Loading...

Table of Content

    24 June 2013, Volume 1 Issue 6
    算法设计与分析
    Active Disturbance Rejection Control for Airbreathing Hypersonic Vehicle
    DU Haoyu;FAN Yonghua;YAN Jie
    2013, 1(6):  1-4.  doi:
    Asbtract ( 269 )  
    Related Articles | Metrics
    Hypersonic vehicle requires strictly for angle of attack and angle of sideslip when its engine is working. To meet the requirements, angle of attack autopilot is designed with autodisturbance rejection control. The system’s state and the disturbance are estimated using the extended state observer. The state error is feedbacked nonlinearly and the disturbance is compensated in order to trace the dictates accurately. With the result of the simulation, it is shown that this method of control can reject the disturbance and meets the requirements well.
    A Prediction Method for Hydrate Formation Conditions Based on Wavelet Neural Network 

    TANG Yonghong;WANG Chao;GONG An;XU Jiafang;GAO Haikang

    2013, 1(6):  5-8.  doi:
    Asbtract ( 239 )  
    Related Articles | Metrics
    There are a variety of shortcomings in forecast methods of traditional hydrate formation conditions. Wavelet neural network prediction of hydrate formation conditions is of high precision and is conducive to the promotion. For the relative gap between the predictive values of hydrate formation conditions being larger, the groups maximum error ratio representation mechanism is presented to improve wavelet neural network learning style. The experimental results show that the algorithm is feasible and effective to predict with high accuracy.
    Research on Guidance of Antistealthairdefense Missile Based on Virtual Target
    FAN Jianchao;YANG Jun;YUAN Bo
    2013, 1(6):  9-12.  doi:
    Asbtract ( 229 )  
    Related Articles | Metrics
    There exist anisotropic for the RCS of the target in direction, that is to say, in different observation direction, the RCS of the target is different, which affects the detection distance of the missile directly. In order to make the detection distance of the missile reach the furthest and achieve precise antistealth effect, the missile is made to track stealth target from the direction where the RCS of the target is the largest. The incident angle is put forward for the middle guidance law of the antistealthairdefense missile. Considering the question of airdefense missile attacking the stealth target, the guidance is designed on the vertical plane according to the movement of the missile and the target, which is based on the proportional navigation guidance law and a guidance law with terminal impact angle constraints. At last the simulation has been made, and the results show that the guidance law can be used to attack the target in a specific incident angle, as a result, the antistealth effect of the missile is proved.
    Application of Hidden Markov Model in Information Mining of Learning System
    HUANG Zhicheng
    2013, 1(6):  13-15.  doi:
    Asbtract ( 231 )  
    Related Articles | Metrics
    According to the constructivism learning theory, cognitive thinking is an iterative, incremental process. In order to understand and track the degree of students’ grasp of knowledge points, taking SQL online testing system of database course for example, a model with hidden Markov model is built. By decoding the feedback information, the hidden state transition is mined and discovered. Experiment shows that state transition information revealed by the model help teachers to better understand students’ mastery of knowledge points.
    Research on Dimension Reduction of Speaker’s Characteristics Based on CCA and PCA  
    CHEN Juezhi;ZHANG Guirong;ZHOU Yuhuan
    2013, 1(6):  16-19.  doi:
    Asbtract ( 257 )  
    Related Articles | Metrics
    With the purpose of improving the performance of speaker recognition, a method of dimension reduction in speaker’s characteristics by jointing CCA and PCA is proposed. Firstly, LPC characteristics based on acoustic models and MFCC characteristics based on auditory models are blended by CCA method so as to enhance the correlativity between LPC and MFCC. After that the PCA method is used to eliminate redundant characteristics so as to reduce the effective characteristic dimensions of speech signal. Experiments show that the efficiency of dimension reduction of this novel method that joints CCA and PCA is significantly improved comparing to that of traditional methods while only using CCA dimension reduction, PCA dimension reduction or manual dimension reduction.
    Generating Algorithm of Progressive Mesh Model Based on Edge Collapse
    HOU Baoming;E Xu;BI Jiana
    2013, 1(6):  20-22.  doi:
    Asbtract ( 228 )  
    Related Articles | Metrics
    In order to implement progressive mesh representation of 3D model, the calculation method of collapse cost of model simplification based on edge collapse mode is improved. Firstly, model data from SMF data file is obtained, and the 3D model in the memory is established rapidly, and the weight calculation method of Garland’s EM algorithm is redesigned. The square of the largest deviation of triangular plane normal adjacent to the vertex is used as the importance degree of vertex, and bring it into error metric formula, by simplifying progressive mesh is generated. The following experiment shows that the algorithm is succinct, and the generating speed of mesh and the contour information of model are completely preserved.
    Research on State Grid Operation and Maintenance Index Modeling Based  on High Dimensional Multiobjective Optimization 
    LI Zhen;TANG Jin;HE Ming;YANG Dongshu
    2013, 1(6):  23-26.  doi:
    Asbtract ( 240 )  
    Related Articles | Metrics
    The assessment plan developed by state grid changes so frequently that the company under assessment can not allocate its resources reasonably. The paper proposes a highdimensional multiobjective optimization modeling method based on indicators in the assessment plan, which aims to make the company achieve some resource allocation scheme which have higher overall score without taking the impact of weighting factors. In the model, the least squares based highdimensional multiobjective reduction algorithm is used to eliminate redundant objectives and a novel density assessment function is introduced to make more effectively converge to the Pareto front. Experimental reference new density evaluation functions of the NSGAII algorithm, and compare with the original NSGAII. Results demonstrate the validity and legitimacy of the proposed model.
    Modeling and Analysis of Undergraduate Colleges Teachers’ Pressure Based  on Set Pair Analysis and Genetic Algorithm
    HOU Mandan;LANG Dianbo
    2013, 1(6):  27-29.  doi:
    Asbtract ( 219 )  
    Related Articles | Metrics
    The paper establishes a model based on the theory of set pair analysis under the 400 application undergraduate colleges teachers’ questionnaire data, and then solves it by genetic algorithm, so can offer reference to the evaluation of college teachers’ pressure.
    Multisensor Cooperative Detection Techniques for Time Critical Target Cooperative Striking 
    LI Yangsi;ZHANG Ke;YU Ruixing;DONG Peng
    2013, 1(6):  30-33.  doi:
    Asbtract ( 229 )  
    Related Articles | Metrics
    Timecritical targets with strict time constraints and operational decisionmaking random combat operations in parallel, information exchange requirements of quality characteristics, so rapid detection and strike ability is needed to respond effectively to sensitive target threat. According to the characteristics of timecritical targets, multiple platforms are used for its detection and tracking. According to realtime requirements, the algorithm with better accuracy and numerical stability for simultaneously deviation registration and target tracking based on central difference Kalman filter is raised. Simulation results show that the algorithm has a good performance and it further demonstrates the algorithm is effective.
    Research on Guidance Law of Low SNR Based on H
    8 Filter
    SHI Jianfeng;WENG Zhiqian;YANG Jun;YUAN Bo
    2013, 1(6):  34-37.  doi:
    Asbtract ( 212 )  
    Related Articles | Metrics
    To solve the problem of maneuvering target interception, this paper designs a variable structure guidance law based on the upper bound of target maneuver. Considering the seeker measurement signal characteristics of low SNR, measuring signal can not be applied to the guidance law, this paper puts forward a guidance information reconstruction method based on H
    8 filtering technique. H
    8 filter is robust to noise uncertainty. Filtering can not only improve the guidance accuracy, but also enhance the stability of system. Finally the guidance law and the filtering algorithm are simulated, and the simulation results verify the validity of this method.
    Application Research of Genetic Simulated Annealing Algorithm in Cloud Scheduling
    JIANG Meiyun
    2013, 1(6):  38-41.  doi:
    Asbtract ( 232 )  
    Related Articles | Metrics
    Cloud computing has become a fashion trend, and has become a commercial mode, in cloud computing, cloud computing resource scheduling is an important part of the strategy, scheduling has a direct impact on the entire cloud computing performance. Based on the study of cloud computing scheduling strategy, this paper tries to apply genetic algorithm and simulated annealing algorithm to cloud computing scheduling, in order to obtain higher performance.
    Application Research of Genetic Simulated Annealing Algorithm in Cloud Scheduling
    JIANG Meiyun
    2013, 1(6):  38-41.  doi:
    Asbtract ( 247 )  
    Related Articles | Metrics
    Cloud computing has become a fashion trend, and has become a commercial mode, in cloud computing, cloud computing resource scheduling is an important part of the strategy, scheduling has a direct impact on the entire cloud computing performance. Based on the study of cloud computing scheduling strategy, this paper tries to apply genetic algorithm and simulated annealing algorithm to cloud computing scheduling, in order to obtain higher performance.
    Self Shadow Removal Algorithm Based on Foreground Segmentation
    LIU Zhenxiang;MA Yinping
    2013, 1(6):  42-43.  doi:
    Asbtract ( 243 )  
    Related Articles | Metrics
    Removing identifying moving objects from a video sequence is a fundamental and critical task in many computer vision applications and a robust segmentation of motion objects from the static background is generally required. Segmented foreground objects generally include their self shadows as foreground objects since the shadow intensity differs and gradually changes from the background in a video sequence. Moreover, self shadows are vague in nature and have no clear boundaries. To eliminate such shadows from motion segmented video sequences, the paper proposes an algorithm based on inferential statistical difference in Mean (Z) method. This statistical model can deal scenes with complex and time varying illuminations without restrictions on the number of light sources and surface orientations. Results show that the algorithm can effectively and robustly detect associated self shadows from segmented frames.
    Study on Health Monitoring of Bridge Based on Wavelet Neural Network
    HUANG Shunjie
    2013, 1(6):  44-47.  doi:
    Asbtract ( 251 )  
    Related Articles | Metrics
    In order to carry out the health monitoring of bridge structure effectively, the application of wavelet neural network on it is studied in depth. The basic theory of the wavelet analysis is analyzed, and the basic theory of wavelet neural network is studied, and then the algorithm procedure of wavelet neural network is designed, data collection and transmission system of health monitoring for the bridge is discussed. Finally, a big bridge is used as an example to carry out simulation analysis of health monitoring of it based on wavelet neural network, and simulation results show that this method has quick monitoring speed and high monitoring precision.
    信息安全
    Design and Implementation of Enterprise Data Protection and Leakage Proof Platform
    LIU Jinsuo;CONG Zhenghai;HAN Yong
    2013, 1(6):  48-51.  doi:
    Asbtract ( 263 )  
    Related Articles | Metrics
    Enterprise informatization is constructed vigorously, to facilitate the realization of information and data sharing. Various types of data are used in normal production and operation of enterprises. No matter what is the scale of enterprises, there are data leakage risks, these risks will make enterprise security, intellectual property, property and privacy multiple threats. This paper describes the data protection and leakage proof platform based on the whole life cycle of the protection of data, through the data classification, identification, retrieval, protection, monitoring and analysis, establishes from the service layer, protection layer and analysis layer of whole life cycle data protection system, thus greatly reduces the conscious or unconscious data leakage, improves enterprise data protection.
    Comparative Study of Information Hiding Method Based on Text Typesetting Format
    TAN Ying
    2013, 1(6):  52-56.  doi:
    Asbtract ( 246 )  
    Related Articles | Metrics
    Information hiding technology has increasingly become a hot spot in the field of information security. The carriers used in common are image, audio, video, text documents and so on. Using text documents as carriers is difficult because of its little redundancy, but the text documents is the most commonly used document form, so information hiding based on the text documents is meaningful. Taking the same Word document for example, through using of different typesetting format to realize information hiding, the paper compares the results of the experiment, summarizes the advantages and disadvantages, and finally points out the research direction in the future by using text documents to realize information hidden.
    Application of Improved LF Algorithm in Intrusion Detection
    NIU Yongjie;ZHAO Yaofeng
    2013, 1(6):  57-59.  doi:
    Asbtract ( 235 )  
    Related Articles | Metrics
    In order to improve the detection rate and reduce the false detection rate of intrusion detection systems, the basic ant colony clustering based on the ant heap classification model LF algorithm has been improved. These measures mainly include four aspects, they are direct positioning, global guidance, neighborhood linearly decreasing and ball neighborhood range. The LF algorithm improves the KDD Cup 1999 data set simulation testing, has higher detection rate and lower false detection rate, and the new algorithm has a fast running speed, not easy to fall into local optimum advantages.
    Study on Digitized Document in Assisted Maintenance
    ZHANG Ruili;GAO Wanchun;WU Weituan
    2013, 1(6):  60-63.  doi:
    Asbtract ( 221 )  
    Related Articles | Metrics
    The assisted repair system involves a large number of data processing, looseleaf approach of digitized documents provides a convenient to maintenance and support. This paper realizes control and interaction of digital information in Web environment by script control technology, encryption / decryption technology and ActiveX plug, and studies the application of digital documents in the assisted maintenance mode of aviation equipment.
    Secure Identityauthentication Scheme Based on Minutiae Classification
    HUANG Jiabin;CAO Zhenfu
    2013, 1(6):  64-66.  doi:
    Asbtract ( 246 )  
    Related Articles | Metrics
    As multibiometric feature identification can get higher accuracy, the U.S. department of justice launched the next generation identification (NGI) project which will add the fingerprint pore information to help the identification. However, the leaking of personal fingerprint pore information can make it easy to restore the fingerprint ridges. The paper presents a scheme which can protect personal private pore information. The scheme uses highresolution fingerprint scan device to capture fingerprint digital image with pores, aligns fingerprints by using minutiae, and binds key by using pore. Existing Fuzzy Vault scheme assumes fingerprints are prealigned or uses inaccurate methods to align fingerprints. The paper firstly combines fingerprint level3 information with Fuzzy Vault scheme.
    图像处理
    A Rotation Invariant Texture Classification Based on Radon Transform and EMD 
    ZHENG Bibo;CHEN Weiqing;TIAN Peiyun
    2013, 1(6):  67-70.  doi:
    Asbtract ( 212 )  
    Related Articles | Metrics
    A rotation invariant texture classification method using Radon transform and Empirical Mode Decomposition (EMD) is proposed. First, texture image is translated by Radon transform to convert the rotation to translation. Secondly, the transform result is divided into several Intrinsic Mode Functions (IMF). Then the invariant feature is composed of the energies of each IMF using a modified energy equation. At last a kNearest Neighbor Distance is applied to classify the rotation textures. The result shows the proposed method can greatly improve the correction rate of rotation texture classification after applying this method on Brodatz.
    Realtime Pupil Parameter Detection for Infrared Image Using OpenCV
    LUO Yuhao;ZOU Yuanwen ;XIA Xun
    2013, 1(6):  71-75.  doi:
    Asbtract ( 319 )  
    Related Articles | Metrics
    This paper presents a simple and effective pupil localization method based on binary threshold coarse location and region growing. The morphology is used as a pretreatment method to remove the influence of the eyelash and the light spot, which could keep the original pupil size and generate thumbnails at the same time. To find the extreme point of the binary image, which can be used as the seed point, the horizontal and vertical projection is conducted. Region growing algorithm is used to obtain the accurate pupil region. The results demonstrate that the pupil parameters could be detected in realtime by using the acquisition system which is developed using OpenCV technology, the processing rate of the system can be at 29.75 fps.
    Research on Features Matching Based on PDCRANSIFT Algorithm 
    WANG Bixuan;ZHANG Ke;SONG Junyan
    2013, 1(6):  76-81.  doi:
    Asbtract ( 259 )  
    Related Articles | Metrics
    This paper researches image object recognition in cluttered background to improve the accuracy and speediness of battlefield target identification. With SIFT’s defects of redundancy and weak, this paper presents a PDCRANSIFT algorithm to improve SIFT features. First, the probabilistic distance clustering (PDC) algorithm is used to cluster the redundancy of SIFT features, select the represent features as coarse features. Then, the mismatching features are rejected by Random Sample Consensus(RANSAC) method, obtaining the refined matching features. The experiment results show the refined matching features have reduced SIFT features’ redundancy to a great extent, the matching time is shortened by about 50%. What’s more, they are easier to distinguish and more robust than SIFT’s for light variation, rotation changes and adding noise.
    Design and Implementation of Color Design System for Multitouch Terminal
    WANG Jinxia;GOU Bingchen
    2013, 1(6):  82-85.  doi:
    Asbtract ( 263 )  
    Related Articles | Metrics
    This paper analyzes the classic expression of color design part about the common design software. Because of the more interactive and more humanized design requirements of multitouch terminal’s users, it puts forward a design framework of 3D color design system. It does some researches about key technologies of the system, such as the technology of 3D color model display, the refinement of 3D color model and the method of color model’s humancomputer interaction. It provides more matching design software and the interactive mode for constant upgrading of hightech electronic terminal products.
    Study on Application of Multimedia Objects in IETM
    GAO Wanchun;ZHANG Ruili;GAO Yang
    2013, 1(6):  86-89.  doi:
    Asbtract ( 269 )  
    Related Articles | Metrics
    Multimedia objects have been applied widely in IETM because of show technique information vividly. The paper researches key technique of multimedia object, such as storage management and quote, analyzes the produce, display and navigate requirements of multimedia objects and IETM integration, puts forward data operating model of multimedia objects in IETM, and applies the results in the some type of airplane.
    Performance Comparison of ITK Metric in Cigarette Case Image Registration 
    ZHU Meihua;WEI Chengke;GENG Anpeng;ZHANG Suwei
    2013, 1(6):  90-94.  doi:
    Asbtract ( 267 )  
    Related Articles | Metrics
    In order to verify the usability and performance of the medical image processing framework ITK in the image registration of cigarette case, through the analysis of the principle of the ITK registration framework and registration process, using a fixed image transform algorithm, linear interpolation algorithm and optimization algorithm, the similarity measurement algorithm is transformed, the efficiency of the image registration in Zhonghua hard box cigarette packaging is compared by using different similarity measure algorithm in ITK. Finally, through a lot of experiments, the usability of the ITK in the medical field is verified, a certain universal image registration process of different small package of cigarette is draw.
    New Image Scrambling Hiding Algorithm Based on Chaotic Proliferation Encryption
    NIU Yongjie;ZHAO Yaofeng
    2013, 1(6):  95-99.  doi:
    Asbtract ( 227 )  
    Related Articles | Metrics
    In recent years, digital image information hiding technology has been the hot research topics in digital image information hiding. Digital images as carriers of information hiding are not different from traditional encryption methods, the use of information hiding generated by images with the confusing can stand attacks from a malicious person. The combination of twodimensional logistic encryption algorithm and digital image hiding algorithm uses a large space and image scrambling hidden characteristics. Although the expense of encryption is not efficiency, security and hidden are better, and it is more suitable for practical application, fully embodies the proliferation of encryption, enhances the ability of scrambling algorithm. The security analysis proves that the algorithm is of enough key space and good hideaway effect.
    Objective Evaluation of Fabric Pilling Based on SOM Network
    KANG Xuejuan;ZHANG Zanzan
    2013, 1(6):  100-103.  doi:
    Asbtract ( 262 )  
    Related Articles | Metrics
    This paper proposes a new neural network based on selforganizing map algorithm method for the fabric pilling grading. Pilling fabric contain important texture information. Firstly, this paper creates the graylevel cooccurrence matrix of pilling image, then extracts its feature vector. Secondly, with the input features, the established SOM neural network is used for training and classification. That is classifying the pilling image as different levels. The paper details the basic principles of SOM networks and learning algorithms, as well as the calculated method of cooccurrence matrix. Finally, the seven kinds of fabric pilling feature parameters are imported to experiment. The results show that the method is efficient and feasible.
    Research on 3D Modeling and Scene Roaming of Mining Subsidence Area
    ZOU Hai;ZOU Chao
    2013, 1(6):  104-107.  doi:
    Asbtract ( 255 )  
    Related Articles | Metrics
    Coal mining although to some extent is met the country’s energy demand, but also brings serious environmental and ecological problems. In view of the surface subsidence induced by coal mining, based on full collection of various geological and mining technology of data, using OpenGL technology and GIS technology in VC 6.0 development environment, the 3D geological modeling of coal mining subsidence area is built. Combining with the geological parameters of Huainan mining area, applying virtual reality technology (VR ), the scene roaming coal mining subsidence area is made. The study is of great significance for the coal mining subsidence area occurrence, development and tendency as well as the comprehensive management of the environment.
    Research on a SAR Image Matching Method Based on Improved SIFT Algorithm
    ZHAO Boyi;ZHANG Ke
    2013, 1(6):  108-112.  doi:
    Asbtract ( 275 )  
    Related Articles | Metrics
    In order to improve the stability and rapidity of synthetic aperture radar(SAR) images matching, an improved SIFT algorithm is proposed. At first, using the Canny edge detection algorithm instead of the original algorithm extracts feature points to optimize the main direction of the SIFT feature vectors, for the problem of speckle noise of SAR images, using a threshold adaptive Contourlet transform to suppress noise and then using the improved principal component analysis(PCA) algorithm to reduce dimensions of features extracted before. Compared with the existing method, the improved SIFT algorithm not only maintains the richness of characteristics but also greatly simplifies the computational complexity and improvs the speed of operation. Experiments shows that the improved SIFT algorithm is able to overcome variations of the scale, rotation and resolution to match two images with faster speed and higher accuracy.
    An Approach to Threshold Determination Based on Qlearning 
    CHEN Peng
    2013, 1(6):  113-115.  doi:
    Asbtract ( 269 )  
    Related Articles | Metrics
    The threshold value of the image in the image processing is very important. The histogram method is a commonly used threshold value determination method, but not to determine the threshold value of the nonbimodal image. Reinforcement learning is learning through interaction with the environment. Qlearning is to strengthen one of the main methods of learning. This article describes a method of using the Qlearning algorithm to determine the optimal threshold. Agent is from a constant threshold algorithm and applied to the image. In the case of the objective, the return is defined based on the ratio of black pixels, the object region, the deviation of the tolerance area, the number of objects. Agent maps the state of the environment to the appropriate action, and tries to get the best return. The experiments show that the proposed method can be objective or subjective way to integrate the expertise of the people, in order to overcome the inadequacies of the existing methods.
    网络与通信
    Design and Implementation of Teaching Management System  at Faculty Level Based on MOSS
    SHEN Junhui;MA Xingguang;LIU Renquan;HAN Aiqing;JIN Zhongzheng
    2013, 1(6):  116-119.  doi:
    Asbtract ( 224 )  
    Related Articles | Metrics
    The article reports the design and implementation of management information system at faculty level using MOSS 2010. The system is reinforced with features such as the editing by multiple persons, the multilayer scheduling for the computer room, etc. The system has achieved expected benefits in improving the faculty working efficiency and in establishing the synchronized working model at faculty level.
    JenaPro: Semantic Web Framework Supporting HTML5 Outline Analysis
    WANG Haibo;ZHANG Run;WANG Zhaohua
    2013, 1(6):  120-124.  doi:
    Asbtract ( 225 )  
    Related Articles | Metrics
    Semantic Web framework is a main tool for developing semantic Web application. As a popular semantic Web framework, Jena lacks support for HTML5 and distributed file store mechanism. This paper proposes JenaPro based on Jena. Through analyzing the DOM structure of HTML5 document and semantic markup, it can extract the outline structure of HTML5 document. It provides a useful tool for the intelligence information processing application to analyze HTML5 document.
    Design and Implementation of Webpage Template Based on Responsive Web Design
    ZHANG Shuming
    2013, 1(6):  125-127.  doi:
    Asbtract ( 270 )  
    Related Articles | Metrics
    With the rapid development of mobile Internet, it is important for website construction to have the corelation and consistency between desktop and mobile Web applications. Based on responsive Web design, the paper designs and implements a universal set of templates that can automatically adjust to different browse equipment environment and be independent from devices, which provide an efficient way for website development.
    Quality Evaluation System for Teaching on Internet  to Modern Distance Open University
    JIANG Yilian
    2013, 1(6):  128-132.  doi:
    Asbtract ( 261 )  
    Related Articles | Metrics
    To make the teaching quality evaluation online, efficient and intelligent, based on MVC pattern of threetier architecture, the paper uses the current most popular JavaEE framework SSH to develop a teaching quality evaluation system online which can be used in teaching quality evaluation to modern distance open university.
    Design and Implementation of Wireless Sensor Networks Gateway Based on ZigBee Technology 
    LIANG Zongbao;LI Peng
    2013, 1(6):  133-137.  doi:
    Asbtract ( 240 )  
    Related Articles | Metrics
    With the further development of wireless network technology, the advantages of wireless sensor networks(WSN) are further reflected than others. WSN will replace most even all of wired sensor networks. In wireless sensor networks, the gateway plays an important role. In this article, beginning with the advantages of ZigBee technology, WSN gateway program based on ZigBee protocol stack is analyzed in detail. In addition, the hardware and software system are designed from the program. Finally, WSN gateway is realized with the use of IC of Microchip. The results show that the gateway can realize the aims at accurate data transmission and stable performance. And the need of the lowcost, lowpower and strong antiinterference ability also can be well meet.
    Application of IOT in Cigarette Authenticity Identification System 
    GENG Anpeng;WEI Chengke;ZHANG Suwei
    2013, 1(6):  138-141.  doi:
    Asbtract ( 246 )  
    Related Articles | Metrics
    IOT technology and image processing technology are currently very popular, the combination of them is applied to many fields, but it is blank in cigarette authenticity identification industry. IOT and image recognition are applied to cigarette authenticity identification system, and it can verify IOT construction combined with the practical application, it can improve low efficiency of cigarette authenticity identification, it can decrease miscarriage of justice. In addition, it can make law enforcement personnel identify cigarette authenticity in the working field, make working hours be shorter, improve law enforcement image.
    Research on Mobile Station in Idle Mode
    CHENJIANG jingzi;XU Ziping;FAN Zhaolong
    2013, 1(6):  142-146.  doi:
    Asbtract ( 218 )  
    Related Articles | Metrics
    In this paper, MS in idle mode is discussed. After switching on, the MS should contact the network so that it can obtain service, so the idle mode is of great concern for study of the research on the work of the MS. Three procedures related to idle mode include PLMN selection, cell selection and reselection and location registration. This paper focuses on the descriptions of the procedures from the basic technical research level.
    Technology of Data Exchange Between Heterogeneous Databases Based on XML and MQ 
    YANG Fan
    2013, 1(6):  147-150.  doi:
    Asbtract ( 222 )  
    Related Articles | Metrics
    Data conversion tools between traditional heterogeneous databases are lack of generality and expansibility which was caused by the platform limits. Data transmission efficient is low, and it is not conducive to the safety of data. XML provides a standardized data format and it is easy to transport; MQ solves the problem of data security and asynchronous communication. Based on the analysis of the existing data exchange solutions, XML and MQ are combined to construct a new solution in this paper. It is proved to be a universal, extensible heterogeneous data exchange model, as the main modules’ function of this model are discussed as follows.
    Application and Implementation of Network Teaching System Using CallBack Mechanism 
    LI Fachun
    2013, 1(6):  151-155.  doi:
    Asbtract ( 235 )  
    Related Articles | Metrics
    CallBack mechanism sends data through client to server, the server queries or processes the received data, and sends the final results back to the client to display the results, it improves the client and server interaction comparing with PostBack mechanism. The paper researches CallBack mechanism principle and its application in online teaching system.
    Design and Implementation of Network Accounting System of Zhejiang University
    MOU Xingliang;ZHENG Qiang;ZHU Sheng
    2013, 1(6):  156-158.  doi:
    Asbtract ( 305 )  
    Related Articles | Metrics
    This paper introduces the design and implementation of network accounting system, and this system is putting into application in the campus network of Zhejiang university. It describes a new method of network accounting, and also discusses some distinguishing features of the system, such as flexible accounting management, improved statistical reporting and efficient online selfservice payment.
    Design of Bus Inquiry System in Mobile Phone Terminal Based on Android Platform
    LI Yuanyuan;JIA Ru
    2013, 1(6):  159-161.  doi:
    Asbtract ( 251 )  
    Related Articles | Metrics
    Firstly, the background of bus inquiry system design on mobile phone is introduced in this paper. Then the system framework is designed, including the system network architecture and system software architecture. And then, according to the general framework, 3 function modules and database structure are planned and designed. Finally 2 business processes, focusing on the bus line query and updating of data, are carried out on a detailed design.
    Application of WebService Encapsulation in Vehicle Networking System
    ZHANG Sheng;WANG Lu;HUANG Liang
    2013, 1(6):  162-165.  doi:
    Asbtract ( 223 )  
    Related Articles | Metrics
    This paper is based on the national key operating vehicle networking integrated system, analyzes the difficulty of the information and service sharing on crosssystem, proposes an information sharing solution based on WebService encapsulation, resolves the problems resulted from the large system, various business, rapid changing and flexible business. The personnel work of the system maintenance is reduced also.
    MIPv6 Fast Handover Scheme Based on Access Router Caching Information
    XI Ting;YUAN Ling;WEI Jinhui
    2013, 1(6):  166-169.  doi:
    Asbtract ( 236 )  
    Related Articles | Metrics
    On the basis of research on fast handover for Mobile IPv6(FMIPv6) protocol, this paper proposes an improved scheme which introduces a mechanism of access router caching information to improve the performance of FMIPv6. In this scheme, it is to create and update router information caching table in the mobile node, which stores the information of all the access routers that mobile node has connected in the past. Then the latency of careof address(CoA) configuration and duplicated address detection(DAD) procedures is reduced significantly. Simulation results show that this scheme can decrease handover latency and the packet loss when mobile node access the router which has been connected in the past.
    Research on UTRAN Radio Interface Protocol
    FAN Zhaolong;XU Ziping;WANG Junfeng
    2013, 1(6):  170-174.  doi:
    Asbtract ( 207 )  
    Related Articles | Metrics
    This paper describes the radio interface protocol between UTRAN(UMTS Terrestrial Radio Access Network)and UE(User Equipment), including the overall protocol structure, then gives the introduction about a partition that the radio interface protocol is divided into three layers: The physical layer (L1), the data link layer (L2) and the network layer (L3). L3 is divided into two planes: control plane and user plane. Based on the three layers, it focuses on the service of every layer and the functions of protocols in every radio interface such as MAC, RLC services and functions, it also has a detailed description about some typical channel protocol termination at the same time.
    应用与开发
    Design and Implementation of Workflow Management System  Based on Microsoft Workflow Foundation
    ZHANG Pingchong
    2013, 1(6):  175-178.  doi:
    Asbtract ( 257 )  
    Related Articles | Metrics
    The release of Windows Workflow Foundation (WF) fills the vacancies of Microsoft workflow framework. How to use this framework to achieve specific workflow products has become a hot discussion by many workflow researchers in recent year. This paper proposes a WFbased workflow management system and discusses some key techniques.
    Research on Missile’s Integrated Testing Platform Based on HLA
    LIU Zhengchun;LIU Qi;YANG Jun
    2013, 1(6):  179-181.  doi:
    Asbtract ( 210 )  
    Related Articles | Metrics
    This paper summarizes the characteristics of the missile test and difficult on the basis, starting from the top level of the system based on HLA (High Level Architecture) specification to design a platform for the missile test. The goal of this platform is to provide a general, reusable distributed simulation support system. In order to get good performance of realtime communication, the underlying communication is supported by reflective memory card. According to the actual needs of missile testing, the independent time advance mechanism is designed for distributed simulation system’s time advance service. Hardware clock system program is designed to provide highprecision clock for simulation federates. So the platform can support both pure digital cosimulation and HIL cosimulation, and can be used in various stages of the test in missile design process also.
    Memory Prefetcher Design Based on SESC Emulator
    ZHAO Lei;ZHANG Meng;LIU Fang
    2013, 1(6):  183-188.  doi:
    Asbtract ( 270 )  
    Related Articles | Metrics
    The emulator is a software system running on host and simulating the behavior of target architecture machine. It can explain and execute the executable program on target architecture machine, while providing runtime instruction and eventrelated records, as well as the statistical parameters of target architecture machine performance. Systemlevel architecture emulator can be used as a virtual target machine which running software system, can achieve the functional simulation of the single (multi) processor, system memory, cache, and an external device subsystem. This paper is based on the structural characteristics of multicore processors, studies architecture simulation and testing procedures. Using architecture simulation, the different structure of multicore processor chip memory access requirements are analyzed, and the offchip memory access bandwidth on the impact of computing performance is discussed. The multicore systemchip memory access mechanism and needs are summed up, as well as offchip memory access and program characteristics.
    XML with Tree Structure in Implementation of Quotation System 
    ZHOU Anyi;QIU Runhe;WANG Jiawei
    2013, 1(6):  189-190.  doi:
    Asbtract ( 243 )  
    Related Articles | Metrics
    The paper provides a method that uses the flow pieces of data(XML documents) in the process as the main data source, regards of the complexity and variability of product bill of materials (BOM) as well as the natural tree data organization form of extensible markup language (XML). Modules in Web page also become componentized according to XML node. The paper designs a quotation system based on Web. Its main function is to assist the sales staff to complete from project established, BOM input, new material maintenance, special price apply (SPA), and quotation to the last quotation print works. The implementation of XML greatly improves the computing speed and performance of the online quotation system.
    Establishing Wisdom Library from Digital Library
    SHI Yanyan
    2013, 1(6):  192-194.  doi:
    Asbtract ( 272 )  
    Related Articles | Metrics
    Based on the progress of the information construction of the university library, this thesis merges the research of the digital library into the construction of wisdom library, which will certainly set off a development wave of wisdom library with the industrial development of “Internet of things”. This thesis firstly explores the concept and characteristics of the digital library and wisdom library, then further researches the establishment plan and expounds the prospects for the development of wisdom library.
    Design and Implementation of PC Wireless Controller Based on Android
    XIAO Fei;WANG Juan
    2013, 1(6):  195-197.  doi:
    Asbtract ( 238 )  
    Related Articles | Metrics
    This paper introduces a humancomputer interaction design based on Android platform: transform a mobile phone into the wireless controller of PC by programming, which can provide the features such as PPT remote control, wireless game controller, remote shutdown and lock screen.
    Design and Realization of Collaborative Office System Based on Knowledge Management 
    ZHONG Luming
    2013, 1(6):  198-202.  doi:
    Asbtract ( 280 )  
    Related Articles | Metrics
    Along with the network popularization, the information entered a stage of rapid growth, knowledge has become the key factors to measure the productivity level. In the globalization competition, knowledge management ability is particularly important. In this paper, collaborative office systems and knowledge management are integrated to achieve the changes from data as the core to information as the core, and has a very important significance to improve the quality and efficiency of government agencies or enterprises, takes the decisionmaking more scientific and correct, and raises the level of integrated management and competitiveness.
    Design of IC Function Tested Method Based on CANoe Simulating ECU
    ZHANG Lihua;WU Hongsheng
    2013, 1(6):  203-206.  doi:
    Asbtract ( 254 )  
    Related Articles | Metrics
    In the state of ECU function test, the traditional way is that the function is tested on the test bench, therefore the traditional test way relies on the test bench. In order to avoid the dependence, the design of test way by CANoe simulating ECU is introduced in the paper. Taking the function test of IC displaying the information for example, firstly, the function database and panel is created, then the hardware devices are connected, and the BCM CAN message is simulated and transmitted to IC, the IC displays the information according to the message. The result shows that the way can well complete the function test.
    Design of IC Function Tested Method Based on CANoe Simulating ECU
    ZHANG Lihua;WU Hongsheng
    2013, 1(6):  203-206.  doi:
    Asbtract ( 245 )  
    Related Articles | Metrics
    In the state of ECU function test, the traditional way is that the function is tested on the test bench, therefore the traditional test way relies on the test bench. In order to avoid the dependence, the design of test way by CANoe simulating ECU is introduced in the paper. Taking the function test of IC displaying the information for example, firstly, the function database and panel is created, then the hardware devices are connected, and the BCM CAN message is simulated and transmitted to IC, the IC displays the information according to the message. The result shows that the way can well complete the function test.
    Design and Simulation of Certain Type of Missile Launch  and Control System Based on 1553B Bus 
    ZHOU Daming;L Meibo;XU Hui
    2013, 1(6):  207-211.  doi:
    Asbtract ( 218 )  
    Related Articles | Metrics
    In the environment of a certain type of missile launch and control, this paper designs bus interface based on 1553B protocol. It combines the three operating modes: bus controller(BC), the remote terminal(RT) and the bus monitor(BM) of the BU61580 protocol chip. It simulates launch control equipment to build terminal topology structure, splitting the complexity of its process, writing the cumbersome transmission parameter information to the 1553B format then designs the LabWindows / CVI platform software. Through simulation test, it proves that this design enables efficient combination of BC / RT / BM three operating modes, control launch various timing stages of implementation and realtime dynamic monitoring. The manmachine interactive controlling and monitoring interface of software is improved in the timeliness, effectiveness and advanced.
    Research and Realization of Digital Archives Appraisal System 
    MENG Yu;ZHAO Zhengwen;ZHANG Tao
    2013, 1(6):  212-215.  doi:
    Asbtract ( 192 )  
    Related Articles | Metrics
    In the construction processing of digital archives, digital archives appraisal has important social and economic significance. Digital archives appraisal is the identification and judgment of the value then determining the saving limit of digital archives in the corresponding file organization, with eliminating the unvalued files which need to be destroyed. Based on the research and study, it uses advanced technology to realize the corresponding demands with the visual interface to achieve the digital archives appraisal and destruction. For the first time in China digital archives appraisal system is deployed in digital archives, during the trial operation, it has realized the basic requirements of digital archives appraisal and played a certain effect.
    Design of MIDI Music Player Based on S3C2440A
    PAN Xiaoli;CHEN Xuehuang
    2013, 1(6):  216-217.  doi:
    Asbtract ( 187 )  
    Related Articles | Metrics
    A MIDI music player is designed, both vocal score function. It is adopting the popular high performance microprocessor ARM9 as CPU, touch screen as inputting. The player has a friendly interface. The main function menu includes player functionality and score function. Menu functions include play/pause, up/down, volume increases/reduction function. Score function menu includes tone select, start, pause music soundtrack and other functions. The whole design is friendly interface, convenient operation, good effect. It will rich people’s entertainment life.
    Robust Control Method for Aero Engine Starting Process Based on Speed Closedloop
    LI Feng;GOU Linfeng;XU Weiwei;SHI Peiyan
    2013, 1(6):  218-222.  doi:
    Asbtract ( 225 )  
    Related Articles | Metrics
    In view of the poor reproducibility and instability in the turboshaft engine starting process, this paper introduces the closedloop gain shaping control method, based on the speed rate closedloop algorithm and designs the controller to control the starting process. In the semiphysical simulation, the system shows good stability, reliability and robustness, as well as the reproducibility and stability are improved obviously.
    Design and Implementation of IT Asset Management System Based on ITIL
    CHAO Lijuan;MU Qiujiang;GUO Dong
    2013, 1(6):  223-226.  doi:
    Asbtract ( 283 )  
    Related Articles | Metrics
    In constructing the operation and maintenance platform background, ITIL concepts are introduced into IT asset management in this paper. Based on the lifecycle management and problem management needs, system structure and functions are designed. Using MySQL database and J2EE technology, the development of IT asset management system is achieved.
    Research on Cyberphysical Systems Data Center Energy Consumption Modeling
    XING Jingyu;ZHANG Lichen
    2013, 1(6):  227-229.  doi:
    Asbtract ( 252 )  
    Related Articles | Metrics
    This paper presents a cyberphysical system which is perspective for data centers, suggests a modeling method based on energy consumption of data centers which contain the information technology system and the cooling system. This model includes service delay constraint model, the workload constraint model, quality of service constraint model and the final energy consumption constraint model of the information technology system and the cooling system energy consumption model. The model provides a basis for the next study about how to ensure quality of service while reducing energy consumption as much as possible.
    A Kind of Invoice Printing Technology Based on Web
    HE Zhiyong
    2013, 1(6):  230-232.  doi:
    Asbtract ( 281 )  
    Related Articles | Metrics
    From the perspective of researching ASP for TEDA Polytechnic, the paper states how to solve the problem of using invoice printing in computer system, instead of original invoice for freshman enrollment in TEDA Polytechnic. It also puts forward the solutions of format controlling, technology and the code and the inspiration of it.
    Simulation of Front Seat Design Parameters on Rear Seat Passenger Safety 
    ZHAO Fei;GE Ruhai;HONG Liang
    2013, 1(6):  233-235.  doi:
    Asbtract ( 218 )  
    Related Articles | Metrics
    In order to study the influence of front seat parameters on rear seat passenger when front crash happens, this article uses the MADYMO software to establish the rear seat passenger constraint system model which including car bodies, safety belts and a 5% dummy for impact simulation. The simulation values are close to test ones after contrasted with the vehicle impact test. The influence of design parameters including the front seat headrest and backrest parameters on passenger HIC, T3MS, ThPC, femur force is researched by this model. The relationship between front seat parameters and passenger injury values is obtained, and the measure of reducing the passenger injury values is proposed.
    Design and Implementation of USB Device for Automatically Identifying Operating System 
    XIAO Leilei;SHI Erna
    2013, 1(6):  236-238.  doi:
    Asbtract ( 207 )  
    Related Articles | Metrics
    In order to adapt to some new USB devices which not belong to any class of device, a series of message which used to describe USB device and its’ attributes so called MODS. Windows PC has some MODS message to interact with USB when a USB device inserted into the Windows PC, but the PC with Linux nuclear does not have the message interacting with the USB device. In view of this, the purpose of identification of PC’s operating system is reached based on this principle.