Loading...

Table of Content

    20 January 2014, Volume 0 Issue 1
    Windows System Performance Monitoring Technology Based on ETW
    LI Meng-jia, LI Zhan-huai, LI Ning, YE Chen
    2014, 0(1):  1-4,9. 
    Asbtract ( 277 )  
    References | Related Articles | Metrics
    System performance monitoring and analysis is an effective means to discover bottlenecks running in the system and optimize system performance. Traditional monitoring tools are lack of a satisfactory monitoring system,
    not detailed and deep enough in data presentation, having a great impact on the performance of the system itself. This paper designs and implements a visual monitoring system based on ETW mechanism, the Perfornitor, which can solve the
    above problems preferably. The paper analyzes two specific performance monitoring examples using the Perfornitor. The results show that the technology can provide effective helps for system analysts to quickly identify and resolve system
    performance issues.
    A Software Deployment Scheme Based on Domestic Software Platform
    WANG Kai1, WANG Hui2
    2014, 0(1):  5-9. 
    Asbtract ( 228 )  
    References | Related Articles | Metrics
    At present domestic operating system mainly is based on Linux platform, and is widely used in energy, finance, transportation, government, defense and other areas. Linux is an open platform. The software type and software package present diversely in open platform. Different types of software are deployed in different ways. This is a serious impediment to use domestic operating system. This paper studies the existing mainstream software type and software format of domestic operating system, and analyzes the existing software deployment tools, and finally proposes the software deployment scheme based on domestic software platform.
    Design and Implementation of MiniC Compiler Based on Object-oriented Technology
    WANG Lan
    2014, 0(1):  10-13. 
    Asbtract ( 184 )  
    References | Related Articles | Metrics
    MiniC language is put forward for remedying the disadvantages of the traditional compiler. MiniC compiler is implemented by using object-oriented technology, which can show the complicated process of program analysis and the detailed results of analysis, and make abstract compiler principle visible. It plays an important role to understand the compiler principle and improves the system-software developing ability in practical application.
     Optimization of MPI Runtime Parameters Based on Attribute Reduction
    ZHU Wei1, WANG Yun-lan2
    2014, 0(1):  14-17,21. 
    Asbtract ( 158 )  
    References | Related Articles | Metrics
    Currently, MPI implementations provide hundreds of tunable runtime parameters, but the default parameters can not achieve ideal application performance. To provide the near-optimal runtime parameters for applications, attribute reduction in rough set theory is adopted to build an optimization model. First, the method generates values of parameters for different benchmarks through attribute reduction, then, predictes parameter values for unknown input application according to their features based on the model built. Experimental evaluations show the method proposed in this paper can predict values of parameters effectively, and achieve approximate 20% performance enhancement.
    Objection Recognition Algorithm Based on Image Feature Matching
    ZHAO Ying, LIU Sen, LI Qing-meng, ZHANG Hao, WEI Hong-lai
    2014, 0(1):  18-21. 
    Asbtract ( 185 )  
    References | Related Articles | Metrics
    Some complicated problems are existed in checkout system based on bar code. In order to solve the queuing problem, a fast objection recognition system based on image feature matching is proposed. In this new system, features are combined with SURF(Speeded Up Robust Features) feature matching, main color feature digital coding classification, and shape feature digital coding classification. The method based on characteristics can compress the amount of information, has the advantages of high precision, and it becomes a research hotspot. But the traditional image feature recognition algorithm has the disadvantages of large feature dimensions, huge calculation, and slow shortcomings, limiting its application. In this paper, main color and shape features are used as digital coding classification firstly, and then SURF identification is used to get precise classification, in order to overcome the above disadvantages. It is showed by the experiment, our system has fast speed and good recognition performance, and provides a convenient for the retail checkout service.
    An Adaptive Correction Method of Human Eyes Gaze in Video Chat
    GUO Yan, LIU Fu-qiang, LI Zhi-peng
    2014, 0(1):  22-26,31. 
    Asbtract ( 166 )  
    References | Related Articles | Metrics
    In video chat, people usually gaze at the display window of the other side instead of the camera which cause that people can’t gaze at each other’s eyes. Based on this, a method is proposed. First, a picture in which people stare at the camera is taken, and Harr-classifier is used to extract rough area of eye’s location from picture. Corners of the eye and eyelids are detected after removing the interference information in area, based on this, area of eye rectangle is extracted, which is standard template. Then, single image in video is in same treatment and area of eye rectangle is obtained. Last, the standard template replaces the area of eye rectangle. This method solves the problem of selecting threshold value successfully by introducing histogram specification into binary image processing. The experimental results show that this method has low cost, and it is effective and operationally simple, and accurate rate can reach more than 85%.
     Algorithm of Low Illumination Image Enhancement
    WANG Wen-bo, MU Xiang-yang, TANG Nan
    2014, 0(1):  27-31. 
    Asbtract ( 262 )  
    References | Related Articles | Metrics
    According to the multi-scale Retinex algorithm (MSR) defect images peak at low SNR, this paper puts forward a method of noise suppression in low luminance region according to the theory of Retinex, the characteristics of illumination and reflection components, the two respectively by different nonlinear functions to adjust, to enhance the image contrast and enhance image detail. The experimental results show that, in HSV and RGB color space, after using this algorithm in low light, uneven illumination image case, the peak signal to noise ratio and the image contrast are higher than that of MSR algorithm, and the processing speed is faster than MSR algorithm.
    Automatically Deal Chinese Suit Tiles Machine Based on Neural Networks Technology
    ZHOU Xu-feng
    2014, 0(1):  32-36. 
    Asbtract ( 197 )  
    References | Related Articles | Metrics
    The Chinese suit tiles recognition system based on BPNN technology is designed to realize the automatically deal Chinese suit tiles machine to overcome a sort of drawbacks brought by artificial shuffle. In order to improve the accuracy of the recognition system, the training images are preprocessed: on the one hand, many kinds of standard features matrix are derived by the closing operation, dilation operation and erosion operation to increase the number of training samples, on the other hand, some regularities are found out and the color eigenvalues and the case eigenvalues are extracted, then the images and the BPNN are classified by these eigenvalues. The simulation results shows this technique is of high rate of classified accuracy and can meet the needs in the competition practical application of Chinese suit tiles.
    Research on Semi-active Suspension Fuzzy Control Based on Adaptive GA
    HU Qi-guo, ZHANG Jiao, WEI Zhao-yang, PAN Yun-wei
    2014, 0(1):  37-41. 
    Asbtract ( 142 )  
    References | Related Articles | Metrics
    The correct choice of the fuzzy rules is the key and difficult in fuzzy controller design, this paper applies an genetic algorithm that can adaptively select crossover probability and mutation probability. RMS value of the body vertical acceleration are optimization goals, the car semi-active suspension fuzzy control rules are optimized, to improve the semi-active suspension control effect of the fuzzy controller, to achieve the purpose of improving vehicle ride comfort. To demonstrate the feasibility of this optimization, applying an optimized fuzzy control method based on improved genetic algorithm, a vehicle semi-active suspension is controlled and an associated simulation model is established using Matlab code and Simulink diagram. Simulation results show that optimized semi-active suspension body vertical acceleration RMS values are significantly reduced, the car ride comfort is improved.
    Dual-purpose Marine VHF Simulator Based on Cross Platform
    LI Shao-wei1,2, SHI Chao-jian2, YU Li-li2
    2014, 0(1):  42-45. 
    Asbtract ( 202 )  
    References | Related Articles | Metrics
    The data transmission efficiency of existing marine VHF voice communication simulators is low and they are only single-function simulators. In order to improve the shortcomings mentioned above, a cross-platform dual-purpose (ship use and land use) VHF simulator is designed. The voice signal is captured and played back by the computer’s sound card and then the voice data are compressed through wavelet algorithm. Data sending and receiving are completed via computer networks and ports instead of radio communication channels. And the software of this simulator is developed based on Qt platform to realize operations on different OS platforms. Function multiplexing, i.e., dual-purpose (ship use and land use) function of VHF is achieved through an optimized design of hardware and software.
    Design of VSC for Overload Control in High Angle-of-attack Missile
    LIANG Xue-chao1, YANG Jun1, QIU Feng2
    2014, 0(1):  46-50. 
    Asbtract ( 201 )  
    References | Related Articles | Metrics
    The purpose of this paper is to study the overload control system of the high angle-of-attack missile. First, the problems of the high angle-of-attack missile in flight process and the advantages of the variable structure control theory are analyzed. Then, the nonlinear variation of aerodynamic parameters are treated as bound-limited movement of linear parameters. Based on the accelerometer flight control system, the sliding mode controller and the control law are designed. The performance of the controller is test under parameter perturbation in Simulink. The result shows that the variable structure autopilot of overload is superior to the traditional design under the condition of the high angle-of-attack flight.
    Implementation of Three-dimensional Simulation of Holding Pattern Based on GoogleEarth
    PAN Wei-Jun, LI Qiu
    2014, 0(1):  51-54. 
    Asbtract ( 230 )  
    References | Related Articles | Metrics
    The pilot and aviation operation guarantee staff need to grasp the flight dynamics in time, the simulation is one of the most intuitive representation of flight dynamics. Traditional flight simulation is the two-dimensional simulation, It cannot display the attitude information of the aircraft. This study is based on the research of flight holding pattern, using GoogleEarth to implements flight holding pattern for 3d simulation, and discusses the technology route to realization of the 3d simulation, provides reference for the development of automatic flight simulation.
    Operation Simulation of Cutter Suction Dredger Based on UDK
    LI Jun-xian, NI Fu-sheng
    2014, 0(1):  55-57. 
    Asbtract ( 159 )  
    References | Related Articles | Metrics
    Three-dimensional (3D) graphic simulation technology is widely used in the dredging experiment and operation. This paper makes the models, implements different speeds of models and designs the interface of operation system according to the operational process of a cutter suction dredger by 3DSMax and UDK(Unreal Development Kit). It successfully performs animation control of up and down of two steels by Kismet. Based on Visual Studio 2010, it compiles Unrealscript to achieve adjustable speeds control of the cutter.
    A Fuzzy Controller of Automobile Cruise Control System Based on Carsim and Simulink
    GAO Xiao-meng, YING Yi-chen, ZHU Jin, WANG Xiao-nian
    2014, 0(1):  58-61,66. 
    Asbtract ( 241 )  
    References | Related Articles | Metrics
    The cruise control system in automobile is introduced, which uses fuzzy as control method. The CCS is divided into two parts to design, includes speed control and distance control. The vehicle longitudinal dynamics model and the process of the fuzzy control method are given. The results got by combining Carsim with Simulink show that the fuzzy controller is easily realized and has good dynamic characteristics.
    Optimal Control of Aeroengine Acceleration Process Based on GA-SQP
    SHI Pei-yan, GOU Lin-feng, GUO Jiang-wei, XU Wei-wei
    2014, 0(1):  62-66. 
    Asbtract ( 292 )  
    References | Related Articles | Metrics
    The optimal control method of aeroengine acceleration process based on GA-SQP hybrid algorithm is proposed. Based on a certain type of aeroengine model, the acceleration process objective function at maximum thrust is
    built, respect to the stability and safety indicators as boundary conditions, the GA-SQP hybrid algorithm is used to seek optimum solution during acceleration, several state points within flight envelope are selected for simulations at
    maximum thrust mode. Simulation results demonstrate that the acceleration control law can minimize accelerated time at maximum thrust mode, considering both stability and safety of the turbine inlet temperature, the process is perfect.
    As a result, the hybrid algorithm is feasible and effective.
    D-S Evidence Theory-based Dynamic Adjustment Method of #br#  Automation Level for Pilot Assistance System
    WU Jun-zhao, ZHANG An
    2014, 0(1):  67-70,76. 
    Asbtract ( 171 )  
    References | Related Articles | Metrics
    In a complex human-machine system such as aircraft cockpit, dynamic relationship of human and assistance system collaboration enhances the harmony between human and machine, and increases the whole system performance. In
    order to achieve dynamic adjustment strategy of needing to synthesize a variety of decision-making information, D-S evidence theory-based dynamic adjustment method of automation level for pilot assistance system is proposed. This method
    firstly utilizes fuzzy membership function to determine basic probability assignment, and then uses similarity coefficient-based combination rule to synthesize various evidences. Examples show that the method is effective and reliable.
    Link Weight Programming Algorithm Based on Robustness
    LUO Yu, LYU Guang-hong
    2014, 0(1):  71-76. 
    Asbtract ( 195 )  
    References | Related Articles | Metrics
    For IP networks, the link weight planning is an important issue of traffic engineering. In order to optimize the network traffic and achieve load balancing and against the unknown traffic matrix, this article proposes a
    link weight programming MIP model based on the robustness theory. This model applies the Γ_model to describe uncertainty set of traffic matrix, and regulates the robustness by the parameter Γ which indicates the extent of disturbance,
    on this base, obtains the optimal solution in the worst-case of uncertain set. Through the experiment in American Abilene network, the proposed algorithm can reduce the maximum link utilization 40 percent and 20 percent respectively when
    comparing with traditional link weight planning methods and the emerging MRC programming model.
    Research on Social Regularization-based Recommendation Algorithm
    WANG Xue-ting, HUANG Wen-liang
    2014, 0(1):  77-80. 
    Asbtract ( 238 )  
    References | Related Articles | Metrics
    Social network includes vast amount of social information, how to find information users are interested in has become research focus of many scholars and experts. Based on this idea, this paper proposes a social regularization-based recommendation algorithm: apply the matrix factorization technology into the social recommendation, make use of friendship between users to get better user’s feature space, consider the tag information in social network, and use this information to learn better user and item feature space. The analysis of experiments shows that the accuracy of the improved algorithm is better than the traditional recommendation algorithm and it solves the problem of redundant social information effectively.
     Preprocessing Algorithm for Fingerprint Image Based on Orientation and Gabor Filter
    FU Yu-hu1, DU Yue-rong1, LI Zhe-zhe2
    2014, 0(1):  81-85. 
    Asbtract ( 228 )  
    References | Related Articles | Metrics
    The fingerprint image in preprocessing is often affected by many factors, but sometimes can not meet the requirements of fingerprint identification system. In this article, an effective fingerprint preprocessing algorithm is presented based on the traditional methods for preprocessing. Firstly, a method based on block gradient variance is implemented to achieve the separation of the fingerprint image and the background area. Secondly, according to the fingerprint feature, we use orientation map and mean filter to enhance the image. And using simplified Gabor filter improves the filtering template to filter edge blur effect. After binarization, thinning and eliminating pseudo minutiae, we get the fingerprint image skeletonization and extract the fingerprint feature points. Experiments show that the preprocessing algorithm is applicable to images of different qualities and levels. It is flexible, efficient, easy, and accurate, meets the requirement of fingerprint identification system.
     Improved Threshold Variable Adaptive Rood Pattern Searching Algorithm of #br#  Block Matching Estimation Based on H.264
    NIE Jian-hua, HUANG Min
    2014, 0(1):  86-89. 
    Asbtract ( 158 )  
    References | Related Articles | Metrics
     Because the algorithm of H.264 video codec standard has high complexity, it can not meet the requirement of the video surveillance and wireless transmission which require high compression ratio, low bit-rate and real-time application. This paper, according to ARPS algorithm which has the advantages of the initial point and the adaptive arm length search strategy, uses variable threshold for early termination of policies and template simple search algorithm. Experimental results show that the algorithm is effective in reducing the number of search points, does not have a greater impact on image quality, improves the motion estimation algorithm search rate and robustness.
     A Parallel Clustering Model Based on MapReduce
    GU Rui-chun1, WANG Jing-yu2
    2014, 0(1):  90-92,108. 
    Asbtract ( 120 )  
    References | Related Articles | Metrics
    During the clustering for big scale data, the traditional serial model has limitations, can not obtain a satisfied results within significant intervals. This paper proposes a concurrent clustering model based on MapReduce architechture under the Hadoop platform. The experiment result shows this model has a perfect linear speedup, and it outperforms the traditional clusting model, especially in dealing with massive data set.
    An Outlier Detection Method Based on k-means Clustering
    BAI Ning
    2014, 0(1):  93-95,113. 
    Asbtract ( 175 )  
    References | Related Articles | Metrics
    Because the behavior pattern of users are always diverse and unpredictability, the traditional outlier detection methods using normal or abnormal models former setting become a difficult problem. To solve this problem, this paper presents a self-adapting outlier detection method based on k-means clustering, called OD_KC algorithm. Based on the unlabeled training samples are clustered by k-means method by different clustering parameter, a measure function is constructed to measure the performance of clustering process to obtain the optimal clustering results, and the small size classes after clustering are took as the outlier model. The outlier detection method based on k-means clustering has the autonomy and adaptability. Specially, the good results also can be obtained when the training data distribution is difficult by the OD_KC method and it has good outlier detection ability. Simulation results on standard datasets demonstrate that excellent detection results can be obtained by this method.
    Quality Evaluation Model of Chinese Characters Based on Neural Network
    GENG Xiao-yan, XU Wei-sheng, WU Ji-wei
    2014, 0(1):  96-99,120. 
    Asbtract ( 145 )  
    References | Related Articles | Metrics
    Traditional making technology of Chinese character database requires a large number of manual operations in the character-formation results. In order to solve this defect, a method of achieving quality evaluation for the character-formation results is proposed by using attributes of Chinese characters. First, this paper extracts the attributes which could reflect the standard writing rules of Chinese characters through image processing technology, to quantify the evaluation criteria of Chinese characters, and then, models the font quality evaluation making use of the improved three-layer BP neural network, which would provide basis for adjustment of the font and reduce the human input in the process of character making.
    Error-based Hybrid Classification Algorithm
    CONG Xue-yan
    2014, 0(1):  100-103,125. 
    Asbtract ( 166 )  
    References | Related Articles | Metrics
     A new error-based approach of hybrid classification is presented, when data sets with binary objective variables are classified and it could increase the accuracy of classification. The paper also uses data sets to test the proposed approach and compares with the single classification. The results show that this method greatly improve the property, especially when it is predicted by two methods and the rate of variance is higher, this hybrid approach had demonstrated impressive capacities to improve the prediction accuracy.
    Using Trusted Third Party for Interoperability and Selection Among Clouds
    WANG Xiao-ping1, MENG Kun 2
    2014, 0(1):  104-108. 
    Asbtract ( 147 )  
    References | Related Articles | Metrics
    With the successful development of cloud computing business models, three major cloud computing service models have been formed: Platform as a service, software as a service and infrastructure as a service. The traditional industry providers eagerly moved to join the cloud computing research, but the intense competitions make it difficult to standardize the cloud computing and to realize the interoperability and cross-platform migration. Meanwhile, the numerous cloud platforms result in that users do not know how to make their choice due to the different cloud platforms without a unified, credible evaluation criteria. In this paper, first, a detailed analysis of various scenarios on the demand for cross-platform services is given, which shows the necessity and inevitability of building a “cross-platform as a service” model. Second, by using the trusted third party to achieve this cross-platform as a service. We give the standard process of data exchange and migration in the cross-platform under the supervision of the trusted third party, and provide users with a credible third-party-centered cloud platform evaluation criterion of security and credibility. This will provide the valuable suggestions for enterprise to choose proper cloud platform services.
    Design and Implementation of Virtual Network Infrastructure Based on OpenFlow
    SUN Ying-ying, LI Zhan-huai, LI Ning, SHI Lin
    2014, 0(1):  109-113. 
    Asbtract ( 161 )  
    References | Related Articles | Metrics
     Bacause a variety of network infrastructures are in use, the network structures become more complex and hard to maintain. OpenFlow network can effectively solve the problems, such as network equipments are bloated and networks are difficult to maintain. Based on the research of OpenFlow technology, this paper designs and implements a virtual network infrastructure based on OpenFlow protocol. It consists of four layers, namely, application layer, VTN virtualization platform, control layer and physical layer. And this paper highlights the implementation of VTN virtualization platform which is the most important part of this network infrastructure. At last, by monitoring the throughout and packets loss rate, this paper concludes that it can integrate different network structure and implement unified management of network resources. And also, it can improve the network compatibility. Furthermore, it has better performance than before.
    Extensions of Client-side JavaScript Built-in Objects by Low Invasion Method#br#  Based on Rhino Engine
    NIE Kun-lin, HUANG Wei, HU Guo-chao
    2014, 0(1):  114-120. 
    Asbtract ( 166 )  
    References | Related Articles | Metrics
    In order to obtain the pages of information generated by JavaScript scripts, better access to Web-depth information, A minimally invasion method that can improve Rhino engine is proposed. Through in-depth analysis on the process that Rhino engine parses JavaScript script, this paper draws the key to extend Rhino engine. On this basis, low-invasive design is used, Rhino engine is improved by low coupling expansion method, thereby Rhino engine parsing on the client JavaScript script is improved. Through the use of minimally invasive extension method, the expansion and use of Rhino engine are completely separated, the developers of the expansion do not have to understand the implementation details of Rhino engine, simplifying extension development. Finally, this paper verified the effect of Rhino engine improvements through experiments.
    Search Strategy of Heterogeneous Massive Data
    DENG Zhen-guo, JIA Hong, LIU Han-bing, ZHANG Feng-ye, DENG Xiao-hong
    2014, 0(1):  121-125. 
    Asbtract ( 138 )  
    References | Related Articles | Metrics
    As the coming of massive data era, how to search data in heterogeneous massive data is becoming a pressing problem. By analyzing the basic principles of data search technology, and considering the existing heterogeneous data search strategies, this article proposes a heterogeneous massive data search strategy based on the introduction of metadata technology, and then describes the realization of the strategy by utilizing some open source technology.
    Semantic Extracting Research Progress Based on Internet Social Images
    GUO Hai-feng1,3, ZHANG Ying-ying2, LI Guang-shui1, HAN Li-xin3
    2014, 0(1):  126-131,136. 
    Asbtract ( 147 )  
    References | Related Articles | Metrics
    This paper provides a comprehensive survey of the semantics extraction from images that is annotated by user in the Web 2.0 system. The main fields of semantics extracted from the social images are generalized, including tags denoising, automatic annotation, tag ranking and two application: recommendation system and image retrieval. The rule of selecting source technique mainly bases on its content it is paid much more attention by others and suitability for large-scale network environment, it’s also done to array the content organization relation and hierarchy characteristic. After the analysis of statistics results from the relevant researchs and social network development trend, summary and next research thought are presented.
     A Novel Prediction Model for Streaming Media Popularity
    SUN Dong-ting1, MU Zhi-peng1, HUANG Xu-hui2
    2014, 0(1):  132-136. 
    Asbtract ( 141 )  
    References | Related Articles | Metrics
    By analyzing the streaming media propagations in different types of groups, this thesis argues that the propagation is similar to infectious diseases spreading process in various types of populations. By setting the different attractiveness of various types of streaming media on different groups (vulnerable groups), the different groups’ capacity of spreading streaming media and ways of transmission (transmission mode) as the elements, a new prediction model of streaming popularity is proposed which could be used to qualitatively and quantitatively analyze the streaming media popularity and then provide the basis for the operator’s resource allocation and deployment.
     Monitoring-based QoS Evaluation Approach
    ZHANG Xue-jie1, WANG Zhi-jian1, ZHANG Wei-jian2, WU Xiao-dan1
    2014, 0(1):  137-141. 
    Asbtract ( 170 )  
    References | Related Articles | Metrics
    In service oriented architecture (SOA), the goal of consumers is to discover and use services which lead to them experiencing the highest quality. With the increasing number of Web services, recommending and selecting the optimal Web services for users has become one of the most important challenges in the service computing field. Traditional approaches to quality evaluation in SOA deem that consumers will be most satisfied when they receive the highest absolute performance. However, adopting such approach does not consider the consumers’ individual needs. So it will not necessarily lead to consumers receiving services that meet their requirements. In the service selection and recommendation process we need to consider not only the functional requirements of the service, but also non-functional requirements service account. In addition, the change of service quality can only be found in the service operated process. In order to solve this problem, this paper presents a QoS evaluation approach based on monitoring which fully considers functional and non-functional properties of service. We build a unified model and evaluate the quality of service based on the monitoring data. This approach provides the basis for the selection and recommendation services in dynamic environment. At last we describe the implementation framework of this approach.
     Middleware-based Desktop Cloud Grid Structure
    ZHANG Guo-bin, HU Cai-ping
    2014, 0(1):  142-146. 
    Asbtract ( 167 )  
    References | Related Articles | Metrics
    Desktop cloud is a pattern of desktop usage, provides the remote desktop services. Desktop cloud middleware is one of the key components of the desktop cloud of leveraging infrastructure resources, improving the user experience and the system robustness. In order to meet the dynamic needs of desktop cloud, this paper proposes a middleware-based desktop cloud grid structure, details the function and designing elements of middleware. Scheduling algorithm based on dynamic feedback mechanism and the virtual desktop dynamic allocation algorithm are proposed. With the multiple node tests, the rationality and validity of the algorithms and the grid structure are proved.
     Evaluation of Computing Resource Applicability in Cloud Computing
    ZHOU Feng, AI Zhong-liang, LIU Zhong-lin
    2014, 0(1):  147-151. 
    Asbtract ( 159 )  
    References | Related Articles | Metrics
     With development of cloud computing and virtualization, it is possible that one physical machine can be virtualized one virtual machine to support an application. In tradition, virtual machine placement just considers whether there is sufficient resource, ignoring the relationship of application type and physical resource status. This paper gives the concept of compute resource applicability, which means that the current status of computing resource is suitable for deploying which application type. When deploying an application, firstly we judge the application type and acquire the occupation of resource, then combine monitor data with the occupation to do static estimation and dynamic estimation. The optimal virtual machine placement policy can be achieved by compositing the results. The experimental results show that, the proposed solution could effectively improve the efficiency of application and the use ratio of resource, and shorten the response time of application.
    Research on Safeguard Delay Cluster Routing Protocol for Energy Efficiency
    XU Jian-zhen, SONG Liu-liu, SONG Ai-ling
    2014, 0(1):  152-155. 
    Asbtract ( 126 )  
    References | Related Articles | Metrics
    In the inter-cluster routing protocol of wireless sensor networks, cluster head single hop or multiple hops communication, cluster energy consumption will lead to imbalance. In order to balance the energy consumption, the new protocol based on LEACH-C, introduces a threshold of distance. If the cluster head distance from the base station is less than the threshold value, the single hop communication should be conducted. If the cluster head distance from the base station is greater than the threshold, the multi-hop communication should be conducted, also a guaranteed delay new multi-hop routing algorithm is proposed. This protocol effectively reduces the cluster head node energy consumption, balances network load.
     A Hot Topic Identification Algorithm Based on User Relevance Analysis
    ZHANG Zhao, AI Zhong-liang
    2014, 0(1):  156-160,163. 
    Asbtract ( 170 )  
    References | Related Articles | Metrics
    To improve the accuracy of detecting hot topic from social network text information, a hot topic identification algorithm based on user relevance analysis is raised. The algorithm considers both the frequency change rate of feature word and the authority of users. The frequency change rate of feature word is elevated using EMA and MACD indicators and the authority of users is calculated by creating user relevance graph. We use a method based on HITS algorithm to calculate the hot value of topic by combining feature frequency change rate data with user authority data together. According to the result of the experiment, the hot topic identification algorithm based on user relevance analysis can raise the accuracy of hot topic identification.
    Search Engine Access Control Based on Index Filter
    ZHANG Wei-cheng, AI Li-rong
    2014, 0(1):  161-163. 
    Asbtract ( 265 )  
    References | Related Articles | Metrics
    With the development of Internet, search engine has been widely applied. Now the application of search engine in the inline network is also gradually increasing. Inline network has the characteristics of separation of access, so it is necessary to realize security access in search process, and role permissions also conform to the security level of information searched. This paper proposes a kind of search strategy to realize security based on index filter, this strategy can ensure the accuracy and security of information search.
     Adaptive Combined Forecasting for Promotion of Television #br#  Website On-line Video Based on NPTB Model
    YANG Shuai, MA Shao-hui
    2014, 0(1):  164-167. 
    Asbtract ( 168 )  
    References | Related Articles | Metrics
     Under the premise of combination film and television audiences basic information, targeted at the film website new type of on-line charges videos, this paper proposes integration into the combination forecasting model on the basis of NPTB model. The model is used to predict the probability of a television audience watching which videos next, and to choose the highest probability of this type of movie viewers for movie promotion. So the purpose of film and television website’s earning is achieved. The example shows that this study is superior to the other prediction audience watch videos probability model.
    Implementation of Incremental Backup Based on Oracle Materialized View 
    LI Xue-si, WANG Hong, WU Fei, LIN Ji-nan
    2014, 0(1):  168-170. 
    Asbtract ( 156 )  
    References | Related Articles | Metrics
    To ease the pressure on the main server of HIS, increase data security and privacy, this paper researches the real-time incremental backup of database with Oracle materialized view, and filteres the sensitive data. The system is fully functional, practical, and achieves a graphical interface to simplify system operation and maintenance. After implementation, as expected, it effectively alleviates the pressure on the main server load by using the backup database, and expands the use scope of data.
     Design and Implementation of Digital Home Transportation System Based on ArcGIS Server
    ZHANG Jin-jin, LIU Xiao-ming
    2014, 0(1):  171-175. 
    Asbtract ( 198 )  
    References | Related Articles | Metrics
     Digital home is a product based on information technology, communication technology and computer technology. The design and realization of digital home transportation service system is the goal, based on the advantage of ArcGIS Server cross-platform, through combining Eclipse development environment with ArcGIS for Android plugin, the secondary development component Network Analyst extension module is used to develop dynamic path, and through the establishment of historical flow table, the road-network dynamic path based on time cost is queried. Tests show that the system can meet preliminary transportation query demand of digital home background, and has certain engineering use value.
     A Multi-dimension Constellation Snapshot Spatio-temporal #br#  Data Model Based on Historical Events
    DAI Hong, YU Ning, CHANG Zi-guan
    2014, 0(1):  176-181. 
    Asbtract ( 139 )  
    References | Related Articles | Metrics
    To support the studies of urban evolution and development about urban form and spatial structure, the data expression of the characteristics of urban form and spatial structure is a basis. The characteristics are based on some typical events during urban development as the tangible footprints carved on regional space. As an important tool to express information of history, geography and culture, the spatio-temporal data model can completely express time, space and semantic feature of the objective world. The typical events of Beijing during urban development are extracted. A multi-dimension constellation snapshot data model is presented to study the facts and characteristics of spatio-temporal data based on the historical events. This model based on relational frameworks synthesizes the traits of multi-dimension constellation model and snapshot data model to express features of history and geography at different stages in Beijing. It offers a conceptual representation for dataware model for spatio-temporal data integration and analysis of spatial features.
    Database Security of Metrology Information Management System
    NI Qing1, MAO Yu-guang2
    2014, 0(1):  182-185,191. 
    Asbtract ( 183 )  
    References | Related Articles | Metrics
     Nowdays information security has drawn increasing attention. The article focuses on the security of database on the basis of introducing the architecture design, development environment and function module design. The system combines database technology with Web technology using ASP+IIS+SQL Server 2005 platform architecture. User identity authentication, firewall technology, role based acess control, data encryption, audit trail and intrusion detection, anti database download and anti-SQL attack injection are used to protect the database considering network system level, operating system level and database management system level.
     LBSN-based Personalized Travel Package Recommendation System
    XU Huang, YU Zhi-wen, FENG Yun, ZHOU Xing-she
    2014, 0(1):  186-191. 
    Asbtract ( 182 )  
    References | Related Articles | Metrics
    Travel has become an important part in our daily lives, but making travel plans is not easy. Location Based Social Networks(LBSN) provides a large amount of information about location and activity, which is useful for location search and recommendation. This paper proposes a LBSN-based personalized travel package recommendation system to help users make travel plans. We generate location profile and user preference model based on the collected LBSN data. Then we produce travel routes under spatio-temporal constraints and recommend the travel packages. The travel package contains travel destinations and visiting order of these destinations.
    Research on Emergency Service Model Based on Ontology
    WANG Neng-gan, WANG Jian, LING Wei-qing
    2014, 0(1):  192-195,200. 
    Asbtract ( 162 )  
    References | Related Articles | Metrics
    By studying the ontology theory and applying emergency service ontology model (ESODM) for emergency service for unified modeling, emergency service will be united in expressing the semantic level. Using the seven-step method developed by Stanford university school of medicine , ontology tool (Protégé) and ontology language OWL to build the ontology library of emergency service, so that emergency service information can be understood by computer, the emergency service information can be intelligently accessed and retrieved and also the emergency service information can be shared and exchanged in the semantic level.
    Design of Small Storage Management System Based on IOS Platform
    QIAO Mu1, GONG Jun-ru2, SHEN Xing-lin2, YANG Hu2
    2014, 0(1):  196-200. 
    Asbtract ( 178 )  
    References | Related Articles | Metrics
     Along with the rapid development of digitization and information technology application in the field of logistics, many kinds of storage management systems are paid more and more attention. The small storage management system based on IOS platform utilizes IOS devices to collect cargo information to satisfy the customers’ requirements for the convenience and efficiency of the storage management, through an operation system which is constructed by SQLite database technology and ZXing barcode image processing library, can better meet the needs of data interaction of small scale of customers. At the same time, the system is of low cost and convenient operation etc.
     Mobile Application Development Platform Based on JFinal and HTML5
    XIA Yan-qiu, YUAN Ru-hua
    2014, 0(1):  201-205,210. 
    Asbtract ( 213 )  
    References | Related Articles | Metrics
     Nowdays, the popularity of smart phones made many companies prefer to develop their own mobile applications. In order to reduce the technical requirements with Android for developers, financial resources which mobile application development requires and shorten the development cycle, the paper presents mobile application development platform based on JFinal and HTML5: JFinal framework is used to make phone APP background management system, supporting implementation of the user interface through HTML5 technology. R&D results show that any mobile phone application can be quickly added through the background management system, the user interface can be comparable to Native APP for adapting to different screen sizes and the demand of various mobile phones.
     Brushless DC Motor Closed Loop Control System Based on DSP
    QIAO Min-juan, HAN Wen-bo, LIU Ying-ying, SONG Jian-lin
    2014, 0(1):  206-210. 
    Asbtract ( 217 )  
    References | Related Articles | Metrics
     This paper introduces a set of brushless DC motor closed loop control system based on TMS320f2812, hypogyny machine adopts DSP (Digital Signal Processor) as the core digital processor, photoelectric encoder as the feedback element, the motor speed achieves closed-loop control precision. This paper adopts intelligent PID algorithm in the position and speed control, and also realizes the simulation in Matlab/Simulink to increase the stability of control system, shorten the reaction time, and improve the system accuracy.
    Design and Implementation of Virtual Logic Analyzer Based on FPGA
    WANG Wan-zhao1, ZHANG Peng-yun1, HE Zhi-qiang2
    2014, 0(1):  211-213,218. 
    Asbtract ( 183 )  
    References | Related Articles | Metrics
    This paper introduces a virtual logic analyzer based on FPGA chip, which consists of signal conditioning circuit, sampling module, trigger module, communication module, NIOS Ⅱ soft-core, and bus interface. The 8-way parallel sampling is achieved. The sampling rate is up to 100MS/s.
    Anti-vibration Optimization Design of Printed Circuit Board Based on Modal Analysis
    CHEN Kang, ZHANG Lei, HU Xiao-ji
    2014, 0(1):  214-218. 
    Asbtract ( 152 )  
    References | Related Articles | Metrics
    To ensure a sufficiently high natural frequency of printed circuit board can effectively improve the anti-vibration capability of the printed circuit board for. Two typical sizes of printed circuit board(PCB) which are 3U and 6U are taken for example, their finite element models are established, and their natural frequencies are obtained by modal analysis. Optimal installation solutions are designed for 3U and 6U boards to solve their problems of low natural frequencies. The results show that the optimal installation solutions are easy to implement, they can significantly increase the natural frequencies for 3U and 6U boards and enhance the anti-vibration reliability, at the same time the installation solutions meet the needs of circuit design.
    Remote Supervision Information System for Testing Organization
    QIU Feng
    2014, 0(1):  219-221. 
    Asbtract ( 189 )  
    References | Related Articles | Metrics
     This article describes the development process of a remote supervision information system for testing organization from demand analysis, system design and system implementation, and introduces the application and implementation of Ajax and NPOI in this system.
    Cooperative IETM Model Based on GJB6600
    GAO Wan-chun, SHI Feng-long, FANG Ping
    2014, 0(1):  222-225. 
    Asbtract ( 334 )  
    References | Related Articles | Metrics
    In order to standardize and guide the work of interactive electronic technical manual in the field of maintenance support, general armaments department of the People’s Liberation Army issued GJB6600. This paper introduced GJB6600 briefly and studied such key techniques as data flow of creating IETM, collaborative structure model and individualized project specification and so on, and put forward own opinions of the application of GJB6600 in the field of maintenance support.
     Study on Stack Analysis of Safety Critical System
    CHEN Gao-feng1, TANG Xiao-ming 2
    2014, 0(1):  226-230. 
    Asbtract ( 195 )  
    References | Related Articles | Metrics
     It is very difficult to find the root cause of a system failure caused by memory exception, partly because the system failure symptoms are quite far from the real errors. In addition, a memory error often causes the whole system crash, such as avionics system, which would cause the crash of the aircraft or human casualty. Therefore as for safety critical system, the memory analysis is crucial. On the other side, compared with other memory space, stack itself is dynamic; meanwhile the dynamic scheduling and the object-code-based analysis enlarge the difficulty of stack analysis as well. Starting with the necessary of stack analysis, this paper proposes a stack analysis combining with interrupt preemption graph. Based on this theory, some suggestions are given for the safety critical system to guarantee the determination of the worst case stack depth. And then, as a real case, this paper conducts the stack analysis for a safety critical system FCOS. The process and result are mentioned also.
     Battlefield Situation Information Describing Method Based on SEDRIS
    TU Le-de, QIU Jian-wei, WANG Jia-run
    2014, 0(1):  231-234. 
    Asbtract ( 191 )  
    References | Related Articles | Metrics
    To meet the request of quick and comprehensive battlefield information obtained in modern battle command, based on SEDRIS technology, this paper studies the method describing battlefield situation information, to achieve a systematic expression of battlefield situation information contained in warfighting symbol. The paper firstly briefs the SEDRIS technology and the warfighting symbol conception, then analyzes the necessary information in battlefield situational expression, and builds a symbol information describing module. Finally, a typical symbol is presented to indicate the simple usage of the symbol information describing method.
     Design and Implementation of Ethernet Communication Module#br#  for ESP Controller with Dual-core Architecture
    PAN Bi-chao1,2, CAO Biao2, ZHANG Jin1, HE Sheng-hua1
    2014, 0(1):  235-238. 
    Asbtract ( 140 )  
    References | Related Articles | Metrics
    As a result of critical industrial conditions of Electrostatic Precipitator(ESP), ESP controller requires a network communication module which can meet a higher level requirement. An excellent signal processing ability, as long as real-time and open communication features, are necessary for ESP controller. This paper presents a network module based on AM1808. This module takes CY7C024AV2, a dual port memory, as the way to make Inter-processor Communication (IPC) possible, so that large amount of data can be exchange efficiently. With this network module, ESP controllers can be connected together to make a multi-controller ESP system. And to make it compactable with upper applications, this network module takes MODBUS/TCP as the key protocol for network communications. After the electrostatic field experimental test, this network module based on AM1808 can achieve a good performance.