Loading...

Table of Content

    10 November 2012, Volume 1 Issue 11
    人工智能
    Research on Dynamic Fuzzy Control Reasoning Model
    LIU Fang
    2012, 1(11):  1-5+9.  doi:10.3969/j.issn.1006-2475.2012.11.001
    Asbtract ( 375 )  
    Related Articles | Metrics
    According to the dynamic fuzzy characteristics of object in control system, based on the theories of dynamic fuzzy sets and dynamic fuzzy logic, the concepts of dynamic fuzzy control reasoning model are proposed, such as DF vector, DF language variable, DF control language rules and DF implication relationship. On this basis, the DF reasoning methods based on DF language rules are discussed. Finally, an example is presented to illustrate the concepts and reasoning algorithm.
    Design of Fault Diagnosis Expert System for Machinery with Jess Engine
    ZENG Yao;WANG Fei;XIONG Bo
    2012, 1(11):  6-9.  doi:10.3969/j.issn.1006-2475.2012.11.002
    Asbtract ( 387 )  
    Related Articles | Metrics
    A scheme about how to build a fault diagnosis expert system for machinery in J2EE environment is introduced, which realizes a fault diagnosis expert system for machinery based on Web by using Jess engine as the core reasoning module, acquiring data via different ways such as Web Service and OPC techniques, and adopting the database to manage expert knowledge base. The scheme also adds the experts' experience, wisdom and methods into the fault diagnosis expert system for machinery. It makes great significance for ensuring the safe operation of equipments.
    Performance Comparison of Function Approximation Based on Improved BP Neural Network
    DING Shuo;WU Qing-hui
    2012, 1(11):  10-13+1.  doi:10.3969/j.issn.1006-2475.2012.11.003
    Asbtract ( 388 )  
    Related Articles | Metrics
    To accurately reflect the nonlinear function approximation abilities of improved algorithms of six typical BP networks, this paper elaborates on improved algorithm learning processes of the six typical BP networks. And the training function of MATLAB toolbox is briefly introduced which is used for BP network design. Finally a specific network is designed on MATLAB platform to conduct approximation test for a given nonlinear function. At the same time, a comparison between the performance differences of the six BP networks is made. The simulation result indicates that for a small scaled network, LM optimization algorithm has the best approximation ability, followed by quasi-Newton algorithm, conjugate gradient method, resilient BP algorithm, adaptive learning rate algorithm and momentum BP algorithm.
    Mathematical Modeling of Course Scheduling Problem in Military Pre-assignment Education Academies
    YANG Yan-ming;YUE Cui-cui;LI Qi-shen
    2012, 1(11):  14-17.  doi:10.3969/j.issn.1006-2475.2012.11.004
    Asbtract ( 434 )  
    Related Articles | Metrics
    Aiming at the features of curriculum scheduling in military pre-assignment education academies, an optimization mathematical model is established, the framework structure of TP is founded based on the analysis of factors, restrictions, solving targets, etc. And genetic algorithm (GA) is presented to solve university TP.
    Research on VRP Problem Based on Ant Colony Algorithm
    SU Tao;HAN Qing-tian;LI Wen-qiang;SUN Cong
    2012, 1(11):  18-21+2.  doi:10.3969/j.issn.1006-2475.2012.11.005
    Asbtract ( 359 )  
    Related Articles | Metrics
    On the basis of analysis on general VRP problem, aiming at the logistics delivery routing optimization problem, the paper builds a mathematical model of logistics delivery routing optimization problem, uses the ant colony algorithm to realize simulation. Experimental results show that the ant colony algorithm is a fast and effective method for solving logistics delivery routing optimization problem.
    Sequential Pattern Mining Used in Teaching Management
    WANG Zhi-gang;WANG Chi-she;GU Yun-feng;TIAN Hai-mei
    2012, 1(11):  22-25.  doi:10.3969/j.issn.1006-2475.2012.11.006
    Asbtract ( 451 )  
    Related Articles | Metrics
    Sequential pattern mining is a knowledge discovery procession to look for frequent sub pattern from temporal sequence database. This paper applies sequential pattern mining to teaching management, constructs data model according to the temporal sequence database model on student achievement sample data, does sequential pattern mining, and gets three temporal sequence association rules whose confidence is higher than 65%. The experimental result indicates that applying sequence pattern mining to teaching management, and doing data mining on scores of relevant course is feasible. The found temporal sequential association rules have certain practical significance to improve the teaching management and promote the student's learning.
    Dynamic Optimized Intersection Method Between Theodolites with Different Precision
    ZHANG Tao
    2012, 1(11):  26-29.  doi:10.3969/j.issn.1006-2475.2012.11.007
    Asbtract ( 376 )  
    Related Articles | Metrics
    In the intersection measurement between theodolites with different precision, in order to improve the reliability and precision of the measure data, a position model and its error model are presented. A process method combined context independent variable behavior and weighted average is analyzed. The algorithm is simulated, the intersection angle area is calculated to judge whether context independent variable behavior algorithm or weighted average algorithm is chosen and applied in task. The result shows that the multi-theodolites with different precision system can increase measure baselines and improve the reliability with the decrease of measurement error effectively.
    Computational Method for Identification of microRNA Based on SVM
    SUN Xiao-han;ZHAO Wei
    2012, 1(11):  30-32.  doi:10.3969/j.issn.1006-2475.2012.11.008
    Asbtract ( 324 )  
    Related Articles | Metrics
    microRNA (miRNA) is an endogenous non-coding RNA which is discovered in animals and plants. The length of miRNA is about 19-24nt. miRNA plays an important role and extensive functions in animals and plants. miRNA has two ways, cDNA clones predict and calculating found are the two ways for the miRNA discovery. cDNA clone predict method has some shortcomings, because the method can be influenced by the miRNA expression time, tissue-specific and expression levels. But the calculating found method can make up these shortcomings. So the miRNA calculating method has much attention. Support vector machine (SVM) as a kind of good machine learning method, is applied on the prediction of miRNAs for its good learning ability. The results of application of SVM on the identification of Caenorhabditis elegans miRNAs show SVM has good accuracy and sensitivity.
    An Algorithm on Calculating Definite Integral Using Random Variable Mean Value Based on Monte-Carlo Method
    ZHANG Le-cheng;WANG Zhen-bo
    2012, 1(11):  33-34+3.  doi:10.3969/j.issn.1006-2475.2012.11.009
    Asbtract ( 374 )  
    Related Articles | Metrics
    In view of the solution of the definite integral approximate calculation question, the paper gives an algorithm to calculate definite integral based on the Monte-Carlo method, which is abbreviated to mean value law and different from the frequency law which is used by the people in usual. The theory basis of this algorithm is the mathematic expectation theorem and the law of large numbers in theory of probability. First, a group of random numbers can be gained by throwing spots randomly to the integrating range. Second, the function value corresponded by each random number composes a group of random variables. At last, the definite integral approximate value is gained by the random variable mean value multiplying the length value of the integrating range. Because of the randomness of this algorithm, it can be fully calculated using the network at the same time. The experimental result indicates this algorithm is effective. Compared with the frequency law, it is of better accuracy and time efficiency.
    Optimization of Search Results Based on Clustering Algorithm
    LUO Zhao-hang;LI Xu-wei
    2012, 1(11):  35-38.  doi:10.3969/j.issn.1006-2475.2012.11.010
    Asbtract ( 363 )  
    Related Articles | Metrics
    Nowadays there are many redundancy pages in results of search engine, and the results are not classified. An optimization algorithm of webpage search results based on an improved DBSCAN (density-based spatial clustering of applications with noise) algorithm is proposed and effective to cluster and classify the results. The algorithm selects the webpages with search weights above a certain value from all search results, then it extracts the eigenvalue of pages and candidate keys, compares the pages similarity to maximize the elimination of duplication and redundancy pages. Meanwhile, classifications are provided in accordance with the candidate keys of pages, thereby the precision and satisfaction of search engine could be improved with the effect of more intelligence.
    Study on Content Optimization Principle and Method of Seasonal Military Aircraft Maintenance
    WANG Li-ming;YUAN Shu-li;MA Nai-cang;JI Yun-fei
    2012, 1(11):  39-42+4.  doi:10.3969/j.issn.1006-2475.2012.11.011
    Asbtract ( 424 )  
    Related Articles | Metrics
    This paper briefly introduces the necessity of seasonal military aircraft maintenance content optimization, and detailedly describes the basic principles of seasonal military aircraft maintenance content optimization, as well as the specific optimization process of logic decision method, reliability-centered maintenance analysis method and mean time between failure analysis method.
    Three Preference-based Interval Multi-objective Evolutionary Algorithms and Their Application
    YIN Zhao-ning;SUN Jing
    2012, 1(11):  43-46.  doi:10.3969/j.issn.1006-2475.2012.11.012
    Asbtract ( 390 )  
    Related Articles | Metrics
    Interval multi-objective optimization problems are very popular and important. There exist few evolutionary optimization methods for directly solving them, and these existing methods aim at finding a set of well-converged and evenly-distributed Pareto-optimal solutions. Three preference-based interval multi-objective evolutionary algorithms are surveyed to obtain the most preferred solution fitted the decision maker’s preferences. Additionally, the above algorithms are applied in robot path planning problems under a special environment, and are compared about their performance. The research enriches the methods of solving robot path planning problems under a special environment, and improves the optimization performance of the problems.
    软件工程
    Research and Application of Database Dynamic Performance Prediction Model Under High Load
    ZHANG Shun-shi;GONG Dai-sheng;YANG Jing
    2012, 1(11):  47-50.  doi:10.3969/j.issn.1006-2475.2012.11.013
    Asbtract ( 382 )  
    Related Articles | Metrics
    Database performance prediction has less historical data available and larger affection by external uncertainty factors. The traditional single, static prediction model is very difficult to meet the needs of actual production. This paper focuses on building a database dynamic prediction combination model under high load to overcome the deficiencies of the traditional Markov chain methods. So it can effectively predict the SQL performance problems caused by sharp increase of logical reads. The overall trends of random time series data can be predicted by building gray-Markov chain prediction model. When the Oracle database system is under high load conditions, these techniques can be used to accurately predict the executive performance of SQL statement, to quickly locate the performance bottlenecks and to effectively prevent the performance problems.
    Research on Disk Storage Technology in Data Acquisition System
    LIU Sheng;ZHANG Yan-yuan;LIN Yi;YOU Hong-tao
    2012, 1(11):  51-54+5.  doi:10.3969/j.issn.1006-2475.2012.11.014
    Asbtract ( 366 )  
    Related Articles | Metrics
    With the optical fiber technology used in embedded systems, the amount of communication data grows in the past years. How to move data that store in the memory to disk in a high speed and correct way becomes the bottleneck of data acquisition system. This article starts with the basic function modules which are combined with producer-consumer model, and analyzes multi-thread concurrency, direct read and write disk devices without passing through file system, asynchronous I/O and other technologies used in the system. The paper abstracts the system model and uses mathematical methods to give a feasibility analysis for the system. Experiments show that the performance of system which adopts multi-thread concurrency method is improved with a certain extent.
    Research on Software Defect Detection Model Based on Static Detection Tools
    ZHOU Dan-dan;LI Xian-guo
    2012, 1(11):  55-58.  doi:10.3969/j.issn.1006-2475.2012.11.015
    Asbtract ( 336 )  
    Related Articles | Metrics
    To cope with the problems about how to reduce the false positives, false negatives and repeated rate, this paper presents a software defect detection model based on static testing tools. This model processes the test results of different static detection tools, and analyzes the final merged result, which effectively reduces the false positives, false negatives and repeated rate. Finally, by using two static detection tools, this model detects an open-source software named “NMap”. The experimental result shows the effectiveness and practicality of this model.
    Research on Key Technology of Automatic Evaluation Facing Simulation System
    CHEN Xuan-hua;YANG Ling
    2012, 1(11):  59-61+6.  doi:10.3969/j.issn.1006-2475.2012.11.016
    Asbtract ( 399 )  
    Related Articles | Metrics
    For the automatic evaluation facing simulation system, there are two modes, one is based on operation results and the other is based on operation sequence. The assessment mode based on operation sequence is complex, but it can reflect the practical operation skills of examinee comprehensively and objectively. The paper firstly emphasizes the framework’s general representation of operation sequence. Then on these bases, the paper establishes an operation evaluation model and automatic rating process of operational examination based on expert system. Lastly, it gives the practical applications of the key technologies of automatic evaluation in the evaluation system of navigation instruments, realizes the relatively objective and fair grading result, improves the efficiency of operational examination greatly.
    Research on Efficient Storage Optimization of Linux
    YOU Hong-tao;ZHANG Yan-yuan;LIU Sheng
    2012, 1(11):  62-65.  doi:10.3969/j.issn.1006-2475.2012.11.017
    Asbtract ( 440 )  
    Related Articles | Metrics
    With the exponential growth of data, storage technology becomes the core driving force of development of information industry, the storage system to some extent, is more important than computing and communication systems. The urgent problem of storage system is how to efficiently store data. The article describes the efficient storage technology RAID technology, data de-duplication technology, data compression technology, designs and realizes an application of efficient storage optimization characteristics in a Linux environment. The experiments show that this application realizes software RAID, removes repetitive data, improves the space utilization of the storage system, reduces storage energy consumption.
    Application-level Page Replacement Algorithm Based on Memory Pool
    ZHAO Zhan-wei;YU Yuan-kun;XI Zhan-wei
    2012, 1(11):  66-69.  doi:10.3969/j.issn.1006-2475.2012.11.018
    Asbtract ( 364 )  
    Related Articles | Metrics
    When massive spatial data are processed with computer, the data exchange between external memory and internal memory is one of the key factors affecting the efficiency of system. This paper firstly analyzes the drawbacks of system-level page replacement algorithm, then proposes the concept of application-level page replacement, and also describes in detail its implementation in Windows operating system. This algorithm is validated in face recognition system, the results show that it performs better than the original algorithm in efficiency greatly.
    图像处理
    An Adaptive Extremum and Median Filtering Algorithm for Salt and Pepper Noise
    ZENG Xian-you;HUANG Zuo-hua;ZHOU Jin-zhao;ZHANG Yong
    2012, 1(11):  70-73+7.  doi:10.3969/j.issn.1006-2475.2012.11.019
    Asbtract ( 390 )  
    Related Articles | Metrics
    In order to preserve more details in an image while removing salt and pepper noise, an adaptive extremum and median filtering algorithm is proposed, according to the feature of salt and pepper noise. The size of the filtering window is adjusted automatically by detecting the presence of signal points in the window. Max-Min operator is used as the noise detector and a suitable threshold is chosen to identify the noises from the pixels which are in the center of the window and the gray value is equal to the maximum gray value or the minimum gray value of the window. Then filter outs the detected noise with the median value of the gray value of all signal points in the window, and outputs the signal points directly without changes. The gray value of the pixels in the center of window which exceeds the maximum window is replaced with the mean of the gray value of neighboring four pixels. Simulation results demonstrate the validity of the algorithm, especially when the density is high.
    Image Resizing Algorithm for Protection of Image Features Based on Edge Detection
    TANG Cai-hong
    2012, 1(11):  74-77.  doi:10.3969/j.issn.1006-2475.2012.11.020
    Asbtract ( 394 )  
    Related Articles | Metrics
    In the process of image resizing, seam carving algorithm causes damage to the geometry characteristics of images. To overcoming this shortcoming, an improved seam carving algorithm based on edge detection is proposed. First, seam is calculated and image contour feature is detected, and then, points of intersection are got. At last, energy around the intersection is upgraded to disperse over-concentrated seams. Simulation results demonstrate that the proposed approach can effectively reduce the image structure distortions caused by seam carving algorithm and well preserve the image prominent geometry features.
    Weighted MRF Algorithm for Automatic Unsupervised Image Segmentation
    LIU Xue-na;HOU Bao-ming
    2012, 1(11):  78-80+1.  doi:10.3969/j.issn.1006-2475.2012.11.021
    Asbtract ( 364 )  
    Related Articles | Metrics
    In order to achieve the automatic unsupervised image segmentation, an algorithm based on the adaptive classification and the weighted MRF is proposed. First, combined with the MDL criterion, the number of image classification under the framework of Markov random fields is computed adaptively. And then, the weighted MRF algorithm is used to expand the option range of the potential function, thus to eliminate the complex calculation of the potential function. Finally, by using ICM algorithm to optimize the model, the segmentation image under MAP criterion is obtained. In the Matlab, test results show that the proposed algorithm is effective, which can correctly calculate the number of classification and effectively reduce the segmentation error.
    信息系统
    Design and Implementation of Online Labs Booking System Based on LINQ to SQL
    WANG Xiao-hua;LI Hong-xia;YUAN Yuan
    2012, 1(11):  81-84.  doi:10.3969/j.issn.1006-2475.2012.11.022
    Asbtract ( 399 )  
    Related Articles | Metrics
    The opening management of laboratory has become an important content of the reform of experimental teaching in information age. On the basis of B/S structure and LINQ to SQL technology, a labs booking system is well designed and developed. This system provides a platform for the efficient management of labs and the balance of laboratory utilization, reduces work of lab managers effectively, and promotes a new step on opening management level and service level.
    Design and Realization of Office Automation Equipment Virtual Display System Based on Virtools
    DING Fan;HU Xiao-qiang;WANG Xin-ting
    2012, 1(11):  85-88.  doi:10.3969/j.issn.1006-2475.2012.11.023
    Asbtract ( 441 )  
    Related Articles | Metrics
    This paper uses the virtual reality (VR) technique in the design of office automation (OA) equipment teaching system, and analyzes the structure characteristics and advantages of Virtools and 3DS Max. Through the strong interactive function of Virtools platform within the multimedia classroom environment, this paper aims at the research and design of the office automation equipment teaching system in colleges, analyzes and solves the problems which are appeared in the process of system design, so as to complete the virtual display of the OA equipment and simulation of electricity usage finally. Then the feasibility and practicability of virtual reality technique could be seen in the use of instructional system development.
    College Fixed Assets Management Based on Internet of Things
    QI Wan-hua;ZHAO Zheng-wen
    2012, 1(11):  89-92+9.  doi:10.3969/j.issn.1006-2475.2012.11.024
    Asbtract ( 462 )  
    Related Articles | Metrics
    Now, the management of fixed assets in colleges is a heavy drudgery and there exist such problems as account discrepancy for a long time. The paper first analyzes the demand for fixed assets management in colleges and the system structure and technology principle of internet of things. With the analysis, the paper proposes a management scheme of fixed assets in colleges. The scheme realizes the intelligent management of the fixed assets in colleges by making use of the techniques of internet of things, guarantees the timely updates of the geographical location and status information of the fixed assets, and effectively solves such long time problems as account discrepancy.
    Architecture and Implementation for Employment Information Network Based on JSP
    LI Shao-jing;TANG Yu-chen;WANG Bao-pan
    2012, 1(11):  93-98.  doi:10.3969/j.issn.1006-2475.2012.11.025
    Asbtract ( 440 )  
    Related Articles | Metrics
    Traditional single job and recruitment channel causes the infarction of information interaction of college graduates and recruiters in job search and recruitment process, which leads to acute manpower loss. For the need of employment information management, through analyzing the users group and some investigations, an overall design is given to solve the imperfections of existing employment site. The paper uses JSF, Spring, Hibernate and Ajax to build a multi-channel, full-featured, efficient operation employment information network, which reflects that the campus recruitment is truly better than the social recruitment.
    Design and Realization of Information Management System of Barber Shops Based on VB.NET
    DUAN Xin;WANG Ling-yan;LUO Ling
    2012, 1(11):  99-102+.  doi:10.3969/j.issn.1006-2475.2012.11.026
    Asbtract ( 410 )  
    Related Articles | Metrics
    With regard to the traditional manual management mode, which barber shops widely adopt, not only the methods of management are rigid, operating process is complex, but also data is at great risk of losing. This thesis firstly conducts the demand analysis, business process analysis, and dataflow process analysis of information management system of barber shops, secondly designs the main function modules and database, thirdly applies VB.NET technology to develop this system. In this way, the workload of managerial personnel is greatly cut, the systematic management of customers, products, services, and workforces is achieved, eventually the information management of private small-sized enterprises is realized.
    Design and Realization of New Energy Power Generation Information Intelligent Management and Control System
    YANG Zhi;SHAO Zuo-zhi
    2012, 1(11):  103-107.  doi:10.3969/j.issn.1006-2475.2012.11.027
    Asbtract ( 416 )  
    Related Articles | Metrics
    Based on the business requirement and system function of a new energy power enterprise demanded by the national wind solar storage demonstration project, this paper designs an intelligent management and control system for new energy power generation. The system uses various advanced technologies including framework/architecture technology, multi-agent data integration technology, SVG and power GIS control and display technology, and intelligent workflow engine. The theory presented by the paper fully satisfies the enterprise demand of both the production operation and the management.
    Library Volunteer Attendance System Based on ASP.NET
    YE Shi-ping
    2012, 1(11):  108-112+.  doi:10.3969/j.issn.1006-2475.2012.11.028
    Asbtract ( 406 )  
    Related Articles | Metrics
    In light of library volunteers management needs, the paper uses ASP.NET development platform and SQL database to develop a set of convenient operation and maintenance of library volunteer attendance system. The requirement analysis, frame design, database design, data flow chart, module implementation and other aspects of the system are introduced.
    Design and Implementation of Environmental Petition Information System
    HU Hao;ZHU Qi;SHANG Yi;LI Qian
    2012, 1(11):  113-118.  doi:10.3969/j.issn.1006-2475.2012.11.029
    Asbtract ( 437 )  
    Related Articles | Metrics
    It is a very necessary and urgent work to strengthen the environmental petition by the information technology. This paper comprehensively analyzes the present situation and disadvantages of the environmental petition, proposes the system design framework and design method of functional modules based on service-oriented architecture (SOA), emphasizes the key theory and technology, including components, enterprise service bus and workflow management.
    Design and Realization of Computer Examination System Based on Continuing Education
    ZHEN Yan-ling;SUN Zhi-yong
    2012, 1(11):  119-122.  doi:10.3969/j.issn.1006-2475.2012.11.030
    Asbtract ( 422 )  
    Related Articles | Metrics
    This paper mainly explores the research and development on various forms of continuing education-oriented computer examination system, takes the course of computer application fundamentals as an example, tries to use the advanced development components to research and design computer examination system. The goal is to make full use of the advantage of network and the existing development component flexible properties, with teaching research, to design a really strong adaptability computer examination system, to create a safe, convenient and efficient online "machine tests" platform, to make the contribution for the continuing education experiment teaching reform and "machine tests" mode reform.
    Development of Reservation System of Stadium Based on .NET
    DAI Xiao-jing;ZHANG Ning
    2012, 1(11):  123-126.  doi:10.3969/j.issn.1006-2475.2012.11.031
    Asbtract ( 403 )  
    Related Articles | Metrics
    This article firstly introduces the necessity of the booking business of stadiums, secondly analyzes the demands and the architecture of system, and then represents the design of database, at last expresses the key technologies to realize the system.
    Design and Realization of Intelligent Shaping System for Submersible Pump
    ZHANG Yu-juan
    2012, 1(11):  127-129+.  doi:10.3969/j.issn.1006-2475.2012.11.032
    Asbtract ( 386 )  
    Related Articles | Metrics
    The intelligent shaping system of submersible pump has practical significance for oil production in shallow sea oil fields. The related computation model in the intelligent shaping system is built to compute the flow speed of motor surface, pump depth, bottomhole flow pressure, etc. Taking the capacities of computer for numerical computation, plotting and large-capacity data storage, this system combines the data from oil exploration, well drilling, well completion and oil production process to build an intelligent shaping design model of submersible pump with computer platform processing. The design and realization of the intelligent shaping system for submersible pump improve work efficiency, save heavy money, move closer to the global advanced ranks for the shallow sea oilfield development.
    Construction of Personalized Library Electronic Resource Management System Based on JSP
    YU Ya-xiu;XU Ting
    2012, 1(11):  130-133.  doi:10.3969/j.issn.1006-2475.2012.11.033
    Asbtract ( 378 )  
    Related Articles | Metrics
    For the current problem that electronic resource management system has a single function, this article introduces the shortcomings of using traditional static pages to display electronic resource, and describes the technologies of developing electronic resource management based on JSP. Finally, it realizes a personalized platform that readers will not get lost.
    信息安全
    Key Private Conditional Proxy Re-encryption in Standard Model
    REN Yong-jun;XU Xin-wei;FANG Le
    2012, 1(11):  134-141.  doi:10.3969/j.issn.1006-2475.2012.11.034
    Asbtract ( 387 )  
    Related Articles | Metrics
    In proxy re-encryption, a proxy can transform the ciphertext under the delegator’s public key into another ciphertext that the delegatee can decrypt by its own private key. However, the proxy cannot access the plaintext. Due to its transformation property, proxy re-encryption can be used in many encrypted communication applications, such as encrypted email forwarding. However none of the existing conditional proxy re-encryption schemes satisfies key private. Based on the decision bilinear Diffie–Hellman assumption and the truncated q-ABDHE assumption, this paper proposes the first such CCA security conditional proxy re-encryption in the standard model.
    Improved (k, n, t, m, p) Threshold Scheme Based on Order
    GAO Zhen-dong;ZHAO Peng-peng
    2012, 1(11):  142-144.  doi:10.3969/j.issn.1006-2475.2012.11.035
    Asbtract ( 375 )  
    Related Articles | Metrics
    As an important method for secret sharing and key recovery, threshold scheme has been widely studied and applied since it has been proposed. Considering the needs of practical application and in order to enhance the security of traditional threshold scheme, this paper presents an improved threshold scheme based on order by approximate infinitely expanding the number of arrangement in the order of combination. So the attacker is difficult to recover the original secret even if he gets all shared secret. Thus, the security of threshold scheme is greatly increased, and the application of threshold scheme is expanded.
    Resource Optimization of Advanced Encryption Standard and Its Implementation for FPGA
    YIN Wei-feng
    2012, 1(11):  145-148+.  doi:10.3969/j.issn.1006-2475.2012.11.036
    Asbtract ( 384 )  
    Related Articles | Metrics
    This paper presents a compact hardware architecture for the AES algorithm which aims at reducing hardware resources without using a memory. The architecture only requires one combined S-box for encryption, decryption and key expansion which implements the multiplicative inverse in the composite field GF(24). In addition, the optimized combined MixColumns module has a lower gate count than other designs that implement mix columns operation. VHDL code is developed for the implementation of 128-bit data encryption with Device Cyclone of Altera Family.
    Design and Implementation of Serial Communication Card Against Electromagnetic Leakage
    PAN Chun-di;HU Xiao-ji
    2012, 1(11):  149-154+.  doi:10.3969/j.issn.1006-2475.2012.11.037
    Asbtract ( 373 )  
    Related Articles | Metrics
    Military communication equipments produce electromagnetic leakage during normal works. The signals can be restored into useful information by the enemy's intelligence system, which results in disclosure of confidential. It is a great threat to national information security. This paper designs a serial communication card against electromagnetic leakage by using the TEMPEST technology to start from the components, the filter circuit, wiring and printed circuit board, eliminating the root causes of a strong electromagnetic wave. In order to achieve that CPCI interface could communicate with the serial port directly, a new type of structure using FPGA as the core is introduced. An asynchronous FIFO is used for the cross-clock domain data buffer. The top-down design method is adopted to complete FPGA logic design. The experimental result shows that the design not only realizes the basic RS232 protocol and achieves optional of the baud rate, the data bits, the parity bit and the stop bit, but also meets the requirements of military electromagnetic radiation, prevents the leakage of electromagnetic, guarantees the information and communication security, and has been successfully used for the air test system.
    Analysis and Detection of Hardware Trojan
    MI Qi;HU Qi;XU Chao;YIN Rui
    2012, 1(11):  155-157+.  doi:10.3969/j.issn.1006-2475.2012.11.038
    Asbtract ( 395 )  
    Related Articles | Metrics
    Nowadays the possibility of implanting hardware trojan in chip during the design and manufacturing process is growing higher and higher. In order to avoid large-scales hardware trojan attack, this paper elaborates detailedly the hazard, conception, classification and technical background of hardware trojan, introduces four currently popular hardware trojan detection methods, also gives recommendations for these feasibility methods.
    网络与通信
    Social Network Analysis of Scientists, Organizations and Technologies and Their Relationships
    SUN Zhen-zhen;QU Wen-bo;NI Yi
    2012, 1(11):  158-161.  doi:10.3969/j.issn.1006-2475.2012.11.039
    Asbtract ( 467 )  
    Related Articles | Metrics
    The social network analysis can quantify the relationships between the actors of social network and show the deep relationships and group structure between the nodes through graphical interface. The data in the text is collected from Wikipedia, composing the forefront technologies in the field of computer network, the corresponding information about the outstanding scientists and the authoritative academic organizations. Based on the data, various types of networks such as technologies and scientists network, organizations and scientists network are built. These networks are analyzed from three aspects, the central, cohesion and core-periphery structure. As a result, a number of features such as the hot technology, the core research team and the development trends of computer network is concluded.
    Research and Development of Electronic Medical Records in Mobile Health
    WU Yuan-li;YANG Hong-qiao;WU Fei;LI Xue-si
    2012, 1(11):  162-166.  doi:10.3969/j.issn.1006-2475.2012.11.040
    Asbtract ( 412 )  
    Related Articles | Metrics
    With the rapid development of mobile health in hospitals, doctors have an urgent requirement to access to EMR (Electronic Medical Record) systems with iPad and other mobile tablets in wireless environment to improve efficiency and make medical process accurate and secure. But most existing EMR clients are based on Windows operation system, therefore how to provide mechanisms making EMR mobile becomes an important research issue in mobile health field. This paper presents a comprehensive survey of basic concepts in this field, introduces several key issues, and compares several major solutions. Finally, the trend of research and application is discussed.
    Real-time Patrol and Supervision System Based on WSNs and OPC Technology
    ZHANG Yi;CHEN Zhi-jun
    2012, 1(11):  167-170.  doi:10.3969/j.issn.1006-2475.2012.11.041
    Asbtract ( 376 )  
    Related Articles | Metrics
    This paper presents a new comprehensive equipment monitoring and management system based on WSNs and OPC technology. Through realizing a patrol reader within sensor nodes, a bidirectional and real-time patrol system is combined with supervision system. Designs of sensor node and gateway node are given. WSNs access management platform based on OPC standard to achieve seamless integration with existing systems. Applying hybrid architecture of C/S and B/S makes the system has both advantages on man-machine interaction and openess.
    Research and Implementation of Distributed Full-text Retrieval System Based on Solr
    LI Dai-wei;LI Ning
    2012, 1(11):  171-176.  doi:10.3969/j.issn.1006-2475.2012.11.042
    Asbtract ( 421 )  
    Related Articles | Metrics
    With the rapid growth of network information resources, traditional retrieval system has been difficult to provide efficient and reliable services to the mass data. In response to this situation, this paper designs a distributed full-text retrieval system based on Solr. The system uses a Web crawler to collect information which is stored as text files. Then the system creates indexes in parallel on multiple computers through Solr index module. It turns out that the design improves the indexing speed effectively. The system improves the retrieval performance by applying Zookeeper management and distributed design in search module. Finally a user-friendly interface is designed. Currently, the system can operate millions of data stably and has a strong practical value.
    Design and Implementation of CMCE Protocol Stack Based on Model Driven
    TANG Sheng;MA Yue;YU Zong
    2012, 1(11):  177-181+.  doi:10.3969/j.issn.1006-2475.2012.11.043
    Asbtract ( 369 )  
    Related Articles | Metrics
    It’s in context that the digital trunking communications network is widely used, the development model based on model-driven is used to design, develop and test on the digital trunking circuit mode control entity. First, an overall structure of digital trunked air interface protocol stack is briefly analyzed and a framework of CMCE is summarized. Then, the design of call control is described in detail, and the designs of call control business processes, primitives, PDU and status machine are emphasized. Finally, Rhapsody is used as the development software to implement the protocol stack and its conformance testing, the test results comply with protocol standards.
    An Improved AODV Routing Protocol Based on WSN
    WANG Wei;LI Cong;WANG Yun
    2012, 1(11):  182-185.  doi:10.3969/j.issn.1006-2475.2012.11.044
    Asbtract ( 405 )  
    Related Articles | Metrics
    AODV algorithm chooses the path between the source node and destination node according to the least hops of path, which ignores the possibility of the existence of low-quality links. The improved routing protocol L-AODV collects the link quality information during the broadcasting progress in network. According to the link quality information included in arrived RREQ packets, the destination nodes will choose the path after evaluating the performance by computing path cost. Experimental results show that L-AODV routing protocol is improved in packet delivery rate.
    Design of Framework for Message Middleware-based Vehicle GPS Monitoring System
    NI Dong;ZHANG Su-wei
    2012, 1(11):  186-189.  doi:10.3969/j.issn.1006-2475.2012.11.045
    Asbtract ( 447 )  
    Related Articles | Metrics
    GPS monitoring system is an advanced vehicle monitor means which combines Car GPS terminal and GIS and other software and hardware technology. The message middleware-based monitoring system framework discussed and designed in this article is a loosely coupled, highly cohesive framework whose core is messaging service, it’s designed aiming at supporting centralized deployed large systems which provide stable and efficient monitoring services for hundreds of thousands of vehicles all around the place. Being tested by practice, the framework is feasible, and is capable of designing and achieving monitoring systems over extra-large vehicles.
    An Efficient Information Inquiry Scheme in Vehicular Networks
    DENG Zuo-xiang;ZHOU Xiao-ping
    2012, 1(11):  190-193.  doi:10.3969/j.issn.1006-2475.2012.11.046
    Asbtract ( 360 )  
    Related Articles | Metrics
    The problem of information inquiry in vehicular networks is investigated. An efficient information inquiry scheme is proposed. First, query routing and reply routing are designed, respectively. Then, a strategy of packet forwarding is designed. Finally, abnormal situation handling and optimization are discussed. Real trace driven simulation experiments are conducted. Performance results demonstrate that, compared with an alternative solution, the proposed scheme can achieve lower latency and higher delivery ratio.
    Research on Warning Model for Metropolitan Area Network
    LU Jia-jia;CHEN Rong
    2012, 1(11):  194-196.  doi:10.3969/j.issn.1006-2475.2012.11.047
    Asbtract ( 350 )  
    Related Articles | Metrics
    A system for monitoring metropolitan area network traffic flow is designed and a warning model is studied. Based on SNMP protocol, the network performance and error are monitored, which can achieve the acquisition of network traffic flow for varieties of device ports, and the monitoring data is automatically saved in the database file. In addition, the recorded data can be transformed into the grapy by computer technology. Finally the rates of aggregation group are obtained by time. Through this software, the rates of recorded objects can be monitored and analyzed. If there are unbalanced or abnormal rates, this system will give warning prompts.
    Design and Implementation of Full-text Search Engine Fast Building
    LI Guo-fang
    2012, 1(11):  197-199.  doi:10.3969/j.issn.1006-2475.2012.11.048
    Asbtract ( 375 )  
    Related Articles | Metrics
    The birth of search engine brings great convenience and benefits for information collection, but the development for a set of complete and mature search engine needs to consume a large amount of resources, this paper focuses on how to quickly build a simple search engine. Based on the search engine components and frameworks which are independently developed and provided by open source organizations, the Java API on JBuilder development platform is called to quickly build a simple full-text search engine composed of three major components of the data capture, indexing and search, which realizes the webpage document data capture and preservation, text extraction, establishment of index documents and index databases, basic keyword search and other functions, and describes the general process of search engine achievement and operation.
    应用与开发
    Backlight System Control of Auto-stereoscopic Display
    DING Kang;WANG Yuan-qing;FAN Ke-feng
    2012, 1(11):  200-202+.  doi:10.3969/j.issn.1006-2475.2012.11.049
    Asbtract ( 372 )  
    Related Articles | Metrics
    This paper describes a multi-user auto-stereoscopic display based on a pupil position tracker. It employs Fresnel lens to form separate viewing regions for left and right eyes, where the corresponding left or right image is seen. LCD is used as imaging panel and LED array is used as steerable illumination backlight, enabling the viewing regions to follow the viewers’ eyes. A high-precision multi-user pupil tracker based on AdaBoost algorithm provides real-time detection of pupil locations. AVR MCU is applied for system control. As a result, within view angle of ±25° horizontally, 1-3 users may get vivid 3D images on the 3D display at the same time and move freely.
    Design and Simulation of CPCI-E Backplane
    ZHOU Ya-guang;HU Xiao-ji
    2012, 1(11):  203-208.  doi:10.3969/j.issn.1006-2475.2012.11.050
    Asbtract ( 390 )  
    Related Articles | Metrics
    The design of CPCI-E backplane directly affects the performance of CPCI-E systems. According to the industrial specification, this paper designs a high compatibility CPCI-E backplane, analyzes the signal integrity problems involved in the backplane, and makes targeted design. The feasibility of the design is verified by the method of simulation.
    Transplantation of U-Boot on Nand Flash Based on MPC8315
    WU Lei;HAN You-chuan;ZHENG Yue-wei
    2012, 1(11):  209-213.  doi:10.3969/j.issn.1006-2475.2012.11.051
    Asbtract ( 403 )  
    Related Articles | Metrics
    This paper uses MPC8315E to build a development platform, introduces the features and hardware platform structure of Freescale’s 32-bit microprocessor MPC8315, and gives a brief physical mapping structure of U-Boot, kernel and file system. Nand Flash capacity is larger relative to Nor Flash. The starting of U-Boot in Nand Flash can save Bootloader, kernel and file system in Nand Flash, then Nor Flash is omitted from the hardware. The paper focuses on the cutting and transplantation process of U-Boot on Nand Flash. By configuring the hardware reset word in U-Boot, and analyzing and modifying the Nand start program, the transplantation of U-Boot on Nand Flash is realized. By modifying Makefile to realize the software selective compiler and giving the cross compiler link process in Linux, the paper describes how to generate an executable document in detail.
    Application Research on Pose Estimation Algorithm in Ancient Building Indoor Environment
    SHI Xiao-yan;WAN Tao-ruan;TANG Wen;LI Shi-ning;CHENG Hong-yan;JING Jun-feng;ZHU Yao-lin
    2012, 1(11):  214-216.  doi:10.3969/j.issn.1006-2475.2012.11.052
    Asbtract ( 362 )  
    Related Articles | Metrics
    Camera pose estimation is the key technology of 3D registration. At present, based on the fundamental matrix estimation, the eight-point algorithm is the most popular, but the eight-point algorithm is obvious degradation in the case of planar scene. In order to expand the application scope of the scene in the ancient ruins of indoor environment registration application, the two algorithms based on the five-point algorithm and eight-point algorithm are studied by computer vision. Using the box structure as the environmental structure of ancient buildings, the experimental results show that five-point algorithm than eight-point algorithm has higher accuracy in the recovery of 3D model.
    Construction of Internet Virtual Instruments Lab for Pipeline System
    SUN Fei;DAI Jian;WANG Zhao-li
    2012, 1(11):  217-219+.  doi:10.3969/j.issn.1006-2475.2012.11.053
    Asbtract ( 350 )  
    Related Articles | Metrics
    Virtual instruments is the main development direction of automatic measurement technology now and in the future. Virtual instruments which can reduce experiment cost, solve room shortage, share software and instruments, realize long-distance control, has strong advantages comparing to traditional instruments. The construction of Internet virtual instruments of pilpeline system, which can offer a basic method for research on pipeline system, has important significance on improving measurement and control level, work efficiency and resource sharing.
    Design and Implementation of Unified Search Platform Based on Search Engine
    YANG Wei-chao;LIU Yang;LI Shu-xia
    2012, 1(11):  220-222.  doi:10.3969/j.issn.1006-2475.2012.11.054
    Asbtract ( 366 )  
    Related Articles | Metrics
    In view of the problems such as libraries of all kinds of information resources on different platforms to be retrieved, the paper proposes building a unified search platform based on search engine. In a unified search interface, a search of the literature is able to get all the information resources so that readers can get the most thorough, most accurate, most comprehensive literature information in the shortest possible time.