Loading...

Table of Content

    16 April 2012, Volume 1 Issue 200
    信息安全
    Parallel and Active Defense Model of Trust Transfer on Windows
    LIN Ji-yan
    2012, 1(200):  1-05.  doi:10. 3969/j. issn. 1006-2475.2012.04.001
    Asbtract ( 419 )  
    Related Articles | Metrics
    In order to increase efficiency of the integrity measurement and prevent some malicious code to continue to run by means of executable redirection when the process is created which can break the integrity of the system, this paper puts forward the parallel and active defense model of trust transfer on Windows using the virtualization technology, white list and Hook technique which can reduce the overhead time of the integrity measurement and prevent the malicious code to run. At the same time, formal verification is given to the presented model which shows the new model can meet the requirement of the trust transfer.
    Information Protection Based on Windows NT Filter Drivers Keyboard
    YE Lei;GE Wan-cheng
    2012, 1(200):  6-03.  doi:10.3969/j.issn.1006-2475.2012.04.002
    Asbtract ( 324 )  
    Related Articles | Metrics
    With the development of E-commerce, the wide application of E-bank and the growing sophistication of RootKit technology, information stealing from these application systems keeps increasing. It becomes much harder to detect malicious software. Based on the theories of E-bank keyboard protection module, a comparatively sound keyboard data entry protection strategy, targeting the detection of currently-popular RookKit, is proposed. By adopting a more safe and reliable keyboard data entry method, this strategy achieves a better result of protecting users’ data entry.
    Study and Defense Against Virus Based on WSH
    ZHAO Fang-ting;YUE Xiao-guang;LIU Zhi-gang
    2012, 1(200):  9-03.  doi:10.3969/j.issn.1006-2475.2012.04.003
    Asbtract ( 387 )  
    Related Articles | Metrics
    At present,Windows Script Host(WSH) language is not fully used in the Small and Medium Program. This thesis adopts WSH language-independent features and rich feature of the object, uses VBScript and JavaScript language to compile a typical example, and detailedly analyizes the WSH-virus program design ideas and theroy of computer virus infection, then proposes some measures to prevent WSH virus program. In practice, this method is effective to prevent a Windows Script Host virus spread probability in the computer networks.
    Research on Information Security Protection Model for Smart Grid Based on Classified Protection
    JIANG Cheng-zhi;ZHANG Tao;YU Yong
    2012, 1(200):  12-05.  doi:10. 3969/j. issn. 1006-2475.2012.04.004
    Asbtract ( 354 )  
    Related Articles | Metrics
    Analyzing the construction status of security classified protection for electric information systems and the security demand of smart grid, this paper proposes an information security protection model for smart grid based on classified protection. According to the characteristics of smart grid, the presented model describes possible information security protections from aspects of physical, terminal, boundary, network, host, application and data security. With the aim of enhancing the information security defense capability of smart grid, the proposed model can be useful and practical during the construction of smart grid information security facilities.
    Formal Verification of Kaman Protocol
    WEN Shuang-ju
    2012, 1(200):  17-06.  doi:10. 3969/j. issn. 1006-2475.2012.04.005
    Asbtract ( 331 )  
    Related Articles | Metrics

    Kaman is security authentication scheme of mobile Ad Hoc networks. However, the author of Kaman didn’t verify security of the protocol by using formal method. Protocol Composition Logic (PCL) is formal verification logic of security protocol. This logic can simplify the process of protocol verification. This paper describes Kaman and analyzes its security properties in PCL. It is proved that Kaman can implement its security aim.

    软件工程
    Research on Cloud Computing Platforms for Open-source
    YANG Jing-li;ZHA Ying-hua;HU Guang-yong
    2012, 1(200):  23-04.  doi:10. 3969/j. issn. 1006-2475.2012.04.006
    Asbtract ( 331 )  
    Related Articles | Metrics
    Eucalyptus, OpenNebula and Enomaly elastic computing platform are three major open-source cloud-computing software platforms. The overall function of these systems is to manage configuration of virtual machines for a cloud providing infrastructure-as-a-service. These various open-source projects provide an important alternative for those who do not wish to use a commercially provided cloud. This paper compares and analyzes these systems more detailed. To facilitate the user's choice, it also analyzes the overall structure of each of these project’s defferent features so that as reference for the defferent goals of each projects.
    Study on Business Intelligence Based on ERP System of Manufacturing Enterprise
    HAO Wei
    2012, 1(200):  27-03.  doi:10.3969/j.issn.1006-2475.2012.04.007
    Asbtract ( 344 )  
    Related Articles | Metrics
    This paper is concerned with the application of business intelligence data mining, prospective analysis and decision support based on ERP system of manufacturing enterprise. The business intelligence composes of BW and BO. BW seamlessly integrates with ERP system through standard data interface, process chain mines massive business data to data warehouse of enterprise. BO generates data tables from data warehouse according to different function requirement, supports further processing business analysis report by extracting data information from BW and allocating standard professional ways of display. The system helps enterprise managers to grasp business trend, find the development trendency and make scientific decision.
    Research on Constructing Digital Platform for Chinese Medicine Museum
    LAN Shao-qing;LI Bao-jin;ZHANG Xiao-xu
    2012, 1(200):  30-03.  doi:10. 3969/j. issn. 1006-2475.2012.04.008
    Asbtract ( 354 )  
    Related Articles | Metrics

    To meet the challenge of the digitization to the museum in network information age, the Chinese medicine museum is gradually to be digitization. The digital platform for Chinese medicine museum is very large-scale and comprehensive information engineering. It involves the collection of the resources digitization, data storage and safety management, the application of the digital resources, the digital presentation, promotion and research about the resources. The development of the digitization supports the development of Chinese medicine and improves the crucial competitiveness for Chinese medicine museum.

    Project Risk Management Methods Based on Monte Carlo Simulation
    FANG Wei
    2012, 1(200):  33-04.  doi:10.3969/j.issn.1006-2475.2012.04.009
    Asbtract ( 507 )  
    Related Articles | Metrics
    The paper focuses on the quantitative risk analysis method, which quantizes the schedule risk in project risk man-agement to support the Risk Response. The paper describes the application of the Monte Carlo simulation in quantitative analy-sis and develops the risk management system.
    计算机控制
    Design and Implementation of Anti-shock HMI Devices Based on LPC2478
    GE Qian-qian
    2012, 1(200):  37-03.  doi:10. 3969/j. issn. 1006-2475.2012.04.010
    Asbtract ( 321 )  
    Related Articles | Metrics
    The paper proposes a method of design and implementation of anti-shock human-machine interactive device based on LPC2478. The anti-shock device has WiFi communication capabilities, multi-channel sampling, and real-time measurement for temperature, humidity, horizontal and vertical conditions. It measures the device distances with other objects and drops acceleration to achieve parametric statistical analysis and diagnostics. Meanwhile, the device has several function features: it has multi-direction anti-shock sensors, self-synchronizing wireless firmware upgrade functions, power management based on user pattern recognition, which meets the protection requirements for portable terminals.
    Platform Independent Model for Online State Maintenance and Decision Support System of Relay Protection
    ZHOU Cheng;HU Bin
    2012, 1(200):  40-05.  doi:
    Asbtract ( 263 )  
    Related Articles | Metrics
    This paper analyzes current situation of state maintenance and decision support systems used in State Grid. The analysis results show that unified model is the key to architecture of online state maintenance systems. Based on model driven architecture, this paper proposes a Platform Independent Model(PIM) of state maintenance and decision support system. In view of collection, storage, state evaluation and decision, this paper gives a reference architecture of PIM for online state maintenance and decision support system.
    Design and Realization of DC Motor Speed Regulation System Based onMCU in C Language
    ZHAO Yuan-dong;FANG Yuan;LIANG Lu-yang
    2012, 1(200):  45-03.  doi:10.3969/j.issn.1006-2475.2012.04.012
    Asbtract ( 352 )  
    Related Articles | Metrics
    This paper describes the functions of PWM signal based on STC-51 single chip, introduces the theory of L298N to control DC motor. The software and hardware of the system are given and DC control motor programs developed by C language are discussed. Experiments explain that the system works stably and credibly, meets the demand of DC motor.
    Design and Implementation of Intelligent Electrical Equipment Housekeeper Based on Zigbee
    CHEN Dong-wei;WANG Wei;XUAN Wei-qing;QIU Wang-xi;LI Shao-jia
    2012, 1(200):  48-05.  doi:10. 3969/j. issn. 1006-2475.2012.04.013
    Asbtract ( 360 )  
    Related Articles | Metrics
    This paper adopts embedded system technology, based on UP-TECH270-S hardware development platform, combining Linux operating system and qt-embedded-linux-opensource4.5 application framework to design and implement an intelligent electrical equipment housekeeper system. The system is mainly based on the technology of Zigbee wireless transmission, GPRS technologies, and infrared transmission technology. This system has the traditional intelligent household appliance controlling function, moreover, it has two advantages: it uses the wireless protocols to send the control signal; it is cheap, simple and suitable for mass production line. The system is of high reliability and practicability etc, with certain application prospect in market.
    数据库与数据挖掘
    Discussion on Application of Data Mining Based on Microsoft Clustering Model
    LIU Cheng-xia;
    2012, 1(200):  56-05.  doi:10. 3969/j. issn. 1006-2475.2012.04.015
    Asbtract ( 328 )  
    Related Articles | Metrics
    The application of Microsoft clustering algorithm of data mining in financial field is discussed. The function of the data mining is mining potential information from the massive data. A business data mining system is created based on Microsoft clustering algorithm, which can provide better decisions and recommendations for the bank through filtering and mining the customers’ transaction information. The client part of system is developed with the Visual Studio.NET 2008. And it uses the objects of ADOMD.NET and Web controls to display the result of mining. By using the application system it can analyze the customer’s attributes to predict his credit and to predict his business tendency. In the creation of the instance model system the whole program of data mining is introduced in detail and it helps the development of data mining’s application.
    Application of SAS/EM Tool in Quality Defects Analysis of Cold Rolling Pickling Coil
    GUO Long-bo;WEI Jun
    2012, 1(200):  61-03.  doi:10.3969/j.issn.1006-2475.2012.04.016
    Asbtract ( 347 )  
    Related Articles | Metrics
    Data mining, a data analysis technique to seek potential information in a mass of data, has gained intensive attention from various circles of society. The SAS data mining technology is better among the methods for data mining and it is well adopted in large enterprises. The paper introduces some basic knowledge of data mining. Besides, the SAS/EM tool is used to make a preliminary attempt to analyze the cause of quality defect of cold rolling pickling coil.
    Discussion and Establishment of Network News Information Mining and Analysis Model
    LIU Lin-hao
    2012, 1(200):  64-04.  doi:10.3969/j.issn.1006-2475.2012.04.017
    Asbtract ( 394 )  
    Related Articles | Metrics
    The paper builds a system model which involves accessing information sources, information processing and information analysis using text mining technology. The model is expected to enforce the evolution of information which consists of automatic access to news, classification and clustering, recommendation and description of evolution of a particular piece of hot news. Hot news mining benefits three parties: users, maintainers and supervisors. Users are easier to access their favorites; maintainers are able to design websites better to cater to users; supervisors can control and steer the Web more effectively.
    Implementation of AHP Algorithm in Teaching Quality Evaluation System Based on Data Mining
    CHEN Xiao-ming;TANG Xin-yu
    2012, 1(200):  68-03.  doi:10. 3969/j. issn. 1006-2475.2012.04.018
    Asbtract ( 390 )  
    Related Articles | Metrics
    This paper, on the platform of the current vocational education, is mainly study on the issue of how to integrate data mining with the evaluation of teaching quality. By drawing on the effective data mining of the teachers from home and abroad, this paper develops approaches of the evaluation of teaching quality based on AHP algorithm which also is used to resolve the unreasonable factors in the course of evaluation of teaching quality, for establishing a fair, just, reasonable and effective evaluation system.
    应用与开发
    Research and Design of Pen-based Interaction Agricultural Information Collection and Dissemination System
    YAO Xin;LUO Min;YANG Guo-qiang
    2012, 1(200):  71-05.  doi:10. 3969/j. issn. 1006-2475.2012.04.019
    Asbtract ( 327 )  
    Related Articles | Metrics
    Users usually have to collect information by hand and then entry the data into computer for the second time in traditional information collection and dissemination in farm produce process, resulting in waste of resources; users are distracted their attention when using interface software based on old WIMP interaction paradigm, it may increase their cognitive load. In order to solve this problem, this paper designs and implements a farm produce information collection and dissemination system based on PGIS paradigm in pen interaction technology and pen-based form technology. The system combines the advantage of the pen interaction nature and efficiency feature with computer’s strong ability of information processing, so it is of a good future.
    High Performance Site Search Solution Based on Xapian and PHP
    SUN Wen-hui;WEI You-ping
    2012, 1(200):  76-03.  doi:10. 3969/j. issn. 1006-2475.2012.04.020
    Asbtract ( 378 )  
    Related Articles | Metrics
    Information retrieval system has been a necessity in people’s daily life. This paper proposes a site search solution based on the open source search engine library-Xapian. The system is implemented using PHP and runs under Linux. After deployment, the system works well on performance, speed and retrieval precision.
    XACML-based Automatic User Role Assignment
    XIE Wei-xing
    2012, 1(200):  79-03.  doi:10. 3969/j. issn. 1006-2475.2012.04.021
    Asbtract ( 337 )  
    Related Articles | Metrics
    AURA(Automatic User Role Assignment) can reduce the cost of administration dramatically. An attribute-based and rule-based access control mechanism can provide a thin-grain access control. The article introduces the extension, the policy language model, the application instance, the problem and the reference implementation of the XACML-based AURA in detail.
    An Approach for Analysis of Pointer Programs
    LIU Gang;HU Kai-ping;SONG Fa-xing
    2012, 1(200):  82-04.  doi:10. 3969/j. issn. 1006-2475.2012.04.022
    Asbtract ( 328 )  
    Related Articles | Metrics
    Analysis of pointer programs has already become a hotspot research in the field of programming languages. This paper takes an approach to the problem by doing shape analysis, which uses a shape graph to express points-to and equivalence relations among pointers in a program, and uses a shape graph logic to infer programs. The shape graph logic is an extension to Hoare logic by regarding shape graphs as assertions about pointers directly. First, this paper describes the proposed shape graph and shape graph logic. Then based on the shape graph logic, it designs a method for shape analysis on pointer programs.
    Solutions to Several Key Problems on Paper Management Information System
    ZHANG Li-qun;JIN Zi-ming
    2012, 1(200):  86-04.  doi:10.3969/j.issn.1006-2475.2012.04.023
    Asbtract ( 349 )  
    Related Articles | Metrics
    This paper presents the composition of the paper management information system. It also introduces the treatment methods of the key problems on paper management information system. Results show that the treatment methods are more efficient and reliable and all-purpose to other MIS.
    Design and Implementation of New Receiver Client for Intelligent Mobile System Platform Based on Android
    QUE Feng
    2012, 1(200):  90-04.  doi:10. 3969/j. issn. 1006-2475.2012.04.024
    Asbtract ( 349 )  
    Related Articles | Metrics
    This paper discusses how to use Java language to develop a system on Android2.3. It can download server-side XML and JPG files to the local for readers to keep track of the software. First, through Http protocol, the system downloads XML file using the way of Inputstream to the local. And then it parses with SAX, stores data into SQLite3 database. When the user needs to read the list, it will display with the way of ListActivity.
    Design of Assets Network Check System Based on ASP.NET AJAX
    ZHANG Han-wei
    2012, 1(200):  94-03.  doi:0.3969/j.issn.1006-2475.2012.04.025
    Asbtract ( 290 )  
    Related Articles | Metrics
    Assets check is an important measure to strength management of assets, the realization of assets network check digital management is a necessary requirement for sustainable development of enterprise. The paper introduces the main technology of system design, and analyzes the overall structure and main function modules of assets network check system, then uses ASP.NET and AJAX technology to better realize the assets check system. The practices show that assets network check system improves the information of assets management to a new level.
    Design and Realization of Enterprise Questionnaire Survey System Based on UML and SSH Framework
    YU Bin
    2012, 1(200):  97-03.  doi:10. 3969/j. issn. 1006-2475.2012.04.026
    Asbtract ( 384 )  
    Related Articles | Metrics
    In view of the problems existing in traditional design questionnaire survey, such as more complicated and complex, repeatability labor, low efficiency of work, a system with highly efficient and flexible easy to use is designed. Based on the Web application system integrated Struts, Spring and Hibernate, the system indicates good extensibility and reusability.
    Design and Implementation of Medical Ethics Evaluation System Based on B/S
    QIU Feng
    2012, 1(200):  100-03.  doi:10.3969/j.issn.1006-2475.2012.04.027
    Asbtract ( 340 )  
    Related Articles | Metrics
    This paper analyzes the contents of medical person evaluation, designs a medical ethics evaluation system based on B/S structure. It introduces the functions of the system in detail, and describes the design and implementation.
    Design and Implementation of Academic Degrees and Graduate EducationInformation Management System Based on MVC and EF
    XU Ling-ling;FENG Wen-chao
    2012, 1(200):  103-04.  doi:10.3969/j.issn.1006-2475.2012.04.028
    Asbtract ( 393 )  
    Related Articles | Metrics
    In order to improve the school’s academic degrees and graduate education information management level, the paper discusses academic degrees and graduate education information management system’s design and implementation based on MVC design pattern, EF framework and Ajax technology. This system has following functions: user management, enrollment management, curriculum management, score management, scholarship management, tutor management, double-blind review management and academic degrees management. This system is of good usability, stability and scalability.
    Telegram Communication Using XML on WinCE
    CHEN Xi-chun
    2012, 1(200):  107-03.  doi:10. 3969/j. issn. 1006-2475.2012.04.029
    Asbtract ( 359 )  
    Related Articles | Metrics
    WinCE, as an embedded operating system, has been widely used in different kind of information terminals. When these terminals communicate with each other using telegram, there are always many formatted data; these kinds of communication can be implemented by XML. This article describes how to represent these data with XML, and the method of exchanging XML documents via network.
    Design of IP Video Monitoring Based on Campus Network
    SUN Feng-ming
    2012, 1(200):  110-02.  doi:10. 3969/j. issn. 1006-2475.2012.04.030
    Asbtract ( 316 )  
    Related Articles | Metrics
    This paper designs IP video monitoring based on campus network for special university environment. It not only strengthens the management of campus security, but also improves the modern management of school.
    Visualization Recorded Wave Analysis System Based on IEC61850
    LI Nan;YIN Jun;DONG Bei;HAN Chun-jiang;GE Ya-chuan
    2012, 1(200):  112-04.  doi:10. 3969/j. issn. 1006-2475.2012.04.031
    Asbtract ( 387 )  
    Related Articles | Metrics
    In order to meet the needs of recorded wave analysis in intelligence substation, the paper designs and develops the recorded wave analysis software based on QT. The software based on Comtrade format and IEC61850 file transfer model can download the Comtrade format wave file from intelligence electronic device, analyze the file, then display sample data, event report, and fault presentation graphically. Through the layered visual logic disply, the software provides the recorded analysis method which going from understand systematically to in-depth analysis, and makes the recorded wave analysis more intuitive, precision and scientific. This paper describes the overall software architecture and program flow of the recorded wave analysis, focuses on the function of downloading recorded wave file based on IEC61850 file transfer model, the sample data analysis algorithm, and describes software functions in detail.
    Design and Realization of Audit Management System for Government Investment Projects
    XIA Hua-guo
    2012, 1(200):  116-03.  doi:10. 3969/j. issn. 1006-2475.2012.04.032
    Asbtract ( 337 )  
    Related Articles | Metrics
    To resolve the complexity of government investment projects, the scheme of audit management system based on the J2EE technology is proposed. Through the design and development, the networking of the audit process is achieved. At the same time, the automatically generating related forms and the real time inspection of auditing process are realized using the extended function of the management system, such as auto summary and statistic. It effectively promotes the efficiency and quality of audit.
    Design and Implementation of In-service Inspection Management Information Platform for Piping Support and Dampers in NPP
    XIA Jun-chao;SUN Mao-rong;ZHANG Yi;FENG Li-fa
    2012, 1(200):  119-04.  doi:10. 3969/j. issn. 1006-2475.2012.04.033
    Asbtract ( 329 )  
    Related Articles | Metrics
    Piping support and dampers is one of important parts of pipe system, and it affects the security of pipe system significantly, but there are complex kinds of NPP, huge quantity and difficult to manage. In order to enforce the supervisory ability, to exten the service lifetime of pipe, analysis the fail mode and summarize the operation experience of piping supports, this paper designs and realizes a management information platform of the piping support and dampers based on B/S mode for a domestic NPP. It’s proved that the system is easy and convenient for in-service inspection.
    Design of Controlling Computers by Mobile Phones Based on Bluetooth Technique
    WANG Kun;YU Ya-fang;LI Jin-kai
    2012, 1(200):  123-04.  doi:10. 3969/j. issn. 1006-2475.2012.04.034
    Asbtract ( 336 )  
    Related Articles | Metrics
    It will bring the convenience to people’s life if people can control the computer by their mobile phones. This paper discusses how to use the mobile phone to control a computer by allowing the computer to respond the messages sent by a phone with which the computer is establishing a connection. Based on this, this paper also discusses how to show the computer’s screen on the mobile phone in real-time, and makes an analysis on the way that the image shows and the key-pressed response mode.
    Remote Microwave Experiment Video Surveillance System Based ARM9 and Linux
    LI Ye;SHEN Hong-rui;ZHANG Jing-jing
    2012, 1(200):  127-03.  doi:10. 3969/j. issn. 1006-2475.2012.04.035
    Asbtract ( 349 )  
    Related Articles | Metrics
    Conventional microwave measurement systems are limited by on-site testing conditions and heavy equipment, hence students have to perform experiment locally, which is not optimized for lab resources due to the time and place constraints. This paper builds an ARM9 and Linux-based microwave experiment surveillance system to solve the above problems by embedded websites design combining HTML+JavaScript+Java+CGI, which provides strong real-time and interactive.
    Design and Implementation of College Practical Training Software Based on Web
    MAO Fang-ming
    2012, 1(200):  130-03.  doi:10.3969/j.issn.1006-2475.2012.04.036
    Asbtract ( 290 )  
    Related Articles | Metrics
    For the purpose of developing practical training system of“Basic Computer” course, this paper analyzes the item requirement, illustrates its systematical function and structure, describes the components of various basic tables in detail and introduces the related techniques of generating test paper. This system is well received in daily application both teaching and learning in college.
    Object-oriented Modeling and Simulation of Semiconductor Optical Amplifiers
    WANG Li;TAO Sheng;LIU Li-yong
    2012, 1(200):  133-06.  doi:10. 3969/j. issn. 1006-2475.2012.04.037
    Asbtract ( 333 )  
    Related Articles | Metrics
    This paper briefly reviews the traveling-wave model of semiconductor optical amplifiers(SOAs), which provides a good balance between the accuracy and the computation efficiency. This model can analyze the multichannel large-signal dynamic performance for pulse width wider than 1 ps. Obviating the constant α-factor approximation, the model can investigate the difference between gain and phase dynamics. In the frame of the theory model, an object-oriented approach is presented to the design and implementation of a dynamic SOAs simulation tool. Through abstracting common ground, the model unifies the three kinds of structures: conventional SOAs, SOAs with gain-clamping by a longitudinal laser and SOAs with gain-clamping by a vertical laser. The interface classes and interface functions are used to reduce the coupling between different modules. In order to avoid low efficiency, some private member variables that are read and modified frequently are exposed after the soft testing. Thus, the object-oriented model with high efficiency is established to analyze the dynamic device behaviors.
    Research on Long SMS Received and Implementation Technology Based on CMPP
    CHEN Su-qing
    2012, 1(200):  139-03.  doi:10.3969/j.issn.1006-2475.2012.04.038
    Asbtract ( 336 )  
    Related Articles | Metrics
    The article introduces the GSM short message service and CMPP protocol, analyzes the long SMS PDU format, describes the identification and consolidation of long SMS technology, and implements recognition and splicing of long SMS in the SMS application development. It is of some practical significance for the development of the SMS application platform.
    Analysis and Design of Electronic Commerce Online Homework System Based on Working Progress
    YANG Shengbin;LIU Zhen;ZHANG Jin-hong;LI Xiao-yuan
    2012, 1(200):  142-03.  doi:10.3969/j.issn.1006-2475.2012.04.039
    Asbtract ( 361 )  
    Related Articles | Metrics
    This paper first describes the significance of working process, and then analyzes the characteristics of E-commerce courses and makes a brief overview of the online homework management system. In the meanwhile, the paper also further analyzes system function requirement, business process design, system database design and data storage and organization, paving the way for further design and development of the system.
    算法设计与分析
    Research on Optimal Binary Search Tree Constructed by Dynamic Programming
    LU Cong-ying
    2012, 1(200):  145-03.  doi:10. 3969/j. issn. 1006-2475.2012.04.040
    Asbtract ( 365 )  
    Related Articles | Metrics
    This paper presents the module of dynamic programming for optimal binary search tree, and improves the algorithms. Instance result shows the algorithm is effective.
    Research on RFID Location Algorthm Based on RBF
    ZHANG Nan-ping;LIU Hong-wu;ZHANG Xiao-lin
    2012, 1(200):  148-04.  doi:10.3969/j.issn.1006-2475.2012.04.041
    Asbtract ( 356 )  
    Related Articles | Metrics
    Radial basic function is a recent meshless interpolation technique. It has a very simple form and study with quick speed. For the low positioning accuracy of K value algorithm to LANDMARC positioning, this paper proposes a new dynamic method in the combination of the advantages of these two methods. The indoor positioning system based on the improved method is constructed, and then uses Matlab to simulate. The results show that, the improved algorithm enhances the positioning accuracy of the positioned tags.
    A New Evolution Algorithm by Stages for Particle Swarm Optimization
    YU Zhi-hui;YU Xu-jin;SONG Ye;WU Lie-yang
    2012, 1(200):  152-03.  doi:10. 3969/j. issn. 1006-2475.2012.04.042
    Asbtract ( 371 )  
    Related Articles | Metrics
    Considering that the standard PSO easily falls into local optimization when it solves the multi-extremum problems, an improved PSO algorithm is proposed. In this algorithm, the evolution process is divided into two stages, while each stage uses a different model, so the possibility of getting local extreme value is reduced by making full use of the respective advantages of the two evolution model. The results of simulation show that the proposed algorithm has the better optimization performance than the standard PSO when solving the multi-extremum problems.
    Gene Expression-based Clonal Selection Algorithm for Job Shop Scheduling Problem
    SHANG Tao
    2012, 1(200):  155-05.  doi:10. 3969/j. issn. 1006-2475.2012.04.043
    Asbtract ( 318 )  
    Related Articles | Metrics
    Based on the characteristics of job shop scheduling problem, gene expression-based clonal selection algorithm is proposed. In this method, using the encoding of gene expression programming to represent scheduling solution, and clonal selection algorithm is utilized as search engine so that the proposed method has more powerful global search ability. Finally, seven kinds of Benchmark instances are tested to verify the effectiveness of the proposed approach. The experimental results show the proposed approach is very effective in solving job shop scheduling problems.
    Research on Improved Field Leader Election Algorithm
    YANG Fu-bo;FU Hong;GAO Xiu-e
    2012, 1(200):  160-03.  doi:10.3969/j.issn.1006-2475.2012.04.044
    Asbtract ( 315 )  
    Related Articles | Metrics
    Distributed network system has the characteristics of heterogeneous types of node and a huge number of nodes; it needs a higher demand for effectiveness of network monitoring and dynamic management. Therefore distributed system is divided into multiple fields, and field leader is a pivotal problem. The advantages and disadvantages of maximum connectivity and minimum load field leader election algorithm are analyzed. A new field leader election algorithm based on the greatest degree of connectivity and least load is proposed. Simulation results show that the stability of field leader election and the efficiency of network management are improved.
    Research on Improved ECC kP+lQ Point Multiplication Algorithm
    HU Yue-mei;WEN Jing-jing
    2012, 1(200):  163-04.  doi:10.3969/j.issn.1006-2475.2012.04.045
    Asbtract ( 377 )  
    Related Articles | Metrics
    As the core operations of the Elliptic Curve Cryptosystem, point multiplication and kP+lQ point multiplication are applied to many multi-party protocols, their running efficiency determines the application efficiency of the ECC. Based on the the Shamir NAF algorithm, by the observation of the NAF addition and subtraction chain sequence and through improving the precomputation, this paper designs a new algorithm aided at kP+lQ. Experiment indicates the efficiency of the new algorithms is improved.
    图像处理
    Study on Remote Test Authentication System Based on FR
    LI Xiao-li;SHAO Ye-qin;LUO Min
    2012, 1(200):  167-04.  doi:10. 3969/j. issn. 1006-2475.2012.04.046
    Asbtract ( 409 )  
    Related Articles | Metrics
    In the distance education examination system, it is important that how to verify the real identity of the candidates effectively. This paper proposes a remote authentication system based on face recognition. First, the color information of skin is used to detect and locate human face images. After preprocessing, the corresponding feature points are extracted. Then, comparing the geometric characteristics with the face image of the registration database, the authentication of candidates is completed. Experiments show that the system can identify the candidate’s information effectively, and achieve a good validation results.
    Computer-Generated Hologram Based on Diffraction
    FU Sheng-hao;BAO Xu-liang;WANG Yuan-qing;FAN Ke-feng
    2012, 1(200):  171-04.  doi:10. 3969/j. issn. 1006-2475.2012.04.047
    Asbtract ( 327 )  
    Related Articles | Metrics
    In the current research on holography, CGH(Computer-Generated Hologram), as for flexibility and ease of operation, has been discussed widely. However, there is not any ideal method for CGH and reconstruction of 3-D scene. This paper analyzes two methods to simulate the diffraction field, proposes a CGH method for 3-D scene, and accelerates the speed with the parallel computing technology. Taking the scene with four different depths as an example, the simulation results show that the algorithm is effective and feasible and the parallel computing technology accelerates the speed for four times.
    Multi-spectral Image Acquisition Technology Based on Camera Array
    SUN Zhen;RAN Xin;YING Shi-jun
    2012, 1(200):  175-04.  doi:10.3969/j.issn.1006-2475.2012.04.048
    Asbtract ( 398 )  
    Related Articles | Metrics
    n the past few years there has been a significant volume of research work carried out in the field of multispectral image acquisition. The most of focus is a type of multispectral image acquisition systems that usually requires multiple subsequent shots. Recently, an alternative approach for multispectral image acquisition has been proposed; based on an extension of the camera array, it produces more than three channels. This paper introduces the concept of multispectral camera array (MCA), develops an eleven-shot multispectral image capturing system, consisting of twelve DH-HV1300FM cameras and eleven interference filters with different wavelengths. Combining with the advantages of multiple channels for multispectral camera array(MCA), an algorithm to reconstruct the scene spectral reflectance is proposed. Finally the recovered spectral measurements are used to recover the continuous spectral reflectance for each scene point by using a linear model for spectral reflectance.
    Research on Human Face Detection Based on Improved YCbCr Skin Color Model and Area Character
    QIU Peng-rui
    2012, 1(200):  179-04.  doi:10.3969/j.issn.1006-2475.2012.04.049
    Asbtract ( 380 )  
    Related Articles | Metrics
    In accordance with the current study situation and difficult problem of human face detection, the paper adopts improved YCbCr elliptic clustering skin color model to extract color zone from the skin. According to the distribution of the YCb’Cr’, if the color brightness less than 80 pixel of color will be a miscarriage, it narrows the ellipse clustering; if greater than 230 complexion pixel of color will be a miscarriage also, it expands the ellipse clustering. It can avoid wrong judgment about skin color spot between high brightness zone and lower brightness zone effectively. And then taking advantage of the geometric characteristic of human face, it analyzes the objective zone with proportion and size in the binary picture to get rid of the impossible human face.
    Design and Realization of Picture Browser Based on Image Transformation
    YANG Ji-hang;YANG Xiao-tong;HE Xiao-nan;SHI Wei-ze;ZHANG Xiao-nan
    2012, 1(200):  183-05.  doi:10.3969/j.issn.1006-2475.2012.04.050
    Asbtract ( 340 )  
    Related Articles | Metrics
    This paper designs a picture browser based on single document MFC and the image transformation technology. According to general analysis about the angle which the picture moves in, the image transformation mode and the fun of the process of the picture viewing, this paper designs several kinds of image transformation algorithms as well. It is proved that the system is practical and worthy of using abroad, for its brief operation interface, easy to be operated, pretty high efficiency. Comparing with ordinary picture browser, the effect of picture browser based on the image transformation is far better than others.
    Research on Abnormal Behavior Recognition of ATM Based on Improved Hu Transform
    LI Zhan-ming;SONG Bing-ju
    2012, 1(200):  188-04.  doi:10. 3969/j. issn. 1006-2475.2012.04.051
    Asbtract ( 332 )  
    Related Articles | Metrics
    This paper presents a recognition approach about ATM abnormal behavior based on the improved Hu transform and Hidden Markov Models. It extracts behavior characteristics of moving object by the improved Hu transform, trains and builds Hidden Markov Models of normal behavior by the Baum-Welch algorithm. Finally it can recognize whether the ATM user’s behavior is abnormal behavior or not by the output probability of test sample sequence. The simulation video of ATM users’ behavior simulatd with Matlab software. The results show that the method can improve recognition rate in the scenes of ATM.
    Human Pose Recognition Research Based on Single Depth Images
    DU Xiao-peng;HAO Jian-ping;LI Xing-xin;YANG Jun
    2012, 1(200):  192-04.  doi:10.3969/j.issn.1006-2475.2012.04.052
    Asbtract ( 328 )  
    Related Articles | Metrics
    To obtain more natural and realistic interactive mode, the research based on depth image technology is carried on. The situation of depth image application and methods are introduced. The depth image is used to recognize human pose induding based on multiple depth image or single depth image. And for the static human pose tracking, random forest algorithm is used to evaluate the human position in the single depth image for improving the run rate and the robust character. Then the recognition of body position and the skeleton joint are realized. At last, an instance is provided to illustrate the effectiveness and accuracy of the method.
    Algorithm for Contour Clipping Against General Polygon
    ZHOU Qing-ping;CHEN Xue-gong
    2012, 1(200):  196-04.  doi:10.3969/j.issn.1006-2475.2012.04.053
    Asbtract ( 356 )  
    Related Articles | Metrics
    This paper presents a new fast algorithm for contour clipping against general complex polygon windows. Firstly, the new algorithm builds the bounding box of the clipping polygons and creates the constraint grid structure. And the algorithm uses the grid structure to pre-clip the contours quickly. Through linked structure to clip the contours, it can get the final clipping result. This paper can realize the method of row scanning to judge the inside and outside attribute by building the linked structure and reduce the counts of segments intersection. Through many experiments, the new algorithm is proved to be very effective and stable.
    Color Recognition Method Based on Illumination Changed Compensation
    PAN Hao;YANG Yi-min
    2012, 1(200):  201-04.  doi:10. 3969/j. issn. 1006-2475.2012.04.054
    Asbtract ( 293 )  
    Related Articles | Metrics
    For the problem that illumination change causes color shiftting and affects the accuracy of color recognition in the medium group of RoboCup competition, this paper proposes a color recognition method based on illumination changed compensation. This method first uses the historical information of the ball to predict its position. After finding the ball by using the method of reverse projection based on color histogram in a small area, it calculates illumination changing rate through the changes of ball’s brightness histogram to dynamically compensate the color lookup table. Experiments show that this method can improve the illumination adaptive of color recognition.
    人工智能
    Construction and Application of Ontology-based Knowledge Base for Emergency Rescue
    XIAO Tian;YANG Zong-xiao
    2012, 1(200):  205-04.  doi:10.3969/j.issn.1006-2475.2012.04.055
    Asbtract ( 344 )  
    Related Articles | Metrics
    Ontology-based knowledge representation approach and Jena-based reasoning engine are proposed for solving the problems about knowledge representation and reasoning exiting in expert system for emergency rescue. Emergency rescue ontology and some inference rules are built by Simple Knowledge-Engineering Methodology and Jena Rule Syntax, and the reasoning for ontology knowledge base is realized. The proposed ontology is applied in an expressway emergency rescue system, the result shows that this knowledge base is of the ability to solve the practical problem; it is helpful for the sharing and reuse of expressway emergency rescue domain knowledge; and it stimulates the development of expert system in the domain of expressway emergency rescue.
    Research on Collaborative Filtering for Recommender Systems
    ZHU Li-fu;PENG Jia-hong
    2012, 1(200):  209-03.  doi:10.3969/j.issn.1006-2475.2012.04.056
    Asbtract ( 371 )  
    Related Articles | Metrics
    In view of users commonly using tree browser pattern, this paper presents a new collection algorithm of user access path top-down to reduce the generation of a short path, and merges it into the users browser tree; based on the concept of cross-page access frequency, establishes the cross-page access frequency matrix for collaborative filtering recommendation system core processing data source. Taking the cross-page user access weight for the judgment basis, it achieves the recommendation of the page associated with the user browser.
    Application of Expert System Based on Fault Tree in Radar Power Fault Diagnosis
    XU Jiang-yan;LI Zhi-hua;XU Jiang-fei;XIAO Yuan-peng
    2012, 1(200):  212-03.  doi:10. 3969/j. issn. 1006-2475.2012.04.057
    Asbtract ( 413 )  
    Related Articles | Metrics
    Fault tree is a kind of important method in fault diagnosis expert system solving problems. In order to reduce the difficulty of representing and acquiring knowledge somewhat, it applies the expert system based on fault tree into the radar power fault diagnosis. To construct and implement a radar power fault diagnosis system can achieve the purpose of simplify and high efficiency. According to the testifying of application of the system, the radar power fault diagnosis expert system based on fault tree is of high diagnosing efficiency and correctness.
    Control Method of Policeforce Agent in RoboCupRescue Simulation
    LU Xiao-hui;YANG Yi-min
    2012, 1(200):  215-03.  doi:10.3969/j.issn.1006-2475.2012.04.058
    Asbtract ( 298 )  
    Related Articles | Metrics
    In the rescue simulation, the effects of police clear roads have a vital role in the whole disaster. According to how the police agent clear roads, this paper proposes a police agent’s task allocation method based on the utility function, and a kind of path searching method based on A* algorithm. Then, the effectiveness of control methods in the rescue simulation system through simulation and competition is verified.
    Research on Construction of Mold Ontology Based on Internet
    ZHANG Rong-rong;HUANG Xiong-bo
    2012, 1(200):  218-05.  doi:10.3969/j.issn.1006-2475.2012.04.059
    Asbtract ( 337 )  
    Related Articles | Metrics
    According to analyze the characteristic of mold knowledge from the Internet, this paper pits forward a method through altering the template of replying at the forum to get the label, after that, “seven step” is used to build mold ontology on Internet and a kind of semantic search conceptual model is preliminarily put forward. It provides a theoretical and practical basis for search engine of mold knowledge on Internet.