Loading...

Table of Content

    17 September 2013, Volume 1 Issue 9
    人工智能
    Domain Ontology-based Semantic Search: Weighted Shortest Path Method
    WANG Man;WU Zhen-zhong
    2013, 1(9):  1-7.  doi:10.3969/j.issn.1006-2475.2013.09.001
    Asbtract ( 356 )  
    Related Articles | Metrics
    The most popular methods about information retrieval are based on keywords matching so far. Despite the search models which can indicate the meaning of documents and queries have emerged, they simply match the similarity of vocabulary semantically instead of lexically. However, the huge difference among existing ontologies and the various definitions of semantics with uneven qualities lead to the difficulties in semantic searching by user intention. Therefore, an efficient mechanism working on knowledge discovery and commonsense reasoning is extremely needed. This paper proposes a novel retrieval method combining ontology with graph theory. To infer the user intention, it presents the knowledge of documents using computer domain ontology and expands the queries in the shortest path of semantic network. In the search process, it ranks the documents based on both factors of lexical and semantic similarities. This model is proven efficient in improving the accuracy of retrieval through a testing of standard dataset.
    Parameters Optimization Method of PID Controller Based on Genetic Algorithm and Fuzzy Neural Network
    ZHOU Di
    2013, 1(9):  8-12.  doi:10.3969/j.issn.1006-2475.2013.09.002
    Asbtract ( 351 )  
    Related Articles | Metrics
    In allusion to the disadvantages of the traditional parameters optimization method of PID controller for needing the precise mathematic model, the adaptive ability and learning ability of fuzzy control theory and neural network and the global optimization ability of genetic algorithm are used. A parameters optimization method of PID controller based on genetic algorithm, fuzzy control theory and neural network is proposed. The parameters and structure of fuzzy neural network are comprehensively optimized by using genetic algorithm based on the decimal coding. Then the optimized fuzzy neural network is used to compute the three parameters of PID controller in order to obtain the optimization PID controller. Finally, the optimization method is applied in the central air conditioning control system of Dazhou Iron & Steel Group, the simulation results show that the optimization method takes on the strong anti-interference ability and robustness.
    Ontology Construction Method Based on Description Logic Reasoning
    ZHU Li;YANG Qing
    2013, 1(9):  13-17.  doi:10.3969/j.issn.1006-2475.2013.09.003
    Asbtract ( 345 )  
    Related Articles | Metrics
    Ontology is becoming one of the important research points in the area of semantic Web, which is enable to fulfill knowledge appearance, information retrieval. And as the basis of ontology description language, description logic is the formal tool of knowledge representation and reasoning, providing strong capabilities of representation and effective reasoning service mechanism, which has been extensively applied to various fields of compute science, such as artificial intelligence, database, information collaboration system and knowledge management. This paper detailedly studies the theory of description logic and its reasoning mechanism, proposes a new algorithm named Tableaux-RALU, and finally verifies the practical reasoning in the process of the concrete ontology construction.
    A Method of Policy Conflict Detection Based on Ontology and SWRL Rules
    REN Xiao-qing;ZHOU Jie;SHEN Li-hua;SUN Shao-lin
    2013, 1(9):  18-22,2.  doi:10.3969/j.issn.1006-2475.2013.09.004
    Asbtract ( 396 )  
    Related Articles | Metrics
    Policy conflict detection and solution is a key and difficulty point of research on policy. This paper employs the concept of ontology in the modeling of policy, and then proposes a new method of policy conflict detection based on SWRL rules. At last, with the support of Protégé, using the Jess engine, the validity and feasibility of the proposed method are proved out.
    Algorithm for Strong Vertex-distinguishing Total Coloring of Circle Graphs
    ZHAO Huan-ping
    2013, 1(9):  23-26.  doi:10.3969/j.issn.1006-2475.2013.09.005
    Asbtract ( 308 )  
    Related Articles | Metrics
    According to the feature of strong vertex-distinguishing total coloring of circle graphs, the paper proposes an algorithm model, in the model there are two situations of three-four adjacent or three-five adjacent for any two adjacent points. Using the model to design a combinatorial construction algorithm, the algorithm is proved to get the strong vertex-distinguishing total chromatic number of circle graphs of given points. The experimental results show that this algorithm can effectively solve the problem of strong vertex-distinguishing total coloring of circle graphs.
    Reliability Evaluation Model for Grid Node Using Fuzzy Logic
    CHEN Kui;LIU Bo
    2013, 1(9):  27-30,3.  doi:10.3969/j.issn.1006-2475.2013.09.006
    Asbtract ( 317 )  
    Related Articles | Metrics
    For the dynamic resources of grid nodes result in failure of task execution in the grid environment, a reliability evaluation model for grid nodes is proposed. The model takes the usages of CPU, memory and network into account, uses fuzzy logic to deduce the probability of successful task execution of grid nodes. Experimentation is designed to use the model for task scheduling. The results demonstrate that the model not only makes a good evaluation of grid nodes reliability, but also improves task scheduling performance.
    Incomplete Data Information Entropy Classification Algorithm Based on AdaBoost
    LYU Jing;SHU Li-lian
    2013, 1(9):  31-34.  doi:10.3969/j.issn.1006-2475.2013.09.007
    Asbtract ( 335 )  
    Related Articles | Metrics
    At present, the ensemble classification algorithms for incomplete data do not consider the differences among attributes. They weight the sub-classifiers just using the size and the dimension of sub-dataset. In this paper, the information entropy is used to quantify the differences among various sub-datasets, and then the weights for each sub-classifier are computed. So, the weighted voting is fairer, and the prediction accuracy is higher. Experiments on UCI datasets with base classifier of BP show that the proposed algorithm is better than the algorithm using simple weight.
    MapReduce-based Web Log Mining Preprocessing
    MAO Yan-qi;PENG Pei-fu
    2013, 1(9):  35-37,4.  doi:10.3969/j.issn.1006-2475.2013.09.008
    Asbtract ( 425 )  
    Related Articles | Metrics
    This article describes the general process of Web log mining and focuses on the study of Web session division in the preprocessing of Web log mining. The article introduces the concept and advantages of cloud computing. For the bottleneck analysis of Web log mining, as well as the difficulties of data storage and sharing, we proposed MapReduce-based Web log mining preprocessing, which can better solve the efficiency issues currently faced in Web log mining and better integrate the computer resources to reduce unnecessary waste.
    Knowledge Discovery in Rough Sets Based on Granular Computing
    ZHENG Xiao-hui
    2013, 1(9):  38-41.  doi:10.3969/j.issn.1006-2475.2013.09.009
    Asbtract ( 370 )  
    Related Articles | Metrics
    The theory of rough sets is a prevalent way for data processing at present, and the granular computing has been a hot spot of the theory of rough sets. In this paper, the theory of granular computing is applied to the process of rough sets in knowledge discovery, the existing knowledge reduction algorithm is improved, and a new method is put forward to increase the speed of knowledge reduction. This paper does a research on the way of reduction in data application by the theory of rough sets and granular computing.
    Load Balancing of Cloud Environment Based on Optimized Ant Colony Algorithm
    LIU Xiao-xi;LI Zhuo-yue
    2013, 1(9):  42-45.  doi:10.3969/j.issn.1006-2475.2013.09.010
    Asbtract ( 314 )  
    Related Articles | Metrics
    The perspective of this research is the load balancing of cloud computing resources. We put forward a program, which is an optimized ant colony algorithm for load balancing of cloud computing. The specific program introduces the pre-optimized sequencing strategy and elitist strategy into the load balancing of ant colony algorithm. We design a simulation for the algorithm, which tests and verifies the algorithm assumption, and the results of this experiment show the effectiveness of the algorithm.
    Mining Technology Topics from Recruitment Information Using LDA
    SHI Qian-kun;LIANG Zheng-you
    2013, 1(9):  46-49.  doi:10.3969/j.issn.1006-2475.2013.09.011
    Asbtract ( 300 )  
    Related Articles | Metrics
    There is a huge number of recruitment information on Internet. These information not only respect the requirements from companies, but also imply the hot technologies in market and the technology topics in companies. For the technology topics implied by recruitment information, this paper proposes a method combining sentence classification and topic extraction. This method uses LDA to model the recruitment information, and then classifies the sentences about technology by SVM, finally, extracts the technology topics from the technology sentence and integrates them into the technology topics of recruitment information. Experimental results show that the method achieves good effect in extracting the technology topics from recruitment information.
    A Collaborative Filtering Algorithm Based on Clustering of Users Trust
    WANG Zong-wu
    2013, 1(9):  50-53.  doi:10.3969/j.issn.1006-2475.2013.09.012
    Asbtract ( 285 )  
    Related Articles | Metrics
    At present, the large number of users has led to speed bottleneck problem, and the addition of new users has led to the cold start problem in collaborative filtering algorithm. A collaborative filtering algorithm is proposed based on clustering of the users trust and interests. The algorithm clusters the users based on their trust degree and scoring similarity. The experimental results show that, this method not only accelerates the results recommended, but also improves the accuracy of recommendation.
    DNA Similarity Comparison Algorithm Based on Discrete Curve Torsion
    FAN Min-jie;LI Qian;XU Yong-an
    2013, 1(9):  54-57.  doi:10.3969/j.issn.1006-2475.2013.09.013
    Asbtract ( 314 )  
    Related Articles | Metrics
    Discrete curves describe the DNA character sequence trend and the complete DNA information in 3D space. When a curve with the DNA sequence has a one-to-one mapping between natures, the inherent characteristic values of the curve itself will be able to describe the biological characteristics of the DNA sequence. On the basis of that the mature Z curve describes the DNA sequence, combining the curve torsion, a determination method for the degree of similarity between the DNA discrete curves is proposed. By comparing 10 kinds of cDNA sequence of bird flu virus, the comparison method is validated. Compared with the traditional dynamic programming algorithm, this method is reliable, and the computer geometry method can be fully used in transforming the traditional gene sequence character comparison into the space discrete curve similar comparison.
    软件工程
    Hierarchical Static Test Method in Code Analysis
    XU Lu-lu;ZHANG Li-ping;GUO Yue
    2013, 1(9):  58-61,6.  doi:10.3969/j.issn.1006-2475.2013.09.014
    Asbtract ( 377 )  
    Related Articles | Metrics
    To increase the accuracy and credibility of outputs for static analysis tool of speed heavy proportion, this paper proposes a hierarchical static testing method. In the first level, the static analysis tool of speed heavy proportion is selected to generate the initial outputs of detection. In the second level, the alarm messages of the initial test results are used to extract the program slices. The alarm program slices are formally abstracted into Boolean formula to determine the true-false of slices by the SAT solver. The accuracy of analysis tools is improved by integrating the results of the first level and the second level. The experimental results show that the method can improve the accuracy and credibility of analysis tools in a certainty and can also reduce the false positives effectively.
    Model of Component Testing Knowledge Management
    HAN Xian-yu;LI Li;LI Rui
    2013, 1(9):  62-65.  doi:10.3969/j.issn.1006-2475.2013.09.015
    Asbtract ( 298 )  
    Related Articles | Metrics
    In order to make sure of effective management for component testing information, this article makes an intensive analysis of features of component testing domain. Combining with technology of knowledge management, a model of component testing information knowledge management is established. Based on this model, we construct the relationship network model and ontology model of component testing domain by using the technology of ontology. An effective knowledge management model for component testing domain is proposed.
    Design and Implementation of Fault-tolerant Architecture Based on R-OSGi
    HUANG Han
    2013, 1(9):  66-70,7.  doi:10.3969/j.issn.1006-2475.2013.09.016
    Asbtract ( 302 )  
    Related Articles | Metrics
    Fault-tolerant is a key method to implement reliability and availability in pervasive computing. The OSGi standard lacks support for fault-tolerant. This article suggests a fault-tolerant architecture supporting R-OSGi. It does not modify the original R-OSGi implementation code and framework, makes full use of the R-OSGi and OSGi framework mechanisms and services to provide the same fault tolerance service for external. By analyzing the fault-tolerant agent, fault-tolerant steps, state maintenance and other related components of the core component replication manager in fault-tolerant framework, it approaches to conclude that the fault-tolerant architecture can meet the needs for three elements of fault tolerance features and services, which enables fast, efficient development of applications based on fault-tolerant systems. The experiments show that the method can meet the remote communication fault-tolerant requirements and is of good practicality.
    Consistent Hashing Algorithm in Multiprocessor System Process Distribution
    GUO Ning;ZHANG Xin
    2013, 1(9):  71-74.  doi:10.3969/j.issn.1006-2475.2013.09.017
    Asbtract ( 279 )  
    Related Articles | Metrics
    The distributing process algorithm plays an important role in multiprocessor performance. This study designs a consistent hashing-based distributing process (CH-DP) algorithm. Firstly, both the processors and the processes are mapped to the close address range, and then the CH-DP algorithm distributes the processes to the closest idle processor in a clockwise direction. The CH-DP algorithm can balance the processor loading processes, with high reliability and extension.
    Exploration of Big Data Processing Technology
    XIAO Fei;QI Li-lei
    2013, 1(9):  75-77.  doi:10.3969/j.issn.1006-2475.2013.09.018
    Asbtract ( 312 )  
    Related Articles | Metrics
    “Big data” poses a challenge for traditional information infrastructure. Based on the understanding of big data, an experiment platform for batch mode applications is designed based on open source projects. The relationship between cloud computing and big data is described, and the future of big data applications is discussed.
    Cloud Computing Task Scheduling Strategy Based on Improved Particle Swarm Algorithm
    MA Liang;LI Xiao
    2013, 1(9):  78-81,1.  doi:10.3969/j.issn.1006-2475.2013.09.019
    Asbtract ( 317 )  
    Related Articles | Metrics
    Task scheduling is an important issue for cloud computing research. Based on detailedly quantitative analysis of the environment and task of cloud computing, this article proposes an improved particle swarm scheduling algorithm, focuses on task completion time and load balancing to optimize task scheduling in cloud computing. The experiments show that the algorithm is of better performance, not only makes the task completion time efficient, but also effectively considers load balancing, achieves a certain effect.
    图像处理
    Driver Fatigue Detection Based on Multi-scale Local Binary Pattern Histogram Fourier Feature and Support Vector Machine
    ZHAO Li-kun;JIANG Xin-hua;YANG Hai-yan;
    2013, 1(9):  82-85,9.  doi:10.3969/j.issn.1006-2475.2013.09.020
    Asbtract ( 290 )  
    Related Articles | Metrics
    In order to reduce the image detection effect from the changes of the driver’s position in the driver fatigue detection, a driver fatigue detection method is proposed based on multi-scale local binary pattern histogram Fourier feature (MLBPH-FF) and support vector machine (SVM). The method includes two processes which are training and recognition. During training, we firstly extract the features of the driver’s facial fatigue and non-fatigue images captured from video stream, calculate and get the MLBP histogram (MLBPH) using different scales of the uniform local binary pattern (LBP) operators, then combine them and use discrete Fourier transform to get the MLBPH-FF. At last, we input these features data to the SVM and train them to get its model and parameters. During recognition, we calculate the MLBPH-FF of the testing image samples, then input these MLBPH-FF to the trained SVM to detect fatigue. The experimental result shows that this method is of better identification rate on fatigue detection and performs stably and robustly on different illuminations and poses.
    Adaptive Window Target Tracking of PTZ Camera Based on Projection
    QIAN Ke-jun;ZHENG Ai-hua;TU Zheng-zheng;LUO Bin
    2013, 1(9):  86-90.  doi:10.3969/j.issn.1006-2475.2013.09.021
    Asbtract ( 349 )  
    Related Articles | Metrics
    This paper presents an adaptive target tracking method based on optical projection on the PTZ camera. The object size in the image varies while the PTZ camera moving, however, the real object size is invariable, and the projection size on the horizontal of the real object is inversely proportional to the size of the object in the image. Therefore, we project the real 3D object to the image to achieve the adaptive window problem in object tracking algorithm. Experimental results demonstrate that this method can figure out the size of the object more accurately.
    Object Tracking Algorithm Based on Image and Depth Fusion
    MA Jun
    2013, 1(9):  91-94.  doi:10.3969/j.issn.1006-2475.2013.09.022
    Asbtract ( 327 )  
    Related Articles | Metrics
    Most object tracking are based on video sequence, visual object tracking is often disturbed by illumination change and the clutter background, it makes the result is of poor robustness. In order to obtain stable tracking results, this paper uses depth data for tracking. Taking into account the stability of the depth data, it does not vary with the illumination or color change, in this paper, we design an object tracking algorithm based on color and depth data fusion. To track object, an integrated particle filtering method is implemented. Due to use depth data in tracking, it shows the trajectory of the object at the same time. Experimental results show that this fused formation algorithm can achieve strong robustness, and have stability result from illumination change and similar color, and also exactly track target in complex scene.
    Rotation-invariant Texture Image Retrieval Based on Nonsubsampled Contourlet Transform and Matrix F-norm
    GUAN Yong-hong
    2013, 1(9):  95-97,1.  doi:10.3969/j.issn.1006-2475.2013.09.023
    Asbtract ( 281 )  
    Related Articles | Metrics
    This paper proposes a novel rotation-invariant texture image retrieval algorithm based on nonsubsampled contourlet transform (NSCT) and matrix F-norm against the common rotation problems for image retrieval. By calculating the F-norm of image subbands decomposed by NSCT, the texture feature elements are extracted. For each scale, the feature elements are re-ordered ascending by the sum of mean and standard deviation of each image subband, the similarity of two images is calculated by the feature vector similarity weighting of different scales. Experiments are conducted on the image set produced by Brodatz database, and the result demonstrates superiority of the proposed method.
    An Approach of Color Recognition Based on SVM-Boosting Classifier
    ZHANG Chao;ZONG Guang-hua
    2013, 1(9):  98-101,.  doi:10.3969/j.issn.1006-2475.2013.09.024
    Asbtract ( 360 )  
    Related Articles | Metrics
    To obtain a higher recognition rate and a better robustness to a change in the intensity of illumination, this paper presents an approach of color recognition based on a combination of SVM classifier and Boosting classifier (SVM-Boosting classifier) for the color identification of ping-pongs. First, two color features independent on the intensity of illumination are selected to train SVM classifier, and four color features are selected to generate Boosting classifier. Finally, the SVM-Boosting classifier is constructed. The results show that the method gives a very higher recognition rate, up to 99.4%, for ping-pongs recognition, a higher recognition rate compared to the threshold method and SVM classifier, and a faster recognition speed compared to Boosting classifier. The method can satisfy both sides the recognition accuracy and speed, and is particularly suitable to a visual system with high accuracy and large sample capacity.
    Enhanced GWR Image Color Reversion Method Based on Bayer Mode
    ZHANG Tao
    2013, 1(9):  102-104,.  doi:10.3969/j.issn.1006-2475.2013.09.025
    Asbtract ( 244 )  
    Related Articles | Metrics
    An enhanced GWR color reversion and auto white balance algorithm based on Bayer mode image is proposed. The original image data is used to calculate the parameters of white balance. The disadvantage of traditional algorithm in different color complexity scenes is avoided. The algorithm can be used in most color scenes and the complexity of software is reduced. Subjective judgement and objective calculation show that better color reversion effect is got by the algorithm.
    Mobile Augmented Reality Tracking Technology Based on FAST-SURF Algorithm
    CHEN Zhi-xiang;WU Li-ming;GAO Shi-ping
    2013, 1(9):  105-108.  doi:10.3969/j.issn.1006-2475.2013.09.026
    Asbtract ( 339 )  
    Related Articles | Metrics
    In the mobile augmented reality, because the low performance of mobile terminals leads to that the capability of feature extraction matching and tracking recognition is limited, this paper uses the FAST-SURF algorithm to detect and describe the plane marker, to save the feature points into the structure of KD-Tree to accelerate the matching speed with the offline collected feature points, through the KLT tracking algorithm to track the key feature frame to determine the position and orientation of the camera, and to superimpose the three-dimensional virtual items onto the real scene. The transplantation experiments of the algorithm on the Android platform show that, in the case of different angles, certain environmental changes and that the reference image is partly occluded, the system is of good display tracking performance.
    信息系统
    Chlorine Dioxide Generator Monitoring System Based on PLC and Configuration Software
    ZHAI Ming-ge;XUE Bin;GE Xue-zhen
    2013, 1(9):  109-112,.  doi:10.3969/j.issn.1006-2475.2013.09.027
    Asbtract ( 331 )  
    Related Articles | Metrics
    According to the requirement for chlorine dioxide generator monitoring and alarming system, the Siemens S7-200 programmable logic controller (PLC) is used as the data acquisition and processing unit, the Siemens industrial touch panel Smart 1000 IE as the HMI device and the configuration software WinCC flexible 2008 for making monitoring interface, and the PLC Ethernet communication module CP243-1 for extending monitoring interface to the remote control room. The system achieves the following functions: the monitoring and alarming of the chlorine dioxide generator temperature, pressure, level, flow, dosage. The system has been put into use and is of stable and reliable performance.
    Design and Implementation of Laboratory Teaching Management System in University
    TANG Cun-dong;QUAN Shang-ke;WANG Zhi-ping
    2013, 1(9):  113-116.  doi:10.3969/j.issn.1006-2475.2013.09.028
    Asbtract ( 372 )  
    Related Articles | Metrics
    Traditional network management systems only solve the problem of charge. Combining with the actual situation of campus network and laboratory management, using Socket as communication control, C# and SQL Server 2000 as development tools to facilitate the teachers and students as the basic starting point, this paper develops a set of experiment automatic start-up, experiment teaching workload statistics, after-school free computer billing, automatic reminder before class, locking the machine in the integration of humane teaching management system.
    Standardized Design for Rugged Computer Based on CPCI
    LIANG Jun;CHEN Li-fang;WANG Fan;BAN Huai-guo
    2013, 1(9):  117-120,.  doi:10.3969/j.issn.1006-2475.2013.09.029
    Asbtract ( 292 )  
    Related Articles | Metrics
    Starting from the characteristics of rugged computer, this paper expounds on its feasibility and significance of standardization design. For the current mainstream rugged computer based on CPCI bus, based on CPCI specifications, and combined with the actual needs of projects, the paper elaborates the standardization design content from two aspects of structure and electrical product, and highlights the effect of standardized design to improve product quality.
    Flight LBS System Based on iPhone Platform
    LIANG Zhi-xue;QI Li-lei
    2013, 1(9):  121-125.  doi:10.3969/j.issn.1006-2475.2013.09.030
    Asbtract ( 285 )  
    Related Articles | Metrics
    With the development and popularization of intelligent mobile phone and 3G technology, LBS (location based service) has been widely applied. In order to make passengers enjoy the convenience of LBS, we have designed a flight LBS system based on the iPhone platform through the use of Sina micro-blog SNS (social network service). The platform is based on LBS, through the user active check-in services, provides the user information of the same flight and also realizes communication of the target passengers in the journey by using of SNS. Currently, the system has been successfully developed and put into use.
    网络与通信
    Basic Unit Layer Rate Control Method Based on Spatial-temporal Correlation
    LI Wei;MEN Jia
    2013, 1(9):  126-129.  doi:10.3969/j.issn.1006-2475.2013.09.031
    Asbtract ( 313 )  
    Related Articles | Metrics
    In order to obtain accurate quantization parameters for rate control, an improved basic unit layer rate control method for JVT-H017 is proposed. This paper presents a spatial-temporal correlation model, instead of the original linear one to predict the mean absolute difference of the basic unit. At the same time, according to the different complexity estimation of each macro-block in one basic unit, its quantization parameter can be amended adaptively. Experimental results show that the algorithm can avoid the process of updating the parameters and reduce the computational complexity, improve the quality of video encoding and increase the control precision of output rate.
    Simulation Analysis of Tactical Communication Networks Based on VRNET Developer
    HUO Jing-he;SHANG Shi-feng;ZHAI Teng-fei;ZANG Yun-hua
    2013, 1(9):  130-132,.  doi:10.3969/j.issn.1006-2475.2013.09.032
    Asbtract ( 342 )  
    Related Articles | Metrics
    This paper presents a model of network nodes, equipments, protocols, businesses for tactical communication networks based on VRNET Developer. By making use of the ray-tracing method, a wireless electromagnetic propagation model and the simulation platform closed to the actual combat environment are built for the simulation of tactical communication networks. Based on specific scenario simulation, the impacts of complicated terrain and interference to the tactical communication networks are analyzed. The main goal of the study is to provide a way for the further research on tactical communication networks.
    Design of Digital Front End in VHF Doppler Radar
    FU Kang
    2013, 1(9):  133-136.  doi:10.3969/j.issn.1006-2475.2013.09.033
    Asbtract ( 285 )  
    Related Articles | Metrics
    According to the problems of digital down converter based on look-up table, which occupies of a large number of block RAM and hardware multiplier resources, this paper puts forward an efficient and compact CORDIC-DDC architecture for implementation of DDC in FPGA, and the detailed performance analysis is made. Compared to the traditional look-up table implementation, the actual system implementation results show that the multiplier-free method achieves savings of above 60% of the block RAM resources, and increasing 38% of the maximum operating speed.
    An Optimized Join Query Method for Wireless Sensor Networks
    WU Zhuan-hua
    2013, 1(9):  137-142.  doi:10.3969/j.issn.1006-2475.2013.09.034
    Asbtract ( 281 )  
    Related Articles | Metrics
    In order to develop the dynamic query method that suits environment, this paper proposes an optimized join query method that is applicable to limited bandwidth context. The dynamic join optimization problem in multi-hop wireless sensor network is resolved and a cost-based model is designed. Moreover, a self learning and adaptive heuristic method is put forward, which chooses the best algorithm and selective variable value according to the actual situation. This algorithm can predict the selectivity in advance, and can optimize the pairs of data streams. The effectiveness of the proposed method is verified by experiments on standard data sets.
    Transmission Scheme of Vector Map on Mobile Terminal
    XING Zhi-qiang
    2013, 1(9):  143-147.  doi:10.3969/j.issn.1006-2475.2013.09.035
    Asbtract ( 337 )  
    Related Articles | Metrics
    Based on the analysis of the current situation of the existing mobile terminals and the variety of internal factors of progressive transmission of spatial vector information, we determined to change the hierarchical progressive transmission method of vector maps into the sub-regional progressive transmission method to solve the problem that the browse effects of large data sets are not very desirable. We adopted the sub-regional compression method to transmit, keeping the original dimension data in the center area and showing the compress data in others. We adopted the next generation network graphic standards SVG, combined with the Java Web, HTML5 technologies to implement progressive transmission system, and carried out a plenty of related experiments. These experiments show that the scheme is of feasibility and effectiveness in dealing with the transmission of large data sets on mobile terminals and improvement of the user experiences.
    An Improved Chord Protocol Algorithm Based on Interest Group
    SHEN Jia-ling
    2013, 1(9):  148-151.  doi:10.3969/j.issn.1006-2475.2013.09.036
    Asbtract ( 290 )  
    Related Articles | Metrics
    Chord protocol is a typical structured P2P networks protocol based on DHT protocol. The DHT mechanism shows a good robustness in node failure, attack and suddenly high load, and is also of good scalability. But, because the classic Chord protocol does not consider the topological structure, it leads to low routing efficiency in practice. This paper further analyzes the P2P network system and the Chord protocol algorithm based on interest group, proposes a Chord protocol algorithm optimization and improvement strategy, and emulates the effectiveness of the algorithm.
    End-to-end Argument in Internet Architecture
    MEN Jia;LI Wei
    2013, 1(9):  152-156.  doi:10.3969/j.issn.1006-2475.2013.09.037
    Asbtract ( 535 )  
    Related Articles | Metrics
    This paper discusses the design principle of Internet architecture, analyzes and summarizes the guiding role played by end-to-end argument in today’s Internet architecture forming process, and explains the conflicts between the current complex application requirements and this argument from multiple perspectives. Finally, the end-to-end argument is re-examined and some recommendations are proposed.
    A Topic Relativity Judging Model Based on Semantic Information
    ZHUO Zhi-hong
    2013, 1(9):  157-159,.  doi:10.3969/j.issn.1006-2475.2013.09.038
    Asbtract ( 360 )  
    Related Articles | Metrics
    Vertical search engine provides such services for people, which treats professional knowledge as topics and searches the information related highly to the same topic. The present topic relativity judging algorithms cannot match the speed of information growth. For the match, a topic relativity judging model based on semantic information is provided. The experiment result shows that the performance of the algorithm significantly improves the ability of judging topics, and this method is of great practical value.
    Underground Location System Based on ZigBee Wireless Sensor Network
    YANG Jun;ZHAN Lin
    2013, 1(9):  160-162.  doi:10.3969/j.issn.1006-2475.2013.09.039
    Asbtract ( 272 )  
    Related Articles | Metrics
    At the moment, China’s coal mine safety mining faces the grim situation, accidents occur frequently, the main reason is the backward monitoring system. We present a wireless location network (WLN) based on the application of CC2430/2431 chips. This WLN can match with current mine monitoring system, and provides miners personal position information through upper PC. We give the design of coordinator node, router node and blind node, describe the concrete design of communication protocol, and provide the wireless location algorithm.
    Link Hot Standby Method Based on MSTP+MPLS VPN
    YANG Ju-mei;LUO Xue-mei;ZHANG Ming;HAN Xi
    2013, 1(9):  163-166,.  doi:10.3969/j.issn.1006-2475.2013.09.040
    Asbtract ( 332 )  
    Related Articles | Metrics
    According to the needs of meteorological operations, for upgrading the network link at the national level, it is combined with the current network structure to realize MSTP + MPLS VPN link hot backup. The relevant agreements and core technologies which involve two kinds of link of MSTP and MPLS VPN are deeply analyzed. The configuration of the two kinds of network link structure is focused. The advantages of these two kinds of link for backup each other are fully explained. The bearing and transmitting meteorological business performance of the hot backup link is validated to realize the weather system of double security, to make the weather business transmission quality assurance of higher, and to give full play to the role of meteorological guards.
    Distributed Computing of Eigenvectors and Eigenvalues in Wireless Sensor Networks
    WANG Xiao-lan
    2013, 1(9):  167-171.  doi:10.3969/j.issn.1006-2475.2013.09.041
    Asbtract ( 271 )  
    Related Articles | Metrics
    Due to the data congestion problem in the process of computing the eigenvalues and eigenvectors of sample covariance matrix by using centralized wireless sensor networks, a scheme which uses distributed wireless sensor networks is proposed. This scheme can compute the eigenvalues and eigenvectors of sample covariance matrix in a fully distributed way by using power method and average consensus filter related theory. Simulation results show the correctiveness and effectiveness of the algorithm.
    信息安全
    Software Copyright Protection Based on Computer Fingerprint
    ZHANG Xue-cheng;WANG Yun-xiao;SUN Hai-long
    2013, 1(9):  172-174.  doi:10.3969/j.issn.1006-2475.2013.09.042
    Asbtract ( 320 )  
    Related Articles | Metrics
    After analyzing the advantages and disadvantages of current ordinary shareware copyright protection technologies, a method about how to protect software is designed, which is based on computer fingerprint. In this method, the software uses the fingerprint information of user computer and additional information of software as the feature information of the user computer, and uses these feature information to generate ciphertext by two encryptions using MD5 algorithm and DES, and then uses this ciphertext to validate the software copyright and to achieve the purpose of protection of software copyright.
    Construction of Firewall Based on IPv4/IPv6 Transitional Stage
    CHEN Jiang;SHAN Gui-jun
    2013, 1(9):  175-178.  doi:10.3969/j.issn.1006-2475.2013.09.043
    Asbtract ( 298 )  
    Related Articles | Metrics
    The paper discusses the status and risk of network security during period of IPv4/IPv6 transition. Aiming at the network security demand during the transitional stage, the firewall frames of IPv4/IPv6 transitional stage are designed, and the detailed design of Trans firewall is realized with Netfilter frame based on Linux. At last the Trans firewall is tested through IPv6-in-IPv4 tunneling packet with experimental facilities, and the result shows its validity.
    Data Fusion of Intrusion Detection in Cloud Computing
    LI Lian;ZHU Ai-hong
    2013, 1(9):  179-182.  doi:10.3969/j.issn.1006-2475.2013.09.044
    Asbtract ( 301 )  
    Related Articles | Metrics
    Intrusion detection is a common network security technology, cloud computing proposes new requirements to intrusion detection system(IDS). In distributed intrusion detection system, there are many different types of IDSs, and data fusion enables the combination of the output of different types of IDSs. The design and achievement of data fusion process model are discussed. By making inferences from the combined data, a multiple level-of-abstraction situational description is emerged, and an analysis of the threat of the current situation is presented.
    A Key Agreement Protocol for Ad Hoc Networks Based on ID and Password Authentication
    LI Su-juan
    2013, 1(9):  183-185.  doi:10.3969/j.issn.1006-2475.2013.09.045
    Asbtract ( 367 )  
    Related Articles | Metrics
    A novel multi-party key agreement protocol with password authentication for ad hoc network is proposed. The protocol is composed of system initialization, ID-based password evolvement algorithm, identity authentication algorithm and session keys generation algorithm. The protocol combines ID-based password evolvement with Waters signature to guarantee the validity of public key and the reliability of the node’s identity. The freshness and security of password are guaranteed by sharing password evolvement every time in node’s identity authentication and key agreement. The new protocol enjoys many secure properties such as against dictionary attack, against man-in-middle attack, against replay attack, key independence, forward security, backward security, etc. The analysis shows that the protocol is very suitable for ad hoc network.
    Application of Information Security Key Technologies for Smart Grid in Sino-Singapore Tianjin Eco-city
    YIN Bo;CHEN Lu;CHEN Liang;WANG Yu-fei
    2013, 1(9):  186-189.  doi:10.3969/j.issn.1006-2475.2013.09.046
    Asbtract ( 306 )  
    Related Articles | Metrics
    By analyzing the construction status of security classified protection for electric information systems and the security demand of smart grid, this paper proposes an information security protection model for smart grid based on classified protection. According to the characteristics of smart grid, the presented model describes possible information security protections from aspects of physical, terminal, boundary, network, host, application and data security. With the aim of enhancing the information security defense capability of smart grid, the proposed model can be useful and practical during the construction of smart grid information security facilities.
    应用与开发
    Parameter Optimization of High-reliable Bus in System-on-Chip
    YE Ning;YING Ren-dong;ZHU Xin-zhong;LI Chao;LIU Pei-lin
    2013, 1(9):  190-194,.  doi:10.3969/j.issn.1006-2475.2013.09.047
    Asbtract ( 307 )  
    Related Articles | Metrics
    In order to enhance the robustness of SoC against single event effect (SEE), we focused on the improving of reliability for bus on chip. We built models for error rate of bus and equations of bus reliability. Concerning three situations, we restricted the value of parameters and thus, discussed the optimization of the parameters. For each of the situation, we give the optimized value of parameters that brings us the highest reliability for bus on chip.
    Power Economic Dispatch of Quantum-behaved Particle Swarm Optimization Based on Sobol Disturbance
    ZHANG Lan
    2013, 1(9):  195-198.  doi:10.3969/j.issn.1006-2475.2013.09.048
    Asbtract ( 296 )  
    Related Articles | Metrics
    In order to obtain the optimal solution, we combined with the quasi-random Sobol sequence to introduce the new quantum-behaved particle swarm optimization, which is based on the Sobol sequence disturbances to perturb the average position. On the analysis of the mathematical model of electric power economic dispatch, we handled constraints with penalty functions to solve economic dispatch problem of power system, and the algorithm steps for solving the economic dispatch problem were given. Then we applied this algorithm to a 15-unit system, the experimental results indicated that the algorithm is of high speed, high accuracy and good convergence.
    Simulation of Real-time Fountain Based on Particle System
    WANG Ji-wen;HU Jun
    2013, 1(9):  199-201,.  doi:10.3969/j.issn.1006-2475.2013.09.049
    Asbtract ( 287 )  
    Related Articles | Metrics
    In recent years, computer animation technology has made a great progress, the generation and simulation of natural scenery have been a hot topic for a long time. A method for simulating fountain is presented based on analyzing the realizing principle of particle system. The paper highlights the motion analysis, generation, deletion of fountain particle. The experimental result shows that the method is of real time and achieves the intended purpose.
    Software Architecture Based on Uncorrelated Instructions
    ZHANG Zhe-chun;DING Peng;LIANG Kun
    2013, 1(9):  202-205.  doi:10.3969/j.issn.1006-2475.2013.09.050
    Asbtract ( 306 )  
    Related Articles | Metrics
    This paper presents a realizable architecture of PC control software. The architecture is based on uncorrelated instructions, we take the instruction decoding off the system. After dynamically configuring and encoding, those instructions can be dynamically recombined and invoked at run time. This design of uncorrelated instructions will greatly improve the efficiency of software development and will also do some help to the expandability and maintainability of the application system.
    A Robot Vision Servoing Tracking System Based on Angle Shift
    WU Gang;WANG Xu-wan
    2013, 1(9):  206-209.  doi:10.3969/j.issn.1006-2475.2013.09.051
    Asbtract ( 287 )  
    Related Articles | Metrics
    Machine vision and embedded system are both the hotspots in robot research area. With the development of computer technology, machine vision has been successfully applied in many areas, such as industry and national defense and so on. In this paper, the combination of machine vision and embedded system is used to control contest robot, embedded robot vision servoing platform is designed and both of relative hardware and software are realized. Experiment reveals that the platform can dynamically acquire, process and analyze visual image, then the result of analysis is feed back to the motors that drive the robot to automatically realize dynamic tracking, meanwhile the tracking precision is very well.
    Research and Implementation of Multi-threaded PostgreSQL Storage Engine
    REN Hong-ping;HUANG Sheng
    2013, 1(9):  210-214.  doi:10.3969/j.issn.1006-2475.2013.09.052
    Asbtract ( 330 )  
    Related Articles | Metrics
    In order to solve the problem that the PostgreSQL starts many processes which takes up a lot of system resources, this paper presents an improved method for PostgreSQL storage engine, that is, using the thread pool wake-up call to replace the original PostgreSQL multi-process communication mechanism, so as to solve the problem that the PostgreSQL takes up a lot of system resources while starting large number of processes. Experimental results show that the improved method of PostgreSQL storage engine thread pool can be a good solution to the problems of system resources and improve the implementation efficiency of database.
    Simulation Research on Car Seat Comfort Based on MADYMO
    YU Xiao-bo;GUAN Jun;WANG Xiang
    2013, 1(9):  215-218,.  doi:10.3969/j.issn.1006-2475.2013.09.053
    Asbtract ( 374 )  
    Related Articles | Metrics
    On the basis of analyzing the mechanical structure of seat and the physiological structure of human spine, body pressure distribution of different percentile of dummy model is obtained through software simulation. The software of MADYMO is carried out to output the coordinates of seat reference points, and to obtain the body pressure distribution of different percentile of dummy model.
    Design of Business Intelligence Front-end Tool Based on Mashup Framework
    SUN Yan;PEI Zhen-bao;WEI Wei
    2013, 1(9):  219-225.  doi:10.3969/j.issn.1006-2475.2013.09.054
    Asbtract ( 294 )  
    Related Articles | Metrics
    The construction of BI system is based on data warehousing, ETL, OLAP, data mining and front-end data visualization technology. BI aims to assist business users in decision making by extracting useful information from historical data among all the technologies that constructed BI. BI front-end tool as the interface between business users and the BI system affects the availability of BI’s function in a great extent. BI front-end tool at present stage is developing from C/S architecture to B/S architecture in order to provide end users with better interaction experiences. Based on the advantages of Mashup technology in self-help style application creation, this paper proposes a Mashup framework based architecture for BI front-end tool.
    Data Write-in Middleware for Transferring Word Form Data into Oracle Database
    FENG He-fei;SUN Qian
    2013, 1(9):  226-228,.  doi:10.3969/j.issn.1006-2475.2013.09.055
    Asbtract ( 289 )  
    Related Articles | Metrics
    Aiming at the problem of the original data collection and the secondly entry existed in a database system, we design a middleware to directly transfer the Word form data into the Oracle database by using the Word object model and OracleClient. The good results are achieved by applying this middleware in the data acquisition module of a command information system.
    Protecting Excel Files by Using VBA Program
    LI Hua;GUO Jian-pu
    2013, 1(9):  229-231,.  doi:10.3969/j.issn.1006-2475.2013.09.056
    Asbtract ( 439 )  
    Related Articles | Metrics
    For the problem of copyright and content protection of Excel documents, using VBA code, combining with the protective function of Excel, a more practical solution is provided from a technical point. In this scheme, user identity information is added to the original file with VBA program, and the file contents copy is forbidden. But the normal use of the file is not affected. The protection method for Excel file with VBA program can be also applied to other Office documents.
    Complex Event Processing Model of RFID Middleware
    GONG Hua-ming;YIN Duo-fen
    2013, 1(9):  232-235.  doi:10.3969/j.issn.1006-2475.2013.09.057
    Asbtract ( 375 )  
    Related Articles | Metrics
    For the ubiquitous shortcomings of weak event handler and poor real-time in the RFID middleware, we propose the RFID middleware three-tier data processing model based on complex event processing (CEP). The core technologies of complex event processing are rule definition and event detection. The difficulty of rule-making lies in identifying the parameters and adapting to the changing needs. In view of this, this paper proposes an adaptive rule model, and elaborates on the process of its implementation.
    Transferring Word Text to Unicode Text File by Using VBA
    HAN Ai-qing;MA Xing-guang;ZHANG Wei-wei;ZHAI Xing
    2013, 1(9):  236-238.  doi:10.3969/j.issn.1006-2475.2013.09.058
    Asbtract ( 401 )  
    Related Articles | Metrics
    By using Word VBA, object model and FileSystemObject model, the purpose of this study is to transfer Word text to pure Unicode text file. Furthermore the Unicode file format is consistent with the requirement of BlackBoard test bank system.