Loading...
主 管:江西省科学技术厅
主 办:江西省计算机学会
江西省计算中心
编辑出版:《计算机与现代化》编辑部
Toggle navigation
Home
About Journal
Editorial Board
Journal Online
Online First
Current Issue
Archive
Most Read Articles
Most Download Articles
Most Cited Articles
Subscription
FAQ
Self Recommendation
Contact Us
Email Alert
中文
Office Online
Submission or Manuscript
Peer Review
Editor-in-Chief
Office Work
Instruction
More>>
Instruction
Submit Flow
Template
Copyright Agreement
The Author Changes the Application
Highlights
More>>
Links
More>>
Visited
Total visitors:
Visitors of today:
Now online:
Table of Content
18 December 2013, Volume 12 Issue 12
Previous Issue
Next Issue
Optimization Algorithm of HEVC Entropy Coding
XU Fei1, ZHANG Yong-fei1,2, LI Zhe1
2013, 12(12): 1-4. doi:
10.3969/j.issn.1006-2475.2013.12.001
Asbtract
(
421
)
References
|
Related Articles
|
Metrics
The latest video compression standard HEVC adopts more flexible compression tools to reach a higher compression rate compared to its predecessor H.264/AVC, meanwhile the computation of HEVC is more complicated. Mainly because the larger Transform Unit and the stronger dependence between transform coefficient, entropy coding of HEVC in RDO (Rate-Distortion Optimization) is much more complex than that in H.264/AVC. This paper proposed several techniques to optimize the entropy coding process of HEVC, including context selection optimization, significant coefficient coding optimization and different size coefficient block optimization. Experiment results show that the proposed schemes can reduce on average 43% of the entropy coding time in RDO without losing compression performance.
A Query Keywords Forming Technology Based on Genetic Algorithm
DU Jing, CHEN Qun, LIU Hai-long
2013, 12(12): 5-8. doi:
10.3969/j.issn.1006-2475.2013.12.002
Asbtract
(
325
)
References
|
Related Articles
|
Metrics
null
Shuffled Frog Leaping Algorithm Based on BFGS for Solving Systems of Nonlinear Functions
PAN Xue
2013, 12(12): 9-13. doi:
10.3969/j.issn.1006-2475.2013.12.003
Asbtract
(
287
)
References
|
Related Articles
|
Metrics
Shuffled Frog Leaping Algorithm (SFLA) is characterized by simplicity, few control parameters required, and easily be used. However, SFLA would easily trap into local optimum and have a low convergent precision when being used to address complex problems. As the traditional numerical optimization method, BFGS is of good local optimum ability. In order to improve the performance of SFLA, a new algorithm called SFLA based on BFGS is proposed, which combines the advantages of the methods of BFGS and SFLA, is put forward to solve systems of nonlinear functions. The experiment results show that the proposed algorithm is of the advantages of robustness, higher precision and faster speed by test of three systems of nonlinear functions. It is a good algorithm for solving systems of nonlinear functions.
null
XIAO Dan, YIN Chun-hua
2013, 12(12): 14-18. doi:
10.3969/j.issn.1006-2475.2013.12.004
Asbtract
(
314
)
References
|
Related Articles
|
Metrics
null
An Improved LSH/MinHash Collaborative Filtering Algorithm
BIAN Yi-jie, CHEN Chao, MA Ling-ling, CHEN Yuan-lei
2013, 12(12): 19-22. doi:
10.3969/j.issn.1006-2475.2013.12.005
Asbtract
(
373
)
References
|
Related Articles
|
Metrics
In recent years, many collaborative filtering-based recommender systems have been successfully applied, but with the increasing number of system users and projects, the amount of similarity calculation increases sharply, collaborative filtering recommendation system scalability issues become increasingly prominent. This paper puts forward a LSH/MinHash algorithm based on the approximate nearest neighbor, and applies it to the clustering of library resources, for solving the problem of high dimension and a amount of data cluster in the complexity under reasonable time. It reduces the amount of similarity calculation, improves the scalability of the algorithm. Experiments show that this algorithm is of higher efficiency and accuracy.
null
LYU Qiong-shuai, XIONG Shu-feng
2013, 12(12): 23-26. doi:
10.3969/j.issn.1006-2475.2013.12.006
Asbtract
(
269
)
References
|
Related Articles
|
Metrics
In the process of urbanization, water pipe network construction and optimization in various areas of China is one of the major problems. There are some problems in existence, for example cost much, the pipe laying are not optimized and low economic benefits and so no. A new method to solve pipe network optimization based on geographic information system and genetic algorithm is put forward. By establishing the mathematical model, using genetic algorithm for pipe network layout optimization, and combined with the GIS integrated management of spatial information and processing power, finally we get a set of more reasonable network layout scheme, so as to achieve the aim of saving construction cost.
A Speeding K-means Clustering Method Based on Sampling
WANG Xiu-hua
2013, 12(12): 27-29. doi:
10.3969/j.issn.1006-2475.2013.12.007
Asbtract
(
266
)
References
|
Related Articles
|
Metrics
To solve problems that traditional K-means clustering algorithm can not solve the large scale dataset clustering, this paper presents a speeding K-means clustering method based on random sampling, called Kmeans_RS clustering algorithm. The working set is selected from the original clustering dataset by random sampling and the traditional K-means clustering method is executed on this working set. Then the center and radius of every cluster is computed and the sampling result is obtained. The last clustering result of all dataset is obtained by measuring the relationship of sampling result and other data to cluster the remaining data. The random sampling way is used in this process and the size of K-means clustering is decreased, so the clustering efficiency is improved largely and it can be used to solve the large scale clustering problems. Simulation results demonstrate that the excellent clustering efficiency is obtained by this parallel speeding K-means method.
Application of Improved Genetic Ant Colony Hybrid Algorithm in TSP
JIANG Teng-xu
2013, 12(12): 30-33. doi:
10.3969/j.issn.1006-2475.2013.12.008
Asbtract
(
368
)
References
|
Related Articles
|
Metrics
Aimed at the shortcomings of genetic algorithm (GA) and ant colony algorithm (ACA), an improved genetic ant colony hybrid algorithm is presented. By determining the improved situation of the optimal solution, the hybird algorithm actualizes dynamic serial fusion for GA and ACA, which makes full use of global search ability of GA and positive feedback mechanism of ACA. Meanwhile, according as the importance of pheromone in positive feedback process, an improved pheromone update mechanism with encouragement or penalty item is proposed. Computing simulation examples show the hybrid algorithm is of much higher convergence speed and much better quality of solutions than that of classical GA or ACA.
A PageRank-based Algorithm to Estimate Microblog Users’ Influences
OU Wei1, OU Bin-yi2, XIE Zan-fu1, XIAO Zheng-hong1, PENG Ping1
2013, 12(12): 34-37. doi:
10.3969/j.issn.1006-2475.2013.12.009
Asbtract
(
394
)
References
|
Related Articles
|
Metrics
By analogizing microblog users to nodes and the followingship of a user to others to directed edges in a network graph, PageRank algorithm can be used to compute the influence of a microblog user. However the unrevised PageRank is based on the condition that the weights of directed edges of a node pointing to others are equal. Obviously this condition is not applicable to compute the influence of microblog users. Because of the existence of natural differences among interests, ideologies, posting frequencies of users, someone must follow different users she or he following to different extend. By computing the interest similarity, relative posting frequency, feedback frequency of a user to another to measure the following degrees of the user to her or his followings, this article develops a new algorithm, WeiboRank, which is based on PageRank to compute the influence of a user on a microblog platform. The experiment result shows that the influence value of a user computed by using WeiboRank can reflect the actual influence of the user in an on-line social circle in which she or he is.
Proactive Recovery Algorithm Based on Byzantine Fault Tolerance
CHEN Liu1, ZHOU Wei2
2013, 12(12): 38-40. doi:
10.3969/j.issn.1006-2475.2013.12.010
Asbtract
(
264
)
References
|
Related Articles
|
Metrics
To solve the problem that the existing recovery algorithms for Byzantine fault tolerance are not suitable to proactive replica, a proactive recovery algorithm supporting stateful replica was proposed. The recovery queue is maintained by each replica. When it comes to a checkpoint, the replica recovery queue is checked by the proactive algorithm. The replica is recovered true state before the replica occurring faults. If the replica has made faults, the algorithm is also work. The experimental results show the effective of the algorithm.
null
ZHANG Rui-li, SHI Feng-long, GAO Wan-chun
2013, 12(12): 41-43. doi:
10.3969/j.issn.1006-2475.2013.12.011
Asbtract
(
228
)
References
|
Related Articles
|
Metrics
Maintenance capability assessment involves many measurable indicators, and how to streamline a large number of index values is a hot research problem. We used the factor analysis to integrate various indicators, considered their relevance, and then extracted the common factors.According to the common factors which represent the maintenance indicators, we reintegrated the original data, carried out the groups divided with systematic cluster.
null
YE Pei-shun
2013, 12(12): 44-47. doi:
10.3969/j.issn.1006-2475.2013.12.012
Asbtract
(
247
)
References
|
Related Articles
|
Metrics
null
Adaptive Load Balancing Algorithm for Distributed Simulation Platform
ZHAO Zhi-yong
2013, 12(12): 48-51. doi:
10.3969/j.issn.1006-2475.2013.12.013
Asbtract
(
198
)
References
|
Related Articles
|
Metrics
Design and Implementation of Two-level Cache for Mass Storage System
YE Chen, ZHANG Yan-yuan
2013, 12(12): 52-55. doi:
10.3969/j.issn.1006-2475.2013.12.014
Asbtract
(
182
)
References
|
Related Articles
|
Metrics
With the introduction of the novel solid-state storage technology and the hybrid cache architecture using DRAM and solid state drive (SSD), this paper presents a kind of two-level cache for mass storage system strategy, which effectively reduces SSD caching lowercase problem by write-back strategy, and the logical disk created by two-level cache architecture is tested. The results show that the average response time of the request is optimized.
Self-adaptive Cache Management of Mobile Database and Its Application
ZHU Chang-yuan1, LIU Ya-jun2
2013, 12(12): 56-61. doi:
10.3969/j.issn.1006-2475.2013.12.015
Asbtract
(
194
)
References
|
Related Articles
|
Metrics
Aiming at the mobile computing environment, concept of self-adaptive cache management of mobile database is presented and a good concept model is proposed for it. Flex group bit vector compression method is proposed to resolve location based service in mobile environment and active abort type combining with mechanism of notification acknowledgement is proposed to resolve the frequent disconnection in mobile environment. The specification of the scheduling algorithm is also presented in detail. The feasibility and availability have been proved by running the policy on designed mobile online doctor reservation system. The results of the practical use show that self-adaptive database cache management can dramatically shorten the system response time and reduce spending of system resources, and is of better performance in supporting location based service and the frequent disconnecting in mobile environment, thus effectively improves the whole performance of mobile application.
Data Backup and Topological Query Optimization Algorithm Based on Distributed OS
ZHU Yan, WU Ying
2013, 12(12): 62-67. doi:
10.3969/j.issn.1006-2475.2013.12.016
Asbtract
(
263
)
References
|
Related Articles
|
Metrics
In order to integrate the existing optimizing methods into the conventional query processing method of distributed database, this paper presents series transformation rules of relational algebra expression based on cross-border topological join optimization rules. And the processed query tree is further optimized by equivalent transformation after data localization. Finally, we put forward some new concepts including query merged tree and execution plan tree. By using the corresponding merged and optimizing algorithm the global spatial query can be transformed into some local fragments joins effectively.
null
WANG Jun1,2, WANG Ji-wen1,2
2013, 12(12): 68-71. doi:
10.3969/j.issn.1006-2475.2013.12.017
Asbtract
(
313
)
References
|
Related Articles
|
Metrics
Because there is a high computational cost to simulate flame animation by using the methods of mathematical physics, a new flame simulation method is proposed. This method combines the advantages of mathematical and physics method and particle systems, uses the incompressible Navier-Stokes equations as physical models of flame simulation, and increases computing speed by simplifying the calculation of external force term. A new texture-based flame rendering method is proposed to achieve satisfactory results of flame animation. Experiments, based on OpenGL in C++ programming, achieve real-time flame simulation by using the proposed method successfully.
A New Method of Simulation System Construction
XING Li-ju1, CHEN Jie2
2013, 12(12): 72-76. doi:
10.3969/j.issn.1006-2475.2013.12.018
Asbtract
(
186
)
References
|
Related Articles
|
Metrics
null
null
CHU Wei, SUN Feng-xin, LIU Li-li
2013, 12(12): 77-80. doi:
10.3969/j.issn.1006-2475.2013.12.019
Asbtract
(
242
)
References
|
Related Articles
|
Metrics
null
Weapon Simulation System Based on HLA/RTI
SHI Jin-lin, XUE Wei
2013, 12(12): 81-85. doi:
10.3969/j.issn.1006-2475.2013.12.020
Asbtract
(
297
)
References
|
Related Articles
|
Metrics
Image Processing System Based on Analog Video Signal Differential and Projective Distortion Rectification
YING Yi-chen, WANG Xiao-nian, ZHU Jin
2013, 12(12): 86-90. doi:
10.3969/j.issn.1006-2475.2013.12.021
Asbtract
(
265
)
References
|
Related Articles
|
Metrics
The video camera is widely applied to embedded systems. Before further processed by the embedded systems, the analog video signal is usually digitized first. The large amount of data has made the difference of the processing capability much significant, and that limits the widespread use of vision sensor. An analog video signal processing system with differential and image rectification is proposed, in which the differential between pixel in analog signal is used to detect the edge. Meanwhile, the projective distortion is corrected according to lookup table. It is easier for further processing after the rectification of projective distortion. The solution improves the real time of signal processing and reduces the dependence on processing capability.
Research and Modification of License Plate Tilt Correction Algorithms
CHEN Ling1, 3,4, LI Xi-ying2,3,4, LU Lin2,3,4
2013, 12(12): 91-97. doi:
10.3969/j.issn.1006-2475.2013.12.022
Asbtract
(
353
)
References
|
Related Articles
|
Metrics
License plate tilt correction is a necessary step before characters segment, which has a direct effect on segmentation. License plate tilt combines with rotary in horizontal direction and shear in vertical direction. By studying the existing main tilt correction algorithms: Hough transformation method, rotating projection method, characteristic line method, orientation image method, some of improved algorithms is presented. Experiments prove that those improved methods are more effective. Another experiment indicates that rotating projection method is more successful than fitting line method in shear correction.
Artificial Neural Network Image Classification Based on Super-pixel
RAO Qian, WEN Hong, YU Wen, MAO Qi-qi, SU Wei-wei
2013, 12(12): 98-101. doi:
10.3969/j.issn.1006-2475.2013.12.023
Asbtract
(
225
)
References
|
Related Articles
|
Metrics
A MAD-based Robust Fractal Dimension Calculating Method and Its Application in Image Recognition
WU Hai-yan, ZHANG Chen-chen
2013, 12(12): 102-105. doi:
10.3969/j.issn.1006-2475.2013.12.024
Asbtract
(
279
)
References
|
Related Articles
|
Metrics
The traditional robust differential box-counting method (RDBC) has been successfully used for calculating fractal dimension of an image degraded by Gaussian noise. However, it is not suitable for estimating fractal dimension of salt & pepper noisy images and classifying those images. This paper presents a MAD-based method (MAD-DBC) for calculating fractal dimension of an image. The method uses MAD for differential box-counting, which is robust against salt & pepper noises. Classification experiments on Brodatz texture images show that, compared with DBC and RDBC, the MAD-DBC achieves higher classification rate and better noise robustness.
Implementation of Shape Matching Based on Relative Chain Codes and Improved LCS Algorithm
YANG Ping, LIU Zai-ying
2013, 12(12): 106-109. doi:
10.3969/j.issn.1006-2475.2013.12.025
Asbtract
(
336
)
References
|
Related Articles
|
Metrics
This paper researches relative chain codes and some string matching algorithms. It realizes two shapes’ matching by using relative chain codes and the improved LCS algorithm. First, through the contour extraction algorithm, we get the shapes contour, then, we get the Freeman chain codes through the contour tracking algorithm, and get the relative chain codes by computing chain codes, at last, using the improved longest common subsequences algorithm, we compute the similarity of two shapes. The method is of less computation, good effect on moving shape and rotating invariance. And it is implemented on Android system, the experimental results show that it is an effective method to decide whether two shapes are similar to each other.
Image Deblurring Algorithm Based on Motion Detection
WU Qing, XIAO Li, SUN Zhi-gang
2013, 12(12): 110-114. doi:
10.3969/j.issn.1006-2475.2013.12.026
Asbtract
(
366
)
References
|
Related Articles
|
Metrics
For the problem of motion-blur caused by the relative motion between the camera and the object during the camera exposure, an image deblurring algorithm based on motion detection is proposed. Based on the mathematics model of camera imaging, the relationship between the blur kernel (length and direction) and relative motion is derived, and by making use of Wiener filter, a sharp result can be available. From the results, the image after filtering becomes much sharper in details, proving that this method makes a certain effect on the blurred image.
Efficient PDO Transmitted Slave Station Design Based on CANopen Protocol
ZHAO Can, WANG Xiao-nian, ZHU Jin, WANG Zhu-ping
2013, 12(12): 114-118. doi:
10.3969/j.issn.1006-2475.2013.12.027
Asbtract
(
273
)
References
|
Related Articles
|
Metrics
Focusing on the CANopen protocol of application layer of CAN fieldbus, we designed a kind of efficient PDO transfer scheme for slave station system. Based on the research of DS401 specification, and compatibility with SDO and PDO access specification at the same time, this paper submitted the scheme which optimizes the PDO transmission efficiency. Besides, it constructed interface implementation of remote I/O module, and gave a detailed design and access process on real-time reading and writing of the object dictionary.
Comparsion Between Apache VCL and VMware vCloud Director Online Resource Application Cloud Platform
TAO Ran, YANG Jian-zhou, SONG Han-zheng
2013, 12(12): 119-124. doi:
10.3969/j.issn.1006-2475.2013.12.028
Asbtract
(
319
)
References
|
Related Articles
|
Metrics
As the development direction of next-generation Internet, cloud computing has become a very popular field in both industry and academia. In promoting the informatization of universities, building their own cloud platform plays a very important role. In many cloud computing technologies, Apache VCL and VMware vCloud Director are maturate technologies in building cloud platform for online resources application. In this paper, we introduced the architecture and application of the open source cloud platform: Apache VCL and commercial cloud platform: VMware vCloud Director in detail. And we made a deep comparison between them in theory, network architecture, and security and so on. At last, we gave some suggestions on building cloud platform for universities.
Self-adaptive Scheduling Strategy of Cloud Workflow Task Based on DPSO
HE Zhi-ming, YANG Shu-jin
2013, 12(12): 125-129. doi:
10.3969/j.issn.1006-2475.2013.12.029
Asbtract
(
213
)
References
|
Related Articles
|
Metrics
Design and Implementation of Anti-harsh Environment HDLC Communication Card Based on CPCI
LI Ning, LI Dai-wei
2013, 12(12): 130-133. doi:
10.3969/j.issn.1006-2475.2013.12.030
Asbtract
(
267
)
References
|
Related Articles
|
Metrics
In order to achieve reliable data transmission for radars in Command and Control System, bit-oriented data link layer protocol HDLC was used for communications. Based on CPCI architecture, FPGA technology was adopted to achieve HDLC protocol controller. CPCI data reading and writing module for local bus, HDLC frame composition and analysis module, CRC code generation and verification module were all achieved. A special board-level reinforcement design is prepared for the card to adapt to military environments. Experiments show that the board can receive and send frames according to the standard data format of HDLC in harsh military environment stably and reliably.
A New Asynchronous Verifiable Secret Sharing Scheme
GAO Ruo-yu, WANG Jian, DU He
2013, 12(12): 134-137. doi:
10.3969/j.issn.1006-2475.2013.12.031
Asbtract
(
271
)
References
|
Related Articles
|
Metrics
In purpose of improving the efficiency of secret sharing in asynchronous channel, this paper proposes a 3-round asynchronous verifiable secret sharing scheme by hiding the knowledge about reconstruction, reduces the efficiency lost in uncertain round communication and ensures the security as well. By analysis, this scheme is of high efficiency and security.
Algorithm of Security Assigning Addresses for Mobile Ad Hoc Networks
WU Yue
2013, 12(12): 138-140. doi:
10.3969/j.issn.1006-2475.2013.12.032
Asbtract
(
169
)
References
|
Related Articles
|
Metrics
Through analysis of the security risks existing in automatic address allocation algorithm, using common encryption algorithms currently, this paper presents a secure network address auto allocation algorithm. Both the mobile network and traditional networks, using the algorithm for automatic address allocation, the probabilities of being attacked are very low.
An Improved Trust Model for Ad-Hoc Network
LIU Wei1, LI Mang2
2013, 12(12): 141-144. doi:
10.3969/j.issn.1006-2475.2013.12.033
Asbtract
(
179
)
References
|
Related Articles
|
Metrics
The article summarized security issues and trust management in mobile Ad Hoc network environment. Based on several currently popular trust models, this article studied and analyzed the advantages and disadvantages of each model, proposed an improved clustering trust model, which is of scalable, dynamic, and initiatively finding out wrong nodes, then, using NS2 simulation platform to simulate the model, compared and analyzed the results in the network performance. The results show the improved model is effective.
A Method of Handwriting Texts and Shapes Separation
HU Xing-hong1,2, SHI Da-peng1,2, FENG Gui-huan1,2
2013, 12(12): 145-148. doi:
10.3969/j.issn.1006-2475.2013.12.034
Asbtract
(
273
)
References
|
Related Articles
|
Metrics
As a technology to improve human-computer interaction, handwriting recognition is becoming more and more important. However, the distinction of handwriting texts and shapes has not drawn enough attention. In this paper, we designed and implemented a handwriting text and shape separation approach based on Weka. The experiment results based on three classification techniques, LogitBoost, RandomForest and LogitBoost, show that LogitBoost performances best. Through a combination of these three classifiers, shapes can be recognized more accurately, while the precision of text is limited by the classifier with lowest accuracy. Moreover, the effect of different features to the results is analyzed based on Information Gain Method.
Design & Implementation of Virtual Vector Signal Generator and Analyzer
SHA Jie, LIU Zai-ying
2013, 12(12): 149-154. doi:
10.3969/j.issn.1006-2475.2013.12.035
Asbtract
(
363
)
References
|
Related Articles
|
Metrics
Vector signal generator (VSG) and vector signal analyzer (VSA) have been widely used for the measurement and debugging of digital communication systems. A virtual VSG and a virtual VSA were developed by using the graphical programming language LabVIEW which belongs to American National Instrument. The analogue electrical interface of the instruments is implemented by using National Instrument Data Acquisition Unit (DAQ). The virtual VSG can generate modulated vector signals based on various digital modulation formats, change the signal bandwidth to pre-allocated spectrum, simulate channel noise, and transmit the modulated signal through analog channel. The generated vector signals can be analyzed by the VSA, which integrates the functions of digital demodulator, spectrum analyzer, oscilloscope, constellation diagram analyzer, bit error rate (BER) tester and error vector magnitude (EVM) tester.
Design and Implementation of Report Search Engine Based on Lucene
CHENG Xu, DU Zhi-bin, SHAO Xue-bin
2013, 12(12): 155-158. doi:
10.3969/j.issn.1006-2475.2013.12.036
Asbtract
(
247
)
References
|
Related Articles
|
Metrics
After years of construction and development, a huge mass of data has been accumulated on the Notice Platform, including about 2.3 million test reports. But an effective search means has not been formed. A full-text search engine is designed for the Notice Platform test report database based on Lucene. It provides full-text search service based on content. This study is important for Notice Platform optimization and management standardization and is of important practical significance for improving the satisfaction of government and enterprises in notice management service.
Method of Social Website Image Retrieval Based on Multi-feature Fusion
GUO Hai-feng, LI Guang-shui, QIU Bin-ren
2013, 12(12): 159-163. doi:
10.3969/j.issn.1006-2475.2013.12.037
Asbtract
(
276
)
References
|
Related Articles
|
Metrics
ecause of users’ non-professional and randomness, in the process of retrieval image, social website retrieval can not ideally generate sufficient result for people. In view of this situation, this paper proposes a method of image retrieval based on multi-feature fusion. According to the initial term of users input, the system offers users a set of candidate images, based on the user’s choice of target image, combining the low-level features of candidate images sets, community themes and label order, this paper constructs a candidate image multi-feature vector. The system can calculate the distance between the vector and the target image, submits the nearest image collection to user. Simulation experiments are done based on real data from Flickr website, and the test results prove that this method is effective.
Design and Implementation of Water Pump Control System Based on iCAN
BEI Yan1, ZHANG Shu-ming2
2013, 12(12): 164-166. doi:
10.3969/j.issn.1006-2475.2013.12.038
Asbtract
(
234
)
References
|
Related Articles
|
Metrics
With the rapid development of industrial control network, more and more attention is paid to the fieldbus technology. As one of the highest market share in fieldbus, the CAN-bus has been widely used in the field of industrial control and other related fields, due to its openness, high reliability, good real-time performance and lower cost, iCAN system has iCAN protocol in the CAN-bus application layer, which has effectively solved the users’ problem of communication control and data collection and also meets the need of most domestic users of small and medium-sized fieldbus network. Basing on iCAN system, this paper designed and implemented an improved system to monitor and control the pumps at water source places with flexible construction, simple structure, low cost, good reliability and stability.
Interface Design of PS/2 Optical Fiber Transmission for Anti-high-power Microwave
JI Yu, HU Xiao-ji
2013, 12(12): 167-171. doi:
10.3969/j.issn.1006-2475.2013.12.039
Asbtract
(
216
)
References
|
Related Articles
|
Metrics
The technology of microwave has been used widely in the domains of communication and others. And the HPMW (High Power Microwave Weapon) has been already used in the military. How to increase the ability of electronic equipment protection in the worse electromagnetic environment becomes an important subject task. Based on the needs of anti-HPM application, this paper designs an interface of PS/2 based on optical fiber transmission, and the related circuit in the design is presented. Experimental results show that this solution can well satisfy the requirement of optical fiber transmission and the protection of HPM. This solution has good prospects of application.
Soil-free Scroll Air Compressor Motor Fixing Match Based on NSGA-Ⅱ
ZHOU Lin-yu1, TU Hai-ning2, YANG Juan2
2013, 12(12): 172-176. doi:
10.3969/j.issn.1006-2475.2013.12.040
Asbtract
(
270
)
References
|
Related Articles
|
Metrics
For the characteristics and the existing problems of assembling soil-free scroll air compressor parts and components, this paper adopted a Non-Dominated Sorting in Genetic Algorithm, according to the characteristics of fixing matching problem, coded the decimal coding for genes, designed the selection, crossover and mutation genetic operators, completed the entire algorithm written in C#. Taking type 04A main motor fixing matching as instance, the feasibility and effectiveness of the matching algorithm are verified.
Low-power Design of AT89 Series 51 MCU System
CAI Yin-he
2013, 12(12): 177-179. doi:
10.3969/j.issn.1006-2475.2013.12.041
Asbtract
(
289
)
References
|
Related Articles
|
Metrics
For the needs of low-power applications, a series of low-power setting methods about AT89 series 51 MCU system was presented, respectively, from hardware and software perspectives. Test results proved that these methods can effectively reduce power consumption of the system. They also provided a reference for low-power design of other types of MCU system.
Improvement of Software Process Management Based on SOA
LI Ming
2013, 12(12): 180-183. doi:
10.3969/j.issn.1006-2475.2013.12.042
Asbtract
(
248
)
References
|
Related Articles
|
Metrics
This paper puts forward an improved software process management model based on RUP. According to the thinking method of SOA construction system, this paper analyzes the service classification of software process management model step by step, lists some critical service flows of software process management model and their input and output standards. Through these standards, the software process management system is of a certain scientific and standardization.
Document Construction Technology of PDF for Web
LI Lan-you1,2, CHEN Li1, XIE Xue-lian1
2013, 12(12): 184-187. doi:
10.3969/j.issn.1006-2475.2013.12.043
Asbtract
(
234
)
References
|
Related Articles
|
Metrics
The document construction technology strategy of PDF for Web is introduced. And the technologies including watermark generating technology, table header title processing technology, large data stream data structure design technology, table text block segmentation technology and paging control technology are discussed. The practical application for device management Web system shows that the technology is smart and it provides reference solution to build and develop similar applied system.
esign of Embedded Computer Platform in Integrity Module Avionics
MEI Yun-hua
2013, 12(12): 188-191. doi:
10.3969/j.issn.1006-2475.2013.12.044
Asbtract
(
214
)
References
|
Related Articles
|
Metrics
The technical demand of the embedded computer in integrity module avionics is elaborated. A solve scheme of the embedded computer, which can satisfy the technical demand, is given. The choice of processor and the composing of hardware & software in the solve scheme are discussed.
Scheduling Scheme of Multi-thread Load Balance in OpenMP
FAN Hui-min, LI Zi-tian
2013, 12(12): 192-195. doi:
10.3969/j.issn.1006-2475.2013.12.045
Asbtract
(
279
)
References
|
Related Articles
|
Metrics
This paper introduced several typical scheduling strategies in OpenMP environment on for loop scheduling, analyzed and summarized the experimental results in detail, then proposed an improved scheduling scheme.
Design and Implementation of Online Monitoring Management System for Power Transmission Line Based on J2EE
LIU Jin, GU Jia-qiang
2013, 12(12): 196-200. doi:
10.3969/j.issn.1006-2475.2013.12.046
Asbtract
(
288
)
References
|
Related Articles
|
Metrics
In order to protect the safe and stable operation of high-voltage transmission line, solve the problem that the potential security risks can not be detected in time by manual patrol of the line, and achieve the remote and online monitoring of high-voltage transmission line, a computer management system that can carry out real-time monitoring for transmission line was designed and developed. This system is based on J2EE, uses J2EE framework and JSP technology. It can conduct imaging display and analysis for the data returned from real-time acquisition by sensors allocated on the transmission equipment. It can also carry out early warning and alarming for the transmission equipment according to corresponding standards, thus to guarantee the safe operation of equipment.
Design and Implementation of Automatic Problem Building System on Excel Operation Test
HAO Han-han, KANG Mu-ning
2013, 12(12): 201-205. doi:
10.3969/j.issn.1006-2475.2013.12.047
Asbtract
(
294
)
References
|
Related Articles
|
Metrics
The traditional automatic problem building system’s interface is relatively complicated, needs to manually set up a lot of information on the topic. Considering these shortcomings, this paper presents the design and implementation of automatic topic building system for Excel operation test. When using this system, the teachers only need to operate the Excel document in a right way at frist. Then, the questions information can be generated automatically by comparing the original document and the revised document properties. Compared with the traditional system, the system’s interface is simpler and the system is of a high degree of automation. So it can really generate questions automatically.
Failure Analysis of Aircraft Generator System Based on RODON
JIANG Liang-liang, WANG Zi-qiang
2013, 12(12): 206-209. doi:
10.3969/j.issn.1006-2475.2013.12.048
Asbtract
(
351
)
References
|
Related Articles
|
Metrics
The traditional fault diagnosis methods that depended on human being or signal analysis were difficult to deal with the increasingly complicated intelligent aircraft electrical systems. The development of artificial intelligence and software technology made it possible to solve this problem. In accordance with the principles of model-based fault diagnosis and using RODON fault diagnosis software, a simulation model of aircraft generator system was built. Failure analysis of aircraft generator system was used to verify the usefulness and efficiency of model-based fault diagnosis method.
Design of Wireless Data Monitoring System Based on Single Chip and Kingview
ZHANG Xue-wei, ZHANG Ce, CHEN Jin-yang
2013, 12(12): 210-210. doi:
10.3969/j.issn.1006-2475.2013.12.049
Asbtract
(
2212
)
References
|
Related Articles
|
Metrics
This paper introduces a temperature and humidity monitoring system based on AT89S52 MCU and PC which communicated by the wireless serial port. The system uses a single chip microcomputer as the slave computer to complete the temperature and humidity data acquisition, sends the data collected by the wireless serial port to PC. The design makes full use of the powerful data processing function of PC unit state Kingview V6.53 software and friendly man-machine interface design to display real-time temperature.