Loading...

Table of Content

    26 October 2013, Volume 218 Issue 10
    算法设计与分析
    Apriori-based Web Traversal Pattern Mining Algorithm
    LIU Mei-ling;SU Yi-juan;
    2013, 218(10):  1-5.  doi:10.3969/j.issn.1006-2475.2013.10.001
    Asbtract ( 272 )  
    Related Articles | Metrics
    The Apriori algorithm and the directed graph representation method for Web traversal paths are briefly introduced, and an algorithm based on Apriori is proposed for generating frequent traversal patterns from Web log files. The proposed algorithm uses the orderliness of the traversal paths as pruning strategy of candidate set, thus it can decrease the scale of candidate sets and improve efficiency. Some experiments are conducted with real datasets and simulated datasets, and the experimental results show the effectiveness and good adaptability of the proposed algorithm.
    Intelligent Algorithm of Assembling Test Paper Based on Chaos Optimization Search
    OU Wei;YI Zhao-hui;JIAO Li-ping
    2013, 218(10):  6-9.  doi:10.3969/j.issn.1006-2475.2013.10.002
    Asbtract ( 517 )  
    Related Articles | Metrics
    The intelligence algorithm of auto-generating test paper is the key technology of network examination system. Based on analyzing the quality index and the mathematical model, this paper proposes an intelligent algorithm of assembling test paper based on chaos optimization search. An encoding question bank is constructed to minimize the exchanging times of computation, whereas a segmental-composing encoding method based on question types is introduced to satisfy the constraints of test paper and improve the coding efficiency, then a multi-sequence chaotic search method based on mutation operation is introduced to ensure optimal search of ergodicity and randomness. Finally, the computing performance, the coverage of the paper and the matching degree with expected values are demonstrated by computer simulations.
    Rule Synthesis Algorithm of Multiple Data Sources Based on New Weight
    LIN Yong-tai;XU Zhi-hu;YE Kai-zhou;XIE Yuan-yuan;ZHANG Shi-wei
    2013, 218(10):  10-12.  doi:10.3969/j.issn.1006-2475.2013.10.003
    Asbtract ( 280 )  
    Related Articles | Metrics
    The data store exits in multiple data sources generally, and it is a hot topic of association-rules synthesis from multiple data sources in the field of data mining. This paper in-depthly analyses the existed methods, and proposes a new synthesis algorithm considering the database size and the number of rules, which can be used to measure the weight of the data source more precisely. The experimental results show the effectiveness of this method.
    View Change Algorithm in Byzantine Fault Tolerance
    CHEN Liu;ZHOU Wei
    2013, 218(10):  13-15.  doi:10.3969/j.issn.1006-2475.2013.10.004
    Asbtract ( 289 )  
    Related Articles | Metrics
    In view of the fact that the View Change algorithm in the existing Byzantine fault tolerance researches can be attacked, a new view change algorithm is proposed. This paper introduces the method of Suspect-Very before the backup replicas prepare to start the process of view change when the backup replicas don’t receive requests from the primary replica. The method ensures the fact that the view change process will be started only in the case of the primary replicable faulty, which ensures that the system will effectively resist attack. The experimental results show the effective of the algorithm.
    Random Producing Test Paper Algorithm with Multi-parameters Constraint Based on Data Dictionary
    HAN Ai-qing;XUE Lei;SHEN Jun-hui;GUO Feng-ying;TANG Yan
    2013, 218(10):  16-18.  doi:10.3969/j.issn.10062475.2013.10.005
    Asbtract ( 304 )  
    Related Articles | Metrics
    This paper researches on random producing test paper in Excel environment, which is constrained by parameters, such as question type, question numbers and difficulty levels. Key problems are expounded, random producing test paper algorithm with multi-parameters constraint, which is based on data dictionary, is designed. The algorithm is realized by Excel VBA and data dictionary technique. Finally, main program is introduced.
    图像处理
    Color Image Blind Watermarking Algorithm Based on Neural Network
    GE Fan-fan;LI Xing-min
    2013, 218(10):  19-21,2.  doi:10.3969/j.issn.1006-2475.2013.10.006
    Asbtract ( 233 )  
    Related Articles | Metrics
    This paper proposes a color image blind watermarking algorithm based on Chebyshev neural network. First of all, the algorithm divides the color image into blocks; secondly, it selects the appropriate training samples to train the neural network, and sets up the network model to extract the watermarks; finally, uses the algorithm based on neural network to embed and extract the watermark in the color image. The experiments’ results show that this watermarking algorithm has better robustness and invisibility. Meanwhile this paper also proposes a new watermarking similarity standard with the nature of Clifford vector dot product and cross product, the experiments show that the evaluation standard can detect the similarity of the original watermark and the similarity of watermark.
    Smooth Connection of q-Bezier Curve/Surface
    HAO Ling;YANG Jun
    2013, 218(10):  22-26.  doi:10.3969/j.issn.1006-2475.2013.10.007
    Asbtract ( 270 )  
    Related Articles | Metrics
    By constructing a matrix transformation operator, the q-Bezier curves/surfaces are transformed into Bezier curves/surfaces. Then, by means of the smooth connection conditions on Bezier curves/surfaces, the geometric continuity conditions on q-Bezier curves/surfaces are given.
    Background Segmentation of Image Based on Gaussian Fuzzy Logic
    CHEN Peng
    2013, 218(10):  27-29,3.  doi:10.3969/j.issn.1006-2475.2013.10.008
    Asbtract ( 295 )  
    Related Articles | Metrics
    The background segmentation of image is a critical step in image processing. It has very important practical significance. Getting background effectively and efficiently through background segmentation method is one of the current research focuses. An algorithm for background segmentation image based on Gaussian fuzzy logic is introduced. The algorithm fully takes into account the complexity of the real-time processing, the validity of the balance results of processing to ensure the effectiveness and efficiency of the system. Finally, simulation test on road traffic video surveillance images is carried on. The experiments show that the proposed algorithm can segmentation background images from surveillance video images. It helps to make the road traffic video surveillance system to effectively get rid of restricts from the environment and noise, as well as other external interference.
    Multi-face Detection Method Based on Skin-color Model and Gaussian Distribution
    LIU Zai-ying;YANG Ping;ZHANG Li-xiao
    2013, 218(10):  30-34.  doi:10.3969/j.issn.1006-2475.2013.10.009
    Asbtract ( 283 )  
    Related Articles | Metrics
    Focusing on multi-face detection problems of color image with complicated background and so on, this paper proposes an improved multi-face detection method based on skin-color model and Gaussian distribution. Skin regions are acquired using skin-color model in the first stage. In the second stage, facial features are utilized to obtain face candidates. Finally, two Gaussian curves are acquired by projecting the edge-detection-image to X-axes and Y-axes respectively, and an accurate face region is found through the solution of Gaussian equation. Simulation shows that the robust method proposed in the paper can improve the multi-face detection accuracy and the detection speed.
    Mesh Generation Algorithm of Composite Materials Based on Digital Image
    ZHANG Lan;XU Lei;ZHANG Yang
    2013, 218(10):  35-37.  doi:10.3969/j.issn.1006-2475.2013.10.010
    Asbtract ( 263 )  
    Related Articles | Metrics
    This paper studies the SEM (Scanning Electronic Microscope)images of composite materials on the basis of edge detection, then adopts the software of vector quantization to structure geometric model, and uses the finite element software ANSYS for mesh generation, proposes a finite element mesh generation based on digital image. In this algorithm, by improving the Kmeans method detect edges in the image. Numerical experiments show the effectiveness of the algorithm.
    Improved ASM Facial Features Localization Method and Its Application
    XU Fei;LI Yu-jian
    2013, 218(10):  38-41.  doi:10.3969/j.issn.1006-2475.2013.10.011
    Asbtract ( 277 )  
    Related Articles | Metrics
    Face Detection plays a very important role in many applications, and precise localization of facial feature points is one of the important steps in face recognition. A improved method is proposed by expanding from single partial template to multi-template, and setting the local template according to human eyes and mouth. In the matching process, the corresponding template is selected to search for the matching template combined with the global template to locate the feature points. Experimental results show that the improved multi-template ASM algorithm has been greatly improved than the standard ASM algorithm, and the effect is significant and can be well applied in face recognition algorithm.
    控制技术
    Modeling and Practice of FY-2 Satellite Tracking
    LI Qing-shuo;WANG Zhi-gang;YUE Jiang-shui
    2013, 218(10):  42-45.  doi:10.3969/j.issn.1006-2475.2013.10.012
    Asbtract ( 303 )  
    Related Articles | Metrics
    It is necessary to calculate the antenna azimuth, elevator and polarization angle of Beijing meteorological satellite ground station after FY-2 satellite positioning in space. This paper describes a calculation principle of tracking angle between the satellite and the ground station. An antenna tracking model is built by analyzing the motion rule of satellite movement. Using spiral scanning track successfully captured FY-2 new satellite in engineering practice.
    Human-computer Interaction Demonstration System Based on Kinect
    BAO Feng;LU Jia-qi;LI Chu-qin
    2013, 218(10):  46-50.  doi:10.3969/j.issn.1006-2475.2013.10.013
    Asbtract ( 314 )  
    Related Articles | Metrics
    Aimed at the human-computer interaion problems such as turning page, annotation when using the existing projection system for presentation, a new hardware-independent interaction system is proposed based on the PowerPoint (PPT). The system uses the Microsoft Kinect to be Sensor. Two main functions, turning page by waving hand and virtual handwriting, are achieved by recognizing body language and tracing certain parts of the body. The applying of statistic method and filter enhances the user experience. And the test result to the system Shows a good effect, which can replace the existing interaction way in most cases.
    Microorganism Fermentation Platform Based on Flash
    GAO Yun-li;LIU Xian-mei
    2013, 218(10):  51-54.  doi:10.3969/j.issn.1006-2475.2013.10.014
    Asbtract ( 317 )  
    Related Articles | Metrics
    In view of the status of the student of biology microorganism profession lack in production practices, a platform for microorganism fermentation professionals’ production practices is designed and implemented by using the 3DSMax modeling techniques, Flash and ActionScript 3.0. The paper builds models of fermentation tank, valves and pipelines, which are in cascade. Then, simulates the basic manipulation knowledge test, the demo mode and the exercises mode in Flash. After that, implements the design of choice question, sorted question, keyboard control and hit-testing by using ActionScript 3.0. The platform is of characteristics, such as high-degree of simulation, human-computer interaction, and portability.
    A Constraint-based Analysis Method to Simplify Control Flow Graph
    LI Jin-nuo
    2013, 218(10):  55-61.  doi:10.3969/j.issn.1006-2475.2013.10.015
    Asbtract ( 274 )  
    Related Articles | Metrics
    A lot of static code analysis methods take control flow graph as basis. This paper uses a constraintbased analysis techniques, including constraintbased 0-CFA, adding data flow analysis method to construct the set of constraints, using fixed-point algorithm to find the smallest solution of the set of constraints, and generates a control flow graph, reduction unreachable branch, generates less redundant control flow graph. The control flow graph, generated in this article as the basis of the static code analysis methods to improve the efficiency of static code analysis, can reduce the rate of false positives.
    Design of Microwave Signal Centralized Control Based on Aeronautical ATE
    JIANG Mao-ren;WU Bo;CHEN Qiong
    2013, 218(10):  62-64.  doi:10.3969/j.issn.1006-2475.2013.10.016
    Asbtract ( 247 )  
    Related Articles | Metrics
    In ATE, electronic equipment has characteristic of high frequency, bandwidth and radiation signal. This paper takes the RF and microwave signal transmission and control to connect the device under test via an attached device, to eliminate path switch links and reduce signal radiation, mutual interference and fading. Practice has proved that the device structure is tight, the usage is stable, and the service life is long. It is a better way to solve the electromagnetic compatibility among instruments.
    计算机仿真
    Smoothing Method of Point Cloudy Data for Double Line Laser Profile Measuring
    ZHANG Guo-min;YAO Jian-min;ZHENG Jian-yong
    2013, 218(10):  65-68.  doi:10.3969/j.issn.1006-2475.2013.10.017
    Asbtract ( 278 )  
    Related Articles | Metrics
    Double line laser 3D scanning system is easy to cause the rough outlines in the point cloud data fusing. This paper proposes a smooth surface based on transverse fitting of discrete points. The average algorithm is applied to smooth the two section points on the curve fitting and followed by selecting two points per-frame on the interval of laser stripe further. It leads the entire laser stripes trim by moving these two points. According to the proposed method of discrete points to reconstruct the 3D model, the experimental results show that the surface smoothness is improved and the reconstruction surface shape model is more close to real surface shape.
    Simulation of Office Network Routing Under Packet Tracer Environment
    WANG Yan;ZHU Lin;HONG Jun;ZHANG Wen-chao
    2013, 218(10):  69-73.  doi:10.3969/j.issn.1006-2475.2013.10.018
    Asbtract ( 263 )  
    Related Articles | Metrics
    Combining office network topology struecture, using Packet Tracer software, this paper builds a simulation environment, studies the introduction of dynamic routing protocols configured instance of the office network, tests on network connectivity in the environment where dynamic routing and network reliability under fault conditions. It provides a reference for the construction of office network.
    Application of Digital Simulation of Shipborne TT & C SystemBased on HLA/RTI and LabWindows/CVI
    WEI Jiang-tao;CHEN Fang-tao
    2013, 218(10):  74-78.  doi:10.3969/j.issn.1006-2475.2013.10.019
    Asbtract ( 229 )  
    Related Articles | Metrics
    Based on the thought of HLA /RTI, a distributed digital simulation of Ship-borne TT&C system is built. The device of the control the system is virtualized within LabWinows/CVI environment. The method of how to combine LabWinows/CVI and HLA simulation system is illustrated by an example. The result shows that this platform can realize the function of digital simulation effectively and reduce the wear and tear of the device.
    Simulation Algorithm of Semi-transparent Color Match for Establishing Database
    HONG Tie;ZHAO Long;WU Peng
    2013, 218(10):  79-82.  doi:10.3969/j.issn.1006-2475.2013.10.020
    Asbtract ( 276 )  
    Related Articles | Metrics
    The K-M theory points that there is a linear relationship between the K/S values and the dye concentration. In practice this linear relationship is not obvious, so most of the software is logarithmic curve fitting way to establish a database. In semi-transparent situation of dye, the linear relationship of K/S is worse, the above mentioned method has failed to meet color accuracy requirements. In this paper, we collected multiple semi-transparent samples and removed invalid points, then did cubic spline interpolation for the remaining valid points, and corrected reflectivity in low concentration points to make it more consistent with the linear relationship hypothesis of K-M theory. Experimental results show that the above-described method can significantly improve the accuracy of color match.
    Flight Training Simulation System Based on HLA
    ZHOU Lie-qiang;YAO Shi-jun;YAO Yun-peng
    2013, 218(10):  83-86,9.  doi:10.3969/j.issn.1006-2475.2013.10.021
    Asbtract ( 250 )  
    Related Articles | Metrics
    In order to rapidly use the flight training simulator and work out the problems in flight teaching, we design a federation named flight training simulation system based on high level architecture (HLA) and PC, elaborate on functions for federates and design flight command data model (FCDM) to make a standard for representing flight command. We also simply introduce the development process of flight simulation object model (FSOM) and flight federation object model (FFOM). By using the tools such as Creator, Vega and VS2003, we implement the simulation system and present the visual simulation rendering in cockpit. The system now is used by army for flight training.
    数据库
    SET Model of Distributed Massive Database
    WANG Fang
    2013, 218(10):  87-90.  doi:10.3969/j.issn.1006-2475.2013.10.022
    Asbtract ( 672 )  
    Related Articles | Metrics
    Distributed database is addressed currently effective solution for mass data storage. Data can be shared on distributed database, and site on the local storage can maintain a certain degree of control. However, with the development of modern storage needs, more and more automation requirements, such as physical location of the deployment (domestic and foreign), the capacity to control and expansion, traditional distributed ideas encountered significant bottleneck. This paper presents the SET Model Database, it solves the important problem of multi-datacenter deployment, just as the scheduling and coordination of the whole network, the storage capacity of standardized management.
    Application of Data Granularity in Warehouse for E-commerce Website
    QI Li-na
    2013, 218(10):  91-93.  doi:10.3969/j.issn.1006-2475.2013.10.023
    Asbtract ( 270 )  
    Related Articles | Metrics
    Data granularity decides the amount of data in data warehouse and the ability to answer queries. Multiple-granularity can not only satisfy the requirements of the amount of data to a certain extent, but also meet the requirements of the ability to answer queries. So in the design of data warehouse, multiple-granularity becomes the preferred. When the data warehouse using multiple-granularity, we will face with how to manage data-granularity problem. This paper firstly studies granularity level and multiple-granularity, puts forward granularity table in order to manage data granularity, expounds the definition process of granularity table, analyzes the advantages of granularity table; and puts forward the process of data warehouse multi-dimensional model based on granularity table.
    Application of Redis in Video Recommendation Service System
    CAO Dan-dan;LE Jia-jin;XIA Xiao-ling
    2013, 218(10):  94-97.  doi:10.3969/j.issn.1006-2475.2013.10.024
    Asbtract ( 336 )  
    Related Articles | Metrics
    Video recommendation system is proposed for solving the problem of how to recommend video information that associated with users to the user accurately in the era of information overload. So the system require real-time and concurrent. Redis as one of NoSQL database products based on the memory Key-value engine showes certain advantages relative to traditional relational database. To improve efficiency, Redis puts the data storing in memory temporarily, or using virtual memory for data persistence. Therefore, the paper proposes the application of Redis in the video recommendation system, using the advantage of Redis to achieve a high efficiency of recommendation.
    Design and Implementation of Web-based Quality Information Management System
    JIN Xiao-ye;WEI Gang;HUANG Rong-jie;ZHU Hua
    2013, 218(10):  98-101,.  doi:10.3969/j.issn.1006-2475.2013.10.025
    Asbtract ( 290 )  
    Related Articles | Metrics
    From the actual needs of enterprise informatization, in order to process decentralized quality information into effective quality information, this paper builds a quality management system based on the needs of enterprises to support enterprise information platform construction. The system designs and develops of a quality management system based on B/S structure, using ASP.NET technology, and combining with the Entity Framework and LINQ to Entity data access technologies. Based on using the traditional layered architecture model, the system increases the entity model framework layer, using database access technology to achieve the separation of business logic layer and data access layer, which greatly improves the efficiency of the system development. The system has been developed and deployed successfully, currently it runs well.
    Influence of Two Kinds of Self-organization Function for Assessment of Information Security Asset Value
    YANG Long-ping;XU Yi-lu
    2013, 218(10):  102-105.  doi:10.3969/j.issn.1006-2475.2013.10.026
    Asbtract ( 243 )  
    Related Articles | Metrics
    In the process of information security risk assessment, the value of assets is decided by the three security attributes: asset confidentiality, integrity and availability. So we must consider these three factors when we assign the value to assets. The value of the assets is a function of the three factors, and the specific function relation can be made decisions by the assessor. This paper discusses the impact of two kinds of commonly used function relationship of information security assets value.
    Trojan Detection Model of Nonlinear SVM Based on Feature Selection Optimization Algorithm
    HUANG Li-mei;WU Li-juan;XIAN Yue-ping
    2013, 218(10):  106-109,.  doi:10.3969/j.issn.1006-2475.2013.10.027
    Asbtract ( 276 )  
    Related Articles | Metrics
    There are two major issues in the current Trojan detection system: unable to detect unknown Trojans and low detection rate. To solve these problems, a Trojan horse detection model based on nonlinear SVM by using an effective feature selection optimization algorithm is presented. This approach extracts the API calls sequence of each executable program as feature vector, and by choosing the parts of high degree of differentiation in the feature selection optimization algorithm, quantizes it into identifiable data, and builds SVM feature vector library. SVM classifier is trained with the training dataset to find the optimal classification hyperplane. Experiment results demonstrate that this method is effective and steady in detection capability.
    Trusted Network Access and Authentication Technology Based on EAP-TTLS
    ZHANG Li-ru;YAN Chu-ping;ZHAN Bao-rong
    2013, 218(10):  110-113,.  doi:10.3969/j.issn.1006-2475.2013.10.028
    Asbtract ( 302 )  
    Related Articles | Metrics
    To solve the problem of the mutual authentication between client and server in the TNC network access layer and terminal and to carry on the task to measure the integrity of client platform, the structure of EAP-TTLS protocol and IF-T standard requirements of the TNC network access layer are analyzed in-depthly, and the security and reliability of trusted network based on EAP-TTLS is focused on. This paper uses the open-source framework, TNC @ FHH, to implement the trusted network access and authentication based on EAP-TTLS. At last, Wireshark capture tool is used to catch the packet from the authentication process, and the results are analyzed.
    Digital Signature Based on Java Security API
    ZHOU Zhi-peng
    2013, 218(10):  114-116.  doi:10.3969/j.issn.1006-2475.2013.10.029
    Asbtract ( 312 )  
    Related Articles | Metrics
    The safety of network data is becoming more and more serious. Digital signature of data file can be implemented by using Java security API, and the data file can be safely transferred on network. This paper introduces basic procedure of digital signature. It illustrates about the algorithm of digital signature, describes how to write Java programs to digital signature file in sender, and how to write Java programs to verify the signed file in receiver. At last it discusses the potentially unsafe factors of this method.
    Technologies for Ensuring Massive Data Security of Key Vehicle Supervision Platform
    ZHAO Li-xuan;ZHAN Cheng-zhi;NIE Pei-lin;CHENG Zhi-feng
    2013, 218(10):  117-120.  doi:10.3969/j.issn.1006-2475.2013.10.030
    Asbtract ( 304 )  
    Related Articles | Metrics

    Aiming at the massive data security problems, effective management method is necessary to be established in key vehicle supervision under Internet of things. In order to ensure the information security of key vehicle supervision platform, technologies for ensuring massive data security are studied. First of all, standardization system of supervision platform is established to contribute to security data exchange between heterogeneous networks. Then a vehicle information management mode based on Hadoop distributed parallel technology is proposed to ensure the data can be stored and processed efficiently. Then map-matching algorithm and technology of temporal GIS is applied to check authenticity of service data. In the end, a data support with the characteristics of safe, reliable and real can be supported by the key vehicle supervision platform with the realization of the technologies above.

    Web Portal Secrecy Inspection System
    WANG Mu-xin
    2013, 218(10):  121-124.  doi:10.3969/j.issn.1006-2475.2013.10.031
    Asbtract ( 322 )  
    Related Articles | Metrics
    Aiming at the shortcomings of the current official department website security, based on computer network and information filtering to study Web portal, combined with the Internet and the actual use situation of office business department, this paper builds a monitor information of Web portals. By using information elements model, the system prevents sensitive information leak from website. The system is based on the general development framework and MFC libraries, and the test results verify the effectiveness and high efficiency.
    应用与开发
    Technical Efficiency Evaluating System for Grape Production
    LI Bin-quan;MU Wei-song;ZHENG Xiao-ping
    2013, 218(10):  125-130.  doi:10.3969/j.issn.1006-2475.2013.10.032
    Asbtract ( 251 )  
    Related Articles | Metrics
    Grape is one of the world’s top four fruits and China is the biggest producer, so the disscussion of grape’s technical efficiency and its influencing factors becomes necessary. The purpose of this article is to design an evaluating system to collect the production data of grape and estimate the technical efficiency of grape automatically. Base on the database technology, network technology and technical efficiency theory, the system adopts the B/S architecture and J2EE. Matlab Web Server is used to embed the SFA algorithm into the system. The system solves the problems of vast territory in China and a great deal of production data need to be collected and realizes the automatic calculation of grape’s technical efficiency in remote site.
    Middleware Specialization Development Method to Cyber Physical Systems
    WANG Yi-ran;ZHU Wei-jun;SUN Ting;LIU Song-quan
    2013, 218(10):  131-134.  doi:10.3969/j.issn.1006-2475.2013.10.033
    Asbtract ( 239 )  
    Related Articles | Metrics
    Contemporary computing infrastructure, such as networking stacks, OS and middleware, are made up of layers of software functionality to support the broadest range of applications. The feature richness and the layers of functionality, however, tend to be a source of performance overhead for cyber physical systems. The paper presents an approach to systematically specialize general-purpose middleware based on the principles of feature-oriented software development. It requires deducing an algebraic structure of contemporary middleware based on a higher level of abstraction of features. The paper showcases how origami matrices and generative programming can play a key role in realizing the specializations.
    Matching Scheme of Chinese Voice and Mouth Shape Driven by Text and Reading Voice
    ZENG Hong-xin;HU Dong-bo;HU Zhi-gang
    2013, 218(10):  135-137.  doi:10.3969/j.issn.1006-2475.2013.10.034
    Asbtract ( 298 )  
    Related Articles | Metrics
    This paper constructs a double modal voice and shape matching control model driven by the text and reading voice. With the combination of the double driven mode,the information insufficiency in single driven mode is counteracted and complemented. During the disposal of matching, the accurate mouth viseme is calculated with the spelling of text, and the correct time sequence of mouth viseme is given by read-speech. Therefore, the mouth motion for read-speech can be matched suitably and correctly.
    Comparison of File System in Cloud Storage
    LI Yi-tong
    2013, 218(10):  138-142,.  doi:10.3969/j.issn.1006-2475.2013.10.035
    Asbtract ( 288 )  
    Related Articles | Metrics
    With the extensive application of cloud storage, distributed file system is considered as a key of cloud storage, attracts increasing attention. This paper describes the performance characteristics of 5 kinds of major opensource distributed file system, and I/O performance is improved on HDFS, the system architecture, access methods, storage and other aspects of server distribated file systems are compared in order to select the appropriate distributed file system. Experimental results show, improved HDFS is great improved in high memory usage, and also slightly faster than Lustre in data read.
    Optimization Scheme for Reliability of Many-core System
    YE Ning;YING Ren-dong;ZHU Xin-zhong;LI Chao;LIU Pei-lin
    2013, 218(10):  143-148.  doi:10.3969/j.issn.1006-2475.2013.10.036
    Asbtract ( 261 )  
    Related Articles | Metrics
    Many-core system in spaceship is faced with the threat of space radiation in security and reliability. Thus when we assign missions to processing cores on board, it is necessary to optimize reliability distribution and redundancy apportionment. This paper proposes a near-optimal algorithm to do such work. This algorithm decides the amount of redundant processing cores assigned for each step in flowchart to make sure of the highest reliability and availability of system using limited number of processing cores. Also, based on flowchart, this paper proposes a new method to calculate the reliability sensitivity of cores. At the last of the paper, examples are introduced and the effect of proposed algorithm is evaluated.
    Collaborative Modeling Based on Feature Semantics Description
    LIU Qiong;DENG Ming-zhong;ZHANG Ning
    2013, 218(10):  149-152,.  doi:10.3969/j.issn.1006-2475.2013.10.037
    Asbtract ( 288 )  
    Related Articles | Metrics
    In order to deal with the problem that the large amount of transmission data of a model in the collaborative feature modeling, this paper proposes a new feature-based descriptive semantic-collaborative modeling method. The semantic description of the features for a product’s model that described by XML is analyzed. For ensuring that the modeling do not depend on the created sequence of features and maintaining the consistency of the design results with the design intent, this article also puts forward a model’s constructing method which driven by the features. This drive mode was based on the constraint relationship between the father element feature and son element feature. This approach also helps to improve the efficiency of design. Finally, the local recognition, extraction and network interaction of the feature semantics increment file are studied. By transmitting only incremental semantic that described by XML, the collaborative modeling with low network traffic load can be realized in principle.
    Design of Self-repairing Scheme of Many-core System in Space
    CHEN Ying-xiang;YING Ren-dong;ZHU Xin-zhong;LI Chao;LIU Pei-lin
    2013, 218(10):  153-158.  doi:10.3969/j.issn.1006-2475.2013.10.038
    Asbtract ( 239 )  
    Related Articles | Metrics
    Human-induced restoration is almost impossible when fault occurs in system of some fields, such as in space. Based on NoC structure and fault-tolerance technologies, this paper proposes a design of self-repairing system of many-core structure. The scheme intents to extend system lifetime without human-induced restoration by remapping when permanent fault occurs.
    Application of NAND Flash in Portable Vibration and Temperature Measurer
    LIU Xiao-wan;JIANG Zhi-nong
    2013, 218(10):  159-162,.  doi:10.3969/j.issn.1006-2475.2013.10.039
    Asbtract ( 274 )  
    Related Articles | Metrics
    Storage system is an important part in a portable vibration and temperature measurer, which plays a significant role in machine fault diagnosis. This paper briefly introduces the interface circuit between NAND Flash and F2812 and explains the Flash driver design in detail, which solves the data loss during Flash continuous write operation. Both the Flash storage, write and retrieve data rate meet this measurer’s requirements.
    Operation Evaluation Method Based on Fuzzy Expert System
    QIAO Cheng-cheng;CHU Ji-zheng
    2013, 218(10):  163-166.  doi:10.3969/j.issn.1006-2475.2013.10.040
    Asbtract ( 273 )  
    Related Articles | Metrics
    This paper introduces the structure and implementation of operator evaluation method based on fuzzy expert system. High quality scoring system not only can evaluate operating quality, but also can instruct the lack in operating. The paper summarizes the importance of operation evaluation and the model of operation and scoring, and using fuzzy expert system to establish the scoring rule base and using forward reasoning to approach to reasoning. This scoring system is successfully applied in a boiler simulation training system. It proved that it is a real time, rapid and accurate way to evaluate operators. It can help the teacher to train objectively. The scoring system is of high value in industry process.
    Hierachical Linear Interpolation Approach of ROM Compressionin Direct Digital Frequency Synthesizer
    XIONG Wei
    2013, 218(10):  167-171.  doi:10.3969/j.issn.10062475.2013.10.041
    Asbtract ( 292 )  
    Related Articles | Metrics
    Complex approximate functions are often used in traditional sine amplitude compression approach for ROM compression in direct digital frequency synthesizer to achieve high compression rate. This paper proposes a new hierachical linear interpolation approach for ROM compression and phase-to-sine amplitude conversion of sinusoid output DDS. Experimental results show that the proposed approach can achieve a higher compression rate with equal spectral performances and simpler hardware structure than most of the previous works.
    Visualization of Personal Information Interaction History
    FU Kang
    2013, 218(10):  172-176.  doi:10.3969/j.issn.1006-2475.2013.10.042
    Asbtract ( 324 )  
    Related Articles | Metrics
    Visualizing interaction histories naturally provide clues for people when they interact with artifacts in real world. But in digital domain, especially in personal information environment where people have to interact everyday; there are few interaction histories, which seriously reduces the working efficiency of people. The paper presents a model of interaction history and analyzes the different levels of user interaction. We bring forward the concept of the life cycle of personal information to manage the interaction histories of personal information. Based on the model and characterizes of personal information, we adapt a proper structure to visualize the interaction histories of personal information. Finally we design an instance, VisPA, to visualize all the interaction histories of personal information, which plays an important role in improving the efficiency of searching and managing personal information and to reduce the load of people cognition.
    Experimental Desktop Cloud Based on VMware View
    ZHANG Rong-gao
    2013, 218(10):  177-178,.  doi:10.3969/j.issn.1006-2475.2013.10.043
    Asbtract ( 235 )  
    Related Articles | Metrics
    Aiming at the status and problems of college computer room. This paper analyzes the related technology of desktop virtualization, designs and implements an experimental desktop cloud based on VMware View, and it can improve the efficiency of the management and maintenance of college computer room.
    Design and Implementation of Analysis Testing Laboratory Information Management System
    ZHANG Jun-yong;ZHANG Ming-hong;HUANG Qing-he;ZHOU Ping
    2013, 218(10):  179-183.  doi:10.3969/j.issn.1006-2475.2013.10.044
    Asbtract ( 243 )  
    Related Articles | Metrics
    In order to improve the analysis testing level of laboratory information management, and strengthen quality management, this paper develops a LIMS based on analysis testing laboratory work procedure and requirement for quality management. Experimental and running results of the software is good. The system is of good expansibility, openness, friendly man-machine interface, can meet the requirements for general analysis testing laboratory management.
    Real-time Detection Method of Microblog Hot Topic Based on Keywords
    WEI Meng;YANG Wen-tao
    2013, 218(10):  184-187,.  doi:10.3969/j.issn.1006-2475.2013.10.045
    Asbtract ( 300 )  
    Related Articles | Metrics
    Main research on microblog hotspots detection focus on both the text and topic and the structural analysis of social networks. Due to short and semi-structured characteristics of microblog, the traditional hot topic detection methods isn’t suit such microblog detection. This paper proposes a microblog hot topic detection methods based on keywords, and uses the microblog multielement data to modify the method. Experiments show the effectiveness of the proposes method for microblog data.
    Mathematical Modeling of Campsites Management Problem in Rafting Trip
    ZHANG Meng-fei;YANG Yi-jian;LI Bo-wen
    2013, 218(10):  188-192.  doi:10.3969/j.issn.1006-2475.2013.10.046
    Asbtract ( 320 )  
    Related Articles | Metrics
    In order to solve the problem that how to arrange the campsites in the best way for passengers when they are camping along the river and schedule an optimal mix of trips, including travel time and selecting carrier, this paper addresses to the complex problem with consideration of three key criteria: carrying capacity of the river, utilization of the campsites, and trip satisfaction. From the perspective of both managers and the visitors, it designs two models which are respectively based on decision strategy and reservation strategy to optimize the mix of trips. Two objective functions are built: the maximum “utilization of the campsites” and the maximum “trip satisfaction”. Through constraint analysis and double goal programming, we calculate the optimal solution by the weight factor. Then computer simulations are run based on genetic algorithm, which contributes to the schedules of optimal mix of trips based on the models and have actual reference value for the managers to set up optimum management plans.
    Application of Multi-threading Technology in Subway Ticket Vending Machine Software
    XIA Ye-feng;XU Jun-shan
    2013, 218(10):  193-196,.  doi:10.3969/j.issn.1006-2475.2013.10.047
    Asbtract ( 315 )  
    Related Articles | Metrics
    For the inadequate use of system resources and poor performance in the development of ticket vending machine software system, multithreading technology is proposed. Combing with the software system architecture and running mechanism of multi-threading technology, this paper achieves the device driver layer and communication layer of ticket vending machines software system by C++, and gives some key code. The performance of the whole software system has been greatly improved since this technology is used. Now, the software system has been stably operated in line two Wuhan metro.
    Development of Web Application Based on ASP.NET MVC Framework
    ZHOU Wen-hong
    2013, 218(10):  197-199.  doi:10.3969/j.issn.1006-2475.2013.10.048
    Asbtract ( 316 )  
    Related Articles | Metrics
    This article introduces the development of Web application using ASP.NET MVC framework. Its core is controller classes writing in C#. User requests are dispatched to different business method to process by using controllers, and the result is returned to view classes, then it is displayed in user interface. The page adopts new Rasor grammar mixed with HTML tags, realizing page template. The data is stored in model classes for mapping to database and making data persistence. The whole application has a good hierarchy, and benefit for developing a clear structure of enterprise Web application.
    Approach for Decision of Test Points Based on Heuristic Graph Search
    PANG Wei;LYU Xiao-feng;MA Ling;DENG Li
    2013, 218(10):  200-203.  doi:10.3969/j.issn.1006-2475.2013.10.049
    Asbtract ( 258 )  
    Related Articles | Metrics
    Towards decision of the test points for weapon system, this paper researches the dependency matrix and information entropy theory, and translates the problem to the graph searching, so the decision of test points becomes a graph node expanding progress. In order to pilot the graph rearching, a heuristic evaluation function is defined and the methods of expanding for graph nodes are deduced. An example is uesed to validate this method. The application example shows that the method can improve the efficiency of the test point searching and select the points quickly.
    网络与通信
    Design and Implementation of Web Services Management System Based on ESB
    ZHAO Peng-fei
    2013, 218(10):  204-207.  doi:10.3969/j.issn.1006-2475.2013.10.050
    Asbtract ( 307 )  
    Related Articles | Metrics
    Aiming at the status of the lack for services management in the SOA development process, this paper analyzes the defects of traditional Web services management in the SOA architecture, uses the way of Web services management and Enterprise Service Bus(ESB) combination, so designs and implements a set of Web services management system for SOA, to provide service registration, service management, service application and approval. The system greatly reduces the staff to manage Web services and effectively improves the working efficiency.
    Energy Efficiency of Wireless Sensor Networks Based on Network Calculus
    QIN Ren-wu;CHEN Yi-xin;WANG Gao-cai;YI Xiang-yang
    2013, 218(10):  208-211,.  doi:10.3969/j.issn.1006-2475.2013.10.051
    Asbtract ( 239 )  
    Related Articles | Metrics
    Energy consumption is a hot topic in wireless sensor networks. This paper describes the arrival process and departure process of traffic for wireless sensor networks based on network calculus and constructs energy consumption mode, gives constraint of model and analyzes the effect of SNR in the model. By introducing depart curve and optimal depart curve, the paper obtains the relationship of depart rate and SNR. Based on this, it studies and calculates the optimal energy consumption of the sensor network in a particular state, deduces the optimum energy consumption formula. Optimal energy efficiency condition is verified by the simulation depart rate and distance relationship etc. corresponding conclusions.
    Design and Implementation of Server Cluster Monitor System
    WU Yu
    2013, 218(10):  212-215,.  doi:10.3969/j.issn.1006-2475.2013.10.052
    Asbtract ( 312 )  
    Related Articles | Metrics
    In order to solve requirement of cluster server system management with the development of IT technology, a server cluster monitoring system based on Web is presented. A three-layer structure system including basic information collection, logic analysis, results display is designed and constructed to implement automatic data acquisition, analysis, judgment, alarm function and decision supporting based on massive data.
    Exhibition of Key Index System of University in Campus Portal
    CHEN Rui
    2013, 218(10):  216-221.  doi:10.3969/j.issn.1006-2475.2013.10.053
    Asbtract ( 338 )  
    Related Articles | Metrics
    This paper takes the university where the author studies as the research object. Combining with the advantages and the development requirements of the school, a set of key indicators systems of college and university is developed. Meanwhile, based on the basic platform of school digital campus construction, a displaying system of the key indicators of system is designed and implemented, and information portal of the indicator display system is integrated. After system integration, single sign-on of information portal system and key indicators system of university development are displayed in information portal. It provides a quick, convenient, reliable key indicators query and management services of colleges and universities development for school administrators.
    Design and Implementation of Agriculture Products Tracing System Based on Internet of Things & RFID
    YANG Yun-ping;ZHOU Zhi-peng;LI Mu-hua
    2013, 218(10):  222-225.  doi:10.3969/j.issn.1006-2475.2013.10.054
    Asbtract ( 241 )  
    Related Articles | Metrics
    This article introduces the implementation of constructing of agriculture products tracing system based on Internet of things & RFID technology. It can trace the source of agriculture products and gain safety by recording information of producing, processing, transporting and storage of agriculture products in database. The system, using ASP.NET and several rendering layer technology such as Ajax, jQuery and JSON, improves user experience. It can combine with RFID driver. It adopts layering structure which is convenient for maintain and expand.
    Storage Infrastructure Management and Optimization Scheme in Virtualized Environment
    ZHANG Ying-chun;ZHANG Wei
    2013, 218(10):  226-228.  doi:10.3969/j.issn.1006-2475.2013.10.055
    Asbtract ( 267 )  
    Related Articles | Metrics
    This paper introduces the storage infrastructure management activities and management techniques in virtualized environment, proposes a view that using virtualization technology at all levels of the IT infrastructure makes complex storage infrastructure management tasks become more flexible, relaxed and efficient, compares the different administrative tasks that need to perform under the traditional environment and virtual environments through the actual cases of allocating storage for a new server/host. Finally analyzes the challenges of current storage infrastructure management, and presents an optimized solution.
    Web Information Segmentation Method Based on DOM Structure Tree
    ZHOU Jian;TANG Jin;LUO Bin;
    2013, 218(10):  229-232.  doi:10.3969/j.issn.1006-2475.2013.10.056
    Asbtract ( 277 )  
    Related Articles | Metrics
    Correct extraction and segmentation of Web information is significant to text information mining. The paper proposes and achieves a method which can get informative information from Web page and be able to follow the correct segmentation of the original text. The method first uses page layout tag <table> and <div> to build a DOM structure tree, and then uses the nested relations of the layout label, that the DOM structure tree reflects to choose the content blocks, extract text information correctly, and finally achieves information segment of the body through the manipulation of some special tags. The experimental results prove that this method is easy to realize and high efficiency and it can automatically extract informative message and section accurately.
    Design of Object-oriented Modular Teledata Collection System Requirements
    ZHOU Zhen-kun
    2013, 218(10):  233-238.  doi:10.3969/j.issn.1006-2475.2013.10.057
    Asbtract ( 252 )  
    Related Articles | Metrics
    This paper aims to develop a framework of objectoriented service design to integrate the structured analysis and design technique, unified modeling language and modular logic to help in designing and analyzing requirements of Teledata Collection System. Based on business principle of DCS, a conceptual modular design framework is built integrating the IDEF0/3 method, use case diagram, class diagram, and activity diagram together. The results show that IDEF, UML and modularity used simultaneously as design principles can ensure service requirements design visibility and semantic meaning accurately at three layers (service, process, activity) in the modular service architecture. The proposed framework is directed to show how, at the strategically level, IDEF0, use case diagram and modular logic can be integrated to systematically translate customer requirements into service functional designs and how, at the operational level, the service developer can transform service functional designs to working procedure with IDEF3, class diagram, activity diagram, and modular logic.