Loading...

Table of Content

    18 December 2013, Volume 12 Issue 12
    Optimization Algorithm of HEVC Entropy Coding
    XU Fei1, ZHANG Yong-fei1,2, LI Zhe1
    2013, 12(12):  1-4.  doi:10.3969/j.issn.1006-2475.2013.12.001
    Asbtract ( 370 )  
    References | Related Articles | Metrics
    The latest video compression standard HEVC adopts more flexible compression tools to reach a higher compression rate compared to its predecessor H.264/AVC, meanwhile the computation of HEVC is more complicated. Mainly because the larger Transform Unit and the stronger dependence between transform coefficient, entropy coding of HEVC in RDO (Rate-Distortion Optimization) is much more complex than that in H.264/AVC. This paper proposed several techniques to optimize the entropy coding process of HEVC, including context selection optimization, significant coefficient coding optimization and different size coefficient block optimization. Experiment results show that the proposed schemes can reduce on average 43% of the entropy coding time in RDO without losing compression performance.
    Shuffled Frog Leaping Algorithm Based on BFGS for Solving Systems of Nonlinear Functions
    PAN Xue
    2013, 12(12):  9-13.  doi:10.3969/j.issn.1006-2475.2013.12.003
    Asbtract ( 245 )  
    References | Related Articles | Metrics
    Shuffled Frog Leaping Algorithm (SFLA) is characterized by simplicity, few control parameters required, and easily be used. However, SFLA would easily trap into local optimum and have a low convergent precision when being used to address complex problems. As the traditional numerical optimization method, BFGS is of good local optimum ability. In order to improve the performance of SFLA, a new algorithm called SFLA based on BFGS is proposed, which combines the advantages of the methods of BFGS and SFLA, is put forward to solve systems of nonlinear functions. The experiment results show that the proposed algorithm is of the advantages of robustness, higher precision and faster speed by test of three systems of nonlinear functions. It is a good algorithm for solving systems of nonlinear functions.
    null
    XIAO Dan, YIN Chun-hua
    2013, 12(12):  14-18.  doi:10.3969/j.issn.1006-2475.2013.12.004
    Asbtract ( 278 )  
    References | Related Articles | Metrics
    null
    An Improved LSH/MinHash Collaborative Filtering Algorithm
    BIAN Yi-jie, CHEN Chao, MA Ling-ling, CHEN Yuan-lei
    2013, 12(12):  19-22.  doi:10.3969/j.issn.1006-2475.2013.12.005
    Asbtract ( 316 )  
    References | Related Articles | Metrics
    In recent years, many collaborative filtering-based recommender systems have been successfully applied, but with the increasing number of system users and projects, the amount of similarity calculation increases sharply, collaborative filtering recommendation system scalability issues become increasingly prominent. This paper puts forward a LSH/MinHash algorithm based on the approximate nearest neighbor, and applies it to the clustering of library resources, for solving the problem of high dimension and a amount of data cluster in the complexity under reasonable time. It reduces the amount of similarity calculation, improves the scalability of the algorithm. Experiments show that this algorithm is of higher efficiency and accuracy.
    null
    LYU Qiong-shuai, XIONG Shu-feng
    2013, 12(12):  23-26.  doi:10.3969/j.issn.1006-2475.2013.12.006
    Asbtract ( 231 )  
    References | Related Articles | Metrics
    In the process of urbanization, water pipe network construction and optimization in various areas of China is one of the major problems. There are some problems in existence, for example cost much, the pipe laying are not optimized and low economic benefits and so no. A new method to solve pipe network optimization based on geographic information system and genetic algorithm is put forward. By establishing the mathematical model, using genetic algorithm for pipe network layout optimization, and combined with the GIS integrated management of spatial information and processing power, finally we get a set of more reasonable network layout scheme, so as to achieve the aim of saving construction cost.
    A Speeding K-means Clustering Method Based on Sampling
    WANG Xiu-hua
    2013, 12(12):  27-29.  doi:10.3969/j.issn.1006-2475.2013.12.007
    Asbtract ( 220 )  
    References | Related Articles | Metrics
    To solve problems that traditional K-means clustering algorithm can not solve the large scale dataset clustering, this paper presents a speeding K-means clustering method based on random sampling, called Kmeans_RS clustering algorithm. The working set is selected from the original clustering dataset by random sampling and the traditional K-means clustering method is executed on this working set. Then the center and radius of every cluster is computed and the sampling result is obtained. The last clustering result of all dataset is obtained by measuring the relationship of sampling result and other data to cluster the remaining data. The random sampling way is used in this process and the size of K-means clustering is decreased, so the clustering efficiency is improved largely and it can be used to solve the large scale clustering problems. Simulation results demonstrate that the excellent clustering efficiency is obtained by this parallel speeding K-means method.
    Application of Improved Genetic Ant Colony Hybrid Algorithm in TSP
    JIANG Teng-xu
    2013, 12(12):  30-33.  doi:10.3969/j.issn.1006-2475.2013.12.008
    Asbtract ( 304 )  
    References | Related Articles | Metrics
    Aimed at the shortcomings of genetic algorithm (GA) and ant colony algorithm (ACA), an improved genetic ant colony hybrid algorithm is presented. By determining the improved situation of the optimal solution, the hybird algorithm actualizes dynamic serial fusion for GA and ACA, which makes full use of global search ability of GA and positive feedback mechanism of ACA. Meanwhile, according as the importance of pheromone in positive feedback process, an improved pheromone update mechanism with encouragement or penalty item is proposed. Computing simulation examples show the hybrid algorithm is of much higher convergence speed and much better quality of solutions than that of classical GA or ACA.
    A PageRank-based Algorithm to Estimate Microblog Users’ Influences
    OU Wei1, OU Bin-yi2, XIE Zan-fu1, XIAO Zheng-hong1, PENG Ping1
    2013, 12(12):  34-37.  doi:10.3969/j.issn.1006-2475.2013.12.009
    Asbtract ( 330 )  
    References | Related Articles | Metrics
    By analogizing microblog users to nodes and the followingship of a user to others to directed edges in a network graph, PageRank algorithm can be used to compute the influence of a microblog user. However the unrevised PageRank is based on the condition that the weights of directed edges of a node pointing to others are equal. Obviously this condition is not applicable to compute the influence of microblog users. Because of the existence of natural differences among interests, ideologies, posting frequencies of users, someone must follow different users she or he following to different extend. By computing the interest similarity, relative posting frequency, feedback frequency of a user to another to measure the following degrees of the user to her or his followings, this article develops a new algorithm, WeiboRank, which is based on PageRank to compute the influence of a user on a microblog platform. The experiment result shows that the influence value of a user computed by using WeiboRank can reflect the actual influence of the user in an on-line social circle in which she or he is.
    Proactive Recovery Algorithm Based on Byzantine Fault Tolerance
    CHEN Liu1, ZHOU Wei2
    2013, 12(12):  38-40.  doi:10.3969/j.issn.1006-2475.2013.12.010
    Asbtract ( 227 )  
    References | Related Articles | Metrics
    To solve the problem that the existing recovery algorithms for Byzantine fault tolerance are not suitable to proactive replica, a proactive recovery algorithm supporting stateful replica was proposed. The recovery queue is maintained by each replica. When it comes to a checkpoint, the replica recovery queue is checked by the proactive algorithm. The replica is recovered true state before the replica occurring faults. If the replica has made faults, the algorithm is also work. The experimental results show the effective of the algorithm.
    null
    ZHANG Rui-li, SHI Feng-long, GAO Wan-chun
    2013, 12(12):  41-43.  doi:10.3969/j.issn.1006-2475.2013.12.011
    Asbtract ( 183 )  
    References | Related Articles | Metrics
    Maintenance capability assessment involves many measurable indicators, and how to streamline a large number of index values is a hot research problem. We used the factor analysis to integrate various indicators, considered their relevance, and then extracted the common factors.According to the common factors which represent the maintenance indicators, we reintegrated the original data, carried out the groups divided with systematic cluster.
    null
    YE Pei-shun
    2013, 12(12):  44-47.  doi:10.3969/j.issn.1006-2475.2013.12.012
    Asbtract ( 218 )  
    References | Related Articles | Metrics
    null
    Design and Implementation of Two-level Cache for Mass Storage System
    YE Chen, ZHANG Yan-yuan
    2013, 12(12):  52-55.  doi:10.3969/j.issn.1006-2475.2013.12.014
    Asbtract ( 145 )  
    References | Related Articles | Metrics
    With the introduction of the novel solid-state storage technology and the hybrid cache architecture using DRAM and solid state drive (SSD), this paper presents a kind of two-level cache for mass storage system strategy, which effectively reduces SSD caching lowercase problem by write-back strategy, and the logical disk created by two-level cache architecture is tested. The results show that the average response time of the request is optimized.
    Self-adaptive Cache Management of Mobile Database and Its Application
    ZHU Chang-yuan1, LIU Ya-jun2
    2013, 12(12):  56-61.  doi:10.3969/j.issn.1006-2475.2013.12.015
    Asbtract ( 168 )  
    References | Related Articles | Metrics
    Aiming at the mobile computing environment, concept of self-adaptive cache management of mobile database is presented and a good concept model is proposed for it. Flex group bit vector compression method is proposed to resolve location based service in mobile environment and active abort type combining with mechanism of notification acknowledgement is proposed to resolve the frequent disconnection in mobile environment. The specification of the scheduling algorithm is also presented in detail. The feasibility and availability have been proved by running the policy on designed mobile online doctor reservation system. The results of the practical use show that self-adaptive database cache management can dramatically shorten the system response time and reduce spending of system resources, and is of better performance in supporting location based service and the frequent disconnecting in mobile environment, thus effectively improves the whole performance of mobile application.
    Data Backup and Topological Query Optimization Algorithm Based on Distributed OS
    ZHU Yan, WU Ying
    2013, 12(12):  62-67.  doi:10.3969/j.issn.1006-2475.2013.12.016
    Asbtract ( 227 )  
    References | Related Articles | Metrics
    In order to integrate the existing optimizing methods into the conventional query processing method of distributed database, this paper presents series transformation rules of relational algebra expression based on cross-border topological join optimization rules. And the processed query tree is further optimized by equivalent transformation after data localization. Finally, we put forward some new concepts including query merged tree and execution plan tree. By using the corresponding merged and optimizing algorithm the global spatial query can be transformed into some local fragments joins effectively.
    null
    WANG Jun1,2, WANG Ji-wen1,2
    2013, 12(12):  68-71.  doi:10.3969/j.issn.1006-2475.2013.12.017
    Asbtract ( 257 )  
    References | Related Articles | Metrics
    Because there is a high computational cost to simulate flame animation by using the methods of mathematical physics, a new flame simulation method is proposed. This method combines the advantages of mathematical and physics method and particle systems, uses the incompressible Navier-Stokes equations as physical models of flame simulation, and increases computing speed by simplifying the calculation of external force term. A new texture-based flame rendering method is proposed to achieve satisfactory results of flame animation. Experiments, based on OpenGL in C++ programming, achieve real-time flame simulation by using the proposed method successfully.
    A New Method of Simulation System Construction
    XING Li-ju1, CHEN Jie2
    2013, 12(12):  72-76.  doi:10.3969/j.issn.1006-2475.2013.12.018
    Asbtract ( 157 )  
    References | Related Articles | Metrics
    null
    null
    CHU Wei, SUN Feng-xin, LIU Li-li
    2013, 12(12):  77-80.  doi:10.3969/j.issn.1006-2475.2013.12.019
    Asbtract ( 193 )  
    References | Related Articles | Metrics
    null
    Image Processing System Based on Analog Video Signal Differential and Projective Distortion Rectification
    YING Yi-chen, WANG Xiao-nian, ZHU Jin
    2013, 12(12):  86-90.  doi:10.3969/j.issn.1006-2475.2013.12.021
    Asbtract ( 234 )  
    References | Related Articles | Metrics
    The video camera is widely applied to embedded systems. Before further processed by the embedded systems, the analog video signal is usually digitized first. The large amount of data has made the difference of the processing capability much significant, and that limits the widespread use of vision sensor. An analog video signal processing system with differential and image rectification is proposed, in which the differential between pixel in analog signal is used to detect the edge. Meanwhile, the projective distortion is corrected according to lookup table. It is easier for further processing after the rectification of projective distortion. The solution improves the real time of signal processing and reduces the dependence on processing capability.
    Research and Modification of License Plate Tilt Correction Algorithms
    CHEN Ling1, 3,4, LI Xi-ying2,3,4, LU Lin2,3,4
    2013, 12(12):  91-97.  doi:10.3969/j.issn.1006-2475.2013.12.022
    Asbtract ( 292 )  
    References | Related Articles | Metrics
    License plate tilt correction is a necessary step before characters segment, which has a direct effect on segmentation. License plate tilt combines with rotary in horizontal direction and shear in vertical direction. By studying the existing main tilt correction algorithms: Hough transformation method, rotating projection method, characteristic line method, orientation image method, some of improved algorithms is presented. Experiments prove that those improved methods are more effective. Another experiment indicates that rotating projection method is more successful than fitting line method in shear correction.
    Artificial Neural Network Image Classification Based on Super-pixel
    RAO Qian, WEN Hong, YU Wen, MAO Qi-qi, SU Wei-wei
    2013, 12(12):  98-101.  doi:10.3969/j.issn.1006-2475.2013.12.023
    Asbtract ( 188 )  
    References | Related Articles | Metrics
    A MAD-based Robust Fractal Dimension Calculating Method and Its Application in Image Recognition
    WU Hai-yan, ZHANG Chen-chen
    2013, 12(12):  102-105.  doi:10.3969/j.issn.1006-2475.2013.12.024
    Asbtract ( 241 )  
    References | Related Articles | Metrics
    The traditional robust differential box-counting method (RDBC) has been successfully used for calculating fractal dimension of an image degraded by Gaussian noise. However, it is not suitable for estimating fractal dimension of salt & pepper noisy images and classifying those images. This paper presents a MAD-based method (MAD-DBC) for calculating fractal dimension of an image. The method uses MAD for differential box-counting, which is robust against salt & pepper noises. Classification experiments on Brodatz texture images show that, compared with DBC and RDBC, the MAD-DBC achieves higher classification rate and better noise robustness.
    Implementation of Shape Matching Based on Relative Chain Codes and Improved LCS Algorithm
    YANG Ping, LIU Zai-ying
    2013, 12(12):  106-109.  doi:10.3969/j.issn.1006-2475.2013.12.025
    Asbtract ( 289 )  
    References | Related Articles | Metrics
    This paper researches relative chain codes and some string matching algorithms. It realizes two shapes’ matching by using relative chain codes and the improved LCS algorithm. First, through the contour extraction algorithm, we get the shapes contour, then, we get the Freeman chain codes through the contour tracking algorithm, and get the relative chain codes by computing chain codes, at last, using the improved longest common subsequences algorithm, we compute the similarity of two shapes. The method is of less computation, good effect on moving shape and rotating invariance. And it is implemented on Android system, the experimental results show that it is an effective method to decide whether two shapes are similar to each other.
    Image Deblurring Algorithm Based on Motion Detection
    WU Qing, XIAO Li, SUN Zhi-gang
    2013, 12(12):  110-114.  doi:10.3969/j.issn.1006-2475.2013.12.026
    Asbtract ( 280 )  
    References | Related Articles | Metrics
    For the problem of motion-blur caused by the relative motion between the camera and the object during the camera exposure, an image deblurring algorithm based on motion detection is proposed. Based on the mathematics model of camera imaging, the relationship between the blur kernel (length and direction) and relative motion is derived, and by making use of Wiener filter, a sharp result can be available. From the results, the image after filtering becomes much sharper in details, proving that this method makes a certain effect on the blurred image.
    Efficient PDO Transmitted Slave Station Design Based on CANopen Protocol
    ZHAO Can, WANG Xiao-nian, ZHU Jin, WANG Zhu-ping
    2013, 12(12):  114-118.  doi:10.3969/j.issn.1006-2475.2013.12.027
    Asbtract ( 224 )  
    References | Related Articles | Metrics
    Focusing on the CANopen protocol of application layer of CAN fieldbus, we designed a kind of efficient PDO transfer scheme for slave station system. Based on the research of DS401 specification, and compatibility with SDO and PDO access specification at the same time, this paper submitted the scheme which optimizes the PDO transmission efficiency. Besides, it constructed interface implementation of remote I/O module, and gave a detailed design and access process on real-time reading and writing of the object dictionary.
    Comparsion Between Apache VCL and VMware vCloud Director Online Resource Application Cloud Platform
    TAO Ran, YANG Jian-zhou, SONG Han-zheng
    2013, 12(12):  119-124.  doi:10.3969/j.issn.1006-2475.2013.12.028
    Asbtract ( 284 )  
    References | Related Articles | Metrics
    As the development direction of next-generation Internet, cloud computing has become a very popular field in both industry and academia. In promoting the informatization of universities, building their own cloud platform plays a very important role. In many cloud computing technologies, Apache VCL and VMware vCloud Director are maturate technologies in building cloud platform for online resources application. In this paper, we introduced the architecture and application of the open source cloud platform: Apache VCL and commercial cloud platform: VMware vCloud Director in detail. And we made a deep comparison between them in theory, network architecture, and security and so on. At last, we gave some suggestions on building cloud platform for universities.
    Design and Implementation of Anti-harsh Environment HDLC Communication Card Based on CPCI
    LI Ning, LI Dai-wei
    2013, 12(12):  130-133.  doi:10.3969/j.issn.1006-2475.2013.12.030
    Asbtract ( 223 )  
    References | Related Articles | Metrics
    In order to achieve reliable data transmission for radars in Command and Control System, bit-oriented data link layer protocol HDLC was used for communications. Based on CPCI architecture, FPGA technology was adopted to achieve HDLC protocol controller. CPCI data reading and writing module for local bus, HDLC frame composition and analysis module, CRC code generation and verification module were all achieved. A special board-level reinforcement design is prepared for the card to adapt to military environments. Experiments show that the board can receive and send frames according to the standard data format of HDLC in harsh military environment stably and reliably.
    A New Asynchronous Verifiable Secret Sharing Scheme
    GAO Ruo-yu, WANG Jian, DU He
    2013, 12(12):  134-137.  doi:10.3969/j.issn.1006-2475.2013.12.031
    Asbtract ( 218 )  
    References | Related Articles | Metrics
    In purpose of improving the efficiency of secret sharing in asynchronous channel, this paper proposes a 3-round asynchronous verifiable secret sharing scheme by hiding the knowledge about reconstruction, reduces the efficiency lost in uncertain round communication and ensures the security as well. By analysis, this scheme is of high efficiency and security.
    Algorithm of Security Assigning Addresses for Mobile Ad Hoc Networks
    WU Yue
    2013, 12(12):  138-140.  doi: 10.3969/j.issn.1006-2475.2013.12.032
    Asbtract ( 138 )  
    References | Related Articles | Metrics
    Through analysis of the security risks existing in automatic address allocation algorithm, using common encryption algorithms currently, this paper presents a secure network address auto allocation algorithm. Both the mobile network and traditional networks, using the algorithm for automatic address allocation, the probabilities of being attacked are very low.
    An Improved Trust Model for Ad-Hoc Network
    LIU Wei1, LI Mang2
    2013, 12(12):  141-144.  doi:10.3969/j.issn.1006-2475.2013.12.033
    Asbtract ( 148 )  
    References | Related Articles | Metrics
    The article summarized security issues and trust management in mobile Ad Hoc network environment. Based on several currently popular trust models, this article studied and analyzed the advantages and disadvantages of each model, proposed an improved clustering trust model, which is of scalable, dynamic, and initiatively finding out wrong nodes, then, using NS2 simulation platform to simulate the model, compared and analyzed the results in the network performance. The results show the improved model is effective.
    A Method of Handwriting Texts and Shapes Separation
    HU Xing-hong1,2, SHI Da-peng1,2, FENG Gui-huan1,2
    2013, 12(12):  145-148.  doi:10.3969/j.issn.1006-2475.2013.12.034
    Asbtract ( 239 )  
    References | Related Articles | Metrics
    As a technology to improve human-computer interaction, handwriting recognition is becoming more and more important. However, the distinction of handwriting texts and shapes has not drawn enough attention. In this paper, we designed and implemented a handwriting text and shape separation approach based on Weka. The experiment results based on three classification techniques, LogitBoost, RandomForest and LogitBoost, show that LogitBoost performances best. Through a combination of these three classifiers, shapes can be recognized more accurately, while the precision of text is limited by the classifier with lowest accuracy. Moreover, the effect of different features to the results is analyzed based on Information Gain Method.
    Design & Implementation of Virtual Vector Signal Generator and Analyzer
    SHA Jie, LIU Zai-ying
    2013, 12(12):  149-154.  doi:10.3969/j.issn.1006-2475.2013.12.035
    Asbtract ( 306 )  
    References | Related Articles | Metrics
    Vector signal generator (VSG) and vector signal analyzer (VSA) have been widely used for the measurement and debugging of digital communication systems. A virtual VSG and a virtual VSA were developed by using the graphical programming language LabVIEW which belongs to American National Instrument. The analogue electrical interface of the instruments is implemented by using National Instrument Data Acquisition Unit (DAQ). The virtual VSG can generate modulated vector signals based on various digital modulation formats, change the signal bandwidth to pre-allocated spectrum, simulate channel noise, and transmit the modulated signal through analog channel. The generated vector signals can be analyzed by the VSA, which integrates the functions of digital demodulator, spectrum analyzer, oscilloscope, constellation diagram analyzer, bit error rate (BER) tester and error vector magnitude (EVM) tester.
    Design and Implementation of Report Search Engine Based on Lucene
    CHENG Xu, DU Zhi-bin, SHAO Xue-bin
    2013, 12(12):  155-158.  doi:10.3969/j.issn.1006-2475.2013.12.036
    Asbtract ( 205 )  
    References | Related Articles | Metrics
    After years of construction and development, a huge mass of data has been accumulated on the Notice Platform, including about 2.3 million test reports. But an effective search means has not been formed. A full-text search engine is designed for the Notice Platform test report database based on Lucene. It provides full-text search service based on content. This study is important for Notice Platform optimization and management standardization and is of important practical significance for improving the satisfaction of government and enterprises in notice management service.
    Method of Social Website Image Retrieval Based on Multi-feature Fusion
    GUO Hai-feng, LI Guang-shui, QIU Bin-ren
    2013, 12(12):  159-163.  doi:10.3969/j.issn.1006-2475.2013.12.037
    Asbtract ( 235 )  
    References | Related Articles | Metrics
    ecause of users’ non-professional and randomness, in the process of retrieval image, social website retrieval can not ideally generate sufficient result for people. In view of this situation, this paper proposes a method of image retrieval based on multi-feature fusion. According to the initial term of users input, the system offers users a set of candidate images, based on the user’s choice of target image, combining the low-level features of candidate images sets, community themes and label order, this paper constructs a candidate image multi-feature vector. The system can calculate the distance between the vector and the target image, submits the nearest image collection to user. Simulation experiments are done based on real data from Flickr website, and the test results prove that this method is effective.
    Design and Implementation of Water Pump Control System Based on iCAN
    BEI Yan1, ZHANG Shu-ming2
    2013, 12(12):  164-166.  doi:10.3969/j.issn.1006-2475.2013.12.038
    Asbtract ( 200 )  
    References | Related Articles | Metrics
    With the rapid development of industrial control network, more and more attention is paid to the fieldbus technology. As one of the highest market share in fieldbus, the CAN-bus has been widely used in the field of industrial control and other related fields, due to its openness, high reliability, good real-time performance and lower cost, iCAN system has iCAN protocol in the CAN-bus application layer, which has effectively solved the users’ problem of communication control and data collection and also meets the need of most domestic users of small and medium-sized fieldbus network. Basing on iCAN system, this paper designed and implemented an improved system to monitor and control the pumps at water source places with flexible construction, simple structure, low cost, good reliability and stability.
    Interface Design of PS/2 Optical Fiber Transmission for Anti-high-power Microwave
    JI Yu, HU Xiao-ji
    2013, 12(12):  167-171.  doi:10.3969/j.issn.1006-2475.2013.12.039
    Asbtract ( 170 )  
    References | Related Articles | Metrics
    The technology of microwave has been used widely in the domains of communication and others. And the HPMW (High Power Microwave Weapon) has been already used in the military. How to increase the ability of electronic equipment protection in the worse electromagnetic environment becomes an important subject task. Based on the needs of anti-HPM application, this paper designs an interface of PS/2 based on optical fiber transmission, and the related circuit in the design is presented. Experimental results show that this solution can well satisfy the requirement of optical fiber transmission and the protection of HPM. This solution has good prospects of application.
    Soil-free Scroll Air Compressor Motor Fixing Match Based on NSGA-Ⅱ
    ZHOU Lin-yu1, TU Hai-ning2, YANG Juan2
    2013, 12(12):  172-176.  doi:10.3969/j.issn.1006-2475.2013.12.040
    Asbtract ( 225 )  
    References | Related Articles | Metrics
    For the characteristics and the existing problems of assembling soil-free scroll air compressor parts and components, this paper adopted a Non-Dominated Sorting in Genetic Algorithm, according to the characteristics of fixing matching problem, coded the decimal coding for genes, designed the selection, crossover and mutation genetic operators, completed the entire algorithm written in C#. Taking type 04A main motor fixing matching as instance, the feasibility and effectiveness of the matching algorithm are verified.
    Low-power Design of AT89 Series 51 MCU System
    CAI Yin-he
    2013, 12(12):  177-179.  doi:10.3969/j.issn.1006-2475.2013.12.041
    Asbtract ( 228 )  
    References | Related Articles | Metrics
    For the needs of low-power applications, a series of low-power setting methods about AT89 series 51 MCU system was presented, respectively, from hardware and software perspectives. Test results proved that these methods can effectively reduce power consumption of the system. They also provided a reference for low-power design of other types of MCU system.
    Improvement of Software Process Management Based on SOA
    LI Ming
    2013, 12(12):  180-183.  doi:10.3969/j.issn.1006-2475.2013.12.042
    Asbtract ( 204 )  
    References | Related Articles | Metrics
    This paper puts forward an improved software process management model based on RUP. According to the thinking method of SOA construction system, this paper analyzes the service classification of software process management model step by step, lists some critical service flows of software process management model and their input and output standards. Through these standards, the software process management system is of a certain scientific and standardization.
    Document Construction Technology of PDF for Web
    LI Lan-you1,2, CHEN Li1, XIE Xue-lian1
    2013, 12(12):  184-187.  doi:10.3969/j.issn.1006-2475.2013.12.043
    Asbtract ( 193 )  
    References | Related Articles | Metrics
    The document construction technology strategy of PDF for Web is introduced. And the technologies including watermark generating technology, table header title processing technology, large data stream data structure design technology, table text block segmentation technology and paging control technology are discussed. The practical application for device management Web system shows that the technology is smart and it provides reference solution to build and develop similar applied system.
    esign of Embedded Computer Platform in Integrity Module Avionics
    MEI Yun-hua
    2013, 12(12):  188-191.  doi:10.3969/j.issn.1006-2475.2013.12.044
    Asbtract ( 184 )  
    References | Related Articles | Metrics
    The technical demand of the embedded computer in integrity module avionics is elaborated. A solve scheme of the embedded computer, which can satisfy the technical demand, is given. The choice of processor and the composing of hardware & software in the solve scheme are discussed.
    Scheduling Scheme of Multi-thread Load Balance in OpenMP
    FAN Hui-min, LI Zi-tian
    2013, 12(12):  192-195.  doi:10.3969/j.issn.1006-2475.2013.12.045
    Asbtract ( 215 )  
    References | Related Articles | Metrics
    This paper introduced several typical scheduling strategies in OpenMP environment on for loop scheduling, analyzed and summarized the experimental results in detail, then proposed an improved scheduling scheme.
    Design and Implementation of Online Monitoring Management System for Power Transmission Line Based on J2EE
    LIU Jin, GU Jia-qiang
    2013, 12(12):  196-200.  doi:10.3969/j.issn.1006-2475.2013.12.046
    Asbtract ( 238 )  
    References | Related Articles | Metrics
    In order to protect the safe and stable operation of high-voltage transmission line, solve the problem that the potential security risks can not be detected in time by manual patrol of the line, and achieve the remote and online monitoring of high-voltage transmission line, a computer management system that can carry out real-time monitoring for transmission line was designed and developed. This system is based on J2EE, uses J2EE framework and JSP technology. It can conduct imaging display and analysis for the data returned from real-time acquisition by sensors allocated on the transmission equipment. It can also carry out early warning and alarming for the transmission equipment according to corresponding standards, thus to guarantee the safe operation of equipment.
    Design and Implementation of Automatic Problem Building System on Excel Operation Test
    HAO Han-han, KANG Mu-ning
    2013, 12(12):  201-205.  doi:10.3969/j.issn.1006-2475.2013.12.047
    Asbtract ( 257 )  
    References | Related Articles | Metrics
    The traditional automatic problem building system’s interface is relatively complicated, needs to manually set up a lot of information on the topic. Considering these shortcomings, this paper presents the design and implementation of automatic topic building system for Excel operation test. When using this system, the teachers only need to operate the Excel document in a right way at frist. Then, the questions information can be generated automatically by comparing the original document and the revised document properties. Compared with the traditional system, the system’s interface is simpler and the system is of a high degree of automation. So it can really generate questions automatically.
    Failure Analysis of Aircraft Generator System Based on RODON
    JIANG Liang-liang, WANG Zi-qiang
    2013, 12(12):  206-209.  doi:10.3969/j.issn.1006-2475.2013.12.048
    Asbtract ( 294 )  
    References | Related Articles | Metrics
    The traditional fault diagnosis methods that depended on human being or signal analysis were difficult to deal with the increasingly complicated intelligent aircraft electrical systems. The development of artificial intelligence and software technology made it possible to solve this problem. In accordance with the principles of model-based fault diagnosis and using RODON fault diagnosis software, a simulation model of aircraft generator system was built. Failure analysis of aircraft generator system was used to verify the usefulness and efficiency of model-based fault diagnosis method.
    Design of Wireless Data Monitoring System Based on Single Chip and Kingview
    ZHANG Xue-wei, ZHANG Ce, CHEN Jin-yang
    2013, 12(12):  210-210.  doi:10.3969/j.issn.1006-2475.2013.12.049
    Asbtract ( 2020 )  
    References | Related Articles | Metrics
    This paper introduces a temperature and humidity monitoring system based on AT89S52 MCU and PC which communicated by the wireless serial port. The system uses a single chip microcomputer as the slave computer to complete the temperature and humidity data acquisition, sends the data collected by the wireless serial port to PC. The design makes full use of the powerful data processing function of PC unit state Kingview V6.53 software and friendly man-machine interface design to display real-time temperature.