Loading...

Table of Content

    17 April 2014, Volume 0 Issue 4
     
    CADbased Semianalytical Parametric Geometry Modeling Method
    LI Xu, GONG Chunlin, GU Liangxian, SU Hua
    2014, 0(4):  1-7.  doi: 10.3969/j.issn.10062475.2014.04.001
    Asbtract ( 181 )  
    References | Related Articles | Metrics
     
    Abstract:  For the current aircraft multidisciplinary design optimization (MDO) in computer simulation applications, the problem of poor description ability and adaptability with limited variables, in geometry modeling, stands out. According to the central idea of several common modeling methods, the concepts of graphic basis and curve correction are introduced, which present a greater scope to promote parametric description ability. Its application to CAD geometry modeling derives a set of CADbased semianalytical hybrid parametric geometric modeling method, which combines both the advantages, with a strong description ability and a simple realization. The cases of airfoil, aircraft parametric modeling and warhead shape optimization indicate that the CADbased semianalytical hybrid method for parameterization is compatible with the traditional method, combining the extended design space and the traditional one, which effectively improve the description ability and the adaptability of the parametric method. It has a certain significance to enrich the parameter selection and new design exploration in geometric modeling of MDO.
     Mobile Communication Virtual Experiment Based on 3D MAX and Virtools
    LING Shen, CHEN Guang, HAN Xiuling
    2014, 0(4):  8-11. 
    Asbtract ( 202 )  
    References | Related Articles | Metrics
     
    The section of the equipment connecting, which is one part of the calling and called process in CDMA mobile station experiments, is proposed as an example in this paper. The detailed procedure of research and development of the virtual experiments is introduced based on 3DS MAX and Virtools. The reality of immersion, the convenience of interaction and the simplicity of manipulation are stated about the mobile communication virtual experiment system taking advantage of the technology mentioned above.
     
    Plant Leaf Classification Based on CNN
    GONG Dingxi, CAO Changrong
    2014, 0(4):  12-15. 
    Asbtract ( 488 )  
    References | Related Articles | Metrics
     
    Plant plays an important role in human life, so it is necessary to build an automatic system for recognizing plant. Plant leaf classification has become a research focus for twenty years. However, conventional methods for recognizing plant leaf have various drawbacks. CNN gained great success in image recognition, in order to utilize CNN to recognize plant leaf, a hierarchical model based on convolutional neural network is proposed. We applied our method to Swedish leaf dataset classification, the experimental results showed that the proposed method is quite effective and feasible.
    Fabric Defect Detection Based on Periodicity and Local Directivity of Texture Edge
    WU Ning, GUAN Shengqi, XU Shuaihua
    2014, 0(4):  16-19. 
    Asbtract ( 222 )  
    References | Related Articles | Metrics
     
    According to the characteristic of the fabric texture image itself, a new method of fabric defect detection is presented, which based on texture periodicity and local directivity. Through eliminating the background texture information of similar texture with defect using its features of periodicity and directivity of normal texture edge, the defect information is highlighted, and then the defect information of no particular direction is detected quickly and efficiently. Through detection experiments of a large number of fabric image with defect, this method is proved to have good detection effect, when the fabric image has clear texture edge or good direction consistency.
    An Improved Nystrom Spectral Clustering for Image Segmentation
    YIN Shile, ZENG Zhiyong
    2014, 0(4):  20-23. 
    Asbtract ( 251 )  
    References | Related Articles | Metrics
     
    Spectral graph theoretic methods have recently shown great promise for the image segmentation. This paper focuses on the disadvantage that the similarity matrix and the Laplacian matrix constructed complex and waste of time in high resolution image segmentation, so presents a Nystrom method based on variance incremental to reduce the scale of the matrix. Then based on cosine similarity to attain similarity matrix, the use of traditional Gauss formula to artificial selection scale parameter is avoided. Lastly, experimental results on Berkeley image database show the validity of the algorithm.
     
     Gridbased Statistical Model for 3D Object Recognition
    FANG Xue, YU Ruixing
    2014, 0(4):  24-28. 
    Asbtract ( 148 )  
    References | Related Articles | Metrics
     
     Abstract:  A 3D object recognition algorithm based on statistical model of grid structure is presented in this paper. First, a grid structure is introduced into the multiview points image. Then according to the positions of the grids, the relationship between the multiview points of the 3D object and the local invariant features of the object, the statistical model is established. Second, the degrees of freedom of the 3D object, which is from the image databaseCOIL, are expanded. At last, based on the previous work, the recognition performance of this algorithm is tested. The empirical results illustrate that this 3D object recognition algorithm, with relatively strong robustness, can not only recognize the classification of 3D objects effectively, but also make reliable judgments on the attitudes of the objects.
    Extraction for Vehicles Contour Based on Stransformation Coupled Canny Operator
    WU Zhenju
    2014, 0(4):  29-32. 
    Asbtract ( 233 )  
    References | Related Articles | Metrics
     
     Abstract:  In order to overcome these defects such as sensitive to noise and prone to produce false edges for better extracting the car contour to significantly improve the accuracy, the extraction mechanism for vehicles contour based on Stransformation coupled Canny operator is proposed in this paper. The Stransformation is introduced into the Canny operator, and the intermediate frequency coefficient of Stransformation is used to extract contour. It significantly improves the ability of antinoise interference, and makes the Canny operator having the property of identifying the false edge information. This algorithm and other algorithms are tested by the Matlab simulation platform. And the results show that: comparing with the other extraction mechanism, the contour extraction accuracy of this mechanism is the highest, and the ability of anti noise interference is also the strongest for which its peak signal noise ratio up to 32.675.
     Key words:  Stransformation; Canny operator; antinoise; false edges; contour extraction
    Detection of Hard Exudates in Fundus Images Based on SVM
    PAN Yanhong, PAN Lin
    2014, 0(4):  33-37. 
    Asbtract ( 235 )  
    References | Related Articles | Metrics
     
    Abstract:  To overcome the difficulties of the detection of hard exudates(HEs) such as uneven illumination, low contrast and the interference of soft exudates, a method based on SVM is proposed. Firstly we use morphological and thresholding methods to coarsely segment the candidate HEs regions in fundus images, then extract features on the candidate regions and import the AMFM features, finally we use a SVM classifier to classify the HEs and nonHEs. The experiment is based on the public diabetic retinopathy database DIARETDB1, we achieve a sensitivity of 91.1% and a specificity of 94.7%. The experimental results indicate that our method can conduct reliable detection of HEs.
    Image Geometric Segmentation Method Based on 3D Context
    CHEN Xiao, WANG Min, TAO Mingyang
    2014, 0(4):  38-40. 
    Asbtract ( 204 )  
    References | Related Articles | Metrics
     
    Abstract:  Image segmentation is the most basic preparatory work in computer vision, and it is the key step from image processing to image analysis. The result of image segmentation is always separate areas without geometric meaning, and the accuracies of existing methods of geometry segmentation are not very high. In this paper, an image geometric segmentation method is proposed and 3D context information is successfully applied to geometric segmentation of scene images. Experiments show that this method can do geometric segmentation with higher accuracy.
     
     Image Fundamental Motion Scrambling Method in Uniform Velocity 
    Based on Knighttour Transformation
    XING Yiliang, MA Liang, HAN Baoru, FU Shi
    2014, 0(4):  41-46. 
    Asbtract ( 197 )  
    References | Related Articles | Metrics
     
    Abstract:  Welltried scrambling method is important to improve scrambling effectiveness, reduce key management cost and improve the resistance of attacking. In this paper, an image fundamental motion scrambling method was introduced. Firstly, image was divided into part A and part B; Secondly, the swap of pixels of part A and part B was implemented in uniform velocity motion method and pixels of part A was evenly distributed in part B; Lastly, image was scrambled by knighttour transformation in global and local view. The results of experiment show this method can decrease keys with good scrambling effectiveness and antiinterference performance.
    Nonlocal Disaster Recovery System of Digitized Campus
    CHEN Si1, LI Huafeng1, TU Qinghua1, TANG Dongyang2
    2014, 0(4):  47-50. 
    Asbtract ( 189 )  
    References | Related Articles | Metrics
     
    Abstract:  This paper proposes a technical program of the nonlocal disaster recovery system of campus network depend on the core of data replication. After analyzing the construction situation of the digitized campus, the paper introduces the development and application of the nonlocal disaster recovery system. It studies the related technology of the system, after that it proposes the construction idea and the technical solution, at last expounds the realization process of Nanjing University of Science and Technology, including the implementation step and the result. Through the app experience, this article summarizes that the platform has obvious advantage and a certain reference value.
    Methods of Hooking IAT with Injection DLL into Remote Process
    ZHANG Zhong
    2014, 0(4):  51-54. 
    Asbtract ( 256 )  
    References | Related Articles | Metrics
     
    Abstract:  In order to install our own function hooks, they are realized by hooking PE file’s import address table(IAT). This paper introduces two methods of hook IAT of using the import table: direct hook method and indirect hook method. We used Win32 assembly language to program the two hook routines of the import address table, tested the hooking IAT effects of the hook module after injecting DLL into the remote process. The results showed that the two methods can reliably hook IAT. Some problems for hook IAT are discussed.
     Multiparty Quantum Secret Sharing Protocol Using Bell Particle
    LIU Minghui
    2014, 0(4):  55-58. 
    Asbtract ( 173 )  
    References | Related Articles | Metrics
     
    Abstract:  A multiparty quantum secret sharing (QSS) protocol which uses Bell particle is presented. In the secret sharing process, the participants have Pauli operation and the H operation to share the information of secret. In the aspect of communications, the protocol using quantum channel to transfer the secrets directly and classical channel is responsible for safety inspection, which ensures the sharing process safety. In the aspect of safety, the protocol can resist the middleman attack as well as internal dishonest participants intercept resend attack.
     Congestion Control Algorithm for WSN in Traffic Information Collection
    CAO Jie, YU Xin
    2014, 0(4):  59-63. 
    Asbtract ( 212 )  
    References | Related Articles | Metrics
     
    Abstract:  A highperformance congestion control algorithm (HPCC) is proposed to improve the reliability and realtimeness of wireless sensor networks for traffic information collection system. The algorithm defines congestion predict state index according to queue occupancy rate and congestion duration for solving the problem of accurately predicting the network load in the single congestion detection condition. HPCC predicts the trend of congestion by the judgment of congestion state index. The algorithm builds selection model by the theory of TOPSIS to avoid network paralysis caused by the optimal path failure. It establishes the temporary best path around the congestion nodes to flow schedule and considers node congestion degree, the remaining energy, the distance from the original path hop and the channel access rate as the nexthop node selection. The experimental results show that the algorithm can more effectively and accurately detect congestion, reduce the delay and decrease the network energy consumption. So the fidelity of the data is obtained.
     Human Posture Recognition Method Based on Multiple Classifiers
    CHEN Huijie, XIE Yixiong
    2014, 0(4):  64-68. 
    Asbtract ( 224 )  
    References | Related Articles | Metrics
     
    Abstract:  To get an accurate body posture recognition result and meet the needs of intelligent video surveillance, we present a fusion of Hu invariant moments and Fourier descriptors characteristics of human posture recognition algorithm. The ReliefF feature selection algorithm is introduced into the process, for distinguishing the importance of characteristics. Voting mechanism of using multiple classifier is constructed with large numbers to vote, plays good advantages of the various classifiers to improve the recognition accuracy. Finally, experimental results show that the proposed algorithm achieves good classification results for various postures.
     A Prioritybased Faulttolerant Task Scheduling Algorithm on Heterogeneous Clusters
    WANG Shangchao, TANG Xiaochun
    2014, 0(4):  69-72. 
    Asbtract ( 144 )  
    References | Related Articles | Metrics
     
    Abstract:  We propose a task prioritybased faulttolerant scheduling algorithm, the priority of the task is not specified by the user, but decided by the start time, execution time and deadline of the task. The algorithm can tolerate a heterogeneous cluster system node fails, the use of active/passive executive backup mode and overlapping ways to improve the system resource utilization. The experimental results show the reliability and efficiency of this algorithm in faulttolerant scheduling.
    A New Weightbased Association Rules Mining Algorithm
    WAN Yuwen, HUANG Linying, GAN Dengwen
    2014, 0(4):  73-76. 
    Asbtract ( 221 )  
    References | Related Articles | Metrics
     
    Abstract:  Association rules mining is an important method in data mining. Combined with traditional algorithm based on support and confidence limit, the paper brings forward a weightbased method to mining association rules and gives some different methods to calculate attribute’s weight. The difference of these methods is compared at the end of this paper. We give an example to show our method is effective.
     Research and Design on Topical Crawler Based on Analysis of Content and Link
    SHU Ben, YIN Ke
    2014, 0(4):  77-80. 
    Asbtract ( 190 )  
    References | Related Articles | Metrics
     
     Abstract:  In the aspect of grasping the topical webpage to the existing topical crawler algorithm, its accuracy is not high. This paper presents a topical webpage grasping method which based on evaluation of text content and webpage link. First it calculates the correlation of current webpage and theme, and then compares the correlation values with a given threshold to determine the current webpage is discarded or stored. At the same time the size of the correlation value also determines the priority of URL in the climbing link queue, this model takes into account the balance of topical webpage between accuracy and coverage. In the aspect of grasping topical webpage to design the new topical crawler algorithm, its accuracy has been improved to some extent.
     Feature Matching Method Based on Random Forests Classifier
    SUI Jiankai1, LIU Huiyi1,YAN Shuo2
    2014, 0(4):  81-85. 
    Asbtract ( 210 )  
    References | Related Articles | Metrics
     
    Abstract:  It is difficult to be speedy as well as accurate in feature matching. To overcome the drawback, this paper proposes a feature matching method based on random forest. This method extracts local invariant features in scale space by SUSurE algorithm, then the features and its adjacent pixels are constructed as training samples. In offline, the random forests are trained and a classification model is acquired to deal with the scale, rotation, illumination and perspective changes. In the online stage, the candidate feature points input RF classifier for realtime classification and feature matching. Comparative tests are made between our approach and SIFT. Experimental results show that the method based on RF is generally more robust and faster in the premise of realtime, and is good at accuracy, as well as adjusting to the illumination changes.
    Cochannel Speech Separation Based on Clustering
    WU Chun, LIANG Zhengyou
    2014, 0(4):  86-88. 
    Asbtract ( 214 )  
    References | Related Articles | Metrics
     
    Abstract:  This paper proposes an unsupervised clustering approach for cochannel speech separation to solve the problem that many auditory scene analysis (CASA) systems using training model to require the availability of pretrained speaker models and prior knowledge of participating speakers. The system produces simultaneous streams of mixture signal through multipitch tracking algorithm, and searches for the optimal assignment of simultaneous speech streams by maximizing the between and withincluster scatter matrix ratio to separate the mixtures. The system does not require trained speaker models, improves obviously the performance of cochannel separation, which offers a good solution to separate cochannel speech.
    An Automatic Verification Algorithm Based on Weighted Calculation
    WANG Xiaolei1, YU Changjiang2, LIAN Yichun2, SU Qiang2
    2014, 0(4):  89-91. 
    Asbtract ( 204 )  
    References | Related Articles | Metrics
     
     Abstract:  The verification process is dependent on the manual judgment, it led to a dispute among the parties. The paper presents an automatic verification method based on weighted calculation, discusses the basic concept of weighted calculation and weighted term. The weighted term definition and weighted calculation sub process insure introduced in the verification process. Finally automation process verification is achieved, to provide decision support for management to verify process.
     
    Comparative Study on Binary Function Approximation Performances of GRNN and RBFNN
    DING Shuo, CHANG Xiaoheng, WU Qinghui
    2014, 0(4):  92-96. 
    Asbtract ( 221 )  
    References | Related Articles | Metrics
     
    Abstract:  In order to compare the approximation performances of GRNN and RBFNN to binary functions, GRNN and RBFNN are first established through computer programming in this paper. A specific binary function is taken as an example to be approximated using the above two neural networks respectively. The simulation results show that in approximation to a binary function, compared with RBFNN, GRNN has higher precision, faster convergence speed, and better approximation ability. Thus it provides a good method to solve the problem of binary nonlinear function approximation.
    Realtime Map Constitution and Robot Obstacle Avoidance Based on VFH+ Method
    WANG Tao, LIU Jin, MA Yongqi
    2014, 0(4):  97-101. 
    Asbtract ( 242 )  
    References | Related Articles | Metrics
     
    Abstract:  In order to increase the accuracy of robot avoidance map and the efficiency of robot avoidance method, this paper improves the VFH+ method. First, we group the ultrasonic sensor to avoid interference between each other. Second, we use software to filter statistics returned from ultrasonic sensors to increase the accuracy of realtime map. Meanwhile, we improve the cost function to get more accurate identification of cost. Lastly, we design a mechanism that allows the robot to get out of the loop based on dynamic threshold. Simulation shows that the improvements are effective.
    EEG Signals Denoising Based on MP Algorithm
    WANG Li
    2014, 0(4):  102-104. 
    Asbtract ( 198 )  
    References | Related Articles | Metrics
     
    Abstract:  Electroencephalograph(EEG) signals are usually interfered by noises during signal acquisition process. This paper uses the matching pursuit algorithm to separate EEG signals and noises, thereby removing noises, and the denoising effects are tested by signal to noise ratio and correlation coefficient. The experimental results show that this approach not only can effectively restrain the power frequency noise, but also be able to keep the shape feature of the EEG signal unchanged.
     Key words:  matching pursuit (MP); overcomplete dictionary; electroencephalograph(EEG); denoising; signaltonoise ratio
    Weighted Centered Optimization Algorithm Based on RSSI
    ZHU Zepeng, YE Shuqiu, YIN Ke
    2014, 0(4):  105-107. 
    Asbtract ( 196 )  
    References | Related Articles | Metrics
     
    Abstract:  With current domestic vehicles increasing, it is difficult to achieve a reasonable planning, control, monitoring and induction in urban transportation system. This paper puts forward an optimization weighted centered wireless sensor network positioning technology based on Received Signal Strength Indicator(RSSI). Studying and utilizing the ZigBee networking positioning and automotive electronic tags, then the collecting data is got accurate position by using the weighted centered localization optimization algorithm. After many test, this system can be positioned within the error range of 0.5m, shows that the algorithm has the advantages of low resource usage, resources, reliability, realtime and high precision.
    Detecting Communities of Complex Networks Based on Dependence Degree of Two Nodes
    GAO Hongwei1, XU Yong2
    2014, 0(4):  109-112. 
    Asbtract ( 215 )  
    References | Related Articles | Metrics
     
     Abstract:  Detecting community structure in complex networks is significant in understanding the structures and functions of networks. The dependence degree of two nodes is analyzed, and a new standard is found for whether a node is belonging to the community. An initial community is first constructed from a node with maximal node strength and its neighbors which satisfying the dependence degree quantitative condition, then the initial community is expanded by adding nodes according to some quantitative conditions. Only local information of nodes is need to use, so the time complexity is a linear complexity. It is applied to the classic Zachary network to verify the validity.
    Firefly Algorithm for Solving 01 Knapsack Problem
    LIU Yilan, XU Lihong, WU Fengyan, PAN Shujing
    2014, 0(4):  113-117. 
    Asbtract ( 236 )  
    References | Related Articles | Metrics
     
    Abstract:  Taking advantage of the standard firefly algorithm (FA) and combining with the characteristics of the 01 knapsack problem, this paper designs a firefly algorithm based on 01 knapsack problem. After experimental simulation, we verified the firefly algorithm’s feasibility and effectiveness to solve 01 knapsack problem. Finally, after many simulation experiments, this paper analyzes the influence of various parameters on the algorithm performance, reflected the importance of selection of key parameters to the algorithm optimization.
     
    An Improved Power Control Algorithm in Cognitive Radio Networks 
    Based on Game Theory
    ZHANG Yu
    2014, 0(4):  118-122. 
    Asbtract ( 180 )  
    References | Related Articles | Metrics
     
    Abstract:  Based on the noncooperative power control game created by David Goodman, we propose a new sigmoid efficiency function and an improved pricing function suitable for Cognitive Radio Network (CRN). This pricing function considers the fairness among users, and the existence of the Nash Equilibrium (NE) is proved. Simulation results show that the proposed power control game not only enhances the network throughput, reduces emission power of cognitive users and improves the utility, but also takes into account the system fairness to some extent than other previous schemes.
    Improvement of Routing Protocol LEACH in Wireless Sensor Network
    ZHANG Yaqiong, ZHANG Hui
    2014, 0(4):  123-125. 
    Asbtract ( 185 )  
    References | Related Articles | Metrics
     
    Abstract:  Classic clustering algorithm LEACH is widely used in wireless sensor networks, but does not consider energy of cluster head and position, so the network consumes energy greatly. To save energy of node and extend the life of network, on the basis of the LEACH algorithm, we proposed the improved LEACHi. The LEACHi adds energy and distance references in the election expression of cluster head, so the nodes which have more energy can be cluster head. On experimental simulation platform of the NS2, the LEACHi algorithm is compared with LEACH algorithm. The results show that the network energy consumption is greatly reduced, and the network life cycle is extended.
    Integrated Development of SAS and .NET System Based on Web Services
    HU Shuang1, LU Tao2, HU Jianhua1
    2014, 0(4):  126-129. 
    Asbtract ( 223 )  
    References | Related Articles | Metrics
     
    Abstract:  To take full advantage of SAS’s online analytical processing(OLAP) and data mining functions and solve SAS’s problem of the unfriendly manmachine interface, a Web service based integrated development method of SAS and .NET system is proposed. The method makes SAS/IT module interacts with .NET, and the functions of reading a SAS data source, calling a stored procedure to analyze the data and obtaining the results of the analysis are achieved. Then these functions are accessed in the form of the Web service interface, and an ASP.NET client to access the Web service is developed. Finally, the bioavailability of variance analysis example is given to verify the feasibility of the method.
     Key words:  Web service; SAS; IOM; .NET system; integrated development; data analysis
     Oximeter Client Software Based on Android
    JIANG Na1, ZHANG Lei2
    2014, 0(4):  130-132. 
    Asbtract ( 286 )  
    References | Related Articles | Metrics
     
    Abstract:  In order to provide doctors fast, direct and effective oxygen data, the essay proposes a blood oxygen monitoring client design based on Android platform. And it introduces the construction of hardware platform based on microcontroller and detailed analysis of the client software. It implements the wireless communication between PC and the lower machine via Bluetooth. The client software can display blood oxygen in real time to achieve realtime data visualization, and the oxygen data is saved in SD card for analysis and diagnosis of the doctors.
    Analyses of Softwaredefined Network and Its Application
    SHEN Qingguo, HUANG Liaoruo, LUO Jian
    2014, 0(4):  133-137. 
    Asbtract ( 204 )  
    References | Related Articles | Metrics
     
    Abstract:  SDN(SoftwareDefined Network) is one of the hottest networks under research and development, yet its evolution direction and application potential need to be recognized calmly. By compared with policy based network, the principles of OpenFlow and SDN are introduced, and the SDN architecture is described. Its innovation in the network programmability and virtualization are illustrated in detail. The main problems of SDN such as application software license model, global status information collection and central controller scalability in large scale network are analyzed. It is pointed out that the SDN application domains are mainly local autonomous networks. The typical application scenarios are presented with the crosslayer integration requirements of IP, optical and wireless networks emphasized.
    Dynamics and Stability of Trust Model in ECommerce
    LIU Wei
    2014, 0(4):  138-142. 
    Asbtract ( 218 )  
    References | Related Articles | Metrics
     
     Abstract:  Currently, most researches on trust model are focused on its computability and diversity, but ignore its dynamics and stability. This paper presents a new trust model for Ecommerce system focusing on its dynamics and stability. In this trust model, peer A’s trust in peer B consists of two parts: A’s direct trust in B and the reputationbased trust of B. A’s direct trust in B is computed according to A’s rating about their transactions. The reputationbased trust of B is computed according to all peers’ transaction rating to him. Considering influence of the time factor, a new concept named credible time window is defined and a punishment mechanism for failed transactions is designed, so the dynamics trust model can motivate a fair exchange effectively. The dynamics of the model can affect the stability, how to balance them in different situation is studied. The experimental results show that this model outperforms the existing trust models in dynamics, and it can make a balance between its dynamics and stability as required.
    Clustering of Network Public Opinion Hot Issues Detection Based on Improved Kmeans
    SUN Lingfang, ZHOU Jiabo, XU Hui, XU Feng, HOU Zhilu
    2014, 0(4):  143-147. 
    Asbtract ( 213 )  
    References | Related Articles | Metrics
     
    Abstract:  Based on the needs of the network public opinion monitoring, this paper designs a model for automatic discovering the network public opinion hot issues. The system includes public opinion information acquisition, Chinese word splitter, feature selection, text segmentation and clustering analysis. By improving the Kmeans algorithm, the sensitivity of the algorithm for outlier is reduced, and the time and space complexity of the algorithm is reduced also. This paper makes use of F1 value to compare the improved Kmeans algorithm with the traditional Kmeans algorithm, which obtains satisfactory results and proves the feasibility and effectiveness of this model.
     Cost Optimization of CNAPS2 Payment Message Transmission
    LI Shiliang
    2014, 0(4):  148-151. 
    Asbtract ( 307 )  
    References | Related Articles | Metrics
     
    Abstract:  To guide the participants connecting the 2nd generation of China national advanced payment system (CNAPS2) by one point access mode, the paper analyzes and optimizes payment message transmission cost for participants, and identifies some impacting factors, such as the optimal merchant bank front end (MBFE) processing ability, the average network delay within participant system, the link delay between MBFE and city clearing processing center (CCPC), payment message arrivals, the maximum scalable MBFE processing ability and MBFE cost per unit of time. Finally, we conduct computational simulation on MATLAB platform to quantify and contrast these factors’ effect; the results can be utilized by participants to select the optimal access point for decision and reference.
     Monitoring System for Distributed PV System Based on ZigBee and Android Phone
    MA Long, WANG Wei
    2014, 0(4):  152-156. 
    Asbtract ( 190 )  
    References | Related Articles | Metrics
     
    Abstract:  To collect data of distributed PV systems and control them remotely, an intelligent monitoring system is developed based on Android phone and WSN. CC2430 chips which are based on ZigBee protocol are used as communication chips in the system. The database technology is applied, the PV systems’ information inquiry service is provided on WeChat. This WSN, Web service and network database are combined in the monitoring system, which makes the monitoring system for distributed PV system more intelligent, efficient and cost less.
    Description Language in General Network Protocol Analyzing Engine
    YU Hao, HUANG Yibin
    2014, 0(4):  157-161. 
    Asbtract ( 339 )  
    References | Related Articles | Metrics
     
     Abstract:  Network protocol analysis software is widely used, but most have bad extensibility. This paper designs a protocol description language (PDL) and develops a protocol analyzing engine based on the language. This engine implements the expansion of a new protocol by adding a protocol description language file. An experiment shows that the method has high feasibility.
    Realtime Neighbor Position Acquisition Protocol in Vehicular Networks
    DENG Zuoxiang
    2014, 0(4):  162-167. 
    Asbtract ( 1024 )  
    References | Related Articles | Metrics
     
     Abstract:  The problem of neighbor position acquisition in vehicular networks is investigated. A realtime protocol called RNP for neighbor position acquisition is proposed. In RNP, time is divided into frames with some time slots. To achieve realtime neighbor position acquisition, RNP adopts an adaptive message transmission strategy. Based on an analytical framework, every parameter of RNP is optimized. Real tracedriven simulations are conducted. Performance results demonstrate that, RNP outperforms other alternative protocols.
     Monte Carlo Simulation Based on Cloud Computing
    WANG Xuying, YAN Chong
    2014, 0(4):  168-171. 
    Asbtract ( 209 )  
    References | Related Articles | Metrics
     
    Abstract:  In order to improve operational efficiency and accuracy of Monte Carlo simulation algorithm, we need to establish a computing environment that it has characteristics of highaccuracy, high efficiency, easy to expand, easy to use. In this paper, according to the characteristics that cloud computing can increase flexible compute nodes, building the Symphony DE parallel software on a private cloud environment in local, achieving Monte Carlo simulation make use of program in Excel, through increasing the number of computing nodes, we can compare computational efficiency with computational accuracy. The results show that operational efficiency is greatly improved and calculation results are more accurate calculations.
    Design and Implementation of Selfdetermination Portable Computer
    WANG Wei, WU Jinzhe, QU Tao, JI Jing
    2014, 0(4):  172-177. 
    Asbtract ( 190 )  
    References | Related Articles | Metrics
     
     Abstract:  Based on the research and successful implementation of the portable computer which uses the selfdetermination key technology productions such as the selfdetermination CPU, firmware and OS, this article summarizes the design and implementation of the portable computer’s hardware and software platform. It introduces the system architecture and the realization of the main function circuits. Furthermore, the loading of the selfdetermination firmware and OS and the matching of the I/O devices is described. Besides, this article gives a full description of the inner infrastructure, cooling, heavy reducing and structure reinforce. At last,
    the sample model’s performance is tested, which includes integer and float calculate capablility, system response time, multitask data interactive capability and CPU processing capability.
    Application of Path Storage Method in Generating Tree Structure
    TANG Qingsong
    2014, 0(4):  178-181. 
    Asbtract ( 153 )  
    References | Related Articles | Metrics
     
    Abstract:  The dynamic tree structure is widely used, the existing method of generating tree structure, such as sort the tree nodes, expand the tree nodes and storage tree nodes in the relation of tables, has its own advantages and disadvantages. To avoid the disadvantages, the path storage method is used. That is to make the liner structural relationship of the nodes in the tree branch as the path, and then stores the path in a field of the node data table, after that, the database searches the list rules and presses the tree node this sequence to generate tree graph. Experiments show that this method can improve the sorting efficiency to sort the tree nodes, search the subtree nodes quickly, and optimize the storage structure for data base.
    Online Monitoring System of Dissolved Gas in TransformerOil Device Based on VxWorks
    LI Zhijun1,2, ZONG Qizhen1, DU Lin2, XIE Qifeng1, ZHANG Jianxue1, REN Jishuang1
    2014, 0(4):  182-186. 
    Asbtract ( 199 )  
    References | Related Articles | Metrics
     
    Abstract:  In order to meet the requirements of intelligent substation development and further improve the stability, accuracy, remote monitoring and management of online monitoring system of dissolved gas in transformer oil device, we use the technologies of selfmade carrier gas, vacuum degassing method, constant temperature control technology and combining with the research on VxWorks operating system, embedded database SQLite and IEC61850 communication protocol, put forward a design scheme of online monitoring system of dissolved gas in transformer oil device based on VxWorks operating system. Through the field application, the results show that: this device has some advantages, such as good stability, high accuracy of operation, more practicability, high level of functional integration, supporting remote monitoring and easy management.
     A Data Stream Monitoring Method Based on Pipeline Mode
    MA Bin1, MA Tianfu1, ZHANG Chao2, ZHANG Yi2
    2014, 0(4):  187-190. 
    Asbtract ( 205 )  
    References | Related Articles | Metrics
     
    Abstract:  In enterprise production and operation activities, it’s helpful to find out relevance between the businesses with the realtime monitor of data stream which generated by all kinds of information system. Also it is powerful for the enterprise business process optimization and management aid decision based on the realtime monitor. A monitoring and analysis method of data stream is described in the paper based on implicit association of business data and linkage of data stream, the concept and method of construction of pipeline and data stream are explained. The application demonstrates that the method is feasible.
    Design and Implementation of Highway Toll Security Card System
    LIU Yanbin1,2
    2014, 0(4):  191-194. 
    Asbtract ( 192 )  
    References | Related Articles | Metrics
     
    Abstract:  At the present time, automatic highway toll card system often lacks of measures to control the driver to steal many charging cards more than usual one. So, we propose a security card system that one car only can get a single card. This design uses an additional traffic direction detection device with the original automatic card machine, forms an antitheft security card system to protect the driver maliciously steal the highway charging cards, and reduces the economic losses of the highway company. The system has a stable and reliable design, and has dozens of them are used in Fujian Funing highway toll station, and has obtained a good effect.
     
    Approach to Data Compression Based on Waveform Storage Infrared Remote Control Transmitter
    ZENG Liancheng, ZHOU Xiaoyun
    2014, 0(4):  195-198. 
    Asbtract ( 234 )  
    References | Related Articles | Metrics
     
    Abstract:  Waveform storage infrared control transmitter is unrestricted from coding format and protocol type, and data compression and coding is the key issue. The pulse width is measured with IR carrier frequency 38 kHz. The high / low pulse waveform is turned into a onedimensional array of signed numbers and clustered. A fixedlength static dictionary is built through prior knowledge. The short pulses are encoded as 2bit, and the long pulses are made up of some encoded short pulses in series. Actual tests show that the data compression rate is high, and transformed infrared remote waveform can control accurately.
    A Dualchannel Acoustic Echo Canceler on Windows Platform
    LIU Yang, FU Zhonghua, TANG Ling
    2014, 0(4):  199-202. 
    Asbtract ( 202 )  
    References | Related Articles | Metrics
     
     Abstract:  A dualchannel acoustic echo cancellation (AEC) system on Windows platform is proposed. It involves a highspeed and high sampling rate audio I/O driver model, which can solve the realtime and synchronic audio processing problems through lowlevel interface. To reduce the transmission and computation loads, a resampling technique is used to adjust the sample rate during net transmission and realtime processing. Additionally, the interchannel decorrelation is implemented with frequencydomain resampling technique so as to improve the performance of echo cancellation. The experimental results verified the effectiveness of the proposed system.
     LLVMbased Impact Analysis on Program Concerns
    CHEN Hongxu
    2014, 0(4):  203-207. 
    Asbtract ( 194 )  
    References | Related Articles | Metrics
     
     Abstract:  At LLVM intermediate representation level, we obtained program snippets that have influences on special program concerns and pruned those unrelated parts. By building accurate call graphs based on Andersen’s pointsto analysis, we got the basic blocks that reach the specific program node during execution; with the help of call graph and the modification information, we generated slices affecting the program point. Experimental result shows that this applied approach can compute subset that has impact on the program point efficiently and correctly.
    An Unmanned Ground Effect Vehicle Height Detection System Based on PSoC
    DENG Xinyu, WANG Qi
    2014, 0(4):  208-210. 
    Asbtract ( 205 )  
    References | Related Articles | Metrics
     
     Abstract:  This paper introduces an intelligent height detection system based on PSoC. Ultrasonic ranging module which consisted of NE555D chip and CX20106A chip, infrared distance sensor DP2D12 chip are constructed in unmanned ground effect vehicle, and the data fusion algorithm is used to process collected data for precise measurement of the height data. This paper sets focus on how to design and achieve the hardware of the height data collect sides, and multisensor data fusion based on adaptive weighted average algorithm. This system has the characteristics of high precision and simple construction, can realize unmanned ground effect aircraft in ground effect segment height detection.
    Tactile Rendering System Based on Electrovibration
    CHEN Sifan, LU Xiong
    2014, 0(4):  211-214. 
    Asbtract ( 172 )  
    References | Related Articles | Metrics
     
    Abstract:  Tactile rendering can render the surface texture of an object. And it has important significance in fields such as medical, military, educational and entertainment. This system increases the friction through increasing electrostatic attraction between finger and tactile panel. This system can realize more accurate and flexible tactile rendering.
    Motorscrew Mechanism’s Control System for Deflectable Nose Missile Based on AdamsSimulink
    LIANG Yichen, GU Liangxian, HU Handong
    2014, 0(4):  215-218. 
    Asbtract ( 182 )  
    References | Related Articles | Metrics
     
     Abstract:  Deflectable nose control is a new control method of missile. The motorscrew mechanism is a practical device which has simple structure and easily realization to drive the nose of the missile. Specific to the characteristic of the motorscrew mechanism, a PID controller with variable parameters is designed to control the deflection angle, and by RoungeKutta method, the cosimulation between Adams and MatlabSimulink is operated to verify the validity of the motorscrew mechanism. The result of the simulation indicated that this kind of mechanism has strong performance of high precision and fast response.
    Test System of Antigravity Casting Mould Filling Process Based on USB 2.0 Interface
    YANG Hui, YU Zirong, CHEN Lijuan, CAI Pengxiang
    2014, 0(4):  219-222. 
    Asbtract ( 172 )  
    References | Related Articles | Metrics
     
    Abstract:  This paper describes the design and implementation of the communication interface of the antigravity casting mould filling process test system based on USB 2.0. The system uses Cypress’s EZUSB FX2 series devices CY7C68013A as the main controller which support USB 2.0 highspeed transmission, to construct peripheral data acquisition circuit structures for fast transmission of data collection. And compared to the communication interface methods using standard serial interface, the system has advantages of high data transfer rate, realtime and high accuracy.