the system and efficiently complete agricultural information collection and dissemination work.
    A Method of Cancer Proteins Network Analysis
    HU Xinyu;ZHU Fei
    2013, 1(11):  151-154.  doi:
    Asbtract ( 192 )  
    Related Articles | Metrics
    Abstract: In recent years, a large number of species to be sequenced genome sequence out, that makes biological research into the postgenomic era, by a single largescale genetic research into proteins and functional areas of research. Protein to protein interactions as the basic content has become a research foundation and focus. We propose a role in cancer protein network analysis methods. This project is to develop a system that can extract text from a biological protein associated information, and clustering for protein function and proteinprotein interaction network constructed to predict cancer.
    Building Embedded Linux System Based on S3C6410 Processor
    SUN Lianwen;ZHU Zhengli;MA Yanting
    2013, 1(11):  155-157.  doi:
    Asbtract ( 215 )  
    Related Articles | Metrics
    Abstract: The embedded system is an important branch of computer, which has been widely used in many industries and gradually changes these industries. Embedded system construction is an indispensable part of embedded system development. This paper studies based on S3C6410 processor, Linux kernel image file is donwloaded to the specified memory address via TFTP server, and then starts the NFS server root file system to complete the construction of embedded Linux development environment. This configuration of the embedded product development stage is very useful.
    Intelligent Design System of MEMS Inertial Switch 
    WANG Jianing;LU Jing;YAO Zhiyong;WANG Jiong
    2013, 1(11):  158-162.  doi:
    Asbtract ( 194 )  
    Related Articles | Metrics
    Abstract: In the view of the knowledge and experience on MEMS inertial switch expanding and improving nowadays, but there is no design system which can use previous knowledge and experience efficiently. By introducing knowledge engineering into design of MEMS inertial switch, We develop a design system containing knowledge base, case base, comprehensive database, reasoning mechanism and virtual test, a kind of MEMS inertial switch intelligent design system development plan is put forward. Test of the system shows that using intelligent design system based on case and knowledge can reuse them effectively.
    Exploration and Prospect of Cloud Computing on Application and  Practical Based on Cloud Computing Theory System
    ZUO Baohe;LUO Xuan
    2013, 1(11):  163-166.  doi:
    Asbtract ( 183 )  
    Related Articles | Metrics
    Abstract: This paper attempts to make a systematic and comprehensive analysis and outlook on cloud computing theory and technology, provides a relatively perfect system of cloud computing concept and framework. At the same time, the paper introduces the practical application of Google and Amazon on cloud computing briefly and the problem of cloud security, and makes this emerging technology popular and opens up new fields of application. The socalled cloud computing is a new business model, which is a core technology of the Internet on which providing new services, or rather a difference from the present computing model, it becomes a new computing model. Its core idea is a management of the large number of computational resources which network connection is unified, forming a set of resources to serve the users. The emergence of cloud computing can be said as another computational science revolution.
    A Web Application Based on Spring MVC Framework
    SHU Lilian
    2013, 1(11):  167-168.  doi:
    Asbtract ( 219 )  
    Related Articles | Metrics
    Abstract: This article introduces the method of developing Web application using Spring MVC framework. Controller is the core of MVC pattern. We focus on configuration method of front controller DispatcherServlet, including how to dispatch front controller to other controllers, how to binding parameters in user interface to models, how to access model data, how to output to view pages.
    PAR Method and PAR Platform Used in Development Process of Software Outsourcing
    WU Gang;XUE Jinyun
    2013, 1(11):  169-173.  doi:
    Asbtract ( 212 )  
    Related Articles | Metrics
    Abstract: Poor reliability and low efficiency are existed in the software service outsourcing industry. The PAR(Partition and Recur) method and the highly reliable platform for software development called PAR platform used in software development can improve the efficiency of development and the reliability of software. This paper carries out the feasibility analysis about applying PAR method and PAR platform to software outsourcing. A software service outsourcing case was implemented successfully in PAR platform, which brings the significant effect in efficiency and reliability of software development.
    Realization of BIOS Rootkit Technology
    MI Qi;;ZONG Junjun;XU Chao
    2013, 1(11):  174-176.  doi:
    Asbtract ( 183 )  
    Related Articles | Metrics
    Abstract: Nowadays, BIOS chips being brushed into BIOS Rootkit maliciously is increasingly likely. In this paper, the basic concepts, building blocks and the hazardous properties of the BIOS Rootkit are expounded and the realization of BIOS Rootkit technology is described in detail, at the same time, establishing appropriate safety standards as soon as possible is recommended to avoid or minimize the BIOS Rootkit attack.
    Design of Space Plant Cultivation Device Monitoring System
    WANG Jing;LI Detian;WANG Changsheng;GAO Bo;ZHOU Ying
    2013, 1(11):  177-181.  doi:
    Asbtract ( 181 )  
    Related Articles | Metrics
    Abstract: We developed a control system of the space plant culture device. According to the plants in different growth stages, the parameters of space culture devices can be adjusted automatically by PC software. The semiconductor heating element is used to control plant cultivation temperature, humidity carbon dioxide, and ethene in plant growth chamber, and adequate water and nutrients are provided, appropriate light intensity and duration are offered, image information can be acquired. System test shows that the control system has good performance, the control precision meets the requirements of plants. Parameters fluctuation of temperature, humidity, ethylene and CO2 is within the range of plant growth needs.
    Application of Soft Set in Mobile Combo Recommendation
    SONG Jingwen
    2013, 1(11):  182-183.  doi:
    Asbtract ( 153 )  
    Related Articles | Metrics
    Abstract: Each mobile phone user will suffer from information overload while there are too many mobile combos (mobile packages) to choose. This paper mainly discusses how to use soft set for recommendations, offers the model and the algorithm based on the basic theory of soft set, and finally summarizes the advantages and disadvantages of these methods.
    An Administration System Based on General Underlying Data Access Layer and Portal Integration
    ZHAO Zhuojun;LU Lianggang;WEI Zhijun;ZHANG Xiaoyan;WU Jinglan;GUO Yinghong
    2013, 1(11):  184-187.  doi:
    Asbtract ( 199 )  
    Related Articles | Metrics
    Abstract: The article states the design and development of an automation platform based on a general underlying layer and portal integration. The underlying layer undertakes all data access for the whole system. Based on this, it establishes 3 office subsystems for the professional school: the administrative office subsystem, the student affair subsystem and the education assessment subsystem. It adopts the principle of “Enterprise Portal”(EP) to integrate 3 subsystems seamlessly, i.e. once a user signed on the system, he could access all functions which have been granted to him, and no need multiple signon.
    SSO Technology in SAPERP System
    ZHANG Zheng
    2013, 1(11):  188-191.  doi:
    Asbtract ( 215 )  
    Related Articles | Metrics
    Abstract: The SSO technology can do that, the users just offer the authentication for only once, and they can use another system directly, it is not necessary to log on again. In this article, the SSO is achieved by using authentication for Windows domain servers in SAP &ERP Portal system.
    Electric Vehicle Monitoring Terminal Based on CAN Bus 
    GONG Wen;ZHANG Hui;CHEN Chao
    2013, 1(11):  192-195.  doi:
    Asbtract ( 233 )  
    Related Articles | Metrics
    Abstract: With the wide application of the Controller Area Network (CAN) bus technology in automotive sector, this paper designs an electric vehicle monitoring terminal which is based on CAN bus, and detailedly describes the hardware platform building and the software implementation also. The real vehicle test results show that the terminal is of a good performance of monitoring vehicle running status.
    General Form Dynamic Generation Technology Based on Metadata
    ZHANG Guiping
    2013, 1(11):  196-198.  doi:
    Asbtract ( 166 )  
    Related Articles | Metrics
    Abstract: In the field of information system, the technology using automatic metadata to generate general form, not only can improve the software development efficiency, reduce the error rate of running software, the software reuse ratio is increased also. By researching of Delphi integrated development environment, based on the database environment, does not rely on the DATASET control, the data in the database is temporarily stored in the DATASET, and then through a unified interface to heterogeneous database table of contents according to certain rules of display data display and maintenance in dynamically generated form.
    Hospital Fixed Assets Management System Based on Time Stamp Data Synchronization
    FANG Weiqing
    2013, 1(11):  199-202.  doi:
    Asbtract ( 239 )  
    Related Articles | Metrics
    Abstract: Based on the platform of Windows mobile system, this paper applies Web Service for system integration, and uses time stamp data synchronization to design and develop the mobile terminal system of the hospital fixed assets management system. The functions of fixed assets inventory and data synchronization in mobile terminal equipment are realized. This terminal system is used in No.2 Hospital of Changshu and shows good effect.
    Subway Terminal Equipment Monitoring System
    ZHANG Yongbin;XU Junshan
    2013, 1(11):  203-206.  doi:
    Asbtract ( 154 )  
    Related Articles | Metrics
    Abstract: The recent development of automatic fare collection(AFC) system and its structure are introduced. The status and role of the system in the AFC are explained. Started from the needs of system, modular division, implementation of communication, and data processing, combined with software interface design and coding, a realtime monitoring system is designed.
    Design of Artificial Intelligence Conversation System Based on  Microblogging Content and Text Segmentation
    SHI Xunzhi;SUN Ningyuan;LI Chenggang
    2013, 1(11):  207-209.  doi:
    Asbtract ( 241 )  
    Related Articles | Metrics
    Abstract: SimSimi is now a popular artificial intelligence conversation robot. However, there are some problems with it, for example, it requires the training of users and it is unable to meet all the conversation needs. A new model based on text segmentation and microblogging content is able to solve those problems of SimSimi, and is of a theoretically better performance.
    Facial Age Recognition by Fusing Errorcorrecting Output Coding 
    YU Mianshui;ZHU Anqing;XIE Xiaomeng
    2013, 1(11):  210-213.  doi:
    Asbtract ( 169 )  
    Related Articles | Metrics
    Abstract: Face imagebased age classification is an approach to classify face images into one of several predefined agegroups, it is a multiclass problem. For solving the multiclass problem, a SVM extension is proposed which combines the method of errorcorrecting output codes (ECOC) with binary SVM classifier. Gabor aging features are extracted to represent the face images, and the two principal components (2DPCA) are used to reduce the dimension of the extracted features. Experimental results on FGNET database are reported to demonstrate its effectiveness and robustness. The results obtained using the fused Gabor and 2DPCA features are better than the one when using 2DPCA alone.
    Design and Implementation of Control System of Upper  and Lower Limb Rehabilitative Training Device
    GU Qifang
    2013, 1(11):  214-218.  doi:
    Asbtract ( 133 )  
    Related Articles | Metrics
    Abstract: Onset of rehabilitation training on hemiplegia and limb treatment and rehabilitation of the disabled patients have obvious effect, so the onset of rehabilitation training device research and development is particularly important and urgent. Rehabilitation training device for the realization of the function of the patients is mainly controlled by the system, the control system is the core of the rehabilitation training device. This article elaborates the design of control system for the construction of the control system, manmachine interface design, patient safety training control, etc, and lays the foundation for rehabilitation training overall design.
    Monitoring Technology of Computer in Cluster
    WU Yifeng;GUI Qiang;LUO Mingyu;CAI Wenju;XU Ming
    2013, 1(11):  218-222.  doi:
    Asbtract ( 249 )  
    Related Articles | Metrics
    Abstract: Since clusters have been widely applied, such as in the area of large data processing and command controlling system, it is important to maintain the stable of the clusters. Monitoring technology of the computers in cluster is researched to solve problems of cluster management. The requirements of the cluster monitoring system are summarized. Monitoring technologies and the characteristics of software including Cacti, Parmon, Nagios, Zenoss, and Ganglia are analyzed. The comparison tests show that each of monitoring software has different features. The tendency of monitoring technology of computer in cluster is discussed.