Loading...

Table of Content

    24 March 2014, Volume 0 Issue 3
    Method of Adaptive Linear Generalized Synchronization
    ZHANG Feng, WANG Yan-fei, ZHENG Xiang-yu, ZHANG Kai-shuan
    2014, 0(3):  1-3.  doi:10.3969/j.issn.1006-2475.2014.03.001
    Asbtract ( 230 )  
    References | Related Articles | Metrics
     Aiming at the system with unknown parameters, this paper proposes an adaptive linear generalized synchronization in control scheme. According to this control scheme, it achieves the adaptive linear generalized synchronization in the unified hyperchaotic system with unknown parameters. Then, the paper identifies these unknown parameters based on this control scheme.
    Robot Simultaneous Localization and Mapping AlgorithmBased on Improved Fuzzy Adaptive Kalman Filter
    WANG Chu, NI Jian-jun, YIN Xia-hong
    2014, 0(3):  4-7.  doi:10.3969/j.issn.1006-2475.2014.03.002
    Asbtract ( 230 )  
    References | Related Articles | Metrics
    Robot simultaneous localization and mapping (SLAM) problem is a very important issue in the robotic field. The main tasks of SLAM include how to reduce the localization error, improve the robustness of the algorithms effectively and improve the accuracy of robot simultaneous localization and mapping. Aim at this problem, an improved fuzzy adaptive extended Kalman filter (EKF) is proposed. In the proposed approach, a fuzzy adaptive control model is used to adjust the system noise and observation noise. Finally, some simulation experiments are conducted, and the experimental results show that the proposed approach can solve the divergence of Kalman filter and reduce the robot localization error effectively.
    Design and Implementation of Digital Storage Oscilloscope Based on SCM
    YE Zheng-kai, ZHU Jian-hong, LI Lin, WU Hao
    2014, 0(3):  11-14.  doi:10.3969/j.issn.1006-2475.2014.03.004
    Asbtract ( 254 )  
    References | Related Articles | Metrics
    This paper introduces the design scheme of a simple digital storage oscilloscope, which is based on the single chip microcomputer(SCM) and dot matrix LCD. MSP430F149 low-power SCM is used as the control core. Signal is sampled by AD830E high-speed A/D chip, and the sampling values are stored synchronously in IDT7204. After being calculated and processed by SCM, the processed sampling values are sent to the LCD 12864 for displaying. The software design of data processing and graphic displaying is discussed mainly. This system is of advantages such as high reliability, high sampling frequency and low cost.
    PM2.5 Generation and Evolution Model Based on Genetic Algorithm and BP Neural Network
    ]YANG Qi-kai, ZHANG Gui-qiang, ZHANG Jing-ming
    2014, 0(3):  15-18,7.  doi:10.3969/j.issn.1006-2475.2014.03.005
    Asbtract ( 273 )  
    References | Related Articles | Metrics
    The problem of PM2.5 has become an atmospheric research hotpot in recent years. This paper analyzes the generation reasons and influncing factors of PM2.5 based on the data of PM2.5 in Xi’an (2013.01.012013.04.26), and builts the generation and evolution mode of PM2.5 in Xi’an, using genetic algorithm and BP neural network. Finally, the model’s effectiveness, versatility and reliability are validated by experiments.
    Traffic Simulation System Based on Particle Filter
    LUO Yong-qi, YAN Xue-feng, FENG Xiang-wen
    2014, 0(3):  19-23.  doi:10.3969/j.issn.1006-2475.2014.03.006
    Asbtract ( 192 )  
    References | Related Articles | Metrics
    Aiming at the existed most traffic simulation systems which have low precision to estimate the traffic state trend, this paper introduces the particle filter method to pre-estimate the motion state of vehicles, then designs and implements a traffic simulation system based on particle filter. First of all, the design of initialization, state transition, weight calculation and normalization and resample operation are introduced; Then the basic process how the measured data which reflects the real characteristics of the system is dynamically incorporated to adjust the distribution of particles for getting closer to the real state development is discussed; Finally, the system based on microscopic traffic simulation software MovSim is realized. Experiments indicate the proposed system is of high accuracy and stabilization of prediction.
    Modeling and Simulation of Parallel-Series Hybrid Electric Vehicle Based on Matlab/Simulink
    BAI Yu-he1, FAN Jian-wen2,3, TAN Guang-xing1
    2014, 0(3):  24-30.  doi:10.3969/j.issn.1006-2475.2014.03.007
    Asbtract ( 488 )  
    References | Related Articles | Metrics
    A parallel-series hybrid electric vehicle (PSHEV) model is built up in Matlab/Simulink, and the mode logic of vehicle controller is modeled with Stateflow. Power performance, fuel economy and emissions performance of hybrid are compared by analysis of simulation using the European urban road driving cycle (CYC_ECE_EUDC). The results of simulation show that comparing with the Advisor/Prius, in the same conditions, the model  conforms to PSHEV dynamic requirements and is of correctness and feasibility, what’s more, it uses the energy distribution control strategy, so that the fuel consumption per hundred kilometers is about 5.056L, which is 2.8% less than that of the Advisor/Prius, the emissions of CO and NOx are reduced by 16.9% and 2.7%. The simulation results indicate the effectiveness of the control strategy. The using of PSHEV achieves the purpose of energysaving and emission reduction.
    A Soft Tissue Cutting Simulation Algorithm Based on Improved Vertex Split
    CHEN Yi, CHEN Guo-dong, WANG Jie-xiong
    2014, 0(3):  31-35.  doi:10.3969/j.issn.1006-2475.2014.03.008
    Asbtract ( 265 )  
    References | Related Articles | Metrics
    As an important part of virtual surgery system, the soft tissue cutting can largely affect the authenticity of virtual surgery. Aiming at the disadvantage of vertex split algorithm, this paper presents an improved vertex split algorithm based on arc fitting. Firstly, we calculate the size of the incision according to the depth of the incision. Secondly, the shape of the incision is simulated using two arcs. Then, we get the number of discrete points according to the discrete steps. Finally, new grid is blended into the original grid. The simulation results show that the improved vertex split algorithm can produce more authentic effect than original algorithms under the circumstances of real-time simulation.
    PID Controlling Lawn Sprinkler System Based on LabVIEW
    LI Yong-wei1, ZHANG Jing-jing2
    2014, 0(3):  36-39.  doi:10.3969/j.issn.1006-2475.2014.03.009
    Asbtract ( 178 )  
    References | Related Articles | Metrics
    Based on  LabVIEW development platform, this paper uses the sensor, data acquisition card and converter to develop automatic sprinkler system. To maintain constant water pressure in pipe network by regulating the pump speed, the system achieves the goal of automatic irrigation and water application for grass on demand  and could guarantee irrigation quality, less consumption of energy, water and labor costs.
    Terrain Avoidance System Based on Intelligent Control Theory
    KUANG Yu1, ZHANG Shao-ping 1, ZHU Xiao-man2, YANG Xiao-long2, KANG Yu-hang2
    2014, 0(3):  40-44,48.  doi:10.3969/j.issn.1006-2475.2014.03.010
    Asbtract ( 218 )  
    References | Related Articles | Metrics
    This paper focuses on aircraft TA system for a brief analysis of the terrain. At first, it introduces and analyzes the paths algorithm of TA. Secondly, it designs double fuzzy PID TA control system for tracking the actual terrain. Finally, the feasibility of the system is verified by simulation.
    Variable Structure Control for a Class of Complicated Temperature Object Based on Feature Extraction
    LI Jian-qing
    2014, 0(3):  45-48.  doi:10.3969/j.issn.1006-2475.2014.03.011
    Asbtract ( 171 )  
    References | Related Articles | Metrics
    The sliding mode variable structure control is designed and applied to a class of complicated temperature object with nonlinear, large time delay and variable parameters. The traditional pole assignment formula is improved for the design of the sliding mode switching function. The feature of system output curve on the initial stage is extracted and expressed as binary linear regression equation, and which is used to design the control law to be mostly suitable for the actual object. Through a series of variable parameter simulation, the results show that the design scheme is validity and superior to the traditional simplex sliding mode variable structure control design, and the system is of great dynamic and static performances.
    An Improved Algorithm for Solid-liquid Boundary Based on SPH Fluid Simulation
    GENG Ming, CHEN Cong
    2014, 0(3):  49-52,56.  doi:10.3969/j.issn.1006-2475.2014.03.012
    Asbtract ( 218 )  
    References | Related Articles | Metrics
    Smoothed particle hydrodynamics (SPH)is a non-grid fluid simulation method, while the simulation of solid-liquid interaction problem is a great challenge in SPH. This paper proposes an intensive single layer particles method which garding the boundary as the solid particles and assuming that these solid particles have a certain density, and it is different from the traditional virtual particle method which simply put the boundary as the stationary fluid particles. This method can significantly reduce the number of fluid particles cross the solid boundary during the simulation.
    Improved Entropy-based Centre Clustering Algorithm
    ZHANG Shu-sen, ZHANG Long-bo, CHEN Ya-li, AN Jian-rui, LI Cai-hong
    2014, 0(3):  53-56.  doi:10.3969/j.issn.1006-2475.2014.03.013
    Asbtract ( 182 )  
    References | Related Articles | Metrics
     This article is based on entropy-based fuzzy clustering algorithm (EFC), proposes an improved entropy-based centre clustering algorithm, namely the very obvious differences clusters heart in the original data is obtained through EFC algorithm and these clusters heart to be heart-centered cluster is analyzed again, each point is re-assigned to the collection which the center represents through computing the distance between each point and center. This improved algorithm can not only get compact and significantly different clustering results, but also can effectively improve the accuracy rate. Experimental results show that the improved algorithm can realize data sets efficient clustering, with higher accuracy.
    Mobile Augmented Reality 3D Registration Algorithm Based on ORB and KLT
    XIAO Bin1, JIANG Yi1, LIN Fan2
    2014, 0(3):  57-60,64.  doi:10.3969/j.issn.1006-2475.2014.03.014
    Asbtract ( 213 )  
    References | Related Articles | Metrics
    3D registration algorithm is the key technology of augmented reality, as well as the indicator of system performance. Since existing algorithm, such as improved SIFT operator and FASTSURF operator, is weak on realtime feature, this paper proposes an augmented reality 3D registration algorithm based on ORB and KLT, which reduces the time overhead and improves the matching performance. Experimental results show that the new algorithm which running on the mobile device, not only can reduce the time cost but also can ensure efficient matching performance.
    Design and Implementation of Remote Monitoring System for Embedded Warehouse
    YIN Wen-long1, LI Zhao-rui2, GUO Li-hua1, SUN Hui-xian1
    2014, 0(3):  61-64.  doi:10.3969/j.issn.1006-2475.2014.03.015
    Asbtract ( 223 )  
    References | Related Articles | Metrics
    Aiming at the high information throughput and multiuser data sharing problems in the process of remote monitoring, this paper uniformly manages the data using the SQLite embedded database, combining the embedded technology with the Web services technology and constructing a remote monitoring scheme for warehouse. The scheme meets the development trend of embedded technique, and lays a solid foundation of the application of Web Services technique in control field.
    Design and Implementation of Graduation Design Management System Based on MVC Framework
    DING Yong, CHU Jiu-liang, ZHANG Fei
    2014, 0(3):  65-68,72.  doi:10.3969/j.issn.1006-2475.2014.03.016
    Asbtract ( 429 )  
    References | Related Articles | Metrics
    Graduation design process involves topics selection, open discussion, process management, and other aspects of the respondent. There is reliance on manual workload management and work procedures cumbersome and other issues. Based on the ASP.NET platform, using MVC4 (Model-View-Control) framework, this paper achieves a threetier architecture graduation design management system. System representation layer uses JQuery, Ajax and other technologies to achieve page display, business layer uses a template class that implements the business logic of the package, data layer uses LINQ to SQL and relational databases to achieve O/RM (Object/Relation Mapping). Flexible system architecture is of good scalability, the system is applied in Nanjing university of science and technology, and improves the quality and efficiency of graduation management.
    Design and Implementation of Personnel Archives Management System Based on LINQ
    JIANG Xiao-ming
    2014, 0(3):  69-72.  doi:10.3969/j.issn.1006-2475.2014.03.017
    Asbtract ( 207 )  
    References | Related Articles | Metrics
    This article introduces a personnel archives management system which was developed by LINQ technology in ASP.NET. LINQ enhances semantics and security of program and reduces programming errors by embedding query syntax in program statements. Developers can implement data operations such as querying, inserting, updating, deletion without accessing database directly by using LINQ. LINQ can also support many other data sources such as .NET collection class, XML document and ADO.NET dataset, which implements versatility of programs.
    ARP System User Analysis Based on Two-step Cluster Analysis Method
    SHI Zhuo-min, SUN Jian-ying, HE Xiao-tao
    2014, 0(3):  73-76.  doi:10.3969/j.issn.1006-2475.2014.03.018
    Asbtract ( 233 )  
    References | Related Articles | Metrics
    With the rapid development of information technology, cluster analysis methods are more and more widely applied in customer classification. This paper with the help of SPSS Clementine 12.0 software, uses two-step cluster analysis approach to do a cluster analysis for Academia Resource Planning project (ARP) system users. This paper summarizes the characteristics of various types of users, analyses the reasons for the clustering results, and proposes concrete solutions to existing problems for different users. The purpose of the paper is to better perform user management, build customer relationships, and thus provide a reference for enhancing the system performance and service levels.
    Design and Implementation of Android-based Micro-injection System
    LU Shu-ping
    2014, 0(3):  77-80.  doi:10.3969/j.issn.1006-2475.2014.03.019
    Asbtract ( 191 )  
    References | Related Articles | Metrics
    With the rapid popularization of smart phones, more and more people use smart phones to take photographs, as time goes by, there are hundreds of photos in their mobile phone, it is difficult to recall the mood at the moment of taking pictures and  to describe the meaning of the photo in words when sharing with friends. Aiming at this, this paper based on the mobile operating system, builds an Android-based micro-injection system. The system can classify the picture, add voice annotations, sent voice notes pictures to E-mail, make Bluetooth transmission, share to Weibo,micro letter, etc. Practice shows that using the system greatly  improves the interactivity between friends by mobile phone.
    A Self-healing Mechanism for Memory Leak in OS
    DUAN Fei-peng1, ZHU Yi-an1, HUANG Shu-juan1,2, ZHAO Cong2
    2014, 0(3):  81-84.  doi:10.3969/j.issn.1006-2475.2014.03.020
    Asbtract ( 192 )  
    References | Related Articles | Metrics
    Aiming at the memory leak system level problems, This paper establishes the model about related issues of finite state automata, and designs a self-healing mechanism for memory leak. The mechanism reflects a  hypothesis of the problem of leak based on the system performance metrics. Based on the hypothesis, we complete the detection, diagnosis and recovery of the memory leak in OS. The results of experiments show the validity of the hypothesis and the effectiveness of the self-healing mechanism
    Intermediate Frame Generating Technology Based on DBBS Model
    JIANG Tai-ping, CHEN Ya-juan
    2014, 0(3):  85-88,93.  doi:10.3969/j.issn.1006-2475.2014.03.021
    Asbtract ( 228 )  
    References | Related Articles | Metrics
    The intermediate frame generating technology has become a hot topic in the visual research field of computer animation. This paper, aiming at the shortage of the traditional intermediate frame generating method, proposes an intermediate frame generating method based on the analysis and elaboration of the basic principle of DBBS(Disk and Ball B-Spline curve)models. According to the situations of the difference in the sharpness of the candidate points on the key frames, it presents a pretreatment method which could meet the corresponding conditions to generate the intermediate frames. At last, it shows that the effect of this method is better and faster than that of the traditional method through the experiment.
    An Extraction Method for Vehicle Target Based on Pixel Sampling Modeling
    LI Xu, XU Gui-li, CHENG Yue-hua, WANG Biao, TIAN Yu-peng, LI Kai-yu
    2014, 0(3):  89-93.  doi:10.3969/j.issn.1006-2475.2014.03.022
    Asbtract ( 232 )  
    References | Related Articles | Metrics
    Aiming at the problem that traditional background models take too much time on initialization and exist Ghost area, we propose a kind of new model based on pixel sampling and the sample consensus theory. During the initialization phase, we sample the historical pixel sequence many times to build the background model. In the model updating phase, we update both of the historic pixel model and the ViBe background models with the improved ViBe algorithm. Finally, we use sample consensus theory to calculate the pixel between the two background models and find the target. The contrast test confirms that, the algorithm works well in Ghost area mitigation and achieves low speed target detection effects when foreground displayed in the initialization phase.
    Soft Classification in Action Recognition Based on Local Spatio-temporal Features
    LYU Wen, XU Gui-li, CHENG Yue-hua, LI Kai-yu, WANG Biao
    2014, 0(3):  94-98,103.  doi:10.3969/j.issn.1006-2475.2014.03.023
    Asbtract ( 225 )  
    References | Related Articles | Metrics
    Aiming at the problem of the global action feature that is difficult to accurately extract, this paper uses space-time interest points to represent motion. In view of the great error in the traditional quantizative word bag hard classification method, this paper refers to the idea of fuzzy clustering and proposes a soft classification approach. Firstly, interest points detect algorithm is applied to extract visual words from the video, and this paper builds the codebook via K-means clustering. This paper calculates the distance of the visual words to be classified and each codeword in the codebook and then gets the membership probability to each codeword. Finally, the codeword’s frequency in each video clip can be calculated. The performance is investigated in Weizmann and KTH datasets. The experiment result shows that the average recognition rates increase 8% in Weizmann datasets and 9% in KTH datasets. This proves that the approach can recognize human behavior more effectively.
    Natural Image Segmentation Based on Mutual Information
    ZHU Yi-wei
    2014, 0(3):  99-103.  doi:10.3969/j.issn.1006-2475.2014.03.024
    Asbtract ( 237 )  
    References | Related Articles | Metrics
    Natural image segmentation occupies an important position in areas such as image processing and computer vision. The image segmentation algorithm based on clustering is an important method in unsupervised image segmentation algorithm. However, these methods have two main problems. First, features extraction is usuallly based on pixels. This makes the segmentation results do not fit the edges of images. Super pixels are introduced to preprocess images to overcome this problem. Second, it’s difficult to determine the number of segments. An energy difference based on mutual information is proposed to determine the number of segments automatically. Experimental results on standard database show that the proposed algorithm conquers two problems and can segment natural images well.
    A Method of License Plate Location Based on Connected Components and Gray Level Jump
    LI Xi-ying1,2,3, LU Lin1,2,3, YU Wen-jin1,2,3
    2014, 0(3):  104-108.  doi:10.3969/j.issn.1006-2475.2014.03.025
    Asbtract ( 196 )  
    References | Related Articles | Metrics
    In the License Plate Recognition (LPR) system, license plate location is the basic step. A method of license plate location is introduced based on connected components and gray level jump of plate. Firstly, it is detected that whether the license plate has shadow region. Then special binaryzation method is used for shadow license plate. Finally, license plate location is completed using gray level jump. Experiments show that this algorithm is precise for license plate location and robust on light disturbance.
    Face Recognition Method Based on Global and Local Features Fusion
    LAN Pei, FANG Chao
    2014, 0(3):  109-113.  doi:10.3969/j.issn.1006-2475.2014.03.026
    Asbtract ( 291 )  
    References | Related Articles | Metrics
    In order to overcome the defects of current pre-processing method and the limitation of the sole facial feature recognition, four face recognition methods are studied based on the eyes-independent dynamic threshold-based algorithm of pre-processing .We extract global features using PCA and 2DPCA, and Gabor and LBP features for face local feature, analyze and compare the recognition rate of these features extraction methods and the situation which is suitable to these features. Based on the analysis of these features, feature fusion experiments are designed for PCA and LBP to improve the recognition accuracy. The experimental results show that the recognition rate is higher when using the decision fusion instead of the feature fusion and sole feature on the ORL and ESSEX database.
    Crowed Abnormal Detection Based on GLCM and Optical Flow
    LIN Qin, ZHANG Li
    2014, 0(3):  114-118.  doi:10.3969/j.issn.1006-2475.2014.03.027
    Asbtract ( 285 )  
    References | Related Articles | Metrics
    Aiming at the problem of detecting the crowed abnormal event in the video surveillance system, this paper proposes an algorithm based on texture features and optional flow features, uses GLCM to compute the crowed density, then uses optical flow method to compute crowed motion vector. Experimental results show that the new algorithm can improve the performance of abnormally detection in crowed scences.
    Human Hand Joint Recognition Based on Rotation Invariant Depth Comparison Features
    ZHANG Yan, WEI Xue-yun
    2014, 0(3):  119-122.  doi:10.3969/j.issn.1006-2475.2014.03.028
    Asbtract ( 216 )  
    References | Related Articles | Metrics
    Aiming at problem that the hand joint is difficult to identify and different joint is difficult to distinguish based on depth image, an algorithm based on rotation invariant depth comparison feature is proposed. First, the rotation invariant depth comparison feature is extracted to train random forest classifier and identify the part category of pixel. Then density of centroid of perpoint mapping is calculated to achieve joint recognition. The experimental result shows that the algorithm is of high accuracy and robustness.
    Single Fog Image Defogged Method Based on Physics Model
    KUANG Wen-long, YE Qing, SONG Zan
    2014, 0(3):  123-125+130.  doi:10.3969/j.issn.1006-2475.2014.03.029
    Asbtract ( 241 )  
    References | Related Articles | Metrics
    As the fog image contrast reduction, we need to defog the image in order to ensure the visibility of the image. According to optics theory, the reduction of scene visibility is exponential to the scene depth. This paper proposes an image defogging algorithm based on physical model of atmospheric optics. First, the proposed algorithm estimates the ambient light in a given hazy image based on the quad-tree subdivision. Then, the proposed algorithm estimates the transmission map to maximize the contrast of the output image. Finally, image restores in the fog. The experiments demonstrate the effectiveness and practicality of the proposed algorithm.
    Ship Reporting System Based on Spring JMS
    ZHANG Sheng, CHENG Bei
    2014, 0(3):  126-130.  doi:10.3969/j.issn.1006-2475.2014.03.030
    Asbtract ( 232 )  
    References | Related Articles | Metrics
     With the rapid development of computer network and the deepening of enterprises information, the enterprises put forward the urgent need of heterogeneous information sharing and exchange of information, the Spring JMS framework technology provides a good solution for the realization of information exchange and sharing of distributed heterogeneous environment. This paper describes the background and significance of system development, and briefly introduces Spring JMS framework and message middleware WebSphere MQ, and implements a data synchronization ship reporting system combined with the actual needs, and achieves good results in practical applications.
    Design and Realization of AMC Ethernet Switch Board Based on MicroTCA System
    WU Jin-zhe, JI Jing, QU Tao
    2014, 0(3):  131-135,140.  doi:10.3969/j.issn.1006-2475.2014.03.031
    Asbtract ( 223 )  
    References | Related Articles | Metrics
    This article takes the design of the AMC (Advanced Mezzanine Card) Ethernet switch board as an example to introduce the realization of the AMC board based on the MicroTCA system. The AMC Ethernet switch board can be divided into two logical parts: Ethernet switch module and Module Management Controller (MMC). This article introduces the chip selection, logic function, interconnect fabric, and management interface of the two parts. Most of all, it gives a full description of the design of the Module Management Controller (MMC) on the AMC board, which provides a good reference of designing other types of MicroTCA AMC boards.
    Intra-only Spatial Scalability of HEVC
    LYU Jie
    2014, 0(3):  136-140.  doi:10.3969/j.issn.1006-2475.2014.03.032
    Asbtract ( 217 )  
    References | Related Articles | Metrics
    Spatially scalable extension video coding provides a way to deliver one video at different resolutions. The proposed methods in this paper make use of the texture features of the base layer to reduce the time of the partition of CU and gain an effective intra prediction mode, as well as take advantage of the correlations between intra prediction mode information in base layer and enhancement layer to improve the intra mode coding in enhancement layer based on HEVC. Compared to simulcast high resolution coding, the enhancement average luma BD-rate is up to 35.1% in the proposed mode, so that the inter-layer intra prediction can display better and reduce the redundancy.
    Highway Management System Based on GSM
    YAN Su-fen1, ZHUANG Wen-wei2, SHEN Jun-fei2
    2014, 0(3):  141-144.  doi:10.3969/j.issn.1006-2475.2014.03.033
    Asbtract ( 194 )  
    References | Related Articles | Metrics
    Highway management system is an integrated management platform software which is based on GSM. It can record emergency alarms of each site and be real-time to display. This system adopts STC12C5A32S2 as the core processor, and controls the GSM module to send and receive information and read the information stored by the GSM module through STC12C5A32S2, then uploads the information to the computer for processing, display and record.
    A Cooperative MAC Protocol Based on Neighbor Nodes Information for Ad Hoc Networks
    YUAN Peng-fei, JING Zheng-wei
    2014, 0(3):  145-150.  doi:10.3969/j.issn.1006-2475.2014.03.034
    Asbtract ( 189 )  
    References | Related Articles | Metrics
    DCF (Distributed Coordination Function) is a compulsory medium access control (MAC) scheme in IEEE 802.11 protocol. In order to avoid the performance degradation due to hidden nodes, DCF adopts RTS/CTS mechanism to decrease collisions. However, hidden node problem degrades system performance sharply when the number of wireless nodes increases. Therefore, it is necessary to design a novel MAC protocol to satisfy the requirements of Ad Hoc networks. Based on the Distributed Coordination Function (DCF) of IEEE 802.11, we design a cooperative MAC protocol (C-MAC). C-MAC node achieves the information of two-hop neighbor nodes from control frames, and according to the information of two-hop neighbor nodes, we design a scheduling algorithm to schedule each node to transmit at a particular time slot. We build a simulator to evaluate the performance of CMAC in terms of throughput, transmission time per hop and fairness index. When the transmission rate is 11Mbps, the throughput of CMAC increases 50% at most compared with the one of DCF.
    Analysis and Defense of SQL Injection Attacks in ASP.NET Application
    CHU Long-xian
    2014, 0(3):  151-153,160.  doi:10.3969/j.issn.1006-2475.2014.03.035
    Asbtract ( 223 )  
    References | Related Articles | Metrics
    Aiming at the SQL injection attack problem in ASP.NET application, after the analysis on the approach and method of injection attacks, a three-level prevention model is put forward from the aspect of input filtering, statement parameters and SQL keywords escaping. With this model, we can customize the rule of keywords escaping and block the approach of SQL injection attacks effectively. The result of experiments verifies the feasibility and effectiveness of this prevention model.
    A Ciphertext Access Control Scheme for Enterprise Synchronous Network Disk
    WANG Yuan1, YANG Yue-xiang2, DENG Wen-ping2
    2014, 0(3):  154-157,160.  doi:10.3969/j.issn.1006-2475.2014.03.036
    Asbtract ( 190 )  
    References | Related Articles | Metrics
    For access control needs of enterprise synchronous network disk, by giving full consideration to the partnership in access control between enterprise and user, this paper designs a dual-controlled enterprises and users ciphertext access control scheme based on RBAC model and CP-ABE mechanism. a prototype system is acheved by using mature open source software in Linux system and the effectiveness and efficiency of the scheme is verified. The scheme can solve the problem of enterprise synchronous network disk ciphertext access control.
    Application of Apache Shiro Security Framework in Technology Transfer Services System
    YANG Yun-ping, WU Zhi-jun
    2014, 0(3):  158-160.  doi:10.3969/j.issn.1006-2475.2014.03.037
    Asbtract ( 249 )  
    References | Related Articles | Metrics
    Apache Shiro is an unusual Java security framework, and the technology transfer service system use it for security is the first choice. A security authentication is realized by inheriting Realm abstract class in Shiro framework, and the purpose of information security is arrived by introducing configure files of Spring.
    A Secure and Efficient Certificateless Authenticated Key Agreement Scheme
    MA Jun1, WANG Xiao-feng2
    2014, 0(3):  161-164.  doi:10.3969/j.issn.1006-2475.2014.03.038
    Asbtract ( 212 )  
    References | Related Articles | Metrics
    针对两方密钥协商方案普遍存在高效性和安全性不可兼顾问题,在无证书公钥密码体制下给出一种安全高效的可认证两方密钥协商方案。该方案使用一般的而非映射到点的Hash函数并预先处理一个双线性对运算,降低计算复杂度,提高了执行效率;增加用户间的身份认证,提高了安全性。性能分析表明,新方案满足前向安全性;抗密钥泄露伪装攻击;已知会话临时秘密信息安全性等目前期望的安全属性,且有较好的执行效率。
    Identity Authentication Service Based on Restful
    PU Lin
    2014, 0(3):  165-168.  doi:10.3969/j.issn.1006-2475.2014.03.039
    Asbtract ( 218 )  
    References | Related Articles | Metrics
    Using Restful Web services technology, this paper designs an identity authentication service. The service publishes the identity authentication as a Rest services for local and remote clients to call, while using cryptographic token way stores user authentication information in the client’s token, the server is no longer to save the authentication user information by using the Session, but by decrypting the token to access authentication user information, which not only ensures the security of the user’s information, but also makes the application server be of a good dynamic scalability.
    Design and Realization of Network Attack and Defense Simulation System Terminal Subsystem
    LI Yan-guang
    2014, 0(3):  169-172,185.  doi:10.3969/j.issn.1006-2475.2014.03.040
    Asbtract ( 224 )  
    References | Related Articles | Metrics
    The simulation of network terminals of existing network attack and defense system is realized mostly through accessing real devices, utilizing virtual machines and simple protocol realizing. These methods are either costing too much and inflexible or too low in simulation level and incapable to respond to application layer requests. Aiming at these problems, this paper puts forward the method of combing network attack and defense simulation system with virtual honeypot which acts as the virtual network terminal. The paper also presents a practical technical solution for using virtual honeypot to realize network attack and defense system terminal subsystem.
    Design of Hyperchaos Secure Communication System Based on State Observer
    WANG Jian1,2, WAN Li-yong2, LI Lei2
    2014, 0(3):  173-176,190.  doi:10.3969/j.issn.1006-2475.2014.03.041
    Asbtract ( 190 )  
    References | Related Articles | Metrics
    In order to solve the secure communication problem, on the basis of studying the chaotic synchronous, this paper designs a hyperchaos secure communication system based on state observer. The hyperchaos Liu system is applied as model of the chaotic system, it can improve the system security efficiently. According to whether the n×n row matrix is full rank, it can judge two hyperchaos systems whether or not achieve synchronism, and avoid the Lyapunov index computation of high dimensional system. 〖JP2〗The method is of widespread applicability. The chaotic system uses the en(t)=y2+(1+x2)p(t) as the cryptographic function, can ensure the flexibility of secure communication. Theoretical analysis and experimental results show that the hyperchaos secure communication system has the characteristics of high security, wide applicability and supporting a certain dynamic adjustment.
    Design and Realization of Java Web Common Users Permissions Management Frame
    ZHOU Chun-rong, XIAO Xiang-lin,YANG Hua
    2014, 0(3):  177-179,196.  doi:10.3969/j.issn.1006-2475.2014.03.042
    Asbtract ( 302 )  
    References | Related Articles | Metrics
    Under the MyEclipse 10 development situation, RBAC model design is used and a common users permissions management frame based on Java Web is realized for the purpose of realizing users, role and resource management. The system adopts Java EE selfservice to increase the reusability and the user role is introduced between users and resources to reduce users’ workload.
    Classification Method of Multi-categories Complex Information Based on Granularity Transform
    LU Zhi-jie
    2014, 0(3):  180-185.  doi:10.3969/j.issn.1006-2475.2014.03.043
    Asbtract ( 186 )  
    References | Related Articles | Metrics
    Aiming at the weak ability to process the multi-categories of complex information in big data processing, this paper proposes a classification method of multi-categories complex information based on granularity transformation. First it introduces the decision attribute into the classification, gets the reduction set group of multi-categories classification attribute by calculating the value of decision class and broad-sense decision class of each category; then calculating respectively the complex comparability of each classification object based on the set group; in the end, fulfilling the automatic classification of the object based on result of complex comparability calculating. The results of contrast emulate experimentation show that system based on this kind of method gets better obviously precision ratio and recall ratio than that of traditional system.
    Laboratory Management System Based on Android
    HONG Wen-zhen
    2014, 0(3):  186-190.  doi:10.3969/j.issn.1006-2475.2014.03.044
    Asbtract ( 282 )  
    References | Related Articles | Metrics
    Through the study on Android, JSON and WCF and other relative technologies, this article aims to design an Androidbased laboratory management system to call the WCF services. The article introduces the model design, design of system function module, data transmission processing etc. in detail. Through the software testing, the design scheme is validated feasibility.
    Optimization of Plane’s Overhaul Assembly Workflow Based on Genetic Algorithm
    SUN Dong-yu1, MA Deng-wu2, YAO Cheng-zhu3, ZHANG Yong-liang4
    2014, 0(3):  191-196.  doi:10.3969/j.issn.1006-2475.2014.03.045
    Asbtract ( 227 )  
    References | Related Articles | Metrics
    Genetic Algorithm is used to optimize plane’s overhaul assembly workflow firstly. The optimization model is built to reach the shortest finish time, and “A method of rescheduling work sequence” and penalty function are integrated to satisfy constricts from work sequence and people, then the simple GA is improved further by a modified optimal preservation strategy. The simulation results demonstrate that, the improved GA is much stronger in bestsolution search ability than the simple GA, and the GA is good for the optimization of dislocation periodic maintenance workflow.
    Method of Automatic Generation of Data Access Interface
    GE Sen1, SUN Peng2, ZHOU Feng3, GE Shi-hao4
    2014, 0(3):  197-201.  doi:10.3969/j.issn.1006-2475.2014.03.046
    Asbtract ( 225 )  
    References | Related Articles | Metrics
    In the MIS design process, the user interface design is very important for users and system security. Due to the low efficiency of manual building data access interface, this paper proposes a solution based on automatic code generation technique. Firstly, the paper uses the existed code generator SocanCode to build the basic module of data access automatically, secondly, develops a new code generator to build the interface module of data access automatically, at last, takes a kind of thematic geographic data for example, in the VS2010 IDE, using the automatic layout feature of LayoutControl, a kind of DevExpress control. This method is implemented through C#, which improves the efficiency of building data access interface.
    Services of Environmental Protection Archival Information Resources Based on REST Mode
    YIN Fang, LI Li-ge
    2014, 0(3):  202-205,209.  doi:10.3969/j.issn.1006-2475.2014.03.047
    Asbtract ( 201 )  
    References | Related Articles | Metrics
     The paper proposes a scheme of environmental protection archival information resources (EPAIR) services based on REST architecture to solve some problems (such as complex data types and low utilization of archival resources and so on), for sharing of environmental protection archival information resource in heterogeneous environment. Firstly, the key points of designing EPAIR services are discussed. The specific steps of the EPAIR services are elaborated in detail including identification of resource, resource identifiers and resource representation of environmental protection archival and its metadata, and resource CRUD operation. Finally, the essentials on how to implement it under Spring 3.0 REST and J2EE are elaborated. Moreover, the services are applied to environmental protection archival information resources sharing platform and get better results.
    High Reliability Video Conference System for Power Enterprise
    ZHOU Kun, JING Dong-sheng, GU Yang-qing
    2014, 0(3):  206-209.  doi:10.3969/j.issn.1006-2475.2014.03.048
    Asbtract ( 203 )  
    References | Related Articles | Metrics
    Video conference system takes important place in power enterprise maintenance support fields, such as information delivery, work coordination and emergency maintenance. The reliability of video conference system is related to the business management and production security which require high reliability. The structure and working principle of the video conference system as well as the update plan are introduced in this paper. Finally the application effect of the high reliability video conference system is mentioned.
    A Summarization of Dynamic Partial Reconfiguration Based on FPGA
    ZHANG Yu1,FAN Jian-hua2, LYU Zun-ming2, WANG Tong-xiang1
    2014, 0(3):  210-214.  doi:10.3969/j.issn.1006-2475.2014.03.049
    Asbtract ( 337 )  
    References | Related Articles | Metrics
    The reconfigurable computing is a new computing architecture, which combines the advantages of general purpose processor and application specific integrated circuit. It is of flexibility and high-performance. The dynamic partial reconfiguration of FPGA allows on-the-fly dynamic reconfiguration of part of the logic resources in FPGA to finish the function transformation. Therefore, it can improve the integrations and flexibility and the tolerance of error of the system. Additionally, it can reduce the cost and the power consumption of the system. This paper presents the theory of dynamic partial reconfiguration of FPGA. Then the paper introduces the implementations of dynamic reconfiguration and analyzes four kinds of the most common ways in details. It also presents the latest development and applications of dynamic partial reconfiguration. At last the future work and study directions of dynamic partial reconfiguration of FPGA are presented.
    Design and Implementation of Railway Customer Service Center Desktop Assistant System
    WANG Kun, TENG Ji
    2014, 0(3):  215-218,222.  doi:10.3969/j.issn.1006-2475.2014.03.050
    Asbtract ( 225 )  
    References | Related Articles | Metrics
    Desktop assistant system is not only a platform that the customerservice folks work on, but also acts as a core system in all other business systems. This paper describes the relevant business of the railway customer service center, and analyzes the relationship between the systems. The system architecture and the function module are also designed and implemented. In addition, the system is tested through the load testing and actual production.
    An Improved Method of Wavelet Threshold Function Denoising
    ZHANG Chi1, LI Xiang2, YAO Lei3
    2014, 0(3):  219-222.  doi:10.3969/j.issn.1006-2475.2014.03.051
    Asbtract ( 246 )  
    References | Related Articles | Metrics
    Based on the method of wavelet threshold denoising, the procession of wavelet threshold denoising is introduced, and the traditional soft, hard and Garrote threshold function are analysed. In order to overcome the shortcoming of the traditional threshold function, a new modified threshold function is proposed. The results of experimental simulation indicate that the modified denoising method performs effectively and remarkable, which is better than the traditional functions.