Loading...

Table of Content

    28 August 2013, Volume 1 Issue 8
    图像处理
    An Improved Random Walk Algorithm for Image Segmentation
    WANG Mei;LI Yu-jian
    2013, 1(8):  1-6.  doi:
    Asbtract ( 181 )  
    Related Articles | Metrics

    An improved random walk algorithm for image segmentation is proposed to solve the problems of heavy computation and complex, a very slow speed with the increase of pixels and unreliable segmentation performance to color

    image of the traditional random walk algorithm for image segmentation in pixel. First, an improved and optimized watershed transform is used to partition the image into many small homogeneous region pieces. In order to avoid over-

    segmentation problem of watershed, the image is preprocessed with nonlinear anisotropic diffusion smooth algorithm morphologic processing; secondly, the graph based on region is build on the homogeneous region pieces pre-segmented by

    watershed transform and used as graph vertexes of random walk algorithm. Then, the target object interested is segmented out following the user guidance to segment the object. Finally, some experimental results are conducted to compare,

    analyze and evaluate the performance of traditional random walk and the new proposed algorithm. A conclusion and future development is made in the end.

    Automatic Pedestrian Segmentation Algorithms in Video Surveillance System
    HU Jiang-hua;TANG Jin;;LI Cheng-long;LUO Bin;
    2013, 1(8):  7-10.  doi:
    Asbtract ( 221 )  
    Related Articles | Metrics

    Video surveillance system has been applied widely in many fields such as intelligent security, it is one of research focuses in recent years. Segmentation of pedestrians in a video surveillance system is significant,

    and the effectiveness of the segmentation has a direct impact on the object recognition and behavior understanding. An automatic pedestrian segmentation algorithm is proposed in this paper. Firstly, the target is located based on the HOG

    pedestrian detection algorithm, and the foreground and background information is roughly obtained; then, the pre-segmentation information is used as the prior knowledge of GrabCut algorithm, without interactive operation, and the

    pedestrian is segmented automatically and precisely; Finally, the experimental results illustrate that the proposed algorithm is effective and meets the application requirements.

    Fast Face Detection Algorithm Based on CUDA
    SUN Li-chao;ZHANG Sheng-bing;CHENG Xun-tao;ZHANG Meng
    2013, 1(8):  11-14.  doi:
    Asbtract ( 311 )  
    Related Articles | Metrics

    For the traditional CPU facial detection program is difficult to meet the requirements of real-time detection over high definition images, this paper proposes a fast face detection algorithm based on the Viola-Jones

    cascade classifier in the CUDA platform. It implements and improves novel parallel methodologies of image integral calculation, scan window processing and the amplification and correction of classifiers. The load imbalance problem of

    irregular tree structure applications could be effectively solved by the window re-mapping technology used in the scan window processing. The experimental results show that the CUDA program could respectively achieve 17.04, 3.22 times

    speedup compared with the CPU and OpenCV programs for the 1080p image, while maintaining a similar detection quality.

    Method of Pedestrian Detection and Tracking at Entrance of Bus Passenger Terminal
    LI Xi-ying;LU Lin;CHEN Ling
    2013, 1(8):  15-18.  doi:
    Asbtract ( 215 )  
    Related Articles | Metrics

    Accuracy pedestrian detection and tracking is the foundation of pedestrian counting and behavior analysis. In the intelligent video monitoring of bus passenger terminal, multiple pedestrians may walk together. A method

    of pedestrian detection and tracking, which can segment multiple pedestrians, is proposed. Firstly, pedestrians have been detected with the background subtraction, and then multiple human objects have been segmented. Then the trajectory

    of pedestrians are shown after tracking pedestrians with Kalman filter. The experimental results show that this method could draw the trajectory clearly, so as well robust results.

    Inter-view Prediction Based on Virtual-view and Low-rank Matrix Recovery
    LIU Ru-yi
    2013, 1(8):  19-22.  doi:
    Asbtract ( 186 )  
    Related Articles | Metrics

    The new generation of multi-view video introduced depth map for virtual view synthesis. In order to make full use of the depth information and improve the compression efficiency, this paper presents a prediction method

    based on the virtual view and low-rank matrix recovery. First, the paper generates the virtual view by the adjacent views and depth maps, and then searches for several matching blocks from adjacent views using the corresponding block of

    virtual view as reference block. Finally, this paper uses low-rank matrix recovery to de-noise the prediction block. The experimental results show that it can save about 2% bit-rate than the original JMVC inter-view prediction.

    Lossless Compression Algorithm Based on HEVC for Digital Image
    LIU Tie-hua
    2013, 1(8):  23-26.  doi:
    Asbtract ( 229 )  
    Related Articles | Metrics

    In order to improve the efficiency of lossless compression, this paper proposes a lossless compression algorithm based on high efficiency video coding. In this algorithm, pixels in macro block are divided into different

    part to predict, instead of using a block-based prediction as a whole. More specifically, pixels are divided into three parts: pixels of first part are predicted by referring the neighbor macro block pixels; then pixels in other parts

    are predicted using the pixels, which has been predicted, as reference, which can eliminate effectively spatial redundancy. Moreover, since the transform and quantization modules are removed from the framework of HEVC, the residuals need

    to be adjusted to the distribution characteristics in a reasonable order for the entropy coding, thus the purpose of further improving compression efficiency is achieved.

    Method of White Line Recognition for NAO Robot
    ZHANG Sheng;LI Long-shu
    2013, 1(8):  27-29,4.  doi:
    Asbtract ( 200 )  
    Related Articles | Metrics

    NAO perceived the outside world by images, NAO white shell increased the difficulty of white line recognition, this is different from other robot. A method based on image preprocessing is presented, sorting white edge

    with cut-point which is non-differential or derivative is zero, then the results appear after analyzing properties of the subclass. The experiment results show that this method is effective when ambient light change is little, it meets

    the requirement of real-time and robutness for NAO robot.

    Implementation of Improved Median Filtering Algorithm in Real-time and High-speed
    YANG Jing;WANG Yuan-qing
    2013, 1(8):  30-32,4.  doi:
    Asbtract ( 227 )  
    Related Articles | Metrics

    Image processing will introduce noise in the process of generating and acquisition, so image preprocessing must first be done. This paper introduces a rapid median filtering algorithm, which is implemented in hardware

    platform on the condition of real-time processing. In the end, this paper chooses field programmable gates array (FPGA) as a hardware platform, and realizes its algorithm by the hardware description language Verilog. According to the

    result of Modelsim simulation, improved algorithm based on FPGA is not only implemented rapidly, but also is highly and perfectly efficient in the real-time processing.

    Research and Design on Stream De-multiplexing and Synchronous Playback in CMMB
    WU Wei;;CAI Qing-chun;YU Jin-ke
    2013, 1(8):  33-37,4.  doi:
    Asbtract ( 199 )  
    Related Articles | Metrics

    For the rapid development of mobile multimedia services, China has proposed a CMMB system with independent intellectual property rights. This paper researches the de-multiplexing and synchronous playback of video

    broadcasting services on receiving end in CMMB, and proposes an implementation scheme. In general, embedded hardware platform has the problems of high cost and high complexity to study the scheme, so we implements the software of de-

    multiplexer and player on PC platform. The experimental results show that this scheme does well for TV business stored in stream.

    算法分析与设计
    Vehicle Perception and Motion State Forecasting Technology
    GE Ru-hai;GUAN Jun;YU Xiao-bo;SHI Cun-jie
    2013, 1(8):  38-42.  doi:
    Asbtract ( 253 )  
    Related Articles | Metrics

    Currently most automotive active safety warning system which has been put into use is expensive, but stays in the vehicle motion posture monitoring and alarm functions, lacking of further prediction of the vehicle’s

    own motion attitude for future time. Considering these shortcomings, launching vehicle motion prediction and predicting vehicle motion posture for future time in advance, can play a very important role to improve the vehicle’s active

    safety and reduce road traffic accidents. The latest 6-axis Motion Processing Unit(MPU) MPU-6050 can realize vehicle posture parameters online perception. The Kalman filter is designed, through signal fusion processing we can get the

    optimal estimate of the vehicle motion posture parameters, using multi-level recursive model to carry out the prediction research. Finally, taking vertical speed, roll angle and yaw angle for example, we carry on perception and

    prediction. A good prediction effect is got by road test, which shows the feasibility and exploratory of the vehicle perception and prediction technology.

    Research Overview of NP-Complete Problems in Bioinformatics
    TANG Xiao-fen
    2013, 1(8):  43-45.  doi:
    Asbtract ( 218 )  
    Related Articles | Metrics

    This paper introduces several NP-complete problems of bioinformatics. Over the past few years, a number of measures have been proposed for these problems, leading to investigations on the NP-complete problems. But these

    existing measures generally have some shortcomings. the paper presents that there are some hot topics of computational intelligence in bioinformatics field and future research should be paid attention to the problems.

    Algorithm for Detecting Overlapping Communities on Complex Networks
    LYU Xiao-jun
    2013, 1(8):  46-48.  doi:
    Asbtract ( 225 )  
    Related Articles | Metrics

    A new overlapping communities detection algorithm based on links is proposed in this paper, which made the result better for using the extended modularity comparing the algorithm proposed by Ahn[1]. The

    algorithm can deal with small-scale non highly overlapping networks and obtains a good partition result.

    Design and Implementation of Medical Image Visualization System Based on Android and VTK
    LI Jian-zhuang;BAO Su-su;GAO Xuan-hui;QIU Wen-chao
    2013, 1(8):  49-52,5.  doi:
    Asbtract ( 244 )  
    Related Articles | Metrics
    A medical image visualization system is proposed in this paper, which is based on powerful object-oriented Visualization Toolkit(VTK). Firstly, the system architecture is introduced, then the design and realization of each module are analyzed, finally, testing on actual devices is carried out. The visualization and user interaction in medical images including digital imaging and communications in medicine(DICOM) and stereolithography(STL) are implemented.
    Optimization of Passenger Car Transmission System and Design of Software
    LU Meng-ting;SHANG Gao-gao
    2013, 1(8):  53-56.  doi:
    Asbtract ( 198 )  
    Related Articles | Metrics
    Based on the technique of mixed programming by Matlab and C#, the transmission parameters optimization software is developed to improve the performance of passenger car. The power loss rate and the fuel economy are transformed into objective function, and the requirements of the vehicle performance and the gearbox ratio interval are used as constraint conditions. The result of verification example shows that the objective function value is reduced after optimization and the effect of optimization with larger weighted factor of economy is more significant. The performance of passenger car can be improved by increasing the main reducer gear ratio and the transmission ratio range.
    Improved Composite Algorithm in Photovoltaic Generation System
    LI Feng;LIU Chun-sheng;XU Xiao-chun
    2013, 1(8):  57-59.  doi:
    Asbtract ( 215 )  
    Related Articles | Metrics
    This paper proposes a new combined adaptive MPPT algorithm, that is the improved Increment Conductance(INC) method with constant voltage(CVT),method startup and variable step-size. The CVT method is used to fast track the approximate maximum power point, while the improved INC is used for accurate tracking. The proposed method is tested in Matlab∕Simulink environment. The experimental results illustrate the advantages of the new algorithms in contrast with the traditional algorithms with fixed step-size.
    An Improved Divisible Job Algorithm in Grid Environment
    YAN Jie
    2013, 1(8):  60-63,6.  doi:
    Asbtract ( 200 )  
    Related Articles | Metrics
    Based on Uniform Multi-Round (UMR) scheduling algorithm: the job execution time don’t reduce with the assigned node increasing. In the Grid environment, this paper advances the optimization UMR scheduling algorithm: For the specified job, reasonable allocation of the number of resource nodes, rather than all the use of the resource nodes. This makes the resource nodes to use the minimum, meantime reducing the execution of the job time. The experimental results show the algorithm takes advantage of grid resources and improves the efficiency of the job.
    A New Personalized Recommendation Algorithm of Combining Content-based and Collaborative Filters
    WANG Quan-min;LIU Xin;ZHU Rong;LIU Xue-qin
    2013, 1(8):  64-67.  doi:
    Asbtract ( 203 )  
    Related Articles | Metrics
    Personalized recommendation service system is based on user history record and recommendation algorithm to provide personalized information or commodities for different users which they may be interested in. According to the problems exist in collaborative filtering recommendation algorithm and content-based recommendation algorithm respectively, this paper presents a recommendation algorithm called ASVD that alternately merge and optimized project-latent topic matrix which is from the process of using singular value decomposition algorithm to decompose the project-keywords matrix based on project content and user ratings users-project matrix to eliminate the noise to improve the accuracy of the recommendation. Experiments show that the new hybrid algorithm ASVD can significantly improve recommendation accuracy.
    An Efficient Attribute Reduction Algorithm
    LU Guang;LI Xiang;WANG Biao
    2013, 1(8):  68-72,7.  doi:
    Asbtract ( 186 )  
    Related Articles | Metrics
    Rough set theory is an effective mathematical analysis approach to process inconsistent, uncertain and incomplete data and so on. Attribute reduction algorithm is one of the key technologies of rough set theory, and it is one of the important issues in data mining field, it is also a key problem of knowledge acquisition. High-efficiency attribute reduction is proved a NP-Hard problem. It is generally regarded as a preprocessing phase, it also adapts to classificatory analysis of decision tables. This paper puts forward a new method——SEGMENT-SIG, the method can find a minimal attribute subset, which preserves classificatory consistency of a decision table. Its worst-case computational complexity is analyzed. The output of the algorithm are two different kinds of classifiers. One is an IF-THEN rule system, the other is a decision tree.
    Modular Design Method for Blend Arithmetic Operations Membrane System
    CHEN Yi-xi
    2013, 1(8):  73-77.  doi:
    Asbtract ( 138 )  
    Related Articles | Metrics
    Membrane computing is a new computing model, which arouses a lot of interest of researchers. But hardly anybody of them focus on application fields. In order to expand the application fields of membrane computing, this paper focuses on basic arithmetic operations. A modular design method is proposed to design blend arithmetic operation membrane system. The designed result verifies that this method is feasible. Meanwhile, at the end of this paper, some problems are pointed out, which should be solved in further research.
    Texts Clustering of K-means Based on LDA
    ZHENG Cheng;LI Hong
    2013, 1(8):  78-80,8.  doi:
    Asbtract ( 240 )  
    Related Articles | Metrics
    The shortcoming of traditional vector space model expressing texts is the huge dimension. Usually one text is a huge sparse matrix, it is inefficient to compute distance or similarity between texts, and the result of clustering is not satisfactory. In latent dirichlet allocation(LDA), texts are represented by probability distribution of topic vectors, and topics are represented by probability distribution of words. In LDA, when the number of topics is assigned to T, all the texts to be clustering are represented by vectors of T dimension. K-means algorithm is utilized as a text clustering algorithm, and it is verified that LDA-based clustering results are better than that based on vector space model through experiment.
    Design and Application of Judging Arithmetic of TV Rough Tracking
    JIN Peng-fei;SHI Chuan;ZHANG Yang
    2013, 1(8):  81-84.  doi:
    Asbtract ( 174 )  
    Related Articles | Metrics
    TV tracking makes use of visible light or infrared imaging equipments to ingest video image of the object. Then it can follow the tracks of object image through calculation and analysis. TV tracking can be divided into rough tracking and exact tracking. A kind of arithmetic for judging TV rough tracking conditions is introdued in this paper. Necessary conditions of rough tracking is summarized and established. Then whether the TV rough tracking will start is judged by this arithmetic. Practices prove that the arithmetic performed effectively.
    计算机仿真
    Pose Measurement of Non-Cooperative Target Based on Stereo Vision
    XU Pei-zhi;XU Gui-li;WANG Biao;GUO Rui-peng;TIAN Yu-peng;YE Yong-qiang
    2013, 1(8):  85-91.  doi:
    Asbtract ( 208 )  
    Related Articles | Metrics
    The measurement of relative pose (position and attitude) between non-cooperative spacecrafts is the key step for on-orbital service such as autonomous rendezvous and capturing. A stereo vision-based method is discussed to measure the relative pose. The method is composed of image acquiring, image filtering, edge detection, feature extraction, target recognition, 3D reconstruction and relative pose measurement. The computer simulations and experiments on the physical platform have been carried out. The simulation and experiment results indicate the accuracy and reliability of the method.
    Research on Quartz Crystal Resonator with Consideration of Support Effect
    WU Rong-xing;;LI Ji-liang;YU Lan-zhen;WANG Ji
    2013, 1(8):  92-94,9.  doi:
    Asbtract ( 183 )  
    Related Articles | Metrics
    The thickness-shear vibrations of quartz crystal plate have been analyzed by finite element method with three-dimensional theory of piezoelectricity. Through altering the length of plates, radius and the distance between conductive adhesive supports, the frequency curves with different parameters and the consideration of the effect of support are obtained. The effects of conductive adhesive support on vibration modes also have been given by comparing frequency with that of free vibrations.
    Attitude Control and Deformation Simulation of Virtual Hand
    LIU Lei;LI Ji-ting
    2013, 1(8):  95-98.  doi:
    Asbtract ( 186 )  
    Related Articles | Metrics
    The hand rehabilitation system iHandRehab combines robotics with virtual reality to do rehabilitation training for hand injury patients. The training tasks in active mode require us to simulate the process of hand grasping/releasing object in virtual environment. The difficulties are concentrated in posture control and local deformation calculation of hand when it was grasping rigid object. This paper simplifies the index and thumb finger into serial mechanism with 3 phalanges respectively and confirms the final posture of virtual hand according to the constraints among phalanges during virtual grasping. The phalange and object are respectively modeled as pointshell and distance field in collision detection, and puts forward to calculate the local deformation in contact region based on the insertion information of collision points. The experimental results show that this model could accurately simulate the real state of human hand when it is grasping rigid object.
    Design of BIST Testing SRAM Based on MARCH Algorithm
    ZHANG Tong;CHENG Ben-mao;ZHANG Xiao-feng
    2013, 1(8):  99-101.  doi:
    Asbtract ( 227 )  
    Related Articles | Metrics
    With the development of complexity and integration of FPGA, the test technology becomes more important. But the test costs the highest in the design and is the most difficult. As the rapid development of the System-on-Chip, the rate of ATE and memory space of ATE can not satisfy the requirements of the test, so the Built-In-Self-Test method appeared in this world. The purpose of design is to achieve a BIST machine to test a SRAM of 32 words each of 8-bits. The algorithm to be used for BIST is MARCH algorithm. The design should be implemented in Verilog, simulated using QautusⅡ9.0.
    Simulation Analysis of Influence and Damage by Booster Seat Performance Parameters
    WANG Xiang;ZHANG Xue-rong;REN Mei-juan
    2013, 1(8):  102-105.  doi:
    Asbtract ( 176 )  
    Related Articles | Metrics
    In order to reduce the rate that child passengers injury their chest and head in a collision, this paper analyzes the parameters of the child restraint system. It uses the multi body dynamics software MADYMO to establish the child occupant crash simulation model and verifies the validity of the model in accordance with the FMVSS213 regulations. The coefficient of friction between booster seat and car seat, car seat safety belt stiffness and influence on children injury when booster seat changes in the height direction are also analyzed. The results show that covering friction material to boost seat bottom surface in order to improve the coefficient of friction, improving safety belt stiffness and maintaining the current seat height of this booster seat can reduce the injuries on children’s head and chest in collisions significantly.
    Cockpit Simulation and Ergonomics Analysis Based on JACK
    LIU She-ming;WANG Xiao-ping;CHEN Deng-kai;WANG Shu-xia
    2013, 1(8):  106-110.  doi:
    Asbtract ( 331 )  
    Related Articles | Metrics
    To the design of cockpit, the author uses the principle of ergonomics and simulation of JACK software to propose a new kind of cabin layout. The JACK CATIA model is imported to create analysis objects and a digital human model based on ergonomics design of the cockpit, then adjust the posture of the digital human model to simulate the real environment of the driver in the cockpit. The paper proposes some improving advices to shorent the cycle of the design and reduce the costs of design and manufacture.
    Modeling and Analysis of Shift Process Based on CPNTool
    MENG Ni;HAN Dan
    2013, 1(8):  111-115.  doi:
    Asbtract ( 190 )  
    Related Articles | Metrics
    According to the characteristics of shift itself, this paper proposes a modeling method on shift process based on coloring Petri nets. Firstly, cluster analysis is adopted to cluster the vehicle operation parameters inside a single window. The next moment motion state of vehicle is evaluated through the vehicle motion state transfer within a certain period. The speed information and state estimation of vehicle are taken as the decision-making condition of vehicle shifting judgment. CPNTool which has the distinct characteristics of hierarchical structure and the good interactive features of substitution transitions is used to simulate shifting process flow. The state transition time delay is defined on the basis of the traffic environment and the information of vehicle motion state. The best shift order is generated from the several possible shifting process. Finally, the data collected from the real car test are used to validate the model and the test results show that this modeling method can graphically show the flow of driver shift operation. In addition, the model can effectively estimate the cost time of each driver shift process and the degree of driver’s shifting.
    软件工程
    Application of JUnit in Unit Testing
    JIA Mei-li;KANG Jun
    2013, 1(8):  116-118.  doi:
    Asbtract ( 244 )  
    Related Articles | Metrics
    Unit testing is playing a very important role in software development. JUnit is an open source unit testing framework used in Java, this article introduces the application of JUnit for automated testing method through the concrete case.
    An Instruction Interpreter Scheme of Software Protection Virtual Machine
    RONG Guo-zhen;LI Xing-min
    2013, 1(8):  119-121,.  doi:
    Asbtract ( 167 )  
    Related Articles | Metrics
    The traditional untreated binary executable code is vulnerable to static analysis, dynamic analysis, reverse engineering, and tampering malicious attacks. In recent years, process-level virtual machine software technology has been used in the field of software protection. This paper describes a novel process-level virtual machine instruction interpreter scheme applied to software protection. This scheme uses a custom SEH (Structured Exception Handling) to control the obtain of virtual instruction. The results show that this scheme provides a platform for other virtual machine protection methods, and can increase the difficulty of reverse analysis on the existing basis.
    Program Slicing Algorithm Based on Reverse Program Flow and Function Dependency Set
    LIU Yan;LI Long-shu
    2013, 1(8):  122-124,.  doi:
    Asbtract ( 176 )  
    Related Articles | Metrics
    Program slicing technique is mostly based on the accessibility algorithm of program dependence graph (PDG) and system dependence graph (SDG) to get a set of interested programs which are optimized, but to construct PDG and SDG need a lot of time and space. So this paper presents a slicing algorithm based on reverse program flow and function dependency set, it scans the reverse program flow to calculate program slicing of the interested points which only related to data dependence of program slicing. The algorithm mainly considers the calculation of function call, improves the computational efficiency. It also founds that through instances the algorithm reduces the complexity of program slicing calculating, and it is feasible and practical.
    网络与通信
    Design of Industrial Equipment Diagnosing System Based on Sensor Technology
    ZOU Yao-zong;HU Wen-bo
    2013, 1(8):  125-128.  doi:
    Asbtract ( 169 )  
    Related Articles | Metrics
    With the development of the internet of things, the sensor technology has been constantly improved, which also begins to apply to all aspects of society, but is not perfect in the industrial equipment diagnosing management.Based on research of the sensor technology, the paper designs an industrial equipment diagnosing system. With sensor technology, the parameters of industrial site equipment can be detected and queried in real time. The wireless sensor network transmits the data to database server, and the data is finally processed by host computer. In this way the loss caused by reducing equipment failure can be reduced.
    Design of Selection and Control Strategy in Campus Network Flow Identification Technology
    JIANG Shu-long;CHAI Zhi-gang;YU Xiao;ZHAO Ming
    2013, 1(8):  129-132.  doi:
    Asbtract ( 195 )  
    Related Articles | Metrics
    This paper depends on the context of campus network band resource abuse, analyses mostly problem on campus network, and researches on main characteristics of mass data flow on campus network, and uses application identification technology of “DPI+DFI”, and designs integration flow control strategy which is fit for campus network based on different utilization ability for network resource of different application and network segment on campus network.
    RAODV: An Improved AODV Routing Protocol Based on Congestion Hop Count
    WANG Long-feng
    2013, 1(8):  133-136.  doi:
    Asbtract ( 219 )  
    Related Articles | Metrics
    In order to solve the problem of local congestion that always exists in communication process in mobile Ad Hoc networks, RAODV routing protocol based on congestion hop count is presented. Average queue length is improved to predict the congestion situation in RAODV routing protocol. When transmitting route request packet(RREQ), each touring node can adjust dynamically hop count according to their congestion situation, get route hop count which is called congestion hop count, and establishs the shortest path. Simulation results show that RAODV routing protocol can improve the transmission delivery rate of data packet under the same convergence speed and reduce the average end-to-end delay.
    An Efficient Routing Protocol of Vehicular Networks
    DENG Zuo-xiang;CHEN Yong-ming
    2013, 1(8):  137-139.  doi:
    Asbtract ( 200 )  
    Related Articles | Metrics
    The routing problem in vehicular networks is investigated. An efficient routing protocol is proposed. By taking advantage of the idea of the secretary problem, the proposed routing protocol can efficiently choose which vehicles to copy messages, so that it can improve delivery ratio. Real trace-driven simulations are conducted. Performance results demonstrate that, compared with an alternative protocol, the proposed routing protocol can achieve higher delivery ratio.
    Design and Application of Attributes Custom Solution Based on CMS
    LIAO Wang-sheng;FAN Bing-bing
    2013, 1(8):  140-144.  doi:
    Asbtract ( 159 )  
    Related Articles | Metrics
    A custom solution for content attributes based on database design and template technology is introduced with the study of content management system and template technology. In this solution, in order to manage and display content better, the content is put into different columns which and whose content model can be defined by user so as to realize the custom of content’s attributes, then the content is custom showed combined with FreeMarker template technology. This solution is used in the intelligent vehicle service system based on mobile internet which obtains good effect.
    Research on Deployment Strategy of Application System in Cloud Environment
    LIANG Jia-wen;FAN Bing-bing
    2013, 1(8):  145-150,.  doi:
    Asbtract ( 204 )  
    Related Articles | Metrics
    Deploying application systems intensively in cloud environment is the current mainstream of information technology development, but because the cloud environment is different from physical machine environment, the methods, processes of application systems deployment in that environment are also different from which in physical machine environment. This article analyses the main way and features of deploying application system in the cloud computing model in-depth, summarizes the factors that should be taken into consideration when deploying application system in cloud environment and the main deployment strategies based on the characteristics of that environment, and puts forward the specific implementation strategy of deploying application systems in that environment.
    A Model of Anomaly Network Flow Detection
    CUI Yan-na
    2013, 1(8):  151-153.  doi:
    Asbtract ( 198 )  
    Related Articles | Metrics
    Anomaly network flow can affect network performance, even causes a serious network interruption. This model is improved on the base of anomaly detection model of network traffic based on statistics. First, it preprocesses the sampling data, removing bad values, and then statistical methods are used to build and update the steady network flow model. It selects some indicators that show the character of flow, and little associate to determine the network flow anomaly. Last, by using the combinative method of year-on-year and chain, it can judge the anomaly network flow more accurately. The experiments show that the method can monitor anomaly network flow well and reduce the rate of false anomaly detection.
    Application of Software VPN in Enterprise Network Security
    LIU Zai-ying;SHA Jie;ZHANG Li-xiao
    2013, 1(8):  154-158,.  doi:
    Asbtract ( 263 )  
    Related Articles | Metrics
    With the enterprise business developing and internationalizing, the branches distributes all over the worlds, and staffs need to access the enterprise Intranet at anytime and anywhere. It’s a basic and important issue for enterprise to construct secure and low-cost enterprise network. The paper introduces the concept and key technologies of VPN, and puts emphasis on basic framework of software VPN & scheme of enterprise network security based on various VPN technologies. It has been proved in practice that information transmission can be conducted securely by the software VPN server solution, which has certain reference value for the enterprise to build VPN network.
    Design and Implementation of Virtual Experiment Platform Based on Private Cloud
    ZHANG Rui-jie;LI Zhan-huai;ZHANG Xiao;ZHAO Xiao-nan;HE Qin-lu
    2013, 1(8):  159-164.  doi:
    Asbtract ( 196 )  
    Related Articles | Metrics
    To solve the defects in current college computer experiment teaching and scientific research in infrastructure investment and meet the demand of users, at the same time, providing basis test use for the country’s 863 major projects-‘cloud computing test and evaluation system’, a virtual experiment platform based on the private cloud is designed and implemented. This paper discusses the platform structure, function design and implementation of strategies, including the core cloud computing technology, network and virtualization, storage, and implementation of client. Experiments show that the platform is fully functional, practical and effective.
    信息安全
    A Method of Extracting Text of Word from Windows XP Physical Image
    HUANG Xiu-ping;CHEN Long
    2013, 1(8):  165-167.  doi:
    Asbtract ( 183 )  
    Related Articles | Metrics
    In forensic analysis, there is great significance restoring the data from the physical image. This paper analyzes and summarizes the rules of Word text in physical image, proposes a method of searching physical address in physical image, in which different size of Word text can be extracted from, and repeats image extraction.
    Privacy Preserving Methods for Multiple Sensitive Attributes
    ZHANG Xing-lan;LIU Le-wei
    2013, 1(8):  168-171,.  doi:
    Asbtract ( 166 )  
    Related Articles | Metrics
    For the privacy leak problems of the existing multiple sensitive attributes data publishing methods, based on the multidimensional bucket grouping approach and the idea of decomposition, a new data publication model is defined, named(l1,l2,…,ld)-uniqueness, and the corresponding anonymous algorithm is proposed. The algorithm considers the distribution of the sensitive attribute values in the group, processes each sensitive attribute independently, and it can withstand the background attacks and the similarity attacks. The theoretical analysis and experiments show that the new method can effectively prevent the loss of privacy, and enhance data security.
    Research on Time Constraints in G-SIS System
    LIU Yao;LI Pei-wu
    2013, 1(8):  172-174.  doi:
    Asbtract ( 140 )  
    Related Articles | Metrics
    Scalability and security are two important indicators of information sharing. In the case of large-scale information sharing, time factor of access control in G-SIS system is still not enough. To address this issue, time character of permissions on subject access is analyzed in G-SIS model. By adding time constraints policy to tranditional G-SIS model, time constraints to subject access permission are introduced, the policies of subject access with time constraints are defined, and the new G-SIS model with time constraints is presented, which can solve the problem of time constraints lack of access control, enhance the efforts of access control, improve stability and security of the system.
    Strategy for Privacy Protection of Supporting Data Modification
    ZHANG Xing-lan;YU Jin-ying
    2013, 1(8):  175-178,.  doi:
    Asbtract ( 191 )  
    Related Articles | Metrics
    To prevent data disclosure, data anonymity is an effective method to implement privacy protection. In order to prevent reasoning leak caused by linking attack, background knowledge attack and homogeneity attack etc. In multiple release, this paper puts forward a anonymous strategy to support data modification, called as m-inclusion principle. It also adopts clustering algorithm, which reduces the loss degree of information and improves the data practicality. Compared with m-invariance principle, m-inclusion more accords with dynamic data release demand. And it protects the privacy security flexibly.
    RFID Security Protocol Based on Reader and Double ID Verification
    LIAO Jian-feng;ZHANG Chao
    2013, 1(8):  179-183.  doi:
    Asbtract ( 194 )  
    Related Articles | Metrics
    Aiming at the high cost of RFID system because of the massive tags application, the paper analyzes the characteristics and limitations of the existing RFID security protocol, puts focus on the strong function of the reader, and proposes a new RFID security protocol based on reader and double ID verification. The reader is first verified on the tag ID(fake ID), then the fake ID is joined with the replace table and forms the real ID, and finally the reader is second verified. In the whole communication, Hash encryption and random number generator are adapted to improve the security of the system. Analysis results show that the proposed protocol can significantly reduce the cost of RFID system, prevent network attacks, and be suitable for RFID system in large-scale use tags.
    Image Encryption Algorithm Based on Chaos Theory and DES
    LIU Ping
    2013, 1(8):  184-186,.  doi:
    Asbtract ( 208 )  
    Related Articles | Metrics
    The sequence generated by chaotic system has better pseudo randomness. DES algorithm implements effectively the diffusion and confusion in the cryptosystem. This paper makes full use of the excellent features to propose a digital image encryption algorithm based on chaos theory and DES. Experimental results show that the encryption algorithm has strong sensitivity to the key, so it can improve the security of digital image in storage and transmission. The algorithm can also solve effectively the problems existing in the spatial domain and frequency domain.
    计算机控制
    Design and Realization of 20 Channels Multi-access Series Communication Card
    ZHANG Lei;CHEN Kang;ZHANG Zai-fei
    2013, 1(8):  187-191.  doi:
    Asbtract ( 181 )  
    Related Articles | Metrics
    To address the problem that few channel and access, low reliability and non-customized in series communication card, twenty channels multi-access series communication card based on CRC checkout algorithm and interface protection technique is studied. Series signal from communication of CPCI bus and chips is used to checkout validity of CRC checkout while the interface protection circuit is used to protect the series card. Simulation and experiment demonstrate the feasibility of the series card and the effectiveness of the electro-circuit.
    Research and Implementation of Automatic Grasping of a EOD Robot  Based on Computer Binocular Stereo Vision
    FAN Lu-qiao;DUAN Ban-xiang;ZHOU Wen-qiong;YAO Xi-fan
    2013, 1(8):  192-194.  doi:
    Asbtract ( 177 )  
    Related Articles | Metrics
    According to the theory of stereo vision, a new intelligent explosive-handling robot with a binocular vision system is developed. The vision system captures real-time images, makes camera calibrations with Zhang’s method, preprocesses images, matches feature point, then gets the stereo coordinate of the feature point of the suspicious objects, programming with Matlab 7.0 and the machine vision software eVision, displays the real-time images on the console, and a robot real-time control system is built through xPC target system, finally, controls explosive-handling robot to grasp the suspicious object automatically and accurately. Experimental results under variable distances indicate that the validity in real-time performance and precision of the vision system.
    Design of Control and Display Module of Radio Altimeter’s Signal Simulator
    CUI Yu-kun;TANG Jin-yuan;WANG Si-chen;YANG Guo-wei
    2013, 1(8):  197-200.  doi:
    Asbtract ( 167 )  
    Related Articles | Metrics
    The radio altimeter’s signal programming simulator is a required equipment in altimeter’s test and maintaining. In this paper, control and display module of one new simulator is designed and manufactured. This module uses C8051F320 microprocessor as its MCU, and uses two LCD screens, which are drived by two PCF8576 chips, as its display. MCU can catch keyboard’s action, and than send corresponding control signals to RF signal time delay and attenuation module and the display’s driver. In this way, control and display module can control the whole simulator, and communicate with operator. Successful utilization in daily maintenance of altimeters has proved that this control and display module has very high practical value, because it has many advantages, such as easy to operate, highly reliability, work stably.
    人工智能
    Online Learning of Formation Strategy Based on Neural Network in RoboCup
    QIN Feng;ZHAO Zhen-zhen;CHEN Ze-kai;TIAN Jie
    2013, 1(8):  201-203,.  doi:
    Asbtract ( 224 )  
    Related Articles | Metrics
    In RoboCup2D simulation system, it is difficult for an agent to make a exact decision in a real-time dynamic and uncertain situation. Learning unpredictable opponent formation strategy movement is desperately needed. The thesis raises the online learning method to learn opponent formation strategy in RoboCup2D. It uses neural network to determine weights directly. Besides, it designs the model of learning opponent formation strategy and uses online coach to train neural network. The experiment establishes the learning opponent formation model based on neural network successfully. By joining it in the defense strategy, it improves the agent defense ability and enhances the team’s overall skills effectively.
    A Lotka-Volterra Recurrent Neural Network Model for Solving TSP
    ZHENG Bo-chuan
    2013, 1(8):  204-208.  doi:
    Asbtract ( 200 )  
    Related Articles | Metrics
    The traveling salesman problem (TSP) is a combinational optimization problem. Firstly, constructing an energy function to express the TSP, and a valid near optimization traveling path of TSP could be obtained at an energy minimum point of the energy function. After that, a Lotka-Volterra (LV) recurrent neural network (RNN) model is proposed to solve energy minimum points of the energy function. Experiments show that the proposed LV RNN model should converge to the energy minimum points of the corresponding energy function, and that compared with Hopfield network, the proposed LV RNN has better performance on solving TSP.
    Multi-agent Intelligent Decision Support System Based on FCM and AHP
    QU Xiao-yan;WANG Zi-xu
    2013, 1(8):  209-213.  doi:
    Asbtract ( 192 )  
    Related Articles | Metrics
    A decision support system based on multi-agent is proposed, and fuzzy C-mean clustering employed to group individual evaluations and analytical hierarchy process are introduced to make the final decision. By clustering and analyzing the given data, fuzzy C-mean is used to establish priority levels of two congener objects by the expert team in order to get superior team expressing majority opinions and its specific centroid. AHP is expected to colligate opinions of experts under each criterion. Besides, the mode of multi-agent system offers capabilities for achieving distributed and asynchronous processing of data as to ensure the applicability of decision support system.
    应用与开发
    Design and Implemetation of Online Customs Agent Management System Based on Workflow
    ZHOU Wen-qiong;WANG Le-qiu;ZHENG Shu-zhao
    2013, 1(8):  214-217,.  doi:
    Asbtract ( 200 )  
    Related Articles | Metrics
    With the continuous development of computer technology and the popularity of Internet application, in order to establish internal control mechanisms and improve the quality of customer service externally, this paper describes the design and implementation of online customs agent management system based on Workflow technology, focusing on the various functional modules of the system description, system processes, system operating environment, system database design. The system has been implemented on a port customs broker, compared with similar other systems, the system is safer, more stable, easier to expand and easier to maintain.
    Building and Managing of Teaching Cloud Platform Based on Virtualization Technology
    XIE Yang;SHI You-qun;TAO Ran;PAN Qiao
    2013, 1(8):  218-221.  doi:
    Asbtract ( 182 )  
    Related Articles | Metrics
    After the analysis on the current building status of network teaching platform, virtualization technology is proposed to optimize the allocation of the current traditional teaching resources and build teaching cloud platform. The article focuses on the platform building steps and the development and deployment of management functions based on CMS which are applied to construct the teaching platform. Effectiveness analysis shows that teaching platform’s availability and scalability are improved by cloud technology and CMS to manage resource dynamically. It meets the various need of network teaching platform.
    Design and Implementation of Campus Alarm System Based on Android
    XIAO Fei;QIAO Rong-ai
    2013, 1(8):  222-224,.  doi:
    Asbtract ( 231 )  
    Related Articles | Metrics
    Ordinary telephone alarms have some disadvantages: need to dial, easy to be heard and difficult to location. A complete alarm message can be sent out, just by clicking one button in an Android application. Photos and words also could be submitted to the server. This system is secure and easy to use.
    GUI Design for Layout Optimization of Tracked Self-moving Power
    JIN Hai;XIE Jin-fa
    2013, 1(8):  225-228.  doi:
    Asbtract ( 169 )  
    Related Articles | Metrics
    The layout optimization design of the power is complicated. The layout problem of tracked self-moving power is researched. And the layout optimization mathematical model of the power is set up. A graphical user interface for the layout optimization design with Matlab GUIDE is developed. NSGA-Ⅱ is applied to the program of the interface. It is conveniently realized the goal that solve the layout optimization problem with NSGA-Ⅱ. The interface is friendly. It reduces the difficulty of the optimization design and improves the design’s efficiency.
    Welding Parameters Management System Based on Real-time  Database of Configuration Software
    ZHANG Xiao-qing;LIN Yong;MU Zhong-nan;GUO Hong-cai
    2013, 1(8):  229-231,.  doi:
    Asbtract ( 180 )  
    Related Articles | Metrics
    Based on SQL Server database, a welding parameters management system is designed, and as an example, it accounts the application of database technique in configuration software. Using the database accessible via INSPEC configuration software, the data exchange of real-time welding data and SQL Server database can be realized. Furthermore, combining some simple functions call, the real-time data of the production process can be managed and a graphical display can be implemented.
    Design and Realization of English Grammar Mobile Learning System Based on Android
    WANG Ling-yan;WU Hua;WANG Li-yan
    2013, 1(8):  232-235.  doi:
    Asbtract ( 230 )  
    Related Articles | Metrics
    With the rapid popularization of intelligent mobile phone, mobile learning will play an important role in our daily life more and more. According to the characteristics of mobile learning, an English grammar mobile learning software is designed and developed based on Android platform. The general design, architecture design and function models design of the system are analyzed. The development procedure and key design idea are clarified for the mobile application system based on Android. Finally the software is realized based on above techniques which will help the mobile learning of English and enriching of the mobile learning software.
    Design and Implementation of Electronic Menu Based on Android Tablet Computer
    XIAO Fei;JIA Man-lei
    2013, 1(8):  236-238.  doi:
    Asbtract ( 247 )  
    Related Articles | Metrics
    In order to improve the ordering efficiency and reduce labor costs, an electronic menu system based on cheap Android tablets is designed, which can provide customers with self-service ordering service. The system has some advantages: better display effect, fast data updates, interactive and could improve a restaurant’s quality and competitiveness, compared with the traditional paper menus.