Loading...
主 管:江西省科学技术厅
主 办:江西省计算机学会
江西省计算中心
编辑出版:《计算机与现代化》编辑部
Toggle navigation
Home
About Journal
Editorial Board
Journal Online
Online First
Current Issue
Archive
Most Read Articles
Most Download Articles
Most Cited Articles
Subscription
FAQ
Self Recommendation
Contact Us
Email Alert
中文
Office Online
Submission or Manuscript
Peer Review
Editor-in-Chief
Office Work
Instruction
More>>
Instruction
Submit Flow
Template
Copyright Agreement
The Author Changes the Application
Highlights
More>>
Links
More>>
Visited
Total visitors:
Visitors of today:
Now online:
Table of Content
17 September 2013, Volume 1 Issue 9
Previous Issue
Next Issue
人工智能
Domain Ontology-based Semantic Search: Weighted Shortest Path Method
WANG Man;WU Zhen-zhong
2013, 1(9): 1-7. doi:
10.3969/j.issn.1006-2475.2013.09.001
Asbtract
(
397
)
Related Articles
|
Metrics
The most popular methods about information retrieval are based on keywords matching so far. Despite the search models which can indicate the meaning of documents and queries have emerged, they simply match the similarity of vocabulary semantically instead of lexically. However, the huge difference among existing ontologies and the various definitions of semantics with uneven qualities lead to the difficulties in semantic searching by user intention. Therefore, an efficient mechanism working on knowledge discovery and commonsense reasoning is extremely needed. This paper proposes a novel retrieval method combining ontology with graph theory. To infer the user intention, it presents the knowledge of documents using computer domain ontology and expands the queries in the shortest path of semantic network. In the search process, it ranks the documents based on both factors of lexical and semantic similarities. This model is proven efficient in improving the accuracy of retrieval through a testing of standard dataset.
Parameters Optimization Method of PID Controller Based on Genetic Algorithm and Fuzzy Neural Network
ZHOU Di
2013, 1(9): 8-12. doi:
10.3969/j.issn.1006-2475.2013.09.002
Asbtract
(
448
)
Related Articles
|
Metrics
In allusion to the disadvantages of the traditional parameters optimization method of PID controller for needing the precise mathematic model, the adaptive ability and learning ability of fuzzy control theory and neural network and the global optimization ability of genetic algorithm are used. A parameters optimization method of PID controller based on genetic algorithm, fuzzy control theory and neural network is proposed. The parameters and structure of fuzzy neural network are comprehensively optimized by using genetic algorithm based on the decimal coding. Then the optimized fuzzy neural network is used to compute the three parameters of PID controller in order to obtain the optimization PID controller. Finally, the optimization method is applied in the central air conditioning control system of Dazhou Iron & Steel Group, the simulation results show that the optimization method takes on the strong anti-interference ability and robustness.
Ontology Construction Method Based on Description Logic Reasoning
ZHU Li;YANG Qing
2013, 1(9): 13-17. doi:
10.3969/j.issn.1006-2475.2013.09.003
Asbtract
(
428
)
Related Articles
|
Metrics
Ontology is becoming one of the important research points in the area of semantic Web, which is enable to fulfill knowledge appearance, information retrieval. And as the basis of ontology description language, description logic is the formal tool of knowledge representation and reasoning, providing strong capabilities of representation and effective reasoning service mechanism, which has been extensively applied to various fields of compute science, such as artificial intelligence, database, information collaboration system and knowledge management. This paper detailedly studies the theory of description logic and its reasoning mechanism, proposes a new algorithm named Tableaux-RALU, and finally verifies the practical reasoning in the process of the concrete ontology construction.
A Method of Policy Conflict Detection Based on Ontology and SWRL Rules
REN Xiao-qing;ZHOU Jie;SHEN Li-hua;SUN Shao-lin
2013, 1(9): 18-22,2. doi:
10.3969/j.issn.1006-2475.2013.09.004
Asbtract
(
450
)
Related Articles
|
Metrics
Policy conflict detection and solution is a key and difficulty point of research on policy. This paper employs the concept of ontology in the modeling of policy, and then proposes a new method of policy conflict detection based on SWRL rules. At last, with the support of Protégé, using the Jess engine, the validity and feasibility of the proposed method are proved out.
Algorithm for Strong Vertex-distinguishing Total Coloring of Circle Graphs
ZHAO Huan-ping
2013, 1(9): 23-26. doi:
10.3969/j.issn.1006-2475.2013.09.005
Asbtract
(
346
)
Related Articles
|
Metrics
According to the feature of strong vertex-distinguishing total coloring of circle graphs, the paper proposes an algorithm model, in the model there are two situations of three-four adjacent or three-five adjacent for any two adjacent points. Using the model to design a combinatorial construction algorithm, the algorithm is proved to get the strong vertex-distinguishing total chromatic number of circle graphs of given points. The experimental results show that this algorithm can effectively solve the problem of strong vertex-distinguishing total coloring of circle graphs.
Reliability Evaluation Model for Grid Node Using Fuzzy Logic
CHEN Kui;LIU Bo
2013, 1(9): 27-30,3. doi:
10.3969/j.issn.1006-2475.2013.09.006
Asbtract
(
359
)
Related Articles
|
Metrics
For the dynamic resources of grid nodes result in failure of task execution in the grid environment, a reliability evaluation model for grid nodes is proposed. The model takes the usages of CPU, memory and network into account, uses fuzzy logic to deduce the probability of successful task execution of grid nodes. Experimentation is designed to use the model for task scheduling. The results demonstrate that the model not only makes a good evaluation of grid nodes reliability, but also improves task scheduling performance.
Incomplete Data Information Entropy Classification Algorithm Based on AdaBoost
LYU Jing;SHU Li-lian
2013, 1(9): 31-34. doi:
10.3969/j.issn.1006-2475.2013.09.007
Asbtract
(
382
)
Related Articles
|
Metrics
At present, the ensemble classification algorithms for incomplete data do not consider the differences among attributes. They weight the sub-classifiers just using the size and the dimension of sub-dataset. In this paper, the information entropy is used to quantify the differences among various sub-datasets, and then the weights for each sub-classifier are computed. So, the weighted voting is fairer, and the prediction accuracy is higher. Experiments on UCI datasets with base classifier of BP show that the proposed algorithm is better than the algorithm using simple weight.
MapReduce-based Web Log Mining Preprocessing
MAO Yan-qi;PENG Pei-fu
2013, 1(9): 35-37,4. doi:
10.3969/j.issn.1006-2475.2013.09.008
Asbtract
(
477
)
Related Articles
|
Metrics
This article describes the general process of Web log mining and focuses on the study of Web session division in the preprocessing of Web log mining. The article introduces the concept and advantages of cloud computing. For the bottleneck analysis of Web log mining, as well as the difficulties of data storage and sharing, we proposed MapReduce-based Web log mining preprocessing, which can better solve the efficiency issues currently faced in Web log mining and better integrate the computer resources to reduce unnecessary waste.
Knowledge Discovery in Rough Sets Based on Granular Computing
ZHENG Xiao-hui
2013, 1(9): 38-41. doi:
10.3969/j.issn.1006-2475.2013.09.009
Asbtract
(
418
)
Related Articles
|
Metrics
The theory of rough sets is a prevalent way for data processing at present, and the granular computing has been a hot spot of the theory of rough sets. In this paper, the theory of granular computing is applied to the process of rough sets in knowledge discovery, the existing knowledge reduction algorithm is improved, and a new method is put forward to increase the speed of knowledge reduction. This paper does a research on the way of reduction in data application by the theory of rough sets and granular computing.
Load Balancing of Cloud Environment Based on Optimized Ant Colony Algorithm
LIU Xiao-xi;LI Zhuo-yue
2013, 1(9): 42-45. doi:
10.3969/j.issn.1006-2475.2013.09.010
Asbtract
(
345
)
Related Articles
|
Metrics
The perspective of this research is the load balancing of cloud computing resources. We put forward a program, which is an optimized ant colony algorithm for load balancing of cloud computing. The specific program introduces the pre-optimized sequencing strategy and elitist strategy into the load balancing of ant colony algorithm. We design a simulation for the algorithm, which tests and verifies the algorithm assumption, and the results of this experiment show the effectiveness of the algorithm.
Mining Technology Topics from Recruitment Information Using LDA
SHI Qian-kun;LIANG Zheng-you
2013, 1(9): 46-49. doi:
10.3969/j.issn.1006-2475.2013.09.011
Asbtract
(
348
)
Related Articles
|
Metrics
There is a huge number of recruitment information on Internet. These information not only respect the requirements from companies, but also imply the hot technologies in market and the technology topics in companies. For the technology topics implied by recruitment information, this paper proposes a method combining sentence classification and topic extraction. This method uses LDA to model the recruitment information, and then classifies the sentences about technology by SVM, finally, extracts the technology topics from the technology sentence and integrates them into the technology topics of recruitment information. Experimental results show that the method achieves good effect in extracting the technology topics from recruitment information.
A Collaborative Filtering Algorithm Based on Clustering of Users Trust
WANG Zong-wu
2013, 1(9): 50-53. doi:
10.3969/j.issn.1006-2475.2013.09.012
Asbtract
(
320
)
Related Articles
|
Metrics
At present, the large number of users has led to speed bottleneck problem, and the addition of new users has led to the cold start problem in collaborative filtering algorithm. A collaborative filtering algorithm is proposed based on clustering of the users trust and interests. The algorithm clusters the users based on their trust degree and scoring similarity. The experimental results show that, this method not only accelerates the results recommended, but also improves the accuracy of recommendation.
DNA Similarity Comparison Algorithm Based on Discrete Curve Torsion
FAN Min-jie;LI Qian;XU Yong-an
2013, 1(9): 54-57. doi:
10.3969/j.issn.1006-2475.2013.09.013
Asbtract
(
350
)
Related Articles
|
Metrics
Discrete curves describe the DNA character sequence trend and the complete DNA information in 3D space. When a curve with the DNA sequence has a one-to-one mapping between natures, the inherent characteristic values of the curve itself will be able to describe the biological characteristics of the DNA sequence. On the basis of that the mature Z curve describes the DNA sequence, combining the curve torsion, a determination method for the degree of similarity between the DNA discrete curves is proposed. By comparing 10 kinds of cDNA sequence of bird flu virus, the comparison method is validated. Compared with the traditional dynamic programming algorithm, this method is reliable, and the computer geometry method can be fully used in transforming the traditional gene sequence character comparison into the space discrete curve similar comparison.
软件工程
Hierarchical Static Test Method in Code Analysis
XU Lu-lu;ZHANG Li-ping;GUO Yue
2013, 1(9): 58-61,6. doi:
10.3969/j.issn.1006-2475.2013.09.014
Asbtract
(
416
)
Related Articles
|
Metrics
To increase the accuracy and credibility of outputs for static analysis tool of speed heavy proportion, this paper proposes a hierarchical static testing method. In the first level, the static analysis tool of speed heavy proportion is selected to generate the initial outputs of detection. In the second level, the alarm messages of the initial test results are used to extract the program slices. The alarm program slices are formally abstracted into Boolean formula to determine the true-false of slices by the SAT solver. The accuracy of analysis tools is improved by integrating the results of the first level and the second level. The experimental results show that the method can improve the accuracy and credibility of analysis tools in a certainty and can also reduce the false positives effectively.
Model of Component Testing Knowledge Management
HAN Xian-yu;LI Li;LI Rui
2013, 1(9): 62-65. doi:
10.3969/j.issn.1006-2475.2013.09.015
Asbtract
(
340
)
Related Articles
|
Metrics
In order to make sure of effective management for component testing information, this article makes an intensive analysis of features of component testing domain. Combining with technology of knowledge management, a model of component testing information knowledge management is established. Based on this model, we construct the relationship network model and ontology model of component testing domain by using the technology of ontology. An effective knowledge management model for component testing domain is proposed.
Design and Implementation of Fault-tolerant Architecture Based on R-OSGi
HUANG Han
2013, 1(9): 66-70,7. doi:
10.3969/j.issn.1006-2475.2013.09.016
Asbtract
(
349
)
Related Articles
|
Metrics
Fault-tolerant is a key method to implement reliability and availability in pervasive computing. The OSGi standard lacks support for fault-tolerant. This article suggests a fault-tolerant architecture supporting R-OSGi. It does not modify the original R-OSGi implementation code and framework, makes full use of the R-OSGi and OSGi framework mechanisms and services to provide the same fault tolerance service for external. By analyzing the fault-tolerant agent, fault-tolerant steps, state maintenance and other related components of the core component replication manager in fault-tolerant framework, it approaches to conclude that the fault-tolerant architecture can meet the needs for three elements of fault tolerance features and services, which enables fast, efficient development of applications based on fault-tolerant systems. The experiments show that the method can meet the remote communication fault-tolerant requirements and is of good practicality.
Consistent Hashing Algorithm in Multiprocessor System Process Distribution
GUO Ning;ZHANG Xin
2013, 1(9): 71-74. doi:
10.3969/j.issn.1006-2475.2013.09.017
Asbtract
(
322
)
Related Articles
|
Metrics
The distributing process algorithm plays an important role in multiprocessor performance. This study designs a consistent hashing-based distributing process (CH-DP) algorithm. Firstly, both the processors and the processes are mapped to the close address range, and then the CH-DP algorithm distributes the processes to the closest idle processor in a clockwise direction. The CH-DP algorithm can balance the processor loading processes, with high reliability and extension.
Exploration of Big Data Processing Technology
XIAO Fei;QI Li-lei
2013, 1(9): 75-77. doi:
10.3969/j.issn.1006-2475.2013.09.018
Asbtract
(
359
)
Related Articles
|
Metrics
“Big data” poses a challenge for traditional information infrastructure. Based on the understanding of big data, an experiment platform for batch mode applications is designed based on open source projects. The relationship between cloud computing and big data is described, and the future of big data applications is discussed.
Cloud Computing Task Scheduling Strategy Based on Improved Particle Swarm Algorithm
MA Liang;LI Xiao
2013, 1(9): 78-81,1. doi:
10.3969/j.issn.1006-2475.2013.09.019
Asbtract
(
371
)
Related Articles
|
Metrics
Task scheduling is an important issue for cloud computing research. Based on detailedly quantitative analysis of the environment and task of cloud computing, this article proposes an improved particle swarm scheduling algorithm, focuses on task completion time and load balancing to optimize task scheduling in cloud computing. The experiments show that the algorithm is of better performance, not only makes the task completion time efficient, but also effectively considers load balancing, achieves a certain effect.
图像处理
Driver Fatigue Detection Based on Multi-scale Local Binary Pattern Histogram Fourier Feature and Support Vector Machine
ZHAO Li-kun;JIANG Xin-hua;YANG Hai-yan;
2013, 1(9): 82-85,9. doi:
10.3969/j.issn.1006-2475.2013.09.020
Asbtract
(
341
)
Related Articles
|
Metrics
In order to reduce the image detection effect from the changes of the driver’s position in the driver fatigue detection, a driver fatigue detection method is proposed based on multi-scale local binary pattern histogram Fourier feature (MLBPH-FF) and support vector machine (SVM). The method includes two processes which are training and recognition. During training, we firstly extract the features of the driver’s facial fatigue and non-fatigue images captured from video stream, calculate and get the MLBP histogram (MLBPH) using different scales of the uniform local binary pattern (LBP) operators, then combine them and use discrete Fourier transform to get the MLBPH-FF. At last, we input these features data to the SVM and train them to get its model and parameters. During recognition, we calculate the MLBPH-FF of the testing image samples, then input these MLBPH-FF to the trained SVM to detect fatigue. The experimental result shows that this method is of better identification rate on fatigue detection and performs stably and robustly on different illuminations and poses.
Adaptive Window Target Tracking of PTZ Camera Based on Projection
QIAN Ke-jun;ZHENG Ai-hua;TU Zheng-zheng;LUO Bin
2013, 1(9): 86-90. doi:
10.3969/j.issn.1006-2475.2013.09.021
Asbtract
(
426
)
Related Articles
|
Metrics
This paper presents an adaptive target tracking method based on optical projection on the PTZ camera. The object size in the image varies while the PTZ camera moving, however, the real object size is invariable, and the projection size on the horizontal of the real object is inversely proportional to the size of the object in the image. Therefore, we project the real 3D object to the image to achieve the adaptive window problem in object tracking algorithm. Experimental results demonstrate that this method can figure out the size of the object more accurately.
Object Tracking Algorithm Based on Image and Depth Fusion
MA Jun
2013, 1(9): 91-94. doi:
10.3969/j.issn.1006-2475.2013.09.022
Asbtract
(
371
)
Related Articles
|
Metrics
Most object tracking are based on video sequence, visual object tracking is often disturbed by illumination change and the clutter background, it makes the result is of poor robustness. In order to obtain stable tracking results, this paper uses depth data for tracking. Taking into account the stability of the depth data, it does not vary with the illumination or color change, in this paper, we design an object tracking algorithm based on color and depth data fusion. To track object, an integrated particle filtering method is implemented. Due to use depth data in tracking, it shows the trajectory of the object at the same time. Experimental results show that this fused formation algorithm can achieve strong robustness, and have stability result from illumination change and similar color, and also exactly track target in complex scene.
Rotation-invariant Texture Image Retrieval Based on Nonsubsampled Contourlet Transform and Matrix F-norm
GUAN Yong-hong
2013, 1(9): 95-97,1. doi:
10.3969/j.issn.1006-2475.2013.09.023
Asbtract
(
314
)
Related Articles
|
Metrics
This paper proposes a novel rotation-invariant texture image retrieval algorithm based on nonsubsampled contourlet transform (NSCT) and matrix F-norm against the common rotation problems for image retrieval. By calculating the F-norm of image subbands decomposed by NSCT, the texture feature elements are extracted. For each scale, the feature elements are re-ordered ascending by the sum of mean and standard deviation of each image subband, the similarity of two images is calculated by the feature vector similarity weighting of different scales. Experiments are conducted on the image set produced by Brodatz database, and the result demonstrates superiority of the proposed method.
An Approach of Color Recognition Based on SVM-Boosting Classifier
ZHANG Chao;ZONG Guang-hua
2013, 1(9): 98-101,. doi:
10.3969/j.issn.1006-2475.2013.09.024
Asbtract
(
425
)
Related Articles
|
Metrics
To obtain a higher recognition rate and a better robustness to a change in the intensity of illumination, this paper presents an approach of color recognition based on a combination of SVM classifier and Boosting classifier (SVM-Boosting classifier) for the color identification of ping-pongs. First, two color features independent on the intensity of illumination are selected to train SVM classifier, and four color features are selected to generate Boosting classifier. Finally, the SVM-Boosting classifier is constructed. The results show that the method gives a very higher recognition rate, up to 99.4%, for ping-pongs recognition, a higher recognition rate compared to the threshold method and SVM classifier, and a faster recognition speed compared to Boosting classifier. The method can satisfy both sides the recognition accuracy and speed, and is particularly suitable to a visual system with high accuracy and large sample capacity.
Enhanced GWR Image Color Reversion Method Based on Bayer Mode
ZHANG Tao
2013, 1(9): 102-104,. doi:
10.3969/j.issn.1006-2475.2013.09.025
Asbtract
(
305
)
Related Articles
|
Metrics
An enhanced GWR color reversion and auto white balance algorithm based on Bayer mode image is proposed. The original image data is used to calculate the parameters of white balance. The disadvantage of traditional algorithm in different color complexity scenes is avoided. The algorithm can be used in most color scenes and the complexity of software is reduced. Subjective judgement and objective calculation show that better color reversion effect is got by the algorithm.
Mobile Augmented Reality Tracking Technology Based on FAST-SURF Algorithm
CHEN Zhi-xiang;WU Li-ming;GAO Shi-ping
2013, 1(9): 105-108. doi:
10.3969/j.issn.1006-2475.2013.09.026
Asbtract
(
379
)
Related Articles
|
Metrics
In the mobile augmented reality, because the low performance of mobile terminals leads to that the capability of feature extraction matching and tracking recognition is limited, this paper uses the FAST-SURF algorithm to detect and describe the plane marker, to save the feature points into the structure of KD-Tree to accelerate the matching speed with the offline collected feature points, through the KLT tracking algorithm to track the key feature frame to determine the position and orientation of the camera, and to superimpose the three-dimensional virtual items onto the real scene. The transplantation experiments of the algorithm on the Android platform show that, in the case of different angles, certain environmental changes and that the reference image is partly occluded, the system is of good display tracking performance.
信息系统
Chlorine Dioxide Generator Monitoring System Based on PLC and Configuration Software
ZHAI Ming-ge;XUE Bin;GE Xue-zhen
2013, 1(9): 109-112,. doi:
10.3969/j.issn.1006-2475.2013.09.027
Asbtract
(
377
)
Related Articles
|
Metrics
According to the requirement for chlorine dioxide generator monitoring and alarming system, the Siemens S7-200 programmable logic controller (PLC) is used as the data acquisition and processing unit, the Siemens industrial touch panel Smart 1000 IE as the HMI device and the configuration software WinCC flexible 2008 for making monitoring interface, and the PLC Ethernet communication module CP243-1 for extending monitoring interface to the remote control room. The system achieves the following functions: the monitoring and alarming of the chlorine dioxide generator temperature, pressure, level, flow, dosage. The system has been put into use and is of stable and reliable performance.
Design and Implementation of Laboratory Teaching Management System in University
TANG Cun-dong;QUAN Shang-ke;WANG Zhi-ping
2013, 1(9): 113-116. doi:
10.3969/j.issn.1006-2475.2013.09.028
Asbtract
(
407
)
Related Articles
|
Metrics
Traditional network management systems only solve the problem of charge. Combining with the actual situation of campus network and laboratory management, using Socket as communication control, C# and SQL Server 2000 as development tools to facilitate the teachers and students as the basic starting point, this paper develops a set of experiment automatic start-up, experiment teaching workload statistics, after-school free computer billing, automatic reminder before class, locking the machine in the integration of humane teaching management system.
Standardized Design for Rugged Computer Based on CPCI
LIANG Jun;CHEN Li-fang;WANG Fan;BAN Huai-guo
2013, 1(9): 117-120,. doi:
10.3969/j.issn.1006-2475.2013.09.029
Asbtract
(
333
)
Related Articles
|
Metrics
Starting from the characteristics of rugged computer, this paper expounds on its feasibility and significance of standardization design. For the current mainstream rugged computer based on CPCI bus, based on CPCI specifications, and combined with the actual needs of projects, the paper elaborates the standardization design content from two aspects of structure and electrical product, and highlights the effect of standardized design to improve product quality.
Flight LBS System Based on iPhone Platform
LIANG Zhi-xue;QI Li-lei
2013, 1(9): 121-125. doi:
10.3969/j.issn.1006-2475.2013.09.030
Asbtract
(
328
)
Related Articles
|
Metrics
With the development and popularization of intelligent mobile phone and 3G technology, LBS (location based service) has been widely applied. In order to make passengers enjoy the convenience of LBS, we have designed a flight LBS system based on the iPhone platform through the use of Sina micro-blog SNS (social network service). The platform is based on LBS, through the user active check-in services, provides the user information of the same flight and also realizes communication of the target passengers in the journey by using of SNS. Currently, the system has been successfully developed and put into use.
网络与通信
Basic Unit Layer Rate Control Method Based on Spatial-temporal Correlation
LI Wei;MEN Jia
2013, 1(9): 126-129. doi:
10.3969/j.issn.1006-2475.2013.09.031
Asbtract
(
347
)
Related Articles
|
Metrics
In order to obtain accurate quantization parameters for rate control, an improved basic unit layer rate control method for JVT-H017 is proposed. This paper presents a spatial-temporal correlation model, instead of the original linear one to predict the mean absolute difference of the basic unit. At the same time, according to the different complexity estimation of each macro-block in one basic unit, its quantization parameter can be amended adaptively. Experimental results show that the algorithm can avoid the process of updating the parameters and reduce the computational complexity, improve the quality of video encoding and increase the control precision of output rate.
Simulation Analysis of Tactical Communication Networks Based on VRNET Developer
HUO Jing-he;SHANG Shi-feng;ZHAI Teng-fei;ZANG Yun-hua
2013, 1(9): 130-132,. doi:
10.3969/j.issn.1006-2475.2013.09.032
Asbtract
(
396
)
Related Articles
|
Metrics
This paper presents a model of network nodes, equipments, protocols, businesses for tactical communication networks based on VRNET Developer. By making use of the ray-tracing method, a wireless electromagnetic propagation model and the simulation platform closed to the actual combat environment are built for the simulation of tactical communication networks. Based on specific scenario simulation, the impacts of complicated terrain and interference to the tactical communication networks are analyzed. The main goal of the study is to provide a way for the further research on tactical communication networks.
Design of Digital Front End in VHF Doppler Radar
FU Kang
2013, 1(9): 133-136. doi:
10.3969/j.issn.1006-2475.2013.09.033
Asbtract
(
333
)
Related Articles
|
Metrics
According to the problems of digital down converter based on look-up table, which occupies of a large number of block RAM and hardware multiplier resources, this paper puts forward an efficient and compact CORDIC-DDC architecture for implementation of DDC in FPGA, and the detailed performance analysis is made. Compared to the traditional look-up table implementation, the actual system implementation results show that the multiplier-free method achieves savings of above 60% of the block RAM resources, and increasing 38% of the maximum operating speed.
An Optimized Join Query Method for Wireless Sensor Networks
WU Zhuan-hua
2013, 1(9): 137-142. doi:
10.3969/j.issn.1006-2475.2013.09.034
Asbtract
(
326
)
Related Articles
|
Metrics
In order to develop the dynamic query method that suits environment, this paper proposes an optimized join query method that is applicable to limited bandwidth context. The dynamic join optimization problem in multi-hop wireless sensor network is resolved and a cost-based model is designed. Moreover, a self learning and adaptive heuristic method is put forward, which chooses the best algorithm and selective variable value according to the actual situation. This algorithm can predict the selectivity in advance, and can optimize the pairs of data streams. The effectiveness of the proposed method is verified by experiments on standard data sets.
Transmission Scheme of Vector Map on Mobile Terminal
XING Zhi-qiang
2013, 1(9): 143-147. doi:
10.3969/j.issn.1006-2475.2013.09.035
Asbtract
(
381
)
Related Articles
|
Metrics
Based on the analysis of the current situation of the existing mobile terminals and the variety of internal factors of progressive transmission of spatial vector information, we determined to change the hierarchical progressive transmission method of vector maps into the sub-regional progressive transmission method to solve the problem that the browse effects of large data sets are not very desirable. We adopted the sub-regional compression method to transmit, keeping the original dimension data in the center area and showing the compress data in others. We adopted the next generation network graphic standards SVG, combined with the Java Web, HTML5 technologies to implement progressive transmission system, and carried out a plenty of related experiments. These experiments show that the scheme is of feasibility and effectiveness in dealing with the transmission of large data sets on mobile terminals and improvement of the user experiences.
An Improved Chord Protocol Algorithm Based on Interest Group
SHEN Jia-ling
2013, 1(9): 148-151. doi:
10.3969/j.issn.1006-2475.2013.09.036
Asbtract
(
324
)
Related Articles
|
Metrics
Chord protocol is a typical structured P2P networks protocol based on DHT protocol. The DHT mechanism shows a good robustness in node failure, attack and suddenly high load, and is also of good scalability. But, because the classic Chord protocol does not consider the topological structure, it leads to low routing efficiency in practice. This paper further analyzes the P2P network system and the Chord protocol algorithm based on interest group, proposes a Chord protocol algorithm optimization and improvement strategy, and emulates the effectiveness of the algorithm.
End-to-end Argument in Internet Architecture
MEN Jia;LI Wei
2013, 1(9): 152-156. doi:
10.3969/j.issn.1006-2475.2013.09.037
Asbtract
(
595
)
Related Articles
|
Metrics
This paper discusses the design principle of Internet architecture, analyzes and summarizes the guiding role played by end-to-end argument in today’s Internet architecture forming process, and explains the conflicts between the current complex application requirements and this argument from multiple perspectives. Finally, the end-to-end argument is re-examined and some recommendations are proposed.
A Topic Relativity Judging Model Based on Semantic Information
ZHUO Zhi-hong
2013, 1(9): 157-159,. doi:
10.3969/j.issn.1006-2475.2013.09.038
Asbtract
(
404
)
Related Articles
|
Metrics
Vertical search engine provides such services for people, which treats professional knowledge as topics and searches the information related highly to the same topic. The present topic relativity judging algorithms cannot match the speed of information growth. For the match, a topic relativity judging model based on semantic information is provided. The experiment result shows that the performance of the algorithm significantly improves the ability of judging topics, and this method is of great practical value.
Underground Location System Based on ZigBee Wireless Sensor Network
YANG Jun;ZHAN Lin
2013, 1(9): 160-162. doi:
10.3969/j.issn.1006-2475.2013.09.039
Asbtract
(
303
)
Related Articles
|
Metrics
At the moment, China’s coal mine safety mining faces the grim situation, accidents occur frequently, the main reason is the backward monitoring system. We present a wireless location network (WLN) based on the application of CC2430/2431 chips. This WLN can match with current mine monitoring system, and provides miners personal position information through upper PC. We give the design of coordinator node, router node and blind node, describe the concrete design of communication protocol, and provide the wireless location algorithm.
Link Hot Standby Method Based on MSTP+MPLS VPN
YANG Ju-mei;LUO Xue-mei;ZHANG Ming;HAN Xi
2013, 1(9): 163-166,. doi:
10.3969/j.issn.1006-2475.2013.09.040
Asbtract
(
374
)
Related Articles
|
Metrics
According to the needs of meteorological operations, for upgrading the network link at the national level, it is combined with the current network structure to realize MSTP + MPLS VPN link hot backup. The relevant agreements and core technologies which involve two kinds of link of MSTP and MPLS VPN are deeply analyzed. The configuration of the two kinds of network link structure is focused. The advantages of these two kinds of link for backup each other are fully explained. The bearing and transmitting meteorological business performance of the hot backup link is validated to realize the weather system of double security, to make the weather business transmission quality assurance of higher, and to give full play to the role of meteorological guards.
Distributed Computing of Eigenvectors and Eigenvalues in Wireless Sensor Networks
WANG Xiao-lan
2013, 1(9): 167-171. doi:
10.3969/j.issn.1006-2475.2013.09.041
Asbtract
(
333
)
Related Articles
|
Metrics
Due to the data congestion problem in the process of computing the eigenvalues and eigenvectors of sample covariance matrix by using centralized wireless sensor networks, a scheme which uses distributed wireless sensor networks is proposed. This scheme can compute the eigenvalues and eigenvectors of sample covariance matrix in a fully distributed way by using power method and average consensus filter related theory. Simulation results show the correctiveness and effectiveness of the algorithm.
信息安全
Software Copyright Protection Based on Computer Fingerprint
ZHANG Xue-cheng;WANG Yun-xiao;SUN Hai-long
2013, 1(9): 172-174. doi:
10.3969/j.issn.1006-2475.2013.09.042
Asbtract
(
360
)
Related Articles
|
Metrics
After analyzing the advantages and disadvantages of current ordinary shareware copyright protection technologies, a method about how to protect software is designed, which is based on computer fingerprint. In this method, the software uses the fingerprint information of user computer and additional information of software as the feature information of the user computer, and uses these feature information to generate ciphertext by two encryptions using MD5 algorithm and DES, and then uses this ciphertext to validate the software copyright and to achieve the purpose of protection of software copyright.
Construction of Firewall Based on IPv4/IPv6 Transitional Stage
CHEN Jiang;SHAN Gui-jun
2013, 1(9): 175-178. doi:
10.3969/j.issn.1006-2475.2013.09.043
Asbtract
(
342
)
Related Articles
|
Metrics
The paper discusses the status and risk of network security during period of IPv4/IPv6 transition. Aiming at the network security demand during the transitional stage, the firewall frames of IPv4/IPv6 transitional stage are designed, and the detailed design of Trans firewall is realized with Netfilter frame based on Linux. At last the Trans firewall is tested through IPv6-in-IPv4 tunneling packet with experimental facilities, and the result shows its validity.
Data Fusion of Intrusion Detection in Cloud Computing
LI Lian;ZHU Ai-hong
2013, 1(9): 179-182. doi:
10.3969/j.issn.1006-2475.2013.09.044
Asbtract
(
333
)
Related Articles
|
Metrics
Intrusion detection is a common network security technology, cloud computing proposes new requirements to intrusion detection system(IDS). In distributed intrusion detection system, there are many different types of IDSs, and data fusion enables the combination of the output of different types of IDSs. The design and achievement of data fusion process model are discussed. By making inferences from the combined data, a multiple level-of-abstraction situational description is emerged, and an analysis of the threat of the current situation is presented.
A Key Agreement Protocol for Ad Hoc Networks Based on ID and Password Authentication
LI Su-juan
2013, 1(9): 183-185. doi:
10.3969/j.issn.1006-2475.2013.09.045
Asbtract
(
408
)
Related Articles
|
Metrics
A novel multi-party key agreement protocol with password authentication for ad hoc network is proposed. The protocol is composed of system initialization, ID-based password evolvement algorithm, identity authentication algorithm and session keys generation algorithm. The protocol combines ID-based password evolvement with Waters signature to guarantee the validity of public key and the reliability of the node’s identity. The freshness and security of password are guaranteed by sharing password evolvement every time in node’s identity authentication and key agreement. The new protocol enjoys many secure properties such as against dictionary attack, against man-in-middle attack, against replay attack, key independence, forward security, backward security, etc. The analysis shows that the protocol is very suitable for ad hoc network.
Application of Information Security Key Technologies for Smart Grid in Sino-Singapore Tianjin Eco-city
YIN Bo;CHEN Lu;CHEN Liang;WANG Yu-fei
2013, 1(9): 186-189. doi:
10.3969/j.issn.1006-2475.2013.09.046
Asbtract
(
356
)
Related Articles
|
Metrics
By analyzing the construction status of security classified protection for electric information systems and the security demand of smart grid, this paper proposes an information security protection model for smart grid based on classified protection. According to the characteristics of smart grid, the presented model describes possible information security protections from aspects of physical, terminal, boundary, network, host, application and data security. With the aim of enhancing the information security defense capability of smart grid, the proposed model can be useful and practical during the construction of smart grid information security facilities.
应用与开发
Parameter Optimization of High-reliable Bus in System-on-Chip
YE Ning;YING Ren-dong;ZHU Xin-zhong;LI Chao;LIU Pei-lin
2013, 1(9): 190-194,. doi:
10.3969/j.issn.1006-2475.2013.09.047
Asbtract
(
354
)
Related Articles
|
Metrics
In order to enhance the robustness of SoC against single event effect (SEE), we focused on the improving of reliability for bus on chip. We built models for error rate of bus and equations of bus reliability. Concerning three situations, we restricted the value of parameters and thus, discussed the optimization of the parameters. For each of the situation, we give the optimized value of parameters that brings us the highest reliability for bus on chip.
Power Economic Dispatch of Quantum-behaved Particle Swarm Optimization Based on Sobol Disturbance
ZHANG Lan
2013, 1(9): 195-198. doi:
10.3969/j.issn.1006-2475.2013.09.048
Asbtract
(
331
)
Related Articles
|
Metrics
In order to obtain the optimal solution, we combined with the quasi-random Sobol sequence to introduce the new quantum-behaved particle swarm optimization, which is based on the Sobol sequence disturbances to perturb the average position. On the analysis of the mathematical model of electric power economic dispatch, we handled constraints with penalty functions to solve economic dispatch problem of power system, and the algorithm steps for solving the economic dispatch problem were given. Then we applied this algorithm to a 15-unit system, the experimental results indicated that the algorithm is of high speed, high accuracy and good convergence.
Simulation of Real-time Fountain Based on Particle System
WANG Ji-wen;HU Jun
2013, 1(9): 199-201,. doi:
10.3969/j.issn.1006-2475.2013.09.049
Asbtract
(
327
)
Related Articles
|
Metrics
In recent years, computer animation technology has made a great progress, the generation and simulation of natural scenery have been a hot topic for a long time. A method for simulating fountain is presented based on analyzing the realizing principle of particle system. The paper highlights the motion analysis, generation, deletion of fountain particle. The experimental result shows that the method is of real time and achieves the intended purpose.
Software Architecture Based on Uncorrelated Instructions
ZHANG Zhe-chun;DING Peng;LIANG Kun
2013, 1(9): 202-205. doi:
10.3969/j.issn.1006-2475.2013.09.050
Asbtract
(
348
)
Related Articles
|
Metrics
This paper presents a realizable architecture of PC control software. The architecture is based on uncorrelated instructions, we take the instruction decoding off the system. After dynamically configuring and encoding, those instructions can be dynamically recombined and invoked at run time. This design of uncorrelated instructions will greatly improve the efficiency of software development and will also do some help to the expandability and maintainability of the application system.
A Robot Vision Servoing Tracking System Based on Angle Shift
WU Gang;WANG Xu-wan
2013, 1(9): 206-209. doi:
10.3969/j.issn.1006-2475.2013.09.051
Asbtract
(
330
)
Related Articles
|
Metrics
Machine vision and embedded system are both the hotspots in robot research area. With the development of computer technology, machine vision has been successfully applied in many areas, such as industry and national defense and so on. In this paper, the combination of machine vision and embedded system is used to control contest robot, embedded robot vision servoing platform is designed and both of relative hardware and software are realized. Experiment reveals that the platform can dynamically acquire, process and analyze visual image, then the result of analysis is feed back to the motors that drive the robot to automatically realize dynamic tracking, meanwhile the tracking precision is very well.
Research and Implementation of Multi-threaded PostgreSQL Storage Engine
REN Hong-ping;HUANG Sheng
2013, 1(9): 210-214. doi:
10.3969/j.issn.1006-2475.2013.09.052
Asbtract
(
393
)
Related Articles
|
Metrics
In order to solve the problem that the PostgreSQL starts many processes which takes up a lot of system resources, this paper presents an improved method for PostgreSQL storage engine, that is, using the thread pool wake-up call to replace the original PostgreSQL multi-process communication mechanism, so as to solve the problem that the PostgreSQL takes up a lot of system resources while starting large number of processes. Experimental results show that the improved method of PostgreSQL storage engine thread pool can be a good solution to the problems of system resources and improve the implementation efficiency of database.
Simulation Research on Car Seat Comfort Based on MADYMO
YU Xiao-bo;GUAN Jun;WANG Xiang
2013, 1(9): 215-218,. doi:
10.3969/j.issn.1006-2475.2013.09.053
Asbtract
(
415
)
Related Articles
|
Metrics
On the basis of analyzing the mechanical structure of seat and the physiological structure of human spine, body pressure distribution of different percentile of dummy model is obtained through software simulation. The software of MADYMO is carried out to output the coordinates of seat reference points, and to obtain the body pressure distribution of different percentile of dummy model.
Design of Business Intelligence Front-end Tool Based on Mashup Framework
SUN Yan;PEI Zhen-bao;WEI Wei
2013, 1(9): 219-225. doi:
10.3969/j.issn.1006-2475.2013.09.054
Asbtract
(
355
)
Related Articles
|
Metrics
The construction of BI system is based on data warehousing, ETL, OLAP, data mining and front-end data visualization technology. BI aims to assist business users in decision making by extracting useful information from historical data among all the technologies that constructed BI. BI front-end tool as the interface between business users and the BI system affects the availability of BI’s function in a great extent. BI front-end tool at present stage is developing from C/S architecture to B/S architecture in order to provide end users with better interaction experiences. Based on the advantages of Mashup technology in self-help style application creation, this paper proposes a Mashup framework based architecture for BI front-end tool.
Data Write-in Middleware for Transferring Word Form Data into Oracle Database
FENG He-fei;SUN Qian
2013, 1(9): 226-228,. doi:
10.3969/j.issn.1006-2475.2013.09.055
Asbtract
(
339
)
Related Articles
|
Metrics
Aiming at the problem of the original data collection and the secondly entry existed in a database system, we design a middleware to directly transfer the Word form data into the Oracle database by using the Word object model and OracleClient. The good results are achieved by applying this middleware in the data acquisition module of a command information system.
Protecting Excel Files by Using VBA Program
LI Hua;GUO Jian-pu
2013, 1(9): 229-231,. doi:
10.3969/j.issn.1006-2475.2013.09.056
Asbtract
(
480
)
Related Articles
|
Metrics
For the problem of copyright and content protection of Excel documents, using VBA code, combining with the protective function of Excel, a more practical solution is provided from a technical point. In this scheme, user identity information is added to the original file with VBA program, and the file contents copy is forbidden. But the normal use of the file is not affected. The protection method for Excel file with VBA program can be also applied to other Office documents.
Complex Event Processing Model of RFID Middleware
GONG Hua-ming;YIN Duo-fen
2013, 1(9): 232-235. doi:
10.3969/j.issn.1006-2475.2013.09.057
Asbtract
(
420
)
Related Articles
|
Metrics
For the ubiquitous shortcomings of weak event handler and poor real-time in the RFID middleware, we propose the RFID middleware three-tier data processing model based on complex event processing (CEP). The core technologies of complex event processing are rule definition and event detection. The difficulty of rule-making lies in identifying the parameters and adapting to the changing needs. In view of this, this paper proposes an adaptive rule model, and elaborates on the process of its implementation.
Transferring Word Text to Unicode Text File by Using VBA
HAN Ai-qing;MA Xing-guang;ZHANG Wei-wei;ZHAI Xing
2013, 1(9): 236-238. doi:
10.3969/j.issn.1006-2475.2013.09.058
Asbtract
(
443
)
Related Articles
|
Metrics
By using Word VBA, object model and FileSystemObject model, the purpose of this study is to transfer Word text to pure Unicode text file. Furthermore the Unicode file format is consistent with the requirement of BlackBoard test bank system.